• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 183
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 469
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

Propagation des informations menaçantes : le rôle du temps et de l'espace social / Propagation of threatening informations : the role of time and social space

Pelletier, Petra 29 November 2016 (has links)
Les menaces sociétales, comme les attaques terroristes, la crise économique ou le réchauffement climatique sont devenues omniprésentes dans notre société en raison de leur extensive diffusion médiatique. La situation de menace, qui agit comme une disruption entre les représentations de l'individu et la réalité, conduit au processus du partage social des émotions (Rimé, 2005) qui constitue le moteur de la propagation des informations menaçantes d'une personne à l'autre et d'un groupe social à l'autre. La présente thèse examine le rôle du temps et de l'espace en tant que deux principales sources de freins à la propagation des informations menaçantes. L'objectif de l'Étude 1 est d'investiguer le sens que les personnes attribuent au terme « menace sociétale », ainsi que de proposer un classement des menaces sociétales actuelles issues de l'actualité médiatique et perçues par les personnes dans le contexte français. L'Étude 2 examine le rôle du temps en tant que frein à la propagation des informations menaçantes dans le contexte suivant l'attentat de Charlie Hebdo à Paris du 7 janvier 2015, en se basant sur le modèle des étapes sociales de coping collectif avec les catastrophes (Pennebaker & Harber, 1993). Puis, l'Étude 3 consiste en une mise à l'épreuve expérimentale du rôle de l'espace social, plus spécifiquement le rôle de l'appartenance groupale, en tant que frein à la propagation des informations porteuses d'une menace terroriste. Les principaux résultats montrent que la fréquence des deux principales composantes du partage social des émotions, c'est-à-dire la parole et l'écoute, diminue dans les deux mois suivant l'attaque terroriste (Étude 2). Puis, l'appartenance groupale des personnes influence le contenu de l'information menaçante transmise à l'interlocuteur (Étude 3). Ces résultats suggèrent que le temps et l'espace social contribueraient à freiner la propagation des informations porteuses d'une menace. Toutefois, de futures recherches devraient se focaliser sur d'autres processus qui permettraient de freiner la propagation des informations menaçantes au sein de la société et d'élucider ainsi la construction du climat socio-émotionnel négatif. / Large-scale societal threats, such as the terrorist attacks, the economic crisis and global warming have become omnipresent in our society because of their extensive media coverage. The threat situation that acts as a disruption between people's representations and the reality leads to social sharing of emotions (Rimé, 2005). The social sharing of emotions constitutes the main impetus underpinning the propagation of threatening information from one person to another and from one social group to another. Thus, this thesis investigates the role of time and space as the primary brakes on the propagation of threatening information. The main aim of Study 1 is to investigate the meaning that people attach to the term "societal threat", and also to propose a classification of actual societal threats from the mass media and actual societal threats perceived by individuals in a French context. Study 2 examines the role of time as a brake on the propagation of threatening information following the Charlie Hebdo terrorist attack of January 7, 2015 in Paris, using the social stage model of collective coping with disasters (Pennebaker & Harber, 1993). Study 3, which is experimental in nature, investigates the role of social space, and group membership specifically, as a brake on the propagation of threatening information related to terrorism. The results show that the frequency of the two main components of social sharing, namely talking and hearing, decreased over two months following the terrorist attack (Study 2). Furthermore, participants' group membership modifies the content of threatening information transmitted to the interlocutor (Study 3). Such results suggest that time and social space contribute to curbing the propagation of threatening information. However, future research might bear a specific interest on the other processes that impede the propagation of threatening information within society, thus elucidating the construction of a negative socioemotional climate.
262

Biodiversité endémique insulaire face aux changements globaux : état des lieux dans un contexte de conservation / Island endemic biodiversity in the face of global changes : state of play across a conservation context

Leclerc, Camille 10 December 2019 (has links)
Les changements globaux, du fait de l’empreinte humaine, sont associés à de nombreux déclins de populations et de disparitions d'espèces, et ce, notamment au sein des systèmes insulaires. L'importante biodiversité abritée par de tels écosystèmes est particulièrement vulnérable aux pressions anthropiques en raison de diverses caractéristiques (p. ex. syndrome d’insularité, faible redondance fonctionnelle, isolement géographique des îles). En dépit de cette vulnérabilité accrue, peu d’études se sont jusqu'à lors intéressées à ces systèmes comme modèle d’étude pour évaluer les patrons de menaces sur les différentes facettes de la diversité (taxonomique, fonctionnelle, et phylogénétique). Pourtant, un tel travail permettrait d’améliorer notre compréhension des menaces qui pèsent au sein des îles. Dans ce sens, l’objectif de cette thèse est de décrire les patrons de diversité endémique insulaire dans le contexte actuel des changements globaux et dans un contexte futur de changements climatiques, en explorant les différentes facettes de la diversité. Une finalité de ce travail est de mettre en évidence des priorités éventuelles de conservation pour ces écosystèmes particulièrement vulnérables. Nous avons abordé l'ensemble de ce travail de thèse à une grande échelle à l’aide de deux bases données recensant les îles mondiales et les espèces qui y sont endémiques. Dans une première partie, nous avons caractérisé les menaces pesant sur les écosystèmes insulaires à l'échelle globale, et prospecté également leurs distributions au sein de différents groupes taxonomiques et régions insulaires. Dans une deuxième partie, nous avons analysé l'incidence des menaces sur la biodiversité endémique insulaire et en particulier sur la composante fonctionnelle. Dans une troisième partie, nous avons identifié les régions insulaires à forte représentativité de la biodiversité endémique menacée au travers de différentes facettes et prospecté leurs niveaux de protection via les aires protégées et les menaces les affectant. Dans une dernière partie, nous avons étudié la vulnérabilité future des îles et de la biodiversité endémique face au changement climatique à l’échéance 2050. À la lumière de nos résultats (identification de menaces majeures dont l'importance varie suivant les groupes taxonomiques, les régions insulaires et également les dimensions de biodiversité considérées), nous avons discuté de l’implication des changements globaux pour la biodiversité endémique insulaire dans un contexte de conservation. Cette thèse révèle l’importance d’intégrer de multiples menaces (et leurs associations) et dimensions de diversité pour les approches de changements globaux et de conservation. / Global changes, because of human activities, are associated with numerous population declines and species extinctions, which are especially pronounced in island systems. The important biodiversity of such ecosystems is particularly vulnerable to anthropogenic pressures because of several characteristics (e.g. island syndrome, low functional redundancy, island geographical isolation). Despite this increased vulnerability, few studies have so far looked at these systems as a study model for assessing patterns of threats to the different facets of diversity (taxonomic, functional, and phylogenetic). However, such work would improve our understanding of islands threats. In this sense, the aim of this PhD thesis is to describe patterns of insular endemic diversity in the current context of global changes and in a future climate change context, by exploring different facets of diversity. The purpose of this work is to highlight potential conservation priorities for these particularly vulnerable ecosystems. We have addressed all of this thesis work on a large scale using two databases of worldwide islands and endemic species. In a first part, we characterized threats to island ecosystems at a global scale and also explored their distributions within different taxonomic groups and island regions. In a second part, we analyzed the impact of threats on the functional component of island endemic biodiversity. In a third part, we have identified priority areas for insular endemic biodiversity representativeness and conservation across different dimensions of biodiversity and explored their levels of protection through protected areas and threats affecting them. In a last part, we studied the future vulnerability of islands and endemic biodiversity to climate change by 2050 based on endemic mammals. In the light of our results (identification of major threats whose importance varies according to the taxonomic groups, the island regions and also the dimensions of biodiversity considered), we discussed the implications of global changes for island endemic biodiversity in a conservation context. This PhD thesis reveals the importance of integrating multiple threats and diversity dimensions for global changes and conservation approaches.
263

SÄKRA MOLN OCH OSYNLIGA KEDJOR: EN ALLIANS FÖR SÄKER DATALAGRING? : En undersökning av informationssäkerheten i blockkedjor och molntjänster / SECURE CLOUDS AND INVISIBLE CHAINS: AN ALLIANCE FOR SECURE DATA STORAGE? : A study of the information security in blockchains and cloud services

Paulsson, Lisa, Tran, Madeleine January 2023 (has links)
I en digitaliserad värld där data kan finnas lättillgänglig, delas samt lagras mellan olika aktörer, uppstår även hot där datan kan äventyras. I dagsläget finns det olika sätt att lagra data på där molnlösningar blivit en av de populäraste hos svenska företag, men det finns även andra tekniker som visar stor potential. Det som undersökts är potentiella effekter vid en användning av blockkedjor och potentiell integration med molnlösningar, samt hur detta kan förändra informationssäkerhetsaspekterna för svenska företag. Den forskning som genomförts rör hoten mot datalagring, dagens molntjänst-användning samt blockkedjeteknikens potential. Utförandet av detta möjliggjordes av semistrukturerade intervjuer för att få en inblick i organisationens dagliga arbete samt tankar och resonemang kring teknikerna. Vidare användes även litteraturkällor för att se hur tidigare forskning har bedrivits inom ämnet. Författarna har kommit fram till att syfte och mål bestämmer teknikens användningsområde, potential samt att organisationer med hjälp av olika lager av tekniska lösningar kan stärka informationssäkerhet. Uppsatsen bidrar till informatikämnet genom att se på hur svenska organisationer ytterligare skulle kunna digitalisera sin verksamhet utifrån hur världen ser ut idag. / In a digitized world where data can be easily accessible, shared and stored between different actors, threats also arise where the data can be compromised. Currently, there are various ways to store data, with cloud solutions becoming one of the most popular with Swedish companies, but there are other technologies that show great potential. What has been investigated is the potential effects of the use of blockchains and potential integration with cloud solutions, and how this can change the information security aspects of Swedish companies. The research carried out concerns regarding the threats of data storage, today's cloud service use and the potential of blockchain technology. The execution of this was made possible by semi-structured interviews to gain an insight into the organization's daily work and thoughts and reasoning about the techniques. Furthermore, literature sources were used to see how previous research has been conducted within the subject. The authors have concluded that purpose determines the technology's area of use, potential, and that organizations can strengthen information security with the help of different layers of technical solutions. The essay contributes to informatics by looking at how Swedish organizations could further digitize their operations based on how the world looks today.
264

SÄKRA MOLN OCH OSYNLIGA KEDJOR: EN ALLIANS FÖR SÄKER DATALAGRING? : En undersökning av informationssäkerheten i blockkedjor och molntjänster / SECURE CLOUDS AND INVISIBLE CHAINS: AN ALLIANCE FOR SECURE DATA STORAGE? : A study of the information security in blockchains and cloud services

Paulsson, Lisa, Tran, Madeleine January 2023 (has links)
I en digitaliserad värld där data kan finnas lättillgänglig, delas samt lagras mellan olika aktörer, uppstår även hot där datan kan äventyras. I dagsläget finns det olika sätt att lagra data på där molnlösningar blivit en av de populäraste hos svenska företag, men det finns även andra tekniker som visar stor potential. Det som undersökts är potentiella effekter vid en användning av blockkedjor och potentiell integration med molnlösningar, samt hur detta kan förändra informationssäkerhetsaspekterna för svenska företag. Den forskning som genomförts rör hoten mot datalagring, dagens molntjänst-användning samt blockkedjeteknikens potential. Utförandet av detta möjliggjordes av semistrukturerade intervjuer för att få en inblick i organisationens dagliga arbete samt tankar och resonemang kring teknikerna. Vidare användes även litteraturkällor för att se hur tidigare forskning har bedrivits inom ämnet. Författarna har kommit fram till att syfte och mål bestämmer teknikens användningsområde, potential samt att organisationer med hjälp av olika lager av tekniska lösningar kan stärka informationssäkerhet. Uppsatsen bidrar till informatikämnet genom att se på hur svenska organisationer ytterligare skulle kunna digitalisera sin verksamhet utifrån hur världen ser ut idag. / In a digitized world where data can be easily accessible, shared and stored between different actors, threats also arise where the data can be compromised. Currently, there are various ways to store data, with cloud solutions becoming one of the most popular with Swedish companies, but there are other technologies that show great potential. What has been investigated is the potential effects of the use of blockchains and potential integration with cloud solutions, and how this can change the information security aspects of Swedish companies. The research carried out concerns regarding the threats of data storage, today's cloud service use and the potential of blockchain technology. The execution of this was made possible by semi-structured interviews to gain an insight into the organization's daily work and thoughts and reasoning about the techniques. Furthermore, literature sources were used to see how previous research has been conducted within the subject. The authors have concluded that purpose determines the technology's area of use, potential, and that organizations can strengthen information security with the help of different layers of technical solutions. The essay contributes to informatics by looking at how Swedish organizations could further digitize their operations based on how the world looks today.
265

Secure satellite internet usage in high-risk areas

Kvant, Andreas, Johansson, Carl January 2023 (has links)
Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. If the terrestrial internet infrastructure is damaged due to armed conflicts in the area, the internet is shut down or internet traffic is monitored by antagonistic parties, satellite internet technology could be a suitable alternative for people or organizations operating in these areas. However, satellite internet comes with its own advantages and shortcomings, and if satellite internet systems are going to be used in these areas, there is a need for secure utilization of the system and awareness of possible vulnerabilities, threats, and risks of using them. Objectives. There are four main objectives of this study: (1) To identify the general threats and vulnerabilities that accompany the use of satellite internet technology in a high-risk area. (2) To assess the risks to the user's safety that may come as a consequence of the vulnerabilities being exploited or threats being realized. (3) To identify possible mitigations to the risks, and device best practices for the secure use of satellite internet technology in high-risk areas. (4) Produce a document that provides information about satellite internet technology, clarifies what vulnerabilities, threats, and risks could be present when using satellite internet in a high-risk area and how the user may assess the risk according to their own situation, the document should also provide the user with mitigations and best practices for the secure use of the satellite internet technology in order to ensure the user's safety. Methods. A structured literature review, semi-structured interviews, and multiple threat analysis methods were used to gather and evaluate the threats to satellite internet. The literature review presented the previous research done, and the interviews gave some perspectives from the industry. The results were then compiled into a document which we evaluated in a workshop to determine its usability and get feedback we could use to improve it. Results. The results show that satellite internet systems are exposed to several attacks, and tracking was a discovered threat that was not mentioned in previous research. When making our example risk assessment tracking also received the highest score, due to it allowing an adversary to threaten the physical safety of a user. Conclusions. The interest in satellite internet security research seems to have recently increased. The most exposed part of the satellite internet infrastructure is the wireless communication link, especially in high-risk areas where attacks targeting the radio signal are more prevalent. User awareness was our most important mitigation against the threats found and is the core contribution of this work. / Bakgrund. Att pålitlig och säker internetuppkoppling är tillgänglig i högriskområden är inte alltid garanterat. Om den markbaserade internetinfrastrukturen skadas på grund av väpnade konflikter i området, internet stängs ned eller internettrafiken övervakas av antagoniska parter, så är satellitinternetteknologi ett lämpligt alternativ för personer eller organisationer som verkar i dessa områden. Satellitinternet har dock sina egna fördelar och nackdelar. Om dessa system ska användas i högriskområden är det av yttersta vikt att de används säkert och att användaren är medveten om vilka möjliga sårbarheter, hot och risker som ackompanjerar användningen av systemen Syfte. Det finns fyra mål med detta arbete: (1) Att identifiera de allmänna hot och sårbarheter som ackompanjerar användningen av satellitinternetteknologi i ett högriskområde. (2) Att bedöma de risker mot användarens säkerhet som kan uppstå till följd av att sårbarheterna utnyttjas eller hoten realiseras. (3) Att identifiera möjliga åtgärder för att mitigera riskerna och utveckla bästa praxis för den säkra användningen av satellitinternetteknologi i högriskområden. (4) Att producera ett dokument som tillhandahåller information om satellitinternetteknologi, klargör vilka sårbarheter, hot och risker som kan förekomma vid användning av satellitinternet i högriskområden samt hur användaren kan bedöma risken utefter sin egen situation. Dokumentet bör också ge användaren åtgärder mot risker och bästa praxis för säker användning av satellitinternetteknologi samt att säkerställa användarens säkerhet. Metoder. En strukturerad litteraturstudie, semi-strukturerade intervjuer och flera hotanalysmetoder användes för att samla in och utvärdera hoten mot satellitinternet. Litteraturstudien presenterade tidigare forskning och intervjuerna gav några perspektiv från branschen. Resultaten sammanställdes sedan i ett dokument som vi utvärderade i en workshop för att bestämma dess användbarhet och få feedback vi kunde använda för att förbättra det. Resultat. Resultaten visar att satellitinternetsystem kan utsättas för flera attacker, och spårning var ett hot vi upptäckte som inte nämnts i tidigare forskning. I vår exempelriskbedömning fick spårning också den högsta poängen, eftersom det möjliggör för en motståndare att påverka en användares fysiska säkerhet. Slutsatser. Resultaten visar att satellitinternetsystem kan utsättas för flera attacker, och spårning var ett hot vi upptäckte som inte nämnts i tidigare forskning. I vår exempelriskbedömning fick spårning också den högsta poängen, eftersom det möjliggör för en motståndare att påverka en användares fysiska säkerhet.
266

MANAGERS’ PERCEIVED UNDERSTANDING AND INFLUENCE ON CYBERSECURITY READINESS : Identifying Barriers, Associated Risks, and Strategies

Egelrud, Andrea, Selberg, Jonas January 2023 (has links)
Organizations need to protect themselves from cyber threats and a variety of methods exist to mitigate these risks. Factors such as rapid digitalization, expedited by Covid-19, have only made cybersecurity threats a growing concern. Most research within the IS field has focused on technical methods to mitigate risk, leaving non-technical methods less explored. The aim of this study was to develop a deeper understanding of managers’, at different levels, perceived understanding, and influence to achieve cybersecurity readiness in order to identify barriers. Further, an objective was to develop possible strategies to mitigate identified risks associated with these barriers. To fulfill this aim, a case study was conducted at a municipality-owned organization who have taken the initiative to raise cybersecurity awareness. Six interviews were conducted with managers from both senior- and middle management, and cybersecurity governance documents were collected. In our findings, we identified three main themes with associated barriers to achieving cybersecurity readiness. These include barriers associated with (1) organizational and managerial factors, (2) pitfalls in communication, and (3) policy and instructions. The study contributes to an understanding of different barriers that managers at different levels might perceive and suggests possible strategies for mitigating the risks associated with said barriers.
267

Assessing cybersecurity within game companies : An interview study

Ginman, Johan January 2023 (has links)
This study examines the understanding of cybersecurity, with a distinct focus on the culture and awareness of cybersecurity within the Swedish game development industry. Utilising a qualitative research design, five semi-structured interviews were conducted with professionals in the domain, and the results are discussed and compared with relevant prior studies. The findings reveal a variance in cybersecurity cultures between larger and smaller organisations, largely dictated by resource availability; security measures are frequently implemented in a reactive rather than proactive manner. Moreover, the study identifies ransomware as the most significant threat in the studio’s threat landscapes. Companies’ perceptions and responses to this threat differ; smaller enterprises often rely on informal security policies, while larger organisations implement regular backup procedures and more sophisticated security measures.
268

Hot och Våld i somatisk vård

Båth, Helena, Nilsson, Marita January 2007 (has links)
Våldet i samhället ökar. Detta våld sprider sig in på våra arbetsplatser så även inom hälso- och sjukvården. Sjukvårdpersonalen är utbildad i att vårda patienten utifrån omvårdnadsforskning och vetenskapliga medicinska rön. Verbala och fysiska aggressioner kan försvåra omhändertagandet. Syftet med denna litteraturstudie var att undersöka förekomsten och upplevelserna av hot och våld inom somatisk vård. Tio vetenskapliga artiklar kunde inkluderas efter att ha granskats och analyserats. Resultatet visade att hot och våld är vanligt förekommande inom somatisk vård. Det inverkade på arbetsmiljön genom att sjuksköterskorna kände sig stressade vid vetskapen om att de kunde utsättas för hot- eller våldssituationer. Uppskattningar om förekomsten av hot och våld pekade också på att det fanns ett stort mörkertal av antal incidenter. Studien visade att de utsatta sjuksköterskorna upplevde hot- och våldincidenter olika exempelvis med rädsla, ilska eller skuld. För att förbättra situationen måste framför allt utbildning i att hantera aggressiva situationer förekomma, med början redan under sjuksköterskeutbildningen och sedan kontinuerligt under yrkesverksamheten. / The violence in society of today is increasing. This violence spreads into our workplaces even into medical services. Hospital staff is educated in taking care of patients on the basis of nursing science and medical experiences. Verbal and physical aggressions may complicate the care. The aim of this review was to look into the incidence and experience of threats and violence in somatic care. Ten scientific articles were included, analyzed and scrutinized. The result showed that the frequency of threats and violence is high in somatic care. It affects the work environment because the nursing staff is aware of the possibility of being exposed to violence. The estimate frequency of threats and violence could even by higher since a lot of incidences were not reported. The review revealed that the nurses exposed to threats and violence experienced different feelings, such as fear, anger and guilt. To improve the situation for both the patients and the working staff a continuous education in handling violent situation is recommended by the authors, starting in nursing schools.
269

Let's Give Them Something To Talk About: Exploring Racism And Racial Tensions As Potential Face Threats In Black And White Interracial Relationships

Castle, Gina 01 January 2008 (has links)
This study examined how racism and racial tensions potentially threatened the face needs of Black and White interracial couples. Specifically, this study investigated the benefit of family approval of one's interracial relationship. Couples use of corrective face work in response to prejudice was also examined. This research used a qualitative, interpretive method to gather and analyze data from 14 personal interviews. The interview schedule enabled interviewees to use storytelling to share their experience of being in a Black and White interracial relationship. Interviewees were asked questions surrounding their experience as the partner in an interracial relationship. Couples shared how they told their family that their romantic partner was a different race and shared how they encountered prejudice when they are out in public. Further, they spoke about how people stare at them and make comments about their interracial relationship. The data underwent a thematic analysis (Owen, 1984) where I reviewed the data and searched for themes that were recurrent and repeated by interviewees. There were several themes that emerged. First, the very presence of racial tensions and racism affects interracial couples. Second, family support seemed to mitigate threats to couples' positive and negative faces and enabled couples to engage in open and honest dialogue with their family and their significant other. Finally, even couples with family support, engaged in corrective face work to respond to the face threats posed by racism and racial tensions.
270

Совершенствование государственного аудита в системе финансовой безопасности России на примере Счетной палаты : магистерская диссертация / Improvement of state audit in the financial security system of Russia on the example of the accounting chamber

Банникова, Ю. С., Bannikova, J. S. January 2020 (has links)
Магистерская диссертация посвящена направлениям совершенствования государственного аудита в системе финансовой безопасности России на примере Счетной палаты. Выпускная квалификационная работа состоит из введения, трех глав, заключения, списка использованных источников и приложений. В первой главе рассмотрены теоретические аспекты финансовой безопасности государства, выявлены актуальные угрозы. Во второй главе проведен анализ и дана оценка деятельности Счетной палаты за 2017 – 2019 годы. В третьей главе предложены пути повышения эффективности деятельности Счетной палаты. / The master's thesis is devoted to the areas of improvement of state audit in the financial security system of Russia on the example of the accounting chamber. The final qualifying work consists of an introduction, three chapters, conclusion, list of sources used, and appendices. In the first Chapter, the theoretical aspects of the state's financial security are considered, and current threats are identified. The second Chapter analyzes and evaluates the activities of the accounting chamber for 2017-2019. The third Chapter suggests ways to improve the efficiency of the accounting chamber.

Page generated in 0.0332 seconds