• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 183
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 469
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

Reservrutiner vid arbete med elektronisk journal : - nödvändigt ont eller förutseende arbetssätt?

Hytter, Mats, Egonsson, Anna-Carin January 2007 (has links)
I och med att fler och fler datasystem används som informationsbärare inom hälso- och sjukvården, blir verksamheterna också sårbara på ett sätt som de inte varit tidigare. Hoten mot informationsförsörjningen kan vara både interna och externa. Exempel på interna hot är de egna medarbetarnas brist på säkerhetstänkande och externa hot kan vara virusangrepp och hackers, men också strömavbrott eller andra kommunikationsavbrott. Rapporten är en kartläggning av och en kunskapsinventering av reservrutiner i Landstinget Kronoberg. Under april och maj 2007 skickade vi ut en webbenkät till ett urval av medarbetare vid de båda driftenheterna. 200 användare valdes slumpvis ut, 50 stycken från vardera yrkeskategorin läkarsekreterare, läkare, undersköterskor och sjuksköterskor. Svarsfrekvensen blev 50 %. Vi har i rapporten kommit fram till att de tillfrågade medarbetarna tycker att reservrutiner är viktigt, men långt från alla vet inte vad reservrutiner är eller hur de arbetats fram. Det har framkommit att många anser att journaluppgifter inte förs in rätt i den datoriserade journalen efter ett driftstopp, då reservrutiner använts. P.g.a. detta finns överhängande risk att man förlorar Landstinget Kronobergs vision om ”en patient – en journal”. Det visar sig att medarbetare är kunniga och väl införstådda i reservrutinsarbetet men stora brister i det allmänna säkerhetstänkandet finns. Enheternas ledningar har inte följt upp användningen av reservrutiner. Inte heller granskat eller reflekterat över arbetet med reservrutiner. Vi avslutar rapporten med förslag till åtgärder av de brister vi kommit fram till. / Since information technology has become the main carrier of information in healthcare service, we can see how these organizations now face a number of new threats. The treaths against information support can be either internal or external. An internal threat can for example be lack of security thinkning, whereas external threats can be power failures. The essay is a survey over and an inventory of backup procedures and routines in the county council of Kronoberg, Sweden. Data was obtained by sending out a questionnaire via county council intranet. 200 users of the EHR in the county council were selected; 50 physicians, 50 nurses, 50 assistant nurses and 50 medical secretaries. A total of 100 persons answered the questionnaire (i.e. a response rate of 50 %). To sum up our result of the survey, we can make the following statements: • all of the respondents think that backup procedures and routines are important for the organization • relatively many are ignorant about the existence of backup routines and procedures • a serious conclusion of the survey, is that many respondents regards that documentation is done incorrectly from the backup procedures in to EHR after an incident or system failure (EHR) • the majority of the units management staff/management teams at the micro system level has not revised the backup routines on a regular basis.
322

Wi-Fi network security : Gender differences in China

Liuxinwei, Ma January 2015 (has links)
With the development of Wi-Fi networks, Wi-Fi connection become a very important part of people‟s life, it seems that Wi-Fi networks are everywhere, especially in China. However, Wi-Fi networks not only bring convenience to users, but also bring some security threats. Nowadays, Wi-Fi security problems become increasingly acute. This thesis investigates the differences between male and female users regarding Wi-Fi network security. By distributing a questionnaire in China, specific questions have been asked about key factors within the area of Wi-Fi security. The questions focus on the usage situation, information security awareness and the knowledge level in Wi-Fi related fields. The found result is: Wi-Fi security issues are more prominent for female users than for male users.
323

Etude du désarmement dans le contexte de recomposition du paysage international / Disarming study in the field of rebuilding up the international scene

Ngabo, Ndjaha 18 December 2013 (has links)
Le désarmement est l’un des axes stratégiques primordiaux de la politique internationale. Il se pose, de manière récurrente, la sempiternelle question de son rapport à la paix, à la sécurité internationale et au développement. Car, le désarmement est, indubitablement, un maillon essentiel de la chaîne indispensable pour bâtir un monde débarrassé de menaces et de risques consécutifs à une militarisation à outrance. Son sucés ou son échec est lié à la configuration du monde. C’est une question de volonté politique dont les États sont les acteurs majeurs. La mutation du contexte international relance la problématique du désarmement. Car, le désarmement vise à éliminer les armes dont l’accumulation constitue une source de tension internationale. Il concerne la réduction du format des armées, la contraction des dépenses militaires et le contrôle du transfert de la technologie militaire. Il permet de libérer à des fins pacifiques des ressources nécessaires à d’autres secteurs de l’économie. L’histoire du désarmement révèle des pratiques, parfois, unilatérales et coercitives. La mise en œuvre du désarmement n’est possible que lorsque, se manifeste une volonté dédiée à sa concrétisation. Il existe un lien entre les dépenses consacrées aux armements et le développement économique et social. Cependant, la diminution de l’influence incommensurable des complexes militaro-industriels, la reconversion des industries de défense conditionnent aussi le désarmement. La coopération multilatérale et la mutualisation des moyens restent des possibilités de garanties pour un désarmement efficient et efficace. / Disarm is one of the main strategics axis of the international politics. It happened, in a recurring way, the sempiternal question of his report to peace, international security and the development. Because disarming, is undoubtedly, an essential link of the chains to build a world without threats and consecutive risks with excess of militarization. Its success or its failure is linked to the configuration of the world. It is a question of political good-will which states are the major actors. The change of the international context boost the problems of disarming. Because, disarming aims to eliminate the weapons which accumulation constitutes a source of international tensions. It relates to the reduction of the format of armed, the contraction of the soldiers expenditure and the control of the military technology transfer. It permits to release peaceful purposes necessary resources to other sectors of the economy. The history of disarming raises the practices, sometimes, links and coercive. The implementation of disarming is not possible when, appears a dedicated will in its concretization. There is a bond between the expenditure devoted to the arms, the economic and social development. However, the reduction in the incommensurable influence of the military-industrial complexes, the reconversion of industries of expenditure condition also disarming. The multilateral co-operation and the mutualism of the means remain the possibilities of the guarantees for an efficient and effective disarming.
324

Seasonal Aggregations of the Florida Manatee (Trichechus manatus latirostris) in the Port Everglades and Intracoastal Regions of Fort Lauderdale, Florida.

Goldman, Jaime M. 01 December 2010 (has links)
The Florida manatee (Trichechus manatus latirostris), a subspecies of the West Indian manatee, is one of the most endangered marine mammals in United States waters. The Florida manatee is the only manatee that ranges into subtropical and temperate regions. During the winter months manatees adopt a “refuging strategy” where they aggregate at warm-water sources immediately following decreases in the ambient water temperature to below 20° C (68° F) in order to avoid cold stress syndrome (CSS). During the winter manatees aggregate in warm water refuges, including natural warm water springs and the effluent discharges of power plants. The purpose of this study was to determine the number of manatees that aggregate and utilize the waters of the Florida Power and Light (FPL) Plant in Port Everglades (PPE), Florida, its effluent canal, and the surrounding Intracoastal Waterway during the winter months. This study documents the importance of Port Everglades as a wintering refuge for the Florida manatee. This study analyzed the inverse relationship between the number of manatees present at a warm water effluent and water temperature. In this study data were collected over five manatee winter seasons (between 15 November and 31 March) from 1999-2004, from both boat-based and land-based surveys monitoring the presence of manatees in the effluent canal from the FPL electricity generating facility in Port Everglades, FL and the Intracoastal Waterway. Findings indicated that there was an inverse relationship between the number of manatees present and water temperature, where more manatees were present in cooler months, and fewer in warmer months. This study also analyzed the parameters of Catch per Unit Effort (CPUE) as well as heating degree-days and their effect on and relationship to the number of manatees present. The higher the heating degree-days number, the more severe, or cold, winter this indicates. The year with the highest heating degree-days, 24.98, was the 2002-2003 season, which was also the season with the highest number of manatees observed, 393, and the highest CPUE, 10.62 manatees/day.
325

Through the Eyes of a Manager : A study on the perceived effects of PSD2 and the preparatory work of Swedish bank managers

Thorell, Jacob, Sjöstrand, Jesper January 2017 (has links)
The European financial market is rapidly changing with emerging fintechs targeting the banks’ traditional value chain, leveraging on their lower pace of innovation. The Payment Services Directive 2 (PSD2) is put into force in 2018 and aims to open up the financial market to new competitors, thus, promoting positive competition. This study examines how the managerial perception of changes in the external environment, caused by PSD2, affects banks’ preparatory work. The study uses a mix of Market Based View and Resource Based View along with an extension of RBV, illuminating how capabilities and managerial cognition affects managerial action. Using a qualitative approach through an interview based comparison between managers of two Swedish banks, the study confirms the theories’ stating that managerial cognition of the external environment, comprised of perceived opportunities and threats, affects managerial preparatory actions. Additionally, the study shows that managers’ perception of organisational capabilities affects managerial action.
326

Money laundering and countermeasures : a comparative security analysis of selected case studies with specific reference to South Africa

Moodley, M.S. (Maiendra Sadanandan) 15 December 2008 (has links)
This study focuses on examining the security implications of money laundering and countermeasures, with reference to South Africa. The purpose of this study was to establish the following: <ul> <li> What is the extent, and what are the security implications of money laundering in South Africa;</li> <li> whether the current money laundering countermeasures in South Africa were effectively implemented from 1994 up to the end of 2006;</li> <li> if South Africa could implement better money laundering controls when compared to the G7/8 countries; and</li> <li> what the factors were that influenced money laundering in South Africa, compared to the G7/8 countries</li> </ul> This study also examined the validity of the following assumptions: <ul> <li>That there are still shortcomings in the practical application of money laundering countermeasures in South Africa, despite these countermeasures being based on the legislative measures adopted by the G7/8 countries; and</li> <li> money laundering promotes crime and corruption in South Africa.</li> </ul> An analysis of the South African anti-money laundering legislation indicated that South Africa had legislatively adopted all of the Financial Action Task Force money laundering recommendations. It was found that despite the strong legislative framework to combat money laundering in South Africa, these efforts were undermined by a lack of capacity; poor coordination that led to a large volume of reports being filed without a corresponding track record of successful prosecutions; and the failure to adopt advances in information technology. This led to a lack of effectively and efficiently translating the anti-money laundering legislation into practice in South Africa. / Dissertation (M(Security Studies))--University of Pretoria, 2008. / Political Sciences / unrestricted
327

Internet of Things based Smart Homes : Security Risk Assessment and Recommendations

Ali, Bako January 2016 (has links)
The Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. Over time, the most of connections in IoT are shifting from ‘Human to Thing’ to ‘Thing to Thing’. This technology is anticipated to become an essential milestone in the development of smart homes to bring convenience and efficiency into our lives and our homes. But, by bringing this IoT technology into our homes there will be important implications for security in these technologies. Connecting every smart objects inside the home to the internet and to each other results in new security and privacy problems, e.g., confidentiality, authenticity, and integrity of data sensed and exchanged by objects. These technologies are very much vulnerable to different security attacks that make an IoT-based smart home unsecure to live in and therefore it is necessary to evaluate the security risks to judge the situation of the smart homes. For any technology to be successful and achieve widespread use, it needs to gain the trust of users by providing sufficient security and privacy assurance. As in all sectors, maintaining security will be a critical challenge to overcome. As homes are increasingly computerized and filled with devices, potential computer security attacks and their impact on residents need to be investigated. This report uses OCTAVE Allegro Methodology which focuses mainly on information assets and considers containers (technical, physical and people) and conducts a security risk assessment with the goal of highlighting various security flaws in IoT-based smart home, impacts and proposing countermeasures to the identified issues satisfying most of security requirements. Finally, it comes up with some recommendations to the users. The research findings documented into a thesis paper for secure IoT-based smart home systems and the resulted list and recommendations will be some useful contribution which can be used as a foundation for the specification of security requirements. For future work, the assessment will be extended to include more types of smart home applications rather than just typical one. / <p>Validerat; 20160620 (global_studentproject_submitter)</p>
328

Modelagem etnoecol?gica da percep??o de vulnerabilidades, riscos e impactos socioambientais em comunidades quilombolas da Ba?a de Todos os Santos

Santos, Andr?a Iridan dos 15 May 2013 (has links)
Submitted by Ricardo Cedraz Duque Moliterno (ricardo.moliterno@uefs.br) on 2016-07-20T00:00:39Z No. of bitstreams: 1 texto da disserta??o_pdf.pdf: 8356606 bytes, checksum: ef40ed660bee11e41dcf73a2b03f9e89 (MD5) / Made available in DSpace on 2016-07-20T00:00:39Z (GMT). No. of bitstreams: 1 texto da disserta??o_pdf.pdf: 8356606 bytes, checksum: ef40ed660bee11e41dcf73a2b03f9e89 (MD5) Previous issue date: 2013-05-15 / Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior - CAPES / This research was conducted in the Quilombola communities of S?o Braz in Santo Amaro and in the Salamina Putumuju community of Maragogipe, both located in the state of Bahia, with the aim of developing ethno-ecological models that describe and reflect on how the quilombola populations of these communities perceive, assess and respond to the socio-environmental impacts, risks and vulnerabilities existing in the Bay of All Saints. To this end, we conducted 67 semi-structured interviews; field observations; focus groups and ethnocartography. We confirmed that the participating communities recognized the serious situation of vulnerabilities, involving a range of aspects, of which the most important are: lack of entitlement to their lands; occupation of the land around them and plans for new, high impact, businesses; uncertain access to basic rights; dependence on natural resources (under chronic and severe threat) to carry out their production activities; the weakening of local organization; little synergy of the forces set up between the communities and government institutions, with little influence on the processes that define policies applied to the region and the locality. In terms of risks and impacts, the main source of threats identified by the groups are of technological origin, which involve industries, factories, petroleum plants, property development tourism, the Pedra do Cavalo hydroelectric dam and power plant, and the Enseada do Paragua?u Shipyard. There are also threats that originate from an absence or inefficiency of the public authorities, such as: the presence of refuse dumps near to bodies of water; the direct discharge of sewage into the mangrove ecosystem; and the lack of inspection to prevent deforestation and the use of fishing explosives. According to the interviewees, fishing resources suffer the most intense impacts, including: a reduced number of fish, molluscs and crustaceans; the pollution and contamination of the sea, rivers and mangroves; fish mortality; and the disappearance of fish and shellfish species. The community capacity to respond and adapt to the impacts and risk they face is small, their defence strategy is based on the construction of partnerships; reporting infringements to the Public Prosecutor?s Office and through the construction of production alternatives for income generation through agriculture and extractivism. It was found that these agro-fishing communities have a great proprietorial knowledge of the ecosystems in which they live, as well as of the changes taking place. We also identified elements regarding impacts and risks that other types of studies have not considered. This study thus reinforces the assertion that the participation of local agents is an essential factor in the planning and management of traditional territories and the risks therein. / Esta pesquisa foi desenvolvida nas comunidades Quilombolas de S?o Braz, em Santo Amaro, e na comunidade Salamina Putumuju, em Maragogipe, ambas localizadas no estado da Bahia,com o objetivo de elaborar modelos etnoecol?gicos que descrevam e reflitam como as popula??es quilombolas dessas comunidades percebem, avaliam e respondem aos impactos socioambientais, riscos e as vulnerabilidades existentes na Ba?a de Todos os Santos. Para isso foram realizadas 67 entrevistas semi-estruturas; observa??es de campo; grupo focal; e etnocartografia. Verificou-se que as comunidades participantes reconhecem um quadro grave de vulnerabilidades que se constituem atrav?s de diversos aspectos, sendo os mais importantes: falta de titula??o de seus territ?rios; ocupa??o do solo no entorno e proje??es de novos empreendimentos impactantes; acesso prec?rio a direitos b?sicos; depend?ncia dos recursos naturais (que est?o sob amea?as cr?nicas e agudas) para desenvolvimento de suas atividades produtivas; fragiliza??o da organiza??o local; pequena sinergia de for?as estabelecida entre as comunidades e as institui??es governamentais com pouca influ?ncia nos processos que definem as pol?ticas aplicadas a regi?o e a localidade. Quanto aos riscos e impactos, as principais fontes de amea?as identificadas pelos grupos s?o de origem tecnol?gica, que envolvem ind?strias, f?bricas, unidades petrol?feras, turismo imobili?rio, Barragem e Usina hidrel?trica da Pedra do Cavalo, e o Estaleiro da Enseada do Paragua?u. Al?m de amea?as originadas da aus?ncia ou inefici?ncia de atua??o do poder p?blico, como: a presen?a de lix?es pr?ximos a corpos h?dricos; despejo direto de esgotos no ecossistema de manguezal; e falta de fiscaliza??o para impedir desmatamentos e o uso de explosivo na pesca. Segundo os entrevistados os impactos atingem com maior intensidade os recursos pesqueiros, entre os quais se destacam: a diminui??o de peixes, moluscos e crust?ceos; polui??o e contamina??o de rios, mar e manguezal; mortandade de peixes; e desaparecimento de esp?cies de peixes e mariscos. A capacidade de resposta e adapta??o das comunidades aos impactos e riscos enfrentados ? pequena, a estrat?gia de defesa ? baseada na constru??o de parcerias; encaminhamento de den?ncias ao Minist?rio P?blico e na constru??o de alternativas produtivas para gera??o de renda a partir da agricultura e do extrativismo. Constatou-se que as popula??es agropesqueiras dessas comunidades conhecem com grande propriedade os ecossistemas aos quais est?o inseridos, bem como suas mudan?as. Al?m de identificarem elementos sobre os impactos e riscos, que outros tipos de estudos n?o contemplam. Dessa maneira este estudo contribui para a afirma??o que a participa??o dos agentes locais ? fator imprescind?vel no planejamento e na gest?o dos territ?rios tradicionais e dos riscos neles existentes.
329

Investigativní novináři v ohrožení v českém mediálním prostředí / Investigative journalists at risk in Czech media environment

Zlatohlávková, Barbora January 2021 (has links)
Fifty journalists worldwide lost their lives while doing their job last year. Many others are in prison, face death threats and other kinds of imminence. With the spread of the internet and social media a lot of communication moved into cyberspace therefore many threats and attacks towards journalists are taking place there. This thesis called Investigative Journalists in Danger in Czech Media Environment deals with the threats investigative journalists are facing. This paper also analyses how they are protecting themselves while doing their job. For a better understanding of the whole topic, this paper also presents to the reader the history, development and role of investigative journalism in the Czech Republic. The research presents interviews with twelve established Czech investigative journalists who shared their experiences and opinions on the state of security in the Czech Republic, the threats they are facing and how they are protecting themselves. The answers of the respondents confirmed the general opinion that being an investigative journalist is often a dangerous job where the reporters face all kinds of threats and pressure.
330

IT-säkerhet : Användarbeteenden, orsaker och åtgärder / IT security : User behavior, causes and actions

Andersson, Sanna, Schiöld, Ellinor January 2021 (has links)
Organisationer står idag inför flera olika hot mot deras IT-säkerhet där ett av de vanligaste hoten är skadliga användarbeteenden som främst orsakas av interna användare. Det kan vara svårt att veta för organisationer vad för användarbeteenden som kan utgöra ett hot samt vilka orsaker som kan bidrar till dessa beteenden. Det är i dagens samhälle viktigt för organisationer att förbereda sig samt vara medvetna om de hot en användare utgör för att kunna vidta de rätta åtgärderna om det skulle uppstå. Syftet med denna studie är att undersöka vilka orsaker till användarnas beteenden som utgör ett hot för en organisations IT-säkerhet och vilka åtgärder som har vidtagits. En kvalitativ metod i form av fem olika intervjuer har valts där en intervjuguide låg som grund till intervjufrågorna. En individuell intervju hölls med en användare av Högskolan i Borås samt en gruppintervju med IT-avdelningen från Högskolan i Borås. Studien resulterade i att 10 användarbeteenden, 25 orsaker och 22 vidtagna åtgärder framkom samt att det finns relationer mellan dem. Det kan vara svårt för organisationer att vara helt förberedda på hot men det är enligt vår studie möjligt att identifiera användarbeteenden, orsaker samt åtgärder. Med utbildning kan organisationer göra sina användare mer säkerhetsmedvetna och därmed minska riskerna för de skador användarbeteenden kan utgöra. / Organizations today are facing several different threats to their IT security where one of the most common threats is malicious user behaviors that are mainly caused by internal users. It can be difficult for organizations to know what user behaviors can pose a threat and what causes can contribute to these behaviors. In today's society, it is important for organizations to prepare and be aware of the threats a user poses in order to be able to take the right measures if they should arise. The language of this study is written in swedish and the purpose of this study is to investigate what causes in users' behavior constitute a threat to an organization's IT security and what measures have been taken. A qualitative method in the form of five different interviews has been chosen where an interview guide was the basis for the interview questions. An individual interview was held with a user of the University of Borås and a group interview with the IT department from the University of Borås. The study resulted in 10 user behaviors, 25 causes and 22 measures taken and that there are connections and relationships between them. It can be difficult for organizations to be fully prepared for threats, but according to our study it is possible to identify user behaviors, causes and measures. With education, organizations can make their users more security-conscious and thus reduce the risks of the damage that user behavior can cause.

Page generated in 0.2473 seconds