• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 504
  • 120
  • 66
  • 35
  • 30
  • 28
  • 18
  • 15
  • 10
  • 5
  • 4
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 1021
  • 217
  • 212
  • 166
  • 142
  • 123
  • 120
  • 104
  • 99
  • 92
  • 80
  • 77
  • 77
  • 72
  • 67
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
411

System polarities and alliance politics

Kim, Sung Woo 01 December 2012 (has links)
The end of the Cold War in 1990 was followed by a shift from a bipolar to a unipolar world, profoundly transforming the nature of international alliance politics. Then, what are the systemic features of the unipolar system that have changed alliance relations in comparison to the previous bipolar and multipolar world? How can we explain the diverse reaction of the U.S. allies in different regions in response to the U.S. request for the modification of alliance functions and reshaping of the alliance burden sharing? How do we measure and interpret changes in the nature of alliance politics in a unipolar system? The goal of this project is to provide a systematic answer to these questions. Focusing on international system polarities and alliance burden sharing behavior, this dissertation builds a framework for understanding the dynamics of alliance politics. In particular, I argue that alliance burden sharing as an empirical indicator plays a critical role in explaining the changed nature of the unipolar alliance system. First, I examine how the two interrelated systemic factors - external threat and the distribution of power - influence alliance burden sharing with a system-level analysis by utilizing a quantitative method with state-year burden sharing data from 1885 to 2000. Second, I present case studies of South Korea and Japan's alliance burden sharing in the post-Cold War period. A central argument of the dissertation is that the role and function of alliance is determined by structural constraints of different international system polarities. Specifically, this project demonstrates that burden sharing is a key factor representing the impact of systemic properties of unipolarity on the behavioral changes in alliance politics.
412

Hot och våld mot sjuksköterskor

Aradean, Denisa, Siverhag, Karolina January 2018 (has links)
Bakgrund: Hot och våld är ett vanligt förekommande fenomen som sjuksköterskor möter. Patienter är den dominerande gruppen som utför dessa handlingar. Det finns ett flertal orsaker till hot och våld, som bland annat beror på brister i organisationen, missnöje hos patienten, omständigheter hos patienten som framkallar hot och våld eller faktorer hos sjuksköterskan som provocerar våldsutövaren. Risken att drabbas av hot och våld som sjuksköterska påverkas av sjuksköterskans bemötande av patienter, erfarenhet, ålder och kön. De förebyggande åtgärderna för att avvärja incidenter av hot och våld är bland annat att bearbeta de ovannämnda utlösande faktorerna som är huvudorsakerna till att hot och våld uppstår. Syfte: Syftet är att beskriva orsaker och konsekvenser av hot och våld mot sjuksköterskor samt hur det kan förebyggas. Metod: En litteraturstudie baserad på tio vetenskapliga artiklar med kvalitativ ansats som hämtades från databaserna PubMed och CINAHL. För att inhämta relevant information till litteraturstudien identifierades bärande begrepp som därefter skapade tre teman för att nå ett resultat; "Orsaker till hot och våld", "konsekvenser av hot och våld", "förebygga hot och våld". Resultat: Konsekvenserna av hot och våld påverkade sjuksköterskans arbetsliv och privatliv men det påverkade även patienten negativt. Orsakerna till hot och våld identifierades som tre huvudsakliga faktorer; organisatoriska brister, sjuksköterskans förhållningssätt samt omständigheter hos patienten. Hot och våld kan förebyggas genom att sjuksköterskan granskar sitt bemötande med patienter och individualiserar omvårdanden samtidigt som organisationen granskar och åtgärdar sina brister. Konklusion: Samtliga tre faktorer som identifierades som orsakerna till hot och våld kan revideras och utvecklas för att minska antalet incidenter av hot och våld. Det påvisades dock en kunskapslucka om hur detta skulle åstadkommas och oavsett om det fanns en handlingsplan så uppstod det barriärer som hindrade lösningen av problemet. / Background: Threats and violence is a common phenomenon in health care. Patients are the dominated group who perform these actions. There are a number of triggering factors for threats and violence, which are among other things due to deficiencies in the organization, the working environment, patient dissatisfaction, patient's circumstances that induce threats and violence or factors of the nurse that provokes violence. The risk of threats and violence as a nurse is affected by how nurse's treat patients, the nurses experience, age and gender. The preventive measures to reduce incidents of threat and violence includes processing the above triggering factors, which are the main causes of threats and violence. Aim: To describe the causes and the consequences of threats and violence against nurses and how it can be prevented. Method: A literature review based on ten scientific articles with qualitative approach taken the databases PubMed and CINAHL. In order to obtain relevant information for the literature review, bearing concepts were identified which subsequently created three themes during the process of achieving a result; "Cause of Threats and Violence", "Consequences of Threats and Violence," "Prevention of Threats and Violence". Result: The consequences for threats and violence affected both the nurse's working life and privacy, it also affected the patients negatively. The cause of threats and violence was identified as three contributing factors; organizational deficiencies, nurses approach and patients' circumstances. Threats and violence can be prevented if nurses review their interactions with patients and individualize the care, at the same time as the organization reviews and addresses its deficiencies. Conclusion: All three contributing factors identified as the cause of threats and violence can be revised and developed to reduce the number of incidents of threat and violence. However, there was a knowledge gap about how this would be achieved and regardless of whether there was an action plan, barriers arose that prevented the solution of the problem.
413

Working For the Same Purpose and Yet Against Each Other: The Process of Identity Network Enactment in a Surgical System

January 2020 (has links)
abstract: Individuals have multiple identities, and several of them may be simultaneously driving enacted behavior in a given context. Scholars have suggested that intrapersonal identity networks – the combination of identities, relationships between identities, and identity characteristics – influence enactment. However, very little is known about the process by which several components of one’s identity network result in a single stream of enactment. This is important because different factors (e.g., leader actions) may impact this process and, in turn, change the way people act in organizations and interpret the actions of others. I examined a healthcare system designed to surgically treat cancer patients. Taking an inductive interpretivist approach, and using grounded theory methodology, I developed a process model of intrapersonal identity network enactment that also takes into account interpretations of other system members’ enactment. My findings contribute to the social identity literature by suggesting that a common, highly central identity is not enough to align behavior in organizations. Instead individuals may enact a common “higher-order” identity in combination with the rest of their identity network in ways that actually work against each other, even as they genuinely work toward the same purpose. I also extend the literature on multiple identities by explicating a process by which four different identities, and four characteristics of each identity, foster enactment toward the surgical system. Finally, I show how one’s intrapersonal identity network influences how they interpret the enacted behavior of others. In doing so, I extend the identity threat and opportunity literature by showing how one person’s identity threat is another’s identity opportunity, even when they share a common higher-order identity. In short, my study shows how individuals can work against each other, even when they are genuinely working toward the same purpose. / Dissertation/Thesis / Doctoral Dissertation Business Administration 2020
414

Seeing race in the unseen other: How self-image threat affects perceptions of a target’s race

Stahl, Jonathan L. January 2020 (has links)
No description available.
415

Exploring Open Source Intelligence for cyber threat Prediction

Adewopo, Victor A. 05 October 2021 (has links)
No description available.
416

Nebezpečné pronásledování - kriminologické aspekty / Stalking - criminological aspects

Bólová, Katarína January 2021 (has links)
Stalking - criminological aspects Abstract The issue of this thesis is the criminological aspects of the crime of stalking in Czech Republic according to section 354 of the Act no. 40/2009 Coll., Criminal Code. The thesis consists of three parts. The first part is focused on the characteristics of the concept of stalking, its criminalization and analysis of the crime of stalking from the point of view of substantive and procedural criminal law. The second part contains knowledge about the personality of stalking perpetrators, several selected typologies of perpetrators and practical advice and recommendations in connection with helping victims of stalking. The last part deals with the threat assessment which stalking perpetrators pose to their victims. Furthermore, it is the focus of the thesis, which is the analysis of the concept of "reasonable concern" in the context of the crime of stalking. The last chapter of this part is devoted to the analysis of 4 cases of stalking from a criminological point of view. The conclusion of the thesis consists of a summary of the most important findings that the author found during her writing. Keywords: stalking/ reasonable concern / threat assessment
417

Projekt systému bezpečného podniku s přístupem společenské odpovědnosti podniků / Secure Company System with a Corporate Social Responsibility Approach

Zouhar, Michal January 2021 (has links)
The diploma thesis is focused on the emergence of danger at work. Related to this is the identification of risks and their management. It defines all emerging risks and their preventive measures. The main task of this activity is to minimize accidents in the workplace. Subsequently, the current level of occupational safety was assessed using a questionnaire obtained from the State Office of Labor Inspection. The work is divided into 4 categories. The theoretical part of the diploma thesis describes the key concepts that are necessary for the elaboration of a diploma thesis. Terms such as risk, threat, risk identification and risk assesment methods are explained. The conclusion of the theory includes BOZP, work-related injuries and a description of what the Safe Company certification means.The analytical part is an analysis of the current situation, BOZP assessment and risk management analysis of the main production process. The last practical part of the diploma thesis is focused on preventive measures in the main production process using FMEA analysis and proposing BOZP improvements.
418

Finland – Nationellt eller Internationellt försvar? : En komparativ teorianalys med fokus på Finlands försvarspolitik från 2001 och 2017

Nygren, Adam January 2021 (has links)
Currently, there is little research on other countries' defence policies in Swedish. This essay will hopefully provide you with an interest in examining other countries' defence policies. The focus will be on Finland, Sweden's neighbour. Considering that Finland and Sweden are both members of the Nordic Council and strive for prosperity in the Nordic region, we should know more about our neighbours. Finnish defence policy reports are published every four or five years. This essay contains two of those reports from 2001 and 2017. The purpose of this essay is to find similarities and differences between the reports, but also to relate the reports to the theories, realism and liberalism. The theoretical analysis examines four different subjects where realism and liberalism will be discussed: International cooperation, rearmament, disarmament, and threat.  This analysis showed that Finland shows a lot of differences between the two reports. There are differences between all the subjects that are observed and the way the reports are written differs as well. The theories also shift a lot between the reports and that is concluded in the essay's conclusion. Suggestions about future research are included in the essay's discussion.
419

Framework pro bezpečný vývoj webových aplikací / Secure Development Framework for Web Applications

Mazura, František January 2017 (has links)
This thesis deals with the theoretical analysis of vulnerabilities in web applications, especially the most frequent vulnerabilities of OWAST TOP 10 are examined. These vulnerabilities are subsequently analyzed for the design of a web application development framework and practically implemented in this framework to prevent the vulnerabilities or, if necessary, defend itself. The main goal of the implementation is to achieve such a framework so that the programmer of the resulting web application is protected to the utmost.
420

Antivirová ochrana počítače z bootovacího úložiště / Antivirus protection of a computer from a boot repository

Mlejnek, Jiří January 2012 (has links)
ABSTRACT Theme of the thesis is the design method of anti-virus protection with the use of an alternative boot store. Processed is a related issue of viruses and the possibility of defenses against them. This thesis is focused on the design and selection of components solutions enabling the execution of antivirus test from the undistorted by the operating system. With selected components continues to realize an alternative booting the operating system from a Windows platform computer network with automatic virus checking of all local disks. The results of inspection are transmitted using signed files on a network server and typically give an overview of the results of the individual tests.

Page generated in 0.0643 seconds