• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 501
  • 120
  • 66
  • 35
  • 30
  • 28
  • 18
  • 15
  • 10
  • 5
  • 4
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 1018
  • 216
  • 211
  • 164
  • 142
  • 123
  • 120
  • 103
  • 98
  • 92
  • 79
  • 77
  • 77
  • 72
  • 67
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
631

Kybernetická bezpečnost: vztah USA a Číny / Cyber Security: US - Chinese Relations

Debnárová, Barbora January 2015 (has links)
This diploma thesis deals with cyber relation of the United States of America and the People's republic of China. The aim of this diploma thesis is to answer the following questions: What kind of cyber threat for the United States does China represent? How is China's cyber strategy characterised? How do USA react on this threat and what are the gaps in this reaction? The thesis is divided into four chapters. The first chapter deals with definition of cyberwarfare and its perception in Chinese context. The second chapter analyses USA - China relation and its implication for cyber security. The third chapter represents US reaction on Chinese cyber threat. The last chapter deals with the gaps in the reaction. Keywords USA, China, cyber threat, cyberwarfare, cyber espionage
632

User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach

Forrester, Vivienne 01 January 2019 (has links)
The popularization of professional virtual communities (PVCs) as a platform for people to share experiences and knowledge has produced a paradox of convenience versus security. The desire to communicate results in disclosure where users experience ongoing professional and social interaction. Excessive disclosure and unsecured user security behavior in PVCs increase users’ vulnerability to technology threats. Nefarious entities frequently use PVCs such as LinkedIn to launch digital attacks. Hence, users are faced with a gamut of technology threats that may cause harm to professional and personal lives. Few studies, however, have examined users’ information security behavior and their motivation to engage in technology threat avoidance behavior in a PVC. This study tested a professional virtual community technology threat avoidance model empirically. The model was developed from the conceptualization of different aspects of the technology threat avoidance theory, social cognitive theory, and involvement theory through an integrated approach. This quantitative study employed a random sampling methodology. Prior to collecting data for the main study an expert panel review and a pilot study were conducted. A web-based survey designed with a 5-point Likert scale was distributed to 1285 LinkedIn members to gather self-reported data on users’ technology threat avoidance behavior. Confirmatory factor analysis (CFA) and structural equation modeling (SEM) were used to analyze the data gathered from 380 respondents. The results of the data analysis revealed that perceived susceptibility, perceived severity, and information security knowledge sharing are strong predictors of avoidance motivation. Information security knowledge sharing had the most significant predicting effect on avoidance motivation in PVCs. Also, self-efficacy, group norms, and avoidance motivation all have a significant predicting effect on users’ information security avoidance behavior in PVCs. However, information security experience and safeguarding measure cost do not have a significant predicting effect on users’ information security avoidance motivation. This study makes significant contributions to the IS body of knowledge and has implications for practitioners and academics. This study offers a comprehensive model through the integration of behavioral and cognitive theories to better understand user information security behavior in PVCs. The model also identifies essential elements to motivate users to engage in technology threat avoidance behavior.
633

Men Don't Care While Women Find it Unfair: Exploring the Harmful Consequences of Illegal Interview Questions on Women's Reactions

Beecham, Jasmine 02 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Although interviews are a widely used and popular selection technique, when they lack clear structure and a predetermined set of questions, bias can permeate the interview selection process. In particular, illegal interview questions (i.e., questions that cannot legally be asked, such as marital status or children) may be particularly threatening for female applicants. Justice and social identity theory were used to explain the applicant reactions to illegal interview questions in this study. Participants were randomly assigned to one of four hypothetical interview conditions – a control of four low face-valid interview questions, four non-gender relevant illegal interview questions, or four gender-relevant illegal interview questions. There was a significant gender by condition interaction on all outcome measures. Illegal interview questions had a significant negative effect on women’s organizational reactions (job pursuit intentions, organizational attractiveness, belonging, trust & comfort) but not on men’s organizational reactions. In contrast both women and men had significantly lower procedural justice perceptions of the gender-relevant illegal interview condition compared to the two other conditions. However, women perceived the illegal interview questions (both the gender relevant and gender non-relevant questions) as lower in face validity (i.e., were less relevant to the job), whereas men perceived all the interview questions as equally face-valid. Thus, although men believed the illegal interview questions were low in procedural justice and unfair, men still perceived these questions as valid and job-relevant. Overall, an indirect effect of procedural justice perceptions on organizational reactions was significant for both men and women, indicating that lower procedural justice did have a significant negative effect on applicants’ organizational reactions. Taken together, the following study demonstrates that illegal interview questions (both those related to gender and unrelated to gender) act as a social identity threat for women and harm women’s attraction to the organization, whereas men are primarily unaffected by these illegal interview questions in their reactions.
634

Hot och våld inom akutsjukvården och dess konsekvenser för omvårdnad – En litteraturöversikt / Threat and violence in emergency care and its consequences for nursing - A literature review

Andersson, Sofia, Bäckström, Alex January 2021 (has links)
Bakgrund: Hot och våld inom akutsjukvården är ett stort och pågående problem. För sjuksköterskor är den specifika kompetensen att ge omvårdnad vilket utmanas inom akutsjukvården. Sjuksköterskor är de som främst utsätts i patientnära vård och ibland med en oförutsägbar arbetsmiljö. De vanligaste formerna av hot och våld är verbalt, fysiskt eller i form av sexuella trakasserier där nyexaminerade är särskilt drabbade. Faktorer som kan ligga bakom uppkomsten av hot och våld är bland annat frustration, stress, känslan av hjälplöshet och brist i kommunikationen. Syfte: Syftet med denna litteraturöversikt är att utforska hot och våld mot sjuksköterskor inom akutsjukvården och dess konsekvenser för att ge omvårdnad.Metod: En litteraturöversikt har genomförts med 20 vetenskapliga artiklar som publicerats under tidsperioden 2011–2021. Databaser som CINAHL och PubMed har använts.Resultat: Hot och våld leder till psykiska konsekvenser som ångest, rädsla och stress. Resultatet visar att sjuksköterskor blir mer benägna att byta avdelning eller avsluta sin anställning. Sjuksköterskor upplever brist på stöd från ledningen efter att ha blivit utsatta för våld och arbetsbelastningen blir svårare att hantera. Bristande kommunikation med kollegor och patienter leder till rädsla över att patienter inte får den vård de behöver.Slutsats: Omvårdnaden till patienter påverkas om sjuksköterskor utsätts för hot och våld. Det medför ett behov av ökat stöd från såväl ledning som organisation. För att sjuksköterskor ska kunna känna sig säkra på sin arbetsplats behövs förebyggande och förberedande strategier. Hot och våld bör även belysas i sjuksköterskeutbildningen. / Background: Threat and violence in emergency care is a large and ongoing issue. Registered nurses specific competence is giving nursing care, which is challenged within emergency care. Registered nurses are primarily exposed because of their close patient care and sometimes with an unpredictable work environment. The most common types of threat and violence is verbal, physical or sexual harassement where newly registered nurses are particularly affected. Factors which may influence the occurence of threat and violence are frustration, stress, the feeling of helplessness and lack of communication.Objective: The aim of this literature review is to explore threat and violence towards nurses in emergency care and its consequences in giving nursing careMethod: A literature review has been conducted with 20 scientific articles, published over the period 2011-2021. Databases such as CINAHL and PubMed have been used.Results: Threat and violence lead to psychological consequences such as anxiety, fear, and stress. The results show that registered nurses become more inclined to change department or end their employment. Registered nurses experience a lack of support from the management after being exposed to violence and the workload becomes more difficult to handle. Inadequate communication with colleagues and patients leads to fearing that patients will not receive the care they require.Conclusion: Nursing care is affected if registered nurses are exposed to threat and violence. This entails a need of increased support from the management as well as from the organisation. For these nurses to feel safe at their workplace, preventive and preparative strategies are necessary. Threat and violence should also be highlighted in nursing education.
635

Cancer-related Masculine Threat, Body Compassion, and Prostate-specific Functioning in Prostate Cancer Patients

Downing, David G. January 2019 (has links)
No description available.
636

Achievement Gap: Cultural Identities and Its’ Influence Upon African American Students Perceptions of Academic Performance

Lewis , Stephen Michael, Sr January 2020 (has links)
No description available.
637

Perceived Black Criminality and its Impact on Contributors to Wrongful Convictions in Cases of African American Men

Lattner, Elizabeth Jane 23 September 2020 (has links)
No description available.
638

Professional photographers and their use of Instagram : How Instagram influences professional photographers’ mindsets and contribute to their rethinking of creative practices

Klimenka, Alesia January 2022 (has links)
Professional photographers who actively use Instagram in their work notice its influence on various aspects of their professional and creative activities. The present thesis examines the manifestations of such influence noticed by a group of professional photographers. The results of five personal in-depth interviews, determined by the thematic analysis, revealed the peculiarities of work of professional photographers on the Instagram platform and beyond it, and their noticeof Instagram influence on such practices as photography creation, photo shootings, retouch, andinspiration search. It appeared that the photographers’ practices are adapting for the better account performance on the platform under the “threat of invisibility”. Besides, to achieve audience recognition, modern photographers need to actively participate in the race for higher metrics, which, due to the algorithmic features of Instagram management, are not guaranteed. All the professional photographers’ practices adapted for better Instagram performance and visibility can be considered as unpaid part of the photographers’ work, that is taken for granted.
639

Standing between a Rock and a Hard Place: The Role of Immigration Enforcement on the Well-Being of Latinx Communities

Echave, Paola Andrea January 2021 (has links)
No description available.
640

Security Threats and Countermeasures for Connected Vehicles

Gong, Xuwei January 2019 (has links)
With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. In this thesis, we examine 25 services that connected vehicles can provide. Entities, connections, and message flows in these services are investigated and synthesized into a vehicle network structure. The 25 services are divided into six use cases including: infotainment service, remote monitoring, device control, Vehicle-toeverything (V2X), diagnostics service, and in-vehicle Intrusion Detection System (IDS). We establish communication models for these use cases and analyze the potential threats based on Confidentiality, Integrity and Availability (CIA) criteria. We discuss possible countermeasures that can mitigate these threats based on existing network security techniques. Each alternative countermeasure’s advantages and limitations are presented. To filter possible attacks, we investigate and design firewalls in four components of a vehicle: Dedicated Short-Range Communications (DSRC) module, gateway, Telematic Control Unit (TCU), and Human-Machine Interface (HMI). We also simulate a firewall for an HMI application by building a communication model in Python. / Med den snabba utvecklingen av anslutna fordon har bilsäkerhet blivit ett av de viktigaste ämnena. För att studera hur man skyddar säkerheten för fordonskommunikation analyserar vi potentiella hot mot anslutna fordon och diskuterar motåtgärder för att mildra dessa hot. I denna avhandling undersöker vi 25 tjänster som anslutna fordon kan tillhandahålla. Entiteter, anslutningar och meddelandeflöden i dessa tjänster undersöks och syntetiseras i en fordonsnätverksstruktur. De 25 tjänsterna är indelade i sex användarvägar, inklusive: infotainment service, fjärrövervakning, enhetskontroll, Fordon-tillallt (V2X), diagnostikservice och IDS-system (Intrusion Detection System). Vi etablerar kommunikationsmodeller för dessa användningsfall och analyserar de potentiella hot som baseras på CIA-kriterier (Confidentiality, Integrity and Availability). Vi diskuterar eventuella motåtgärder som kan mildra dessa hot baserat på befintliga nätverkssäkerhetstekniker. Varje alternativ motåtgärds fördelar och begränsningar presenteras. För att filtrera eventuella attacker undersöker vi och utformar brandväggar i fyra delar av ett fordon: Dedicated Short-Range Communications (DSRC) -modul, gateway, Telematic Control Unit (TCU) och Human Machine Interface (HMI). Vi simulerar också en brandvägg för en HMI-applikation genom att bygga en kommunikationsmodell i Python.

Page generated in 0.0389 seconds