• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 184
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 470
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
401

Návrh konkureční strategie firmy / Proposal of Competitive Strategy of Company

Števanka, Ladislav January 2008 (has links)
This Master’s thesis analyses the current status of the small selling company, which sells sport articles. The thesis investigates impact extenrnal environment on the firm and also analyse internal environment. It defines strategic targets, contains propsal of competitive strategy of the company and its time implementation.
402

Rozvoj obchodních aktivit podniku cestovní kancelář Cílka, s.r.o. / Business Development of Travel Agency Cílka, Ltd.

Procházková, Ivana January 2009 (has links)
The Master's thesis characterizes, analyzes and assesses the current situation of the travel agency Cílka, Ltd. The thesis nalysis current position of the company, it deals with inside and outside environment that influences business activities. By the inside and outside analysis of environment there are formulated Opportunities and Threats and below Strengths and Weaknesses. On the basis of findings, the work includes complex solution strategy, development and improvement company position, which should had help establish firm and fix her position on market.
403

Řešení interních hrozeb v managementu bezpečnosti informací / Solution of Internal Threats in the Information Security Management System

Trčka, Martin January 2013 (has links)
This diploma thesis deals with internal threats in the organization and their restriction with the assistance of DLP system. The first part of the thesis discusses the information security management system and describes requirements for the introduction of the ISO/IEC 27000 standards series. Next chapters detail internal threats and technical description of the DLP system. The second part of the thesis analyzes the organization and describes the process of implementation of DLP solution, which aims to reduce internal threats. The conclusion of the thesis describes acceptance agreement and financial evaluation of the implementation.
404

Požadavky EU na ochranu letectví před protiprávními činy a jejich aplikovatelnost na regionální letiště / EU requirements for aviation security and its applicability to regional airports

Šumpela, David January 2011 (has links)
Diploma thesis is focused on summary of EU security requirements. Especially it is about EU regulations, security programs and international conventions. These regulations are applicated on Airport České Budějovice, which is now in the process of modernization and expansion. From this view is thesis concentrated on airport area segregation, their border, security check planing, capacity of each part of airport and comparison of appropriate security devices. It deals about possibility of deviation from common security rules and accept alternative security rules. There is a small mention about kinds of airport threats and theirs consequences.
405

Vnímání nových médií jako hrozby na příkladu seriálu Black Mirror / Perception of new media as a threat on an example of Black Mirror series

Ivanovová, Karolína January 2020 (has links)
Thesis Perception of new media as a threat on an example of Black Mirror series deals with the Black Mirror series viewers' stand on new media threats. The aim is to detect if the series affected their opinions or behavior with new media in any way. This aim will be persuaded by using the method of semi-structured interviews. The topic of new media and their negative impacts on individuals and society is in sociology represented increasingly. Black Mirror series literally aiming to set up a black mirror for our lives with ever-evolving technologies adds a value that can affect the respondents' emotions and opinions on this topic. The theoretical part describes the transitions of society in modern day - concept of network society and risk society and explains the terms threat and risk. Furthermore, the thesis focuses on current new media threats. The second, practical, part describes the specific methodological procedures used in this thesis and thus the methods of thematic analysis and methods of qualitative interviews. This will be followed by a description of the research steps, a description of the results and the results interpretation.
406

Safetifying from interpersonal violence through Phasic Protective Sequencing : a classic grounded metatheory

Last, Antony 11 1900 (has links)
This study generates a metatheory of interpersonal violence from an initial qualitatively highest scoring academic literature item and theoretically sampling over 200 additional literature items using classic grounded theory methodological analysis and synthesis. Danger emerged as the main concern of those experiencing interpersonal violence. Safetifying from interpersonal violence through the socio-psychophysical process of Phasic Protective Sequencing emerged as the resolution of the main concern. The metatheory of safetifying emerged in four parts: 1. The first was the socio-structural process of endangering with interpersonal violence through the interaction of the people and the elite resulting in endangerment (danger). 2. Danger precipitates the socio-psychological process of safetifying before interpersonal violence which involves awarenessing, setting up, and evaluating. 3. If the person is attacked, it precipitates the psycho-physical process of safetifying during interpersonal violence including resiliencing, finishing, and victoring. 4. The aftermath of an attack or the avoidance of an attack precipitates the psycho-social process of safetifying after interpersonal violence including reclaiming, relinquishing, and achieving. The metatheory of safetifying was shown to contribute uniquely to the field of interpersonal violence, to many related theories, and to have potential for therapeutic application. / Psychology / M.A. (Psychology)
407

Hybridhotbilden mot Sverige : En kvalitativ försvars- och säkerhetspolitisk innehållsanalys om hybridhot / The Hybrid Threat Scenario in Sweden : A qualitative defense and security policy content analysis on hybrid threats

Nilsson, Pierre January 2021 (has links)
With a changing state of security in Europe, defined by instability and unpredictability, the use of hybrid threats presents itself as an international security challenge. Characterized by the antagonistic use of both conventional and unconventional means, the hybrid threat actor coordinates these means in an attempt achieve specific goals, often under a guise of ambiguity. The complexity of hybrid threats deepens as advancing technology and globalisation enables the hybrid threat actor to use tools not only bound by geographical constraints, but tools that makes use the cyber domain and the constant flow of information. Tools ranging from military, political, economic, civil, and informational tools can, in various combinations, take advantage of specific vulnerabilities in the target state. Identifying and countering such a wide range of multifaceted tools provides a difficult task for most states.                                            This study aims to investigate the Swedish hybrid threat scenario by focusing on the authorities concerned with national defence and security and their identification of potential hybrid threats that faces Sweden. For countering such hybrid threats the study investigates the highly topical Swedish defence act 2021-2025. Its focus being on investigating potential goals, strategies and abilities for building resilience and countermeasures regarding hybrid threats. The study finds that Sweden is subject to the use of hybrid threats by antagonistic state actors, mainly Russia and China. Tools being used against Sweden include for example espionage, strategic acquisition of businesses and real estate, disinformation, and cyberattacks. For countering these threats, the study fails to find a specific set of goals for hybrid threat defence. Instead, the study finds a broad effort to strengthen national defence and security including among others the rebuilding of the Total Defence, founding of a national cybersecurity centrum, instituting an agency for psychological defence as well as lifting the perspective of hybrid threat among relevant national agencies.
408

Computational Methods to Optimize High-Consequence Variants of the Vehicle Routing Problem for Relief Networks in Humanitarian Logistics

Urbanovsky, Joshua C. 08 1900 (has links)
Optimization of relief networks in humanitarian logistics often exemplifies the need for solutions that are feasible given a hard constraint on time. For instance, the distribution of medical countermeasures immediately following a biological disaster event must be completed within a short time-frame. When these supplies are not distributed within the maximum time allowed, the severity of the disaster is quickly exacerbated. Therefore emergency response plans that fail to facilitate the transportation of these supplies in the time allowed are simply not acceptable. As a result, all optimization solutions that fail to satisfy this criterion would be deemed infeasible. This creates a conflict with the priority optimization objective in most variants of the generic vehicle routing problem (VRP). Instead of efficiently maximizing usage of vehicle resources available to construct a feasible solution, these variants ordinarily prioritize the construction of a minimum cost set of vehicle routes. Research presented in this dissertation focuses on the design and analysis of efficient computational methods for optimizing high-consequence variants of the VRP for relief networks. The conflict between prioritizing the minimization of the number of vehicles required or the minimization of total travel time is demonstrated. The optimization of the time and capacity constraints in the context of minimizing the required vehicles are independently examined. An efficient meta-heuristic algorithm based on a continuous spatial partitioning scheme is presented for constructing a minimized set of vehicle routes in practical instances of the VRP that include critically high-cost penalties. Multiple optimization priority strategies that extend this algorithm are examined and compared in a large-scale bio-emergency case study. The algorithms designed from this research are implemented and integrated into an existing computational framework that is currently used by public health officials. These computational tools enhance an emergency response planner's ability to derive a set of vehicle routes specifically optimized for the delivery of resources to dispensing facilities in the event of a bio-emergency.
409

Anomaly Detection and Security Deep Learning Methods Under Adversarial Situation

Miguel Villarreal-Vasquez (9034049) 27 June 2020 (has links)
<p>Advances in Artificial Intelligence (AI), or more precisely on Neural Networks (NNs), and fast processing technologies (e.g. Graphic Processing Units or GPUs) in recent years have positioned NNs as one of the main machine learning algorithms used to solved a diversity of problems in both academia and the industry. While they have been proved to be effective in solving many tasks, the lack of security guarantees and understanding of their internal processing disrupts their wide adoption in general and cybersecurity-related applications. In this dissertation, we present the findings of a comprehensive study aimed to enable the absorption of state-of-the-art NN algorithms in the development of enterprise solutions. Specifically, this dissertation focuses on (1) the development of defensive mechanisms to protect NNs against adversarial attacks and (2) application of NN models for anomaly detection in enterprise networks.</p><p>In this state of affairs, this work makes the following contributions. First, we performed a thorough study of the different adversarial attacks against NNs. We concentrate on the attacks referred to as trojan attacks and introduce a novel model hardening method that removes any trojan (i.e. misbehavior) inserted to the NN models at training time. We carefully evaluate our method and establish the correct metrics to test the efficiency of defensive methods against these types of attacks: (1) accuracy with benign data, (2) attack success rate, and (3) accuracy with adversarial data. Prior work evaluates their solutions using the first two metrics only, which do not suffice to guarantee robustness against untargeted attacks. Our method is compared with the state-of-the-art. The obtained results show our method outperforms it. Second, we proposed a novel approach to detect anomalies using LSTM-based models. Our method analyzes at runtime the event sequences generated by the Endpoint Detection and Response (EDR) system of a renowned security company running and efficiently detects uncommon patterns. The new detecting method is compared with the EDR system. The results show that our method achieves a higher detection rate. Finally, we present a Moving Target Defense technique that smartly reacts upon the detection of anomalies so as to also mitigate the detected attacks. The technique efficiently replaces the entire stack of virtual nodes, making ongoing attacks in the system ineffective.</p><p> </p>
410

Revisorns oberoende : Skillnad mellan auktoriserade revisorer och revisorsassistenter? / Auditor independence : Difference between authorized auditors and auditor assistants?

Svensson, Hanna, Thunberg, Hanna January 2020 (has links)
Revisorns oberoende är ett ständigt diskuterat och debatterat ämne. Nya skandaler fortsätter att uppstå där revisorns oberoende ifrågasätts. Syftet med studien är att undersöka om det finns en skillnad mellan revisorers oberoendebedömning beroende på revisorns yrkestitel. Yrkestitlarna som har undersökts i denna studie är revisorsassistenter och auktoriserade revisorer. För undersökning av studiens syfte har en kvalitativ metod tillämpats och semistrukturerade intervjuer genomförts med fem revisorer varav tre auktoriserade revisorer och två revisorsassistenter.   Resultatet av studien visar att alla respondenter var eniga om att oberoendet är viktigt för att skapa förtroende för samt att oberoendet är en svårbedömd fråga. Detta eftersom de alla trodde att det förekommer skillnader mellan olika revisorers oberoendebedömningar och att oberoendet kvarstår som ett komplext ämne. Vidare framkom det skillnader mellan de två olika yrkestitlarnas resonemang kring olika scenarier där de skulle bedöma ifall det förelåg hot mot oberoendet eller inte. Det som framkom var att de auktoriserade revisorerna hade en striktare syn på självgranskningshotet samt vänskapshotet medan revisorsassistenterna såg striktare på egenintressehotet samt det synbara oberoendet.   Slutsatserna som dras av studien är att revisorsassistenter och auktoriserade revisorer använder sig av analysmodellen på samma sätt men det är revisorsassistenterna som fyller i dessa medan de auktoriserade revisorerna kontrollerar det. Ytterligare förekom skillnader mellan revisorsassistenter och auktoriserade revisorers resonemang kring olika oberoendehot vilket innebär att studien tydliggör att karaktärsdraget yrkeserfarenhet påverkar revisorns oberoendebedömning. / Auditor independence is a constantly discussed and debated topic. New scandals continue to arise where the auditor's’ independence is questioned. The purpose of this study is to investigate whether there is a difference between the auditors’ independent assessment depending on the auditor's professional title. The titles examined in this study is auditor assistants and authorized auditors. To investigate the purpose of the study, a qualitative method was used and semi-structured interviews were conducted with five auditors, of which three where authorized auditors and two auditor assistants.   The results of the study show that all respondents agreed that independence is important for building trust and that independence is a difficult question. This is because they all believed that differences existed between the different auditors' independent assessments and that the independence remains as a complex subject. Furthermore, differences emerged between the two different professional titles' arguments regarding different scenarios where they should decide whether there was a threat to their independence or not. What emerged was that the authorized auditors had a stricter view of the self-examination threat and the friendship threat, while the auditor assistants looked more strictly at the self-interest threat and independence in appearance.   The conclusions drawn from the study is that auditor assistants and authorized auditors use the analysis model in the same way, but the auditors' assistants fill in these while the authorized auditors control it. In addition, there were differences between the auditor assistants and the authorized auditors' arguments regarding different independence threats, which means that the study makes clear that the character trait, professional experience, influences the auditor's independence assessment.

Page generated in 0.0266 seconds