• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1359
  • 677
  • 268
  • 140
  • 114
  • 91
  • 67
  • 39
  • 37
  • 27
  • 25
  • 22
  • 21
  • 20
  • 20
  • Tagged with
  • 3323
  • 3323
  • 783
  • 666
  • 556
  • 386
  • 344
  • 297
  • 281
  • 278
  • 262
  • 245
  • 239
  • 235
  • 220
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
951

Trajetórias migratórias e construções identitárias de palestinos em Santa Catarina / Migratory trajectories and identity constructions of Palestinians in Santa Catarina

Soares, Gabriel Mathias 27 February 2013 (has links)
A trajetória dos imigrantes palestinos em Santa Catarina esteve marcada por redes sociais de solidariedade étnica e familiar. Dessa forma, em todo seu percurso, as questões identitárias estiveram fortemente presentes nessa imigração caracteristicamente autônoma, sem qualquer auxílio estatal, e urbana. Os vínculos familiares, étnicos e religiosos, forneceram os alicerces para inserção econômica e social, assim como para comunidades locais e associações entre imigrantes. Intimamente associada a este processo, a Questão Palestina se fez presente durante toda trajetória desses palestinos tanto como indivíduos, como parte de uma coletividade ligada a essa questão. Fortemente marcada na memória individual e coletiva, está a expropriação e/ou a ocupação da terra habitada por eles e/ou por seus familiares mais próximos, que os afeta de diversas maneiras (social, cultural, politica e economicamente), particularmente no que se refere às causas da emigração. Associável sempre a todos, entretanto, está o pertencimento a uma coletividade cuja identidade está em questão em muitos lugares do mundo. A busca pela emancipação de seu torrão natal torna-se assim um dos elementos fundamentais de sua identidade, que por sua vez se torna uma ferramenta indispensável para manutenção do direito de retorno daqueles que foram expulsos e de seus descendentes, como também contra a expulsão daqueles que lá permanecem. A inserção numa cultura diferente, bem como em outra realidade socio-política, trouxe mudanças e dilemas em relação aos hábitos e a própria autodefinição. Diante dessa realidade, a etnicidade foi mantida através do vínculo com a causa palestina, a família, a religião e a comunidade de imigrantes. Entretanto, o apego aos costumes e as tradições entre os palestinos em Santa Catarina não os fez menos brasileiros em sua visão, pois ao mesmo tempo incorporaram a nacionalidade brasileira a sua própria maneira. / The trajectory of Palestinian immigrants in Santa Catarina was marked by social networks of family and ethnic solidarity. Thus, throughout its path, the identity issues were strongly present in this characteristically autonomous, without any state aid, and urban immigration. Family ties, ethnic and religious, have provided the foundation for economic and social inclusion, as well as local communities and associations among immigrants. Closely associated with this process, the Palestine Question was present during the entire trajectory of these Palestinians as individuals, as part of a community linked to this issue. Strongly marked in individual and collective memory, is the expropriation and / or occupation of land where they and / or their close family members inhabit, which affects them in a variety of ways (socially, culturally, politically and economically), particularly in respect of the causes of emigration. Associable always to everyone, however, is belonging to a community whose identity is in question in many places around the world. The search for the emancipation of their homeland have thus becomes a fundamental element of their identity, which in turn becomes an indispensable tool for maintaining the right of return of those who were expelled and their descendants, as well as those who remain there resisting their expulsion. The setting in a different culture, as well as other socio-political reality, brought changes and dilemmas in relation to habits and their own self-definition. Having this reality in mind, ethnicity was maintained through ties with the Palestinian cause, family, religion and immigrant community. However, attachment to the customs and traditions among Palestinians in Santa Catarina did not make them less Brazilians in their view, because at the same time they incorporated Brazilian nationality in their own way.
952

Imagem-rede: convergência e deslinearidade entre produzir, compartilhar e interagir / -

Pereira, Raul Ernesto 31 October 2018 (has links)
O advento da internet, sobretudo das redes sociais, fez emergir um novo modelo de comunicação que, junto com os smartphones, impulsionou em larga escala a produção e circulação de imagens produzidas por aparelhos, isto é, as tecnoimagens. Objetivando identificar e conceituar as imagens-rede, reconhecidas pelo resultado da convergência entre a produção, circulação e a interação imagéticas, a presente dissertação recorre a uma revisão bibliográfica em torno desta temática para apontar não apenas as transformações inerentes a este universo conectado, mas evidenciar o deslocamento do uso das imagens em direção à centralidade do processo comunicacional em rede. Serão abordadas discussões em torno da produção imagética, dos aparelhos, das redes e da maneira como as recebemos e as distribuímos. Pretende-se, desta forma, subsidiar o pensamento crítico sobre o papel das imagens, suas funções e impactos, a fim da obtenção de maior consciência de como olhamos, interagimos e estabelecemos nossas relações com as imagens contemporâneas e também a partir delas. / The advent of the internet, especially the social networks, emerged with a new model of communication that, along with smartphones, boosted in large scale and production of images produced by apparatus, that is, as technoimagens. In order to identify and conceptualize as network-images, recognized as the result of the convergence between images production, circulation and interaction, the present dissertation appeals to a bibliographic review around this thematic to point out not only the transformations inherent to this connected universe, but to highlight the shift in the use of images towards the centrality of the networked communication process. Discussions around imagery production, devices, networks and the way they are received and distributed will be developed in this work. It is intended, therefore, to subsidize critical thinking about the role of images, their functions and their impacts, in order to increase the awareness of how do we look, interact and stablish our relations with the contemporary images and also from them.
953

Marché et réseaux : l'influence des liens interindividuels sur l'efficacité des échanges / Markets and networks : the influence of interpersonal links on trades' efficiency

Saba, Stéphanie 11 March 2016 (has links)
La définition et la mesure de la confiance restent toujours une ambiguïté en économie, sociologie et philosophie. Les "trois papiers" de cette thèse comparent, tout en considérant le niveau de confiance deux mécanismes de vente: la vente de gré à gré et la vente aux enchères. Le marché de Boulogne-sur-Mer, caractérisé par la coexistence stable de deux systèmes de vente constitue le centre de notre analyse empirique. Ces trois papiers sont précédés par une introduction générale et une revue de la littérature. Le premier papier est dédié à la comparaison des deux structures en termes de robustesse et de "nestedness", en s’appuyant sur de outils de réseaux employés par les écologistes. Le deuxième papier analyse la création des liens de confiance du côté de l’acheteur à l’aide d’un modèle de durée. La taille des acheteurs a son rôle sur la confiance. Le troisième papier s’intéresse à l’effet de l’indice de confiance sur les "outcomes" des transactions. Des graphes bipartis et homogènes montrent une différence de structure. Nos résultats affirment que le marché de gré à gré est plus atteint par la confiance comme l’information est centralisée. Les agents se basent sur cette confiance comme alternative au risque. Cela n’est pas le cas des enchères où l’information est connue. / How to define and measure trust is still an enigma in economics, philosophy and sociology. This "three papers" thesis compares two different mechanisms - egotiated(decentralised submarket) and auction (centralised submarket) - on the basis of trust. Through an empirical study, the level of trust is evaluated and its impact is analysed on the "Boulogne-sur-Mer" fish market characterised by a stable coexistence of these two mechanisms. The three papers are preceded by a general introduction and a literature review. Paper one aims at comparing the nestedness and the robustness of both submarkets. Social network tools of ecologists are applied in order to provide an answer. Paper two models trust creation on both structures from the buyer side using the survival analysis and considering the buyer size. Paper three studies the effect of a trust index on the outcomes of transactions. Bipartite and projected graphs reveal the difference between submarkets. This thesis shows that the negotiated market is marked by a higher level of trust as agents interact and are not fully informed about the market situation unlike the auction one where information is centralised. We believe that trust is a way out of risk when there is lack of information.
954

The academic social network and research ranking system. / CUHK electronic theses & dissertations collection

January 2013 (has links)
Fu, Zhengjia. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 107-116). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts also in Chinese.
955

Influence modeling and malicious users identification in interactive networks. / CUHK electronic theses & dissertations collection

January 2012 (has links)
由於在線社交網絡的龐大用戶群和口碑效應的病毒式傳播特點,使用少量用戶吸引大量用戶的定向廣告策略在病毒營銷中是非常有效的。公司可以先提供免費商品給在線社交網絡上的小部份用戶,然後依靠這些用戶推薦此產品給他們的好友,從而達到提升產品整體銷售額的目的。在本文中,我們考慮如下在線社交網絡中廣告投放的問題:給定廣告投放資本,比如固定數目的免費產品,公司需要決定在線社交網絡中用戶會最終購買的概率。為了研究此問題,我們把在線社交網絡模擬成擁有或者沒有高聚合係數的無標度圖。我們使用多個影響機制來刻畫如此大規模網絡中的影響傳播,并且使用本地平均場技術來分析這些節點狀態會被影響機制所改變的網絡。我們運行了大量的仿真實驗來驗證我們的理論模型。這些模型能夠為設計在線社交網絡中的有效廣告投放策略提供認識和指導。 / 雖然口碑效應的病毒式傳播能有效地促進產品銷售,但是它同時也為惡意行為提供了機會:不誠實用戶會故意給他們的好友提供錯誤的推薦從而擾亂正常的市場份額分配。為了解決這個問題,我們提出了一個通用的檢測框架,并基於此檢測框架制定了一系列完全分佈式的檢測算法來識別在線社交網絡中的不誠實用戶。我們考慮了不誠實用戶採取基本策略和智能策略兩種情況。我們通過計算假陽性概率,假陰性概率和檢測不誠實用戶所需要的時間的分佈來度量檢測算法的性能。大量的仿真實驗不僅說明了不誠實推薦所造成的影響,也驗證了檢測算法的有效性。我們還應用前面提到的通用檢測框架來解決無線網格網絡(wireless mesh network)和點對點視頻直播網絡(peer-to-peer live streaming network)中的污染攻擊問題。在應用了網絡編碼的無線網格網絡中,污染攻擊是一個很嚴重的安全問題。惡意節點能夠輕易地發動污染攻擊,從而造成污染數據包的病毒式傳播進而消耗網絡資源。前面提到的通用檢測框架也能被用來解決此安全問題。明確地說,我們使用基於時間的校驗碼和批量驗證機制來決定污染數據包的存在與否,然後提出一系列完全分佈式的檢測算法。即使智能攻擊者存在時,此檢測算法仍然有效。這裡智能攻擊者指的是那些為了降低被檢測到的概率從而假裝合法節點傳輸有效數據包的節點。並且,為了解決攻擊者合作注入污染數據包的情形并加速檢測,我們還提出了一個增強的檢測算法。我們也給出了規範的分析來度量檢測算法的性能。最後,仿真實驗和系統原型驗證了我們的理論分析以及檢測算法的有效性。 / 污染攻擊還會對點對點視頻直播網絡基礎設施造成嚴重影響,比如說,它能夠減少網絡中的攻擊問題,我們仍然基於前面提到的通用檢測框架提出了分佈式的檢測算法來識別污染攻擊者。我們也提供了理論分析來度量檢測算法的性能從而證明了算法的有效性。 / Due to the large population in online social networks and the epidemic spreading of word-of-mouth effect, targeted advertisement which use a small fraction of buyers to attract a large population of buyers is very efficient in viral marketing, for example, companies can provide incentives (e.g., via free samples of a product) to a small group of users in an online social network, and these users can provide recommendations to their friends so as to increase the overall sales of the product. In particular, we consider the following advertisement problem in online social networks: given a fixed advertisement investment, e.g., a number of free samples, a company needs to determine the probability that users in the online social network will eventually purchase the product. To address this problem, we model online social networks as scale-free graphs with/without high clustering coefficient. We employ various influence mechanisms that govern the influence spreading in such large scale networks and use the local mean field technique to analyze them wherein states of nodes can be changed by various influence mechanisms. We carry out extensive simulations to validate our models which can provide insight on designing efficient advertising strategies in online social networks. / Although epidemic spreading of word-of-mouth effect can increase the sales of a product efficiently in viral marketing, it also opens doors for “malicious behaviors: dishonest users may intentionally give wrong recommendations to their friends so as to distort the normal sales distribution. To address this problem, we propose a general detection framework and develop a set of fully distributed detection algorithms to discover dishonest users in online social networks by applying the general detection framework. We consider both cases when dishonest users adopt (1) baseline strategy, and (2) intelligent strategy. We quantify the performance of the detection algorithms by deriving probability of false positive, probability of false negative and distribution function of time needed to detect dishonest users. Extensive simulations are carried out to illustrate the impact of dishonest recommendations and the effectiveness of the detection algorithms. / We also apply the general detection framework to address the problem of pollution attack in wireless mesh networks (WMNs) and peer-to-peer (P2P) streaming networks. Epidemic attack is a severe security problem in network-coding enabled wireless mesh networks, and malicious nodes can easily launch such form of attack to create an epidemic spreading of polluted packets and deplete network resources. The general detection framework can also be applied to address such security problem. Specifically, we employ the time-based checksum and batch verification to determine the existence of polluted packets, then propose a set of fully distributed detection algorithms. We also allow the presence of “smart attackers, i.e., they can pretend to be legitimate nodes to probabilistically transmit valid packets so as to reduce the chance of being detected. To address the case when attackers cooperatively inject polluted packets and speed up the detection, an enhanced detection algorithm is also developed. Furthermore, we provide formal analysis to quantify the performance of the detection algorithms. At last, simulations and system prototyping are also carried out to validate the theoretic analysis and show the effectiveness and efficiency of the detection algorithms. / To address the problem of pollution attack in P2P streaming networks, which is known to have a disastrous effect on existing P2P infrastructures, e.g., it can reduce the number of legitimate users by as much as 85%, we also propose distributed detection algorithms to identify pollution attackers by applying the general framework. Moreover, we provide theoretical analysis to quantify the performance of the detection algorithms so as to show their effectiveness and efficiency. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Li, Yongkun. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 148-157). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Influence Modeling in Online Social Networks --- p.7 / Chapter 2.1 --- Scale-free Graphs without High Clustering Coefficient --- p.8 / Chapter 2.1.1 --- Modeling Online Social Networks --- p.8 / Chapter 2.1.2 --- q-influence Model --- p.11 / Chapter 2.1.3 --- m-threshold Influence Model --- p.14 / Chapter 2.1.4 --- Majority Rule Influence Model --- p.16 / Chapter 2.2 --- Scale-free Graphs with High Clustering Coefficient --- p.19 / Chapter 2.3 --- Generalized Influence Models --- p.21 / Chapter 2.3.1 --- Deterministic Influence Model --- p.21 / Chapter 2.3.2 --- Probabilistic Influence Model --- p.25 / Chapter 2.4 --- Multi-state Model --- p.27 / Chapter 2.4.1 --- Example of 3-State Majority Rule --- p.32 / Chapter 3 --- Identifying Dishonest Recommenders in Online Social Networks --- p.35 / Chapter 3.1 --- General Detection Framework --- p.37 / Chapter 3.2 --- Modeling the Behaviors of Users --- p.41 / Chapter 3.2.1 --- Products and Recommendations --- p.41 / Chapter 3.2.2 --- Behaviors of Users --- p.43 / Chapter 3.3 --- Distributed Detection Algorithms --- p.45 / Chapter 3.3.1 --- Identifying Dishonest Recommenders when Baseline Strategy is Adopted --- p.46 / Chapter 3.3.2 --- Identifying Dishonest Recommenders when Intelligent Strategy is Adopted --- p.53 / Chapter 3.3.3 --- Complete Detection Algorithm --- p.57 / Chapter 3.4 --- Cooperative Algorithm to Speed up the Detection --- p.58 / Chapter 3.5 --- Algorithm Dealing with User Churn --- p.61 / Chapter 4 --- Identifying Pollution Attackers in Network Coding Enabled Wireless Mesh Networks --- p.64 / Chapter 4.1 --- Introduction on Wireless Mesh Networks and Pollution Attack --- p.64 / Chapter 4.2 --- Network Coding and Time-based Checksum Batch Verification --- p.66 / Chapter 4.3 --- Basic Detection Algorithms --- p.70 / Chapter 4.3.1 --- Core Idea of the Detection Algorithms --- p.71 / Chapter 4.3.2 --- Attackers with Imitation Probability δ = 0 --- p.74 / Chapter 4.3.3 --- Attackers with Imitation Probability δ > 0 --- p.78 / Chapter 4.3.4 --- Improvement on Probability of False Negative --- p.81 / Chapter 4.4 --- Enhanced Detection Algorithm --- p.82 / Chapter 4.4.1 --- Detection Algorithm --- p.82 / Chapter 4.4.2 --- Performance Analysis --- p.87 / Chapter 4.4.3 --- Detection Acceleration --- p.91 / Chapter 4.5 --- Alternative Detection Algorithms --- p.92 / Chapter 5 --- Identifying Pollution Attackers in Peer-to-Peer Live Streaming Systems --- p.95 / Chapter 5.1 --- Introduction on Peer-to-Peer Streaming Systems and the Problem of Pollution Attack --- p.95 / Chapter 5.2 --- Detection Algorithms --- p.97 / Chapter 5.2.1 --- Imitation Probability δ = 0 --- p.99 / Chapter 5.2.2 --- Imitation Probability δ > 0 --- p.102 / Chapter 5.2.3 --- Improvement on Probability of False Negative --- p.104 / Chapter 6 --- Performance Evaluation --- p.106 / Chapter 6.1 --- Influence Modeling in Online Social Networks --- p.107 / Chapter 6.1.1 --- Online Social Networks without High Clustering Coefficient --- p.107 / Chapter 6.1.2 --- Online Social Networks with High Clustering Coefficient --- p.113 / Chapter 6.1.3 --- Performance Evaluation of the Multi-state Model --- p.116 / Chapter 6.2 --- Performance Evaluation of the Detection Algorithms in Online Social Networks --- p.118 / Chapter 6.2.1 --- Synthesizing Dynamically Evolving Online Social Networks --- p.118 / Chapter 6.2.2 --- Impact of Wrong Recommendations --- p.120 / Chapter 6.2.3 --- Performance Evaluation of the Detection Algorithms --- p.121 / Chapter 6.3 --- Performance Evaluation of the Detection Algorithms in Wireless Mesh Networks --- p.126 / Chapter 6.3.1 --- Performance of the Basic Detection Algorithms --- p.126 / Chapter 6.3.2 --- Results from System Prototype --- p.131 / Chapter 6.3.3 --- Performance of the Enhanced Detection Algorithm --- p.132 / Chapter 6.4 --- Performance Evaluation of the Detection Algorithms in Peer-topeer Streaming Networks --- p.136 / Chapter 6.4.1 --- Performance of the Baseline Algorithm --- p.136 / Chapter 6.4.2 --- Performance of the Randomized Algorithm --- p.138 / Chapter 6.4.3 --- Derive Optimal Uploading Probability --- p.141 / Chapter 7 --- RelatedWork and Conclusion --- p.143
956

Hitch-hiking attacks in online social networks and their defense via malicious URL classification. / CUHK electronic theses & dissertations collection

January 2012 (has links)
近年來,網絡的犯罪數量一直在迅速增加。現在,惡意軟件作者編寫惡意程序竊取用戶的個人信息,或提供基於垃圾郵件的營銷服務為利潤的地方。為了更有效地傳播惡意軟件,黑客已經開始瞄準流行的在線社交網絡服務(SNS)的 SNS用戶和服務的互動性之間固有的信任關係。一種常見的攻擊方法是惡意軟件自動登錄使用偷來的 SNS用戶憑據,然後提供接觸/被盜的用戶帳戶的朋友名單,他們通過在一些短消息嵌入惡意 URL(鏈接)。受害人然後認為是他們的朋友提供的鏈接,按一下被感染。然而,這種方法是有效的,惡意軟件來模仿人類類似的行為,它可以超越任何一個/兩個班輪對話。在這篇論文中,我們首先介紹一個新類型的攻擊,提供惡意網址 SNS用戶之間的合法對話。為了證明其概念,我們設計和實施名為 Hitchbot惡意軟件[1],其中包括多個攻擊源,為實現我們所提出的攻擊。特別是,當一個 SNS用戶發送一個鏈接/ URL到他/她的朋友,Hitchbot悄悄地取代類似,但惡意攔截在幾個可能的點之一,互動式輸入/輸出鏈接系統。由於惡意鏈接在一些適當的對話上下文之間的合法用戶交付,這使得它更難以對受害者(以及吊具)來實現攻擊,從而可以大幅增加轉換率。這方法也使 Hitchbot的繞過大多數現有的防禦計劃,主要是靠對用戶的行為或流量異常檢測。 Hitchbot是基於客戶端模塊的形式可以順利上常見的社交網絡服務,包括雅虎和微軟的郵件客戶端和其他基於 Web瀏覽器,如 Facebook和 MySpace的社交網絡服務的加息。為量化 Hitchbot的效力,我們已經研究,交換和處理對 URL操作時用戶的行為。最後,我們研究通過自動在線分類 /識別惡意網址的可行性。尤其是不同類型的屬性/惡意 URL分類功能的有效性進行量化,從不同的惡意網址數據庫中獲得數據的基礎上,我們也考慮實時的準確性,嚴格的延遲要求影響和權衡需求的惡意網址分類。 / The number of cyber crimes has continued to increase rapidly in the recent years. It is now commonplace for malware authors to write malicious programs for prot by stealing user personal information or providing spam-based marketing services. In order to spread malware more effectively, hackers have started to target popular online social networking services (SNS) due to the inherent trust-relationship between the SNS users and the interactive nature of the services. A common attacking approach is for a malware to automatically login using stolen SNS user cre¬dentials and then deliver malicious URLs (links) to the people on the contact/friend-list of the stolen user account by embedding them in some short messages. The victim then gets infected by clicking on the links thought to be delivered by their friends. However, for this approach to be effective, the malware has to mimic human-like behavior which can be quite challenging for anything beyond one/two-liner conversations. In this thesis, we first introduce a new type of attacks called the social hitch-hiking attacks which use a stealthier way to deliver malicious URLs by hitch-hiking on legitimate conversations among SNS users. As a proof-of-concept, we have designed and implemented a malware named Hitchbot [1] which incorporates multiple attack vectors for the realization of our proposed social hitch-hiking attacks. In particular, when a SNS user sends a link/URL to his/her friends, Hitchbot quietly replaces it with a similar-looking, but malicious one by intercepting the link at one of the several pos¬sible points along the interactive-input/output chain of the system. Since the malicious link is delivered within some proper conversation context between the legitimate users, this makes it much more difficult for the victim (which is also the spreader) to realize the attack and thus can increase the conversion rate substantially. The hitch-hiking approach also enables Hitchbot to bypass most existing defense schemes which mainly rely on user-behavior or traffic anomaly detection. Hitchbot is in form of a client-based module which can hitch-hike on common social networking services including the Yahoo and Microsoft Messaging clients and other web-browser-based social-networking services such as Facebook and Myspace. To quantify the effectiveness of Hitchbot, we have studied the behavior of users in exchanging, handling and operating on URLs. Lastly, we study the feasibility of defending hitching-hiking attacks via automated online classification/identification of malicious URLs. In particular, the effectiveness of different types of attributes/features used in malicious URL classification are quantified based on a data obtained from various malicious URL databases. We also consider the implications and trade-offis of stringent latency requirement on the accuracy of real-time, on-demand malicious URL classifications. / Detailed summary in vernacular field only. / Lam, Ka Chun. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 43-48). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts also in Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Organization --- p.4 / Chapter 2 --- Related Work --- p.6 / Chapter 2.1 --- Exploiting Social Networking Services --- p.6 / Chapter 2.1.1 --- Malware Spreading Channels in SNS --- p.7 / Chapter 2.1.2 --- Common Exploits on SNS platforms --- p.10 / Chapter 2.2 --- Recent defense mechanisms of Malware --- p.12 / Chapter 3 --- A New Class of Attacks via Social Hitch-hiking --- p.14 / Chapter 3.1 --- The Social Hitch-hiking Attack --- p.14 / Chapter 3.1.1 --- The Interactive User Input/Output Chain --- p.16 / Chapter 3.1.2 --- Four Attack Vectors --- p.17 / Chapter 4 --- Attack Evaluation and Measurement --- p.26 / Chapter 4.1 --- Comparison of Attack Vectors --- p.26 / Chapter 4.2 --- Attack Measurement --- p.27 / Chapter 4.3 --- Defense against Hitch-hiking Attacks --- p.29 / Chapter 5 --- Defense via Malicious URL Classification --- p.31 / Chapter 5.1 --- Methodology --- p.31 / Chapter 5.2 --- Attributes --- p.33 / Chapter 5.2.1 --- Lexical attributes --- p.34 / Chapter 5.2.2 --- Webpage content attributes --- p.34 / Chapter 5.2.3 --- Network attributes --- p.34 / Chapter 5.2.4 --- Host-based attributes --- p.35 / Chapter 5.2.5 --- Link popularity attributes --- p.36 / Chapter 5.3 --- Performance Evaluation and Discussions --- p.36 / Chapter 6 --- Conclusion and Future work --- p.41
957

A social capital perspective on IT professionals' work behavior and attitude.

Zhang, Lixuan 08 1900 (has links)
Abstract Attracting and developing information technology (IT) professionals is one of the top concerns for companies. Although much research has been conducted about the job behavior and attitudes of IT professionals over the last three decades, findings are inconclusive and contradictory. This suggests that something may be missing in how we examine this phenomenon. Most of this research is drawn from theories of motivation, very little examines the effect of social relationships on IT professionals' behavior and attitude. Yet, social capital theory suggests that job behavior and attitude may be greatly influenced by these relationships. This suggests that IT professionals' social capital warrants empirical examination. The primary research question that this dissertation addresses is how social capital affects IT professionals' work attitude and behavior including job satisfaction, organizational citizenship behavior, job performance and turnover intention. The research model in this dissertation examines the influence of three aspects of social capital on IT professionals' job attitude and work behavior: tie strength, the number of ties and the structural holes. Data were collected from 129 IT professionals from a range of jobs, organizations and industries. Results indicate that tie strength in the organization of an IT professional is positively related to job satisfaction. The number of ties outside an organization an IT professional has is also positively related to job performance. However, hypotheses about organizational citizenship behavior and turnover intention are not supported. Several implications for organizational executives and managers are offered based on findings.
958

Esfaqueamento no púlpito: o comércio e suas elites em Cachoeira do Sul na segunda metade do séc. XIX (1845-1865)

Fagundes, Rosicler Maria Righi 03 April 2009 (has links)
Made available in DSpace on 2015-03-03T19:30:54Z (GMT). No. of bitstreams: 0 Previous issue date: 3 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / Essa investigação dedica-se a estudar as elites mercantis de Cachoeira do Sul, no período compreendido entre 1845e 1865. O estudo sobre comerciantes no período Imperial no Rio grande do Sul é um tema ainda pouco explorado pela historiografia, por isso buscaremos entender a atuação e as estratégias utilizadas para a inserção deste grupo na sociedade oitocentista. Utilizaremos como guia a trajetória do comerciante Antonio Vicente da Fontoura. Para compreender os sujeitos pertencentes às elites mercantis utilizamos como fonte principal os inventários post-mortem, além da documentação avulsa pertencente à Câmara de Vereadores de Cachoeira do Sul, processos crimes e fontes privadas. Contudo, se ocupar um lugar na elite mercantil significava ter poder econômico, esse não bastava para manter-se no topo. Com isso, havia a necessidade de tecer redes horizontais e verticais. Dessa interação com os pares e os subalternos as elites mercantis se reiteravam no poder e se inseriam politicamente. / This inquiry is dedicated to study the mercantile elites of Cachoeira do Sul, in the period from 1845 to 1865. The study about merchants in the Imperial period in Rio Grande do Sul is a subject still very little explored by the historiography. That is why we will seek to understand the actions and strategies adopted for the insertion of this group in the eight hundredth’s society, using the path of the merchant Antonio Vicente da Fontoura as a guideline. In order to understand the subjects belonging to the mercantile elites, the main source used was the post-mortem inventories, as well as the documentation found in the city council of Cachoeira do Sul, crime processes and private sources. However, if occupying a place in the mercantile elite meant having economical power, that was not enough to maintain oneself on the top. Therefore, there was the need to weave vertical and horizontal networks. From that interaction with the pairs and the subordinates the mercantile elites were confirmed in the power and inse
959

Imagem-rede: convergência e deslinearidade entre produzir, compartilhar e interagir / -

Raul Ernesto Pereira 31 October 2018 (has links)
O advento da internet, sobretudo das redes sociais, fez emergir um novo modelo de comunicação que, junto com os smartphones, impulsionou em larga escala a produção e circulação de imagens produzidas por aparelhos, isto é, as tecnoimagens. Objetivando identificar e conceituar as imagens-rede, reconhecidas pelo resultado da convergência entre a produção, circulação e a interação imagéticas, a presente dissertação recorre a uma revisão bibliográfica em torno desta temática para apontar não apenas as transformações inerentes a este universo conectado, mas evidenciar o deslocamento do uso das imagens em direção à centralidade do processo comunicacional em rede. Serão abordadas discussões em torno da produção imagética, dos aparelhos, das redes e da maneira como as recebemos e as distribuímos. Pretende-se, desta forma, subsidiar o pensamento crítico sobre o papel das imagens, suas funções e impactos, a fim da obtenção de maior consciência de como olhamos, interagimos e estabelecemos nossas relações com as imagens contemporâneas e também a partir delas. / The advent of the internet, especially the social networks, emerged with a new model of communication that, along with smartphones, boosted in large scale and production of images produced by apparatus, that is, as technoimagens. In order to identify and conceptualize as network-images, recognized as the result of the convergence between images production, circulation and interaction, the present dissertation appeals to a bibliographic review around this thematic to point out not only the transformations inherent to this connected universe, but to highlight the shift in the use of images towards the centrality of the networked communication process. Discussions around imagery production, devices, networks and the way they are received and distributed will be developed in this work. It is intended, therefore, to subsidize critical thinking about the role of images, their functions and their impacts, in order to increase the awareness of how do we look, interact and stablish our relations with the contemporary images and also from them.
960

Migração, redes e inserção cultural: estudo de caso dos migrantes nordestinos em Anastácio (MS)

Trevizan, Fernanda Kiyome Fatori 31 March 2011 (has links)
Made available in DSpace on 2017-07-21T18:13:48Z (GMT). No. of bitstreams: 1 Fernanda Kiyome Fatori Trevizan.pdf: 2424030 bytes, checksum: b8197dcf95aa479091b1757077d0051e (MD5) Previous issue date: 2011-03-31 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / Societies are increasingly multicultural; the fact is due mainly to migration between cities, regions and countries. The patterns of displacement of people often occur cause to the existence of social networks between the cities involved in the migration process, as these networks establish the connection between the points and facilitates the flow of people. To migrate to other places, people carry with them their cultural characteristics (habits, customs, traditions, events) that pass to enter the location where they are established, enabling the emergence of a "his territory" on the other, from its manifestations cultural. Using the analysis through social networks, this paper presents a case study of northeastern migrants Anastácio (MS), where they established their connections to migration and inserted their culture that, even with the mixing with the local cultures, became the higher expression of cultural location. / As sociedades estão cada vez mais multiculturais, o fato se deve principalmente, aos movimentos migratórios entre cidades, regiões e países. Os fluxos de deslocamento das pessoas, muitas vezes, ocorrem em razão da existência de redes sociais entre as localidades envolvidas no processo migratório, pois estas redes estabelecem a conexão entre os pontos e viabiliza os fluxos das pessoas. Ao migrarem para outros locais, as pessoas levam consigo suas características culturais (hábitos, costumes, tradições, manifestações) que passam a influenciar na localidade em que se estabelecem, possibilitando o surgimento de um “território seu” em outro, a partir de suas manifestações culturais. A partir da análise através das redes sociais, este trabalho apresenta o estudo de caso dos migrantes nordestinos em Anastácio (MS), onde estabeleceram suas conexões para migração e inseriram sua cultura que, mesmo com a miscigenação com as culturas locais, tornou-se a maior expressão cultural da localidade.

Page generated in 0.0455 seconds