• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 1
  • 1
  • Tagged with
  • 7
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Therapists' experiences in adopting technology as a therapeutic medium with children / Deborah Jean Cotton

Cotton, Deborah Jean January 2014 (has links)
Children, growing up in this digital era incorporate technology into play, communication and learning. Therapists working with children endeavour to use mediums with which children are familiar and thus need to make a decision whether to include technology in or exclude technology from their therapeutic environments. This is no easy decision, in the midst of negative publicity regarding the role technology plays in children‘s lives. A deeper understanding of what encourages or discourages therapists from using technology as a therapeutic medium with children could guide practitioners in their decisions regarding the use of technology in therapy. The aim of this study was to explore and describe experiences of therapists using technology, as a therapeutic medium with children. A qualitative multiple case study design was used. Experiences were defined as the “active process" of reinterpreting the "physical, perceptual, affective and cognitive aspects" of being exposed to events to bring about a change in response options (McKnight & Sechrest, 2003:471). Data were collected by means of semi-structured interviews and visual data. Seven therapists participated in the research, selected by means of non-probability purposive sampling and snowball sampling. Collected data and reflective field notes were analysed thematically, using an inductive, interpretive approach, guided by a theoretical framework, the Theory of Reasoned Action (TRA). Findings indicated that all participants were aware that children find technology appealing, but participants who were older or psychodynamically orientated were less inclined to incorporate technology as a therapeutic medium. Participants who were experimental by nature used technology as a therapeutic medium with some caution. Experimentally inclined participants who had received training in using technology used technology not only as a therapeutic medium, but also more confidently as a play medium. Participants were deterred mainly by the uncertainty of the therapeutic value of technology, the lack of ethical guidelines regulating the use of technology in therapy and the concern that technology may interfere with the therapeutic process. Further research regarding parents’ and child-clients’ perspectives of using technology in therapy would perhaps reduce speculative perceptions. Research regarding therapists’ values and perceptions of technology as a therapeutic medium could guide stakeholders in their development of training programs and necessary ethical guidelines. / MA (Psychology), North-West University, Potchefstroom Campus, 2015
2

Therapists' experiences in adopting technology as a therapeutic medium with children / Deborah Jean Cotton

Cotton, Deborah Jean January 2014 (has links)
Children, growing up in this digital era incorporate technology into play, communication and learning. Therapists working with children endeavour to use mediums with which children are familiar and thus need to make a decision whether to include technology in or exclude technology from their therapeutic environments. This is no easy decision, in the midst of negative publicity regarding the role technology plays in children‘s lives. A deeper understanding of what encourages or discourages therapists from using technology as a therapeutic medium with children could guide practitioners in their decisions regarding the use of technology in therapy. The aim of this study was to explore and describe experiences of therapists using technology, as a therapeutic medium with children. A qualitative multiple case study design was used. Experiences were defined as the “active process" of reinterpreting the "physical, perceptual, affective and cognitive aspects" of being exposed to events to bring about a change in response options (McKnight & Sechrest, 2003:471). Data were collected by means of semi-structured interviews and visual data. Seven therapists participated in the research, selected by means of non-probability purposive sampling and snowball sampling. Collected data and reflective field notes were analysed thematically, using an inductive, interpretive approach, guided by a theoretical framework, the Theory of Reasoned Action (TRA). Findings indicated that all participants were aware that children find technology appealing, but participants who were older or psychodynamically orientated were less inclined to incorporate technology as a therapeutic medium. Participants who were experimental by nature used technology as a therapeutic medium with some caution. Experimentally inclined participants who had received training in using technology used technology not only as a therapeutic medium, but also more confidently as a play medium. Participants were deterred mainly by the uncertainty of the therapeutic value of technology, the lack of ethical guidelines regulating the use of technology in therapy and the concern that technology may interfere with the therapeutic process. Further research regarding parents’ and child-clients’ perspectives of using technology in therapy would perhaps reduce speculative perceptions. Research regarding therapists’ values and perceptions of technology as a therapeutic medium could guide stakeholders in their development of training programs and necessary ethical guidelines. / MA (Psychology), North-West University, Potchefstroom Campus, 2015
3

Adding value to business performance through cost benefit analyses of information security investments : MBA-thesis in marketing

Cardholm, Lucas January 2007 (has links)
<p>The purpose of this thesis is to present an approach for good practice with regards to using cost benefit analysis (CBA) as a value-adding activity in the information security investment process for large enterprises. The approach is supported by empirical data.</p><p>From a MIO model perspective, this report is focused on the phase of strategic choices regarding organization, i.e. trying to find optimal investments for efficient operations. To assess, improve and monitor the operational effectiveness and management’s internal control environment is essential in today’s business execution. Executive management and boards are increasingly looking for an information security governance framework that encompasses information technology and information security: a single framework through which all information assets and activities within the organisation can be governed, to provide the optimum capability for meeting the organisation’s objectives, in terms of functionality and security.</p><p>The investment decision is one of the most visible and controversial key decisions in an enterprise. Some projects are approved, others are bounced, and the rest enter the organisational equivalent of suspended animation with the dreaded request from the decision makers to “redo the business case” or “provide more information.”</p><p>The concept of cost benefit analyses of information security helps management to make decisions on which initiatives to fund with how much, as there needs to be an approach for measuring and comparing different alternatives and how they meet business objectives of the enterprise. Non-financial metrics are identified using different approaches: governance effectiveness, risk analysis, business case analysis or game theory. The financial performance metrics are driven by the main value disciplines of an enterprise. These lead to the use of formulas enabling the measurement of asset utilisation, profit or growth: ROI (ROIC), NPV, IRR (MIRR), FCF, DCF, Payback Period, TCO, TBO, EVA, and ROSI.</p><p>The author shows research in the field of good corporate governance and the investment approval process, as well as case studies from two multinational enterprises. The case from Motorola demonstrates how IT governance principles are equally applicable to information security governance, while the case from Ericsson demonstrates how an information security investment decision can be supported by performing a cost benefit analysis using traditional marketing approaches of business case analysis (BCA) and standard financial calculations.</p><p>The suggested good practice presented in this thesis is summarised in four steps:</p><p>1. Understand main rationale for the security investment</p><p>2. Identify stakeholders and strategic goals</p><p>3. Perform Cost Benefit Analysis (non-financial and financial performance metrics)</p><p>4. Validate that the results are relevant to stakeholders and strategic goals</p><p>DISCLAIMER</p><p>This report is intended for academic training only and should not be used for any other purposes. The contents are not to be considered legal or otherwise professional advice. No liability is taken, whatsoever, by the author.</p>
4

Adding value to business performance through cost benefit analyses of information security investments : MBA-thesis in marketing

Cardholm, Lucas January 2007 (has links)
The purpose of this thesis is to present an approach for good practice with regards to using cost benefit analysis (CBA) as a value-adding activity in the information security investment process for large enterprises. The approach is supported by empirical data. From a MIO model perspective, this report is focused on the phase of strategic choices regarding organization, i.e. trying to find optimal investments for efficient operations. To assess, improve and monitor the operational effectiveness and management’s internal control environment is essential in today’s business execution. Executive management and boards are increasingly looking for an information security governance framework that encompasses information technology and information security: a single framework through which all information assets and activities within the organisation can be governed, to provide the optimum capability for meeting the organisation’s objectives, in terms of functionality and security. The investment decision is one of the most visible and controversial key decisions in an enterprise. Some projects are approved, others are bounced, and the rest enter the organisational equivalent of suspended animation with the dreaded request from the decision makers to “redo the business case” or “provide more information.” The concept of cost benefit analyses of information security helps management to make decisions on which initiatives to fund with how much, as there needs to be an approach for measuring and comparing different alternatives and how they meet business objectives of the enterprise. Non-financial metrics are identified using different approaches: governance effectiveness, risk analysis, business case analysis or game theory. The financial performance metrics are driven by the main value disciplines of an enterprise. These lead to the use of formulas enabling the measurement of asset utilisation, profit or growth: ROI (ROIC), NPV, IRR (MIRR), FCF, DCF, Payback Period, TCO, TBO, EVA, and ROSI. The author shows research in the field of good corporate governance and the investment approval process, as well as case studies from two multinational enterprises. The case from Motorola demonstrates how IT governance principles are equally applicable to information security governance, while the case from Ericsson demonstrates how an information security investment decision can be supported by performing a cost benefit analysis using traditional marketing approaches of business case analysis (BCA) and standard financial calculations. The suggested good practice presented in this thesis is summarised in four steps: 1. Understand main rationale for the security investment 2. Identify stakeholders and strategic goals 3. Perform Cost Benefit Analysis (non-financial and financial performance metrics) 4. Validate that the results are relevant to stakeholders and strategic goals DISCLAIMER This report is intended for academic training only and should not be used for any other purposes. The contents are not to be considered legal or otherwise professional advice. No liability is taken, whatsoever, by the author.
5

Dreamers of the Dark: Kerry Bolton and the Order of the Left Hand Path, a Case-study of a Satanic/Neo-Nazi Synthesis

van Leeuwen, Wilhelmus Roelof January 2008 (has links)
In 1990 a small self-published journal/magazine called The Watcher was distributed among New Zealand's occult underground. The Watcher described itself as 'the New Zealand Voice of the Left Hand Path', and was published as the journal of the Order of the Left Hand Path. The Watcher and the Order directed its attentions towards those occultists who identified themselves as Satanists and, as such, the journal articulated a distinctly Satanic philosophy and perspective. However, as the journal evolved and developed, renaming itself as The Heretic and The Nexus in later years, there arose alongside Satanic philosophy an increasing emphases on what could be called esoteric Nazism or esoteric Nationalism. Given that the editor of The Watcher was Kerry Bolton, a man who has been immersed in New Zealand's Nationalist/neo-Nazi movement since the early 1970s, such an increasingly political orientation was perhaps unsurprising. This thesis examines the way in which the Order bought Satanic and neo-Nazi ideologies together and the resulting synthesis. It also looks at the transition from being a Satanic order led by a neo-Nazi to an openly neo-Nazi Order that uses Satanic philosophy to justify and popularise its conception of National Socialism.
6

Biennial Oscillation Of Indian Summer Monsoon And Global Surface Climate In The Present Decade

Menon, Arathy 07 1900 (has links)
The ENSO-monsoon system is known to have a biennial component. Here we show using high resolution satellite data, mainly daily rainfall and sea surface temperature (SST) from the Tropical Rainfall Measuring Mission (TRMM), and daily scatterometer surface winds from QuickSCAT, that there is a clear biennial oscillation (TBO) in summer monsoon rainfall over Central India – Bay of Bengal (Cl-BoB) and the far west Pacific in the period 1999-2005. Summer (JJAS) mean rainfall oscillates between high and low values in alternate years; the rainfall is high in the odd years 1999, 2001, 2003, and 2005, and low in even years 2000, 2002 and 2004. The amplitude of the oscillation is significant, as measured against the long term standard deviation of seasonal rain based on 1979-2005 Global Precipitation Climatology Project (GPCP) data. We find that the TBO in rainfall is associated with TBO of SST over the tropical Indian, west Pacific and Atlantic Oceans in different seasons. There is no TBO in east Pacific SST, and no strong El Nino in this period. The TBO of SST is related to change in evaporation due to TBO of surface wind speed. A TBO of the surface branch of the Walker circulation in the eastern Indian and western Pacific basins is clearest in the autumn season during 1999-2005. There is a clear relation between a large-amplitude TBO of winter surface air temperature over north Asia associated with TBO of the Arctic oscillation (AO), and the TBO of summer monsoon rainfall. High rainfall over CI-BoB lin summer is followed by a relatively high value of the AO Index, and warm air termperature over north Asia in the succeeding winter. The Inter Tropical Convergence Zone(ITCZ) over the central Pacific and Atlantic Oceans shift north by about two degrees when the northern hemisphere is warm, reminiscent of the behaviour of the climate system of ENSO, decadal and palaeoclimate time scales. In this thesis we document the biennial oscillation of monsoon rain and its spatial structure in the recent period, and its relation with biennial oscillation of surface climate over the global tropics and extratropical regions. The existence of TBO in the tropical Atlantic, and its relation with the monsoon, is a new finding. We demonstrate that the interannual variability of the summer monsoon during 1999-2005, including the drought of 2002, is part of a pervasive TBO of global surface climate.
7

Výběr informačního systému / Information System Selection

Kornelly, Roman January 2015 (has links)
The thesis aims to describe the selection of a new information system, which should lead to process streamlining and a boost in the number of customers at Rumburak s.r.o. The first chapter lays out the theoretical knowledge needed to tackle the task at hand. The following section analyzes the internal and external environment of the company and the implications thereof. The proposal portion contains a comparison of the available information systems and selects the best among them. It develops a schedule for the implementation of the new IS, along with identifying the benefits and economic evaluation of the entire proposal.

Page generated in 0.0376 seconds