• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 501
  • 120
  • 66
  • 35
  • 30
  • 28
  • 18
  • 15
  • 10
  • 5
  • 4
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 1018
  • 216
  • 211
  • 164
  • 142
  • 123
  • 120
  • 103
  • 98
  • 92
  • 79
  • 77
  • 77
  • 72
  • 67
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
741

Predição de tetrápodes ameaçados no cerrado baseada na relação espécies-área / Prediction of threatened tetrapods in the Cerrado based on species-area relationship

ROVIDA, Julio Cola 18 February 2011 (has links)
Made available in DSpace on 2014-07-29T16:21:17Z (GMT). No. of bitstreams: 1 TESE JULIO COLA ROVIDA.pdf: 491833 bytes, checksum: 38ea9a7ec6fd58dba6680dfa971676e6 (MD5) Previous issue date: 2011-02-18 / The current rate of extinctions observed in the entire planet has its origin in high rates of habitat loss due to human population increase. The species-area relationship may be usefull in predicting extinction threats when combined with this loss. Lists of Cerrado s tetrapods were compiled and using the species-area relationship, we predicted values of species a threat. These values were compared with the IUCN Red List. The predictions of threat in all cases were higher than the Red List, except for endemic mammals that reflect the current threat list, and endemic birds whose predictions are lower than the threat level by IUCN. A large portion of species have populations in decline according to IUCN. Part of these results can be explained by a time-lag in the response time to the degradation itself associated with the gaps of knowledge about the species. The relationship could be used as a preliminary threat assessment, and followed by the aggregation of these red lists in order to increase efficiency in conservation planning. Life history, spatial and environmental heterogeneity data, when aggregated, should increase the prediction s accuracy. Major investments in basic biology are necessary in order to achieve maximum information input about the species to be evaluated. / A atual taxa de extinções observadas em todo planeta tem sua origem nas altas taxas de perda de habitat em decorrência do aumento populacional humano. A relação espécies-área pode ser útil na predição de ameaças de extinção quando associada a essa perda. Compilamos listas de tetrápodes do Cerrado e usando a relação espécie-área, foram preditos valores (números) de espécies em ameaça. Esses valores foram comparados com a lista vermelha da IUCN. As predições de ameaça em todos os casos foram superiores às da lista vermelha, excetuando-se mamíferos endêmicos que refletem as predições da lista atual, e aves endêmicas cuja predição de ameaça é inferior ao observado pela IUCN. Uma grande parcela de espécies também possui populações em declínio segundo a IUCN. Parte desses resultados seria explicada por um time-lag no tempo de resposta à degradação associada a lacunas de conhecimento acerca das espécies. A relação poderia ser usada como forma preliminar de avaliação de ameaça, e em segundo momento a agregação dessas listas vermelhas deveria ser feita a fim de se aumentar a eficiência no planejamento da conservação. Dados de história de vida, heterogeneidade ambiental e espacial, quando agregados, aumentariam a precisão da predição. Maiores investimentos em pesquisa básica se fazem necessários a fim de se obter o máximo de informações acerca das espécies a serem avaliadas.
742

Vulnerabilidade situacional afetando a intenção comportamental: um estudo no setor de serviços automotivos

Artoni, Patricia Regina Caldeira Daré 09 August 2013 (has links)
Submitted by Patricia Regina Caldeira Daré Artoni (pattydare@gmail.com) on 2013-09-06T23:06:19Z No. of bitstreams: 1 Tese_PatriciaReginaCaldeiraDareArtoni.pdf: 2049299 bytes, checksum: 4026feb5c8cbd73a4d3b99ba8bbf3522 (MD5) / Approved for entry into archive by Suzinei Teles Garcia Garcia (suzinei.garcia@fgv.br) on 2013-09-09T13:03:15Z (GMT) No. of bitstreams: 1 Tese_PatriciaReginaCaldeiraDareArtoni.pdf: 2049299 bytes, checksum: 4026feb5c8cbd73a4d3b99ba8bbf3522 (MD5) / Made available in DSpace on 2013-09-09T13:14:07Z (GMT). No. of bitstreams: 1 Tese_PatriciaReginaCaldeiraDareArtoni.pdf: 2049299 bytes, checksum: 4026feb5c8cbd73a4d3b99ba8bbf3522 (MD5) Previous issue date: 2013-08-09 / Considering the evolution in research and theory of the psychology of risk and, in particular, from the perspective of risk as feelings (emphasizing the interaction between cognition and emotion on threat analysis), this thesis proposes and tests a conceptual model with focus on the influences of vulnerability on consumer response to automobile services. This study hypothesized that self-efficacy reduces or eliminates the vulnerability‟s effect on behavioral intentions. The lack of research on feelings of vulnerability in services consumption, specifically those not related to health as are the maintenance automotive services, and the lack of studies linking vulnerability and behavioral intentions to service purchase, stimulated this research. The impact of the three antecedents of threat analysis (perceived risk, risk as feelings and perceived severity) has been tested in a single model with self-efficacy on behavioral intention in the specific context of service consumption. The measurement proposed model was evaluated for dimensionality, validity and reliability by using confirmatory factor analysis; subsequently evaluated the causal hypotheses proposed in the model of full structural equation. The model was estimated and in one samples (ns = 202). Data were collected through an transverse online survey and research findings confirm the hypotheses that (1) the perceived risk and self-efficacy affect vulnerability. The hypotheses of (2) relationship between service failure severity and perceived risk or vulnerability were not supported. Implications for the theory and management are discussed. These findings help to understand the results of studies conducted in the U.S. in recent decades, offer a theoretical contribution to the understanding of the phenomenon of vulnerability, validate a scale to measure the phenomenon applied to services in the Brazilian context and reinforce the importance of considering self-efficacy for generalizations. From the perspective of management, the study shows that vulnerability influences business performance of automotive service companies, since it negatively influences the positive recommendation and maintaining business relationships. The findings suggest that managers of service companies should endeavor to reduce the vulnerability of the consumer through information that assist in the negotiation and evaluation of the service to minimize uncertainties. / Considerando os avanços da pesquisa e teoria da psicologia do risco e, em particular, da perspectiva do risco como sentimentos, ressaltando a interação entre cognição e emoção na análise de ameaças, esta tese propõe e testa um modelo conceitual sobre o efeito da vulnerabilidade (risco como sentimento) em intenções comportamentais de serviços relacionados a automóveis. Este estudo teve como hipótese que a autoeficácia percebida pelo consumidor diminui ou elimina o efeito da vulnerabilidade nas intenções comportamentais de perpetuidade de relacionamento com a empresa de serviço. Estimularam o interesse de pesquisa tanto a carência de pesquisas sobre o papel da vulnerabilidade no consumo de serviços não relacionados à área da saúde ou ao corpo do consumidor, quanto a carência de pesquisas sobre a relação entre a vulnerabilidade e as intenções comportamentais. Testou-se em um único modelo, o impacto previsto pelos processos cognitivos e afetivos que envolvem a análise de ameaça (sentimentos de vulnerabilidade, risco e severidade das falhas) e de capacidade de enfrentamento (autoeficácia) na intenção comportamental, no contexto específico de consumo de serviços relativos a automóveis. O modelo de mensuração proposto foi avaliado quanto à dimensionalidade, validade e confiabilidade pelo uso de análise fatorial confirmatória; posteriormente, avaliou-se a relação causal proposta nas hipóteses pelo modelo completo de equações estruturais. O modelo de mensuração proposto foi avaliado quanto à dimensionalidade, validade e confiabilidade pelo uso de análise fatorial confirmatória; posteriormente, avaliou-se a relação proposta nas hipóteses pelo modelo completo de equações estruturais, usando-se o software Amos e a estimativa por máxima verossimilhança. O modelo foi estimado em uma amostra de 202 respondentes. Os dados foram coletados por meio de um levantamento eletrônico transversal e os achados da pesquisa apontam para a confirmação das hipóteses de que (1) o risco percebido cognitivamente, sentimentos de vulnerabilidade e a autoeficácia influenciam as intenções comportamentais. Não foi possível suportar a hipótese de que (2) a severidade das possíveis falhas de serviço tem relação com risco ou com sentimentos de vulnerabilidade. Esses achados ajudam a compreender a relação entre intenções comportamentais e sentimentos de vulnerabilidade. Implicações para o desenvolvimento teórico da pesquisa na área e implicações gerenciais são discutidas. Os resultados auxiliam a compreensão dos resultados de estudos realizados nos EUA nas últimas décadas. Os achados oferecem uma contribuição teórica ao entendimento do fenômeno da vulnerabilidade, a adaptação de uma escala de medida para o fenômeno no contexto brasileiro e aplicado a serviços que não sejam de saúde e cuidados com o corpo. Do ponto de vista gerencial, o estudo alerta para o fato de a vulnerabilidade exercer influência no desempenho comercial de empresas de serviços automotivos, visto que ela influência negativamente a recomendação positiva e a manutenção de relacionamentos de negócios. Os achados sugerem que os gestores de empresas de serviços devem empreender esforços para reduzir a vulnerabilidade do consumidor por meio de informações que o auxiliem na negociação e avaliação do serviço ao minimizar incertezas.
743

[en] REFUGEES AS A FACTOR OF INSECURITY: THE CASE OF THE BIG LAKE REGION IN THE CENTRAL AFRICA / [pt] REFUGIADOS COMO FATOR DE INSEGURANÇA: O CASO DA REGIÃO DOS GRANDES LAGOS NA ÁFRICA CENTRAL

ALICE SOARES GUIMARAES 13 January 2006 (has links)
[pt] Esta dissertação aborda o impacto do fluxo de refugiados de guerra na segurança dos Estados anfitriões. Tal impacto foi investigado por meio de revisão bibliográfica das principais contribuições teóricas sobre a questão, e do estudo de caso da região dos Grandes Lagos, localizada na África Central. Tomando como objeto referencial de segurança os governos de tais Estados, identificou-se que tais fluxos podem representar uma ameaça econômica, política e/ou cultural, o que irá variar de acordo com o contexto específico de cada Estado. Verificou-se ainda que as questões relativas aos refugiados geram uma interdependência entre os Estados da região estudada no que se refere às suas considerações de segurança, identificando-se portanto uma dinâmica regionalista. / [en] This dissertation concerns the impact of the refugees flows on the security of the host State. Such impact was investigated through bibliographic research and the study of case of the Big Lake region, located in Central Africa. Taking as referencial the security of the governements of this States, the analysis identified that such fluxes could configures an economic, political and/or cultural threat, depending of the specific context of each State. It was also identified that the issues related with refugees generate an interdependence between the States of the region in their concerns about security, showing an regionalist dynamics.
744

AI as a Threat to Democracy : Towards an Empirically Grounded Theory

Berisha, Visar January 2017 (has links)
Artificial intelligence has in recent years taken center stage in the technological development. Major corporations, operating in a variety of economic sectors, are investing heavily in AI in order to stay competitive in the years and decades to come. What differentiates this technology from traditional computing is that it can carry out tasks previously limited to humans. As such it contains the possibility to revolutionize every aspect of our society. Until now, social science has not given the proper attention that this emerging technological phenomena deserves, a phenomena which, according to some, is increasing in strength exponentially. This paper aims to problematize AI in the light of democratic elections, both as an analytical tool and as a tool for manipulation. It also looks at three recent empirical cases where AI technology was used extensively. The results show that there in fact are reasons to worry. AI as an instrument can be used to covertly affect the public debate, to depress voter turnout, to polarize the population, and to hinder understanding of political issues.
745

Security Enhanced Firmware Update Procedures in Embedded Systems

Abrahamsson, David January 2008 (has links)
Many embedded systems are complex, and it is often required that the firmware in these systems are updatable by the end-user. For economical and confidentiality reasons, it is important that these systems only accept firmware approved by the firmware producer. This thesis work focuses on creating a security enhanced firmware update procedure that is suitable for use in embedded systems. The common elements of embedded systems are described and various candidate algorithms are compared as candidates for firmware verification. Patents are used as a base for the proposal of a security enhanced update procedure. We also use attack trees to perform a threat analysis on an update procedure. The results are a threat analysis of a home office router and the proposal of an update procedure. The update procedure will only accept approved firmware and prevents reversion to old, vulnerable, firmware versions. The firmware verification is performed using the hash function SHA-224 and the digital signature algorithm RSA with a key length of 2048. The selection of algorithms and key lengths mitigates the threat of brute-force and cryptanalysis attacks on the verification algorithms and is believed to be secure through 2030.
746

A Quantitative Evaluation Framework for Component Security in Distributed Information Systems / Ett kvantitativt utvärderingsramverk för komponenters säkerhet i distribuerade informationssystem

Bond, Anders, Påhlsson, Nils January 2004 (has links)
The Heimdal Framework presented in this thesis is a step towards an unambiguous framework that reveals the objective strength and weaknesses of the security of components. It provides a way to combine different aspects affecting the security of components - such as category requirements, implemented security functionality and the environment in which it operates - in a modular way, making each module replaceable in the event that a more accurate module is developed. The environment is assessed and quantified through a methodology presented as a part of the Heimdal Framework. The result of the evaluation is quantitative data, which can be presented with varying degrees of detail, reflecting the needs of the evaluator. The framework is flexible and divides the problem space into smaller, more accomplishable subtasks with the means to focus on specific problems, aspects or system scopes. The evaluation method is focusing on technological components and is based on, but not limited to, the Security Functional Requirements (SFR) of the Common Criteria.
747

Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis / Hot mot Informationssäkerhet : Bortom tekniska lösningar. - Använda Hotträdsanalys

Olandersson, Sandra, Fredsson, Jeanette January 2001 (has links)
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1 standard. A co-operation between the technical solutions and the administrative security is necessary to achieve information security, together with ordinary common sense. True, each of these can help improve security, but none of them is a complete solution. Security is not a product - it is a process. Threat trees form the basis of understanding that process. In this thesis, we have been using a qualitative method. The analysis method is a case study at the Social Department, at the municipality in Ronneby. Through interviews it has come us to hand, that the organisation has not established an information security policy which should give the code of practice for how the work of information security will pursue within the organisation. The organisation does neither use a model for structuring threats nor a method for collecting threats against information today. Through the structure of possible threats, the personnel generates an understanding of the organisation and takes active part finding adequate threats within the Social Department. As users understand the importance of security, how to use it, and where to report suspected violations, they can do a great deal to reduce the risk to loose information. Important to remember is that the education is an ongoing process, new users need training and trained users need reminding, especially when new technologies or processes are introduced. Thus, Threat Tree Analysis is useful for continuing towards developing an information security policy according to SS 62 77 99-1 standard. / För att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1. / Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
748

A study of online users' cyber threat awareness and their use of threat countermeasures

Gopisetty, Yugandhar January 2016 (has links)
The internet has permeated the lives of the modern men in more respects than can be tabulated simply. The ease of access to online shopping, social networking, simplified communication, etc. make the internet a modern panacea for a number of problems. However, the internet also opens up avenues that expose the user to vulnerabilities at the hand of hackers and malicious software coders. The use of the internet to exchange personal and fiscal information makes attacks all the more inviting. This is compounded by the fact that most online users are unaware of threats that affect them on a daily basis and how to protect themselves against such threats. Despite the fact that the level of awareness of the contemporary cyber threats, has significantly increased among online users within the last few years, there is a growing need to improve the efficiency and effectiveness of the countermeasures currently being used. Fortunately, there are a number of Human Computer Interaction (HCI) principles that can effectively be used to enhance online user interaction and reduce internet security threats.
749

Theories of Nightmares in Cognitive Neuroscience and Psychology

Chamorro, Emilia January 2015 (has links)
Dreaming is a complex, multimodal and sequentially organized model of the waking world (Metzinger, 2003). Nightmares are a category of dreams involving threatening scenarios, anxiety and other negative emotions (Hartmann, 1998; Nielsen & Levin, 2007). Dreams and nightmares are explored in this present thesis in the light of psychology and modern cognitive neuroscience as to their nature, function and neural correlates. The three main dream theories and their leading investigations are reviewed to evaluate their evidence and overall explanatory power to account for the function of dreams and nightmares. Random Activation Theories (RATs) claim dreams are biological epiphenomena and by-products of sleep underlying mechanisms (Crick & Mitchison, 1983; Flanagan, 1995, 2000a, 2000b, Hobson & McCarley, 1997). Mood regulation theories consider that the psychological function of dreams is to regulate mood and help with the adaptation of individuals to their current environment such as solving daily concerns and recovery after trauma exposure (Hartmann, 1996; Levin, 1998; Stickgold, 2008; Kramer, 1991a, 1991b, 2014). Threat Simulation Theories of dreams present the evolutionary function for dreaming as a simulating off-line model of the world used to rehearse threatening events encountered in the human ancestral environment (Revonsuo, 2000a). With the threat-simulation system, threats were likely to be recognized and avoidance skills developed to guarantee reproductive success. TST consider nightmares to reflect the threat-simulation system fully activated (Revonsuo, 2000a). Supported by a robust body of evidence TST is concluded to be the most plausible theory at the moment to account as a theoretical explanation of dreams and nightmares
750

Zajišťování bezpečnosti a mimořádné stavy v ústavním pořádku ČR / Safety securing and states of crisis in the constitutional law of the CR

Baumruková, Lucie January 2017 (has links)
This thesis discusses the issue of securing safety of the state with emphasis on the institute of so called states of crisis in the constitutional law of the Czech Republic. The first part deals with states of crisis in general, outlines the basic theory of states of crisis as institutes of law, historical and international context of regulation, as well as on a generally security oriented context. The second section is dedicated to individual states of crisis, namely the state of danger, state of emergency, state of threat to the state and state of war. The thesis contain the basic description of the state of emergency, its sources of law, the method of its declaration all of the states of crises and discusses institutes common for all, or most of the individual states of crisis. Last section of this thesis focuses on further methods of safety ensuring, in particular with connotation to Article 43 of the Constitution of the Czech Republic. For example the regulation of the dispatch of armed forces beyond the territory of the Czech Republic and the residence of foreign armed forces in the territory of the Czech Republic or the regulation of crossing and flying across the territory of the Czech Republic. The conclusion indicates that the current legislation regulating states of crisis is not...

Page generated in 0.0541 seconds