• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 183
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 469
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

An exploratory analysis of violence and threats against lawyers /

Brown, Karen N. January 2005 (has links)
Thesis (M.A.) - Simon Fraser University, 2005. / Theses (School of Criminology) / Simon Fraser University. Also issued in digital format and available on the World Wide Web.
22

Airborne DECM threat file reprogramming analysis and recommendation for the Brazilian Air Force /

Batista, Geraldo Magela. January 1990 (has links) (PDF)
Thesis (M.S. in Systems Engineering (Electronic Warfare))--Naval Postgraduate School, September 1990. / Thesis Advisor(s): Hershey, Scott. Second Reader: Sternberg, Joseph. "September 1990." Description based on title screen viewed on December 16, 2009. DTIC Descriptor(s): Electronic warfare, libraries, navy, computer programming, airborne warning and control system, receivers, radar receivers, flow charting, brazil, threats, air force, theses. DTIC Identifier(s): Systems approach, electronic warfare, Brazilian Air Force, military forces(foreign). Author(s) subject terms: Radar warming receivers, user data file reprogramming process. Includes bibliographical references (p. 61). Also available in print.
23

Targeted violence toward political figures identifying violence risk factors through thematic content analysis /

Schoeneman, Katherine A. January 2008 (has links)
Thesis (Ph.D.)--University of Nebraska-Lincoln, 2008. / Title from title screen (site viewed May 5, 2009). PDF text: xiv, 150 p. : ill. (some col.) ; 842 Kb. UMI publication number: AAT 3341672. Includes bibliographical references. Also available in microfilm and microfiche formats.
24

Attention to social and health threat words in individuals with and without high social anxiety /

Roberts, Karen E. January 2007 (has links)
Thesis (M.A.)--York University, 2007. Graduate Programme in Clinical Psychology. / Typescript. Includes bibliographical references (leaves 57-67). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:MR32017
25

Ambiente urbano e espaços verdes-uma perspectiva geográfica sobre a cidade do Porto

Melo, Odete Manuela Sequeira de January 2000 (has links)
No description available.
26

Dreams’ Impact in Life and Fiction: An Analysis of Dreams in a Normative Canadian Sample and in Shakespearean Plays

Robidoux, Raphaëlle 17 July 2018 (has links)
Dreams have been widely shared, analyzed, and explored for centuries. Throughout cultures and contexts, some dreams seem to leave a lasting trace on waking life, whereas other dreams are forgotten as quickly as they appear. This thesis focuses its efforts on the former category, known as impactful dreams. Impactful dreams are rare and distinguished by their effect on the dreamer’s thoughts, feelings, and/or behavior. Some dreams, including impactful dreams, also contain threatening oneiric material, which may be seen as mirroring threatening content the dreamer will have to face, or has already faced, in waking life. This thesis contributes to the study of dream content by using modern dream analysis methods to investigate impactful dreams and threats in dreams, drawing from a large normative sample of Canadians’ dreams, but also from the oneiric content found in works written by William Shakespeare. It was expected that both samples would share certain oneiric traits, but that Shakespeare’s in-play dreams would contain more oneiric threats, would have an impact on the dreamer by default, and would most notably affect the narrative of the play. In contrast, normative Canadian dreams were expected to show a lesser tendency towards both impact and threatening content. The first article explores all impactful dreams found within a normative sample of Canadian dreams, investigating their impactful dream type and their link to waking and dreaming mood. The second article does the same within the scope of Shakespeare’s fictional works, and compares the two samples in terms of dream impact, threats, and overall oneiric content.
27

The Complexity of Security Threats in Urban Areas: The Case of Johannesburg. / The Complexity of Security Threats in Urban Areas: The Case of Johannesburg.

Sanjoh, Charles January 2017 (has links)
Cities today have become a playground for man-made security threats. From terrorism, drug abuse, and different forms of physical violence that impedes the smooth functioning of the activities of those living within the city spaces. Considering the present day violence and insecurity in our cities, it is vital not only to embark on preventive measures, but also to learn how to cope with and adapt to them. Since it would be an illusion to think of eliminating violence, resilience becomes an important aspect, a gateway to move on with our daily activities without fear and with greater hope for a better future. It is in this respect that I decided in this thesis to talk about resilience within our municipalities with a special focus on the city of Johannesburg in South Africa.
28

Technologie 5G: Posouzení hrozeb a rizik implementace / The 5G Technology Nexus: Assessing Threats and Risks of Implementation

La Rosa, Giampaolo January 2021 (has links)
The new 5G technology, next generation of telecommunication and mobile network, is all around the world in course of inspection and inquiry for its astonishing novelty, from new services to functions and scalability. However, every technology brings alongside new possibilities and new threats scenarios, especially in this case where the impact on the present network is promised to be massive, with brand new features allowed by 5G, like Internet of Things, widespread virtualization and huge leap forward in rapidity and capability of the mobile transmission. An increase in the network surface, considered as more connections, more devices connected and more traffic load of data, will expand also the possible entry point and fault exploitable by a malevolent actor, raising common concern about the technology. The deployment of such a technology on European soil, especially in some states of the Union, caused uproar and critics primarily in the security field. Following a global trend, but also leading a best practice approach, the EU developed a series of mechanisms and agencies that are challenged to oversees the gradual shift from old 4G LTE to 5G. In this paper a Critical Information Infrastructure Protection (CIIP) framework is used to analyse the criticalities of the new technology. Definition of...
29

Optimizing Production System Maintenance Policies when Cyber Threats are Considered

Ta, Anh V 08 1900 (has links)
In a production environment, physical and cyber-related failures become unavoidable because of the complexity of highly connected manufacturing systems and a finite equipment life cycle. The main purpose of this thesis is to investigate optimal maintenance outsourcing and replacement policies in the presence of cyber-threats, as well as policies to achieve channel coordination via cost subsidization. Although well-developed maintenance outsourcing literature has addressed many advanced and trending issues such as the costs and benefits of new technology adoptions, learning effects, forgetting effects, and systems with back-up machines, no study has looked at the effect of cyber threats on connected production systems. Besides filling this gap, this thesis addresses the most common replacement policies including preventive maintenance with minimal repairs and age replacement. The advent of the Internet of Things (IoT) has enabled the creation of "smart" manufacturing systems, However the resulting connected format makes these systems potential targets for cyber-attacks. Manufacturers have to face a difficult decision as to whether they should adopt costly security technologies or let the manufacturing systems be vulnerable to cyber-threats. This study develops a model addressing this dilemma by providing some insights into the effects of cost subsidization and installation of security systems on the system profit. Our findings suggest that a manufacturer can trade off cost subsidization to gain flexibility in the maintenance decision-making process. The study also provides evidence that, for a "smart" manufacturing system, the existence of a security system guarantees at least a marginal increase in system profit. With the help of an extensive numerical study, we provide guidelines for optimizing system profit and addressing the effect of various model parameters (such as a monetary parameter, failure rate and a cyber-attack related parameter) on the value of a security system.In the second part of this thesis, we build analytical models to deal with cyber-threats in the context of a production system that utilizes the age replacement policy. We propose two different scenarios involving cyber-threats. First, cyber-attacks do not disrupt the physical production system. In this case, we replace the broken components either when the system has a physical breakdown or when a predetermined amount of time (T) elapses. Second, we need to replace the system right after it suffers from a successful cyber-attack. Thus, we replace the system components if one of three following events happen, whichever comes first: (1) a successful cyber-attack, (2) a physical breakdown, or (3) a predetermined time (T) elapses. We analytically provide optimal policies to minimize the expected cost for these scenarios. Finally, we carry out sensitivity analyses to show the effect of different model parameters on the value of a cyber security system.
30

Prompting safety-belt use with a positive versus negative prompt: Comparative impact on the target behavior and relevant body language

Cox, Matthew George 17 June 2009 (has links)
Two studies were conducted to compare the efficacy of two behavioral prompts in increasing safety-belt use. Two approaches were used in both studies. The first approach involved showing a sign with the message, "Please Buckle Up, I Care" to unbuckled drivers leaving a parking lot; the second involved displaying the nationwide slogan "Click it or Ticket" (CioT). Participants were 1,822 unbuckled drivers exiting two student parking lots of a large university. Research assistants identified an unbuckled driver, flashed one of two signs, and recorded whether the driver buckled after the prompt, as well as the driver's facial reactions and hand gestures. Of the unbuckled drivers, 34% buckled following the Flash-for-Life (FfL) prompt, and 26% with the CioT prompt (p < .05). Drivers gave significantly more positive facial expressions and hand gestures following FfL vs. CioT prompt (p < .05). The second study used a variation of the procedures in Study I and implemented the intervention at a large department store. Driver age was measured with the previous driver variables. Participants were 1,990 unbuckled drivers exiting a parking lot. Results showed no significant differences in terms of compliance to signs (20.8% for FfL and 20.4% for CioT, p's > .05). Significant differences in hand gestures, facial expressions and ages were detected as a function of compliance, regardless of sign (all p's < .001). Specifically, drivers who complied with either prompt were more likely to be younger, and present positive hand gestures and facial expressions. Implications and future directions are discussed. / Master of Science

Page generated in 0.0286 seconds