• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 183
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 469
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
411

Optimalizace bezpečnostních schopností ozbrojených sil České republiky / Security capabilities optimalization of Czech military forces

Melich, Ladislav January 2013 (has links)
The topic of this diploma thesis is "Security capabilities optimalization of Czech armed forces". The original research aims to propose the strategic optimalization of the security capabilities of Czech armed forces. After the description of the evolution of the transformation of Czech armed forces from 1989 the thesis has offered an analysis of threats, risks and assets to Czech republic made on the basis of Czech strategic security documents. On this basis matrix of security risks has been created. Then preventive and liquidation measures that are necessary to adopt in case of emergency situations have been formulated. In the next section necessary security capabilities for realization of the measures have been suggested. Although the author examined all security capabilities necessary for elimination of security risks, major emphasis has been given to military capabilities. The actual military capabilities of Czech armed forces have also been described. The main aim of this thesis has been to define the strategic gap - the difference between desirable military capabalities and actual military capabilities - and to present strategic goals for approximately next twenty years.
412

Hybridní válčení, války a hrozby: konceptuální analýza / Hybrid Warfare, Wars, and Threats: A Conceptual Analysis

Bahenský, Vojtěch January 2016 (has links)
This thesis strives to raise and answer three questions about the concept of hybrid warfare: What concepts of hybrid warfare exist so far? How similar or different are they? How useful are they from conceptual standpoint? The questions are answered by a conceptual analysis consisting of survey of existing concepts, their comparison and detailed evaluation of two of them on the basis of criteria of conceptualization. The answers revealed several important issues of the concept. Firstly, there are too many different concepts of hybrid warfare, often formulated with insufficient care for previous debates and already established concepts. Secondly, the formulated concepts of hybrid warfare are often different to a degree, which calls into question the claim, that all of them are trying to capture the same phenomenon. Lastly, even the better elaborated of the hybrid warfare concepts seem to be rather poorly conceptualized and not very useful. These three answers together cast shadow of doubt on the currently popular concept of hybrid warfare. The results of this work call for more careful thinking on whether and how the use of this concept is helping or hurting both our understanding of contemporary conflicts and our defence efforts against contemporary threats.
413

Resiliencia en personas con epilepsia idiopática / Resilience in people with idiopathic epilepsy

Ramirez Huamán, Paloma, Zloczover Villarreal, Patrick Claudio 11 February 2022 (has links)
El objetivo de la investigación es explorar la resiliencia en personas diagnosticadas con epilepsia idiopática. Para tal fin, se desarrolló un estudio cualitativo de diseño fenomenológico, aplicando la técnica de la entrevista semiestructurada a una muestra de 10 participantes, 6 mujeres y 4 hombres, cuyas edades se situaron en el rango de 20 a 29 años. Los principales resultados muestran que los sesgos personales, la estigmatización, el desconocimiento de la sociedad sobre la enfermedad, la falta de reconocimiento de los participantes sobre la participación en actividades riesgosas y la aversión a la adherencia al tratamiento y su relación con los recordatorios familiares, representan amenazas significativas. Por otro lado, como principales competencias se encuentran el apoyo familiar y el proceso de adaptación a la enfermedad. Las principales conclusiones son: (1) Se comprende que existen riesgos significativos para su autonomía, (2) se identifican factores que representan una protección frente a los posibles riesgos, (3) cuentan con factores protectores que facilitan el crecimiento personal. / The aim of the research is to explore resilience in people diagnosed with idiopathic epilepsy. For this purpose, a qualitative study of phenomenological design was developed, applying the semi-structured interview technique to a sample of 10 participants, 6 women and 4 men, whose ages ranged between 20 to 29 years. The main results show that personal biases, stigmatization, unawareness by society about the disease, lack of recognition by participants about participation in risky activities and aversion to adherence to treatment and its relationship with family reminders represent significant threats. On the other hand, the main competences are family support and the process of adaptation to the disease. As conclusions: (1) It is understood that there are significant risks to their autonomy, (2) they have factors that represent a protection against possible risks, (3) they have protective factors that facilitate personal growth. / Tesis
414

A framework for higher academic institutions in the republic of South Africa to mitigate network security threats and attacks.

Mohapi, Matrinta Josephine 06 1900 (has links)
M. Tech. (Department of Information and Communication Technology, Faculty of Applied and Computer Sciences), Vaal University of Technology. / The computer networks of higher academic institutions play a significant role in the academic lives of students and staff in terms of offering them an environment for teaching and learning. These institutions have introduced several educational benefits such as the use of digital libraries, cluster computing, and support for distance learning. As a result, the use of networking technologies has improved the ability of students to acquire knowledge, thereby providing a supportive environment for teaching and learning. However, academic networks are constantly being attacked by viruses, worms, and the intent of malicious users to compromise perceived secured systems. Network security threats and cyber-attacks are significant challenges faced by higher academic institutions that may cause a negative impact on systems and Information and Communications Technology (ICT) resources. For example, the infiltration of viruses and worms into academic networks can destroy or corrupt data and by causing excessive network traffic, massive delays may be experienced. This weakens the ability of the institution to function properly, and results in prolonged downtime and the unavailability of Information Technology (IT) services. This research determines challenges faced by higher academic institutions, identifies the type of security measures used at higher academic institutions, and how network security could be addressed and improved to protect against network security threats and attacks. Two research approaches were adopted, namely a survey and an experiment. Survey questionnaires were distributed to IT technical staff at higher academic institutions in Gauteng province to determine the challenges they face in terms of securing their networks. It is crucial that network security takes on a prominent role when managing higher academic institutions‘ networks. The results of the study reveal several challenges such as budget constraints, inadequate security measures, lack of enforcing network security policies, and lack of penetration testing on systems and the network. The results also reveal that the implementation of security measures can and does address network security threats and attacks. It is therefore extremely important for higher academic institutions to implement proper security measures to help mitigate network security threats and attacks. The framework proposed is based on the results from the research study to help mitigate network security threats and attacks at higher academic institutions.
415

Essais sur la conception de mécanismes et les enchères

Njiki Njiki, Paul Samuel 11 1900 (has links)
No description available.
416

Hur ser stödet ut för socialarbetare vid hot och våldssituationer? : En kvalitativ studie om socialarbetarens erfarenheter av stöd vid hot och våldssituationer på arbetsplatsen / What does the support look like for social workers in situations of threats and violence? : A qualitative study on social workers experiences of support in situations of threat and violence in the workplace

Ranégie, Julia, Karhula, Alexander January 2023 (has links)
Syftet med denna uppsats är att skapa en djupare förståelse för vilket stöd som socialarbetare inom socialtjänsten får vid hot och våldssituationer på arbetsplatsen i relation till de stöd som socialarbetare tycker att de behöver. Det är viktigt att undersöka då kunskapen kan bidra till diskussion om socialarbetare får adekvat stöd i arbetsmiljöer där hot och våld är närvarande. Intresset har varit att undersöka om socialarbetaren får rätt stöd i hot och våldssituationer. Studien baseras på sjukvalitativa, semistrukturerade intervjuer med socialarbetare inom Sveriges socialtjänst. En tematisk analys har genomförts för att bearbeta den insamlade empirin. Empirin har också analyserats utifrån tidigare forskning och två olika teorier, coping och human relations. Studien visar att socialarbetarna någon gång i yrket utsatts för hot och våld och att de subtila hoten förekommer mer frekvent än andra hot och våldshandlingar. Samtliga deltagare beskriver att de idag har ett bra stöd när incidenter om hot och våld inträffar på arbetsplatsen men att det finns en del stöd som kan utvecklas. Stödet de vill se mer av vid hot och våldssituationer är bland annat: förebyggande rutiner, stående punkter om hot och våld på arbetsplatsträffar, handledning, att chef har inblick i ärenden och ger återkoppling, bättre introduktion inför arbetet gällande hot och våld på arbetsplatsen och mer dialog om ämnet då hot och våld inte sällan normaliseras i det sociala arbetet. Gemensamt för socialarbetarna är att de vill se politikerna ta ansvar i frågan om hot och våldsbilden mot socialarbetare. / The purpose of this study is to gain a deeper understanding of the support that social workers in the social services receive in situations involving threats and violence at the workplace in relation to the support that social workers feel they need. It is important to investigate this topic as the knowledge gained can contribute to discussions about whether social workers receive adequate support in work environments where threats and violence are present. The study is based on seven qualitative, semistructured interviews with social workers in Sweden's social services. A thematic analysis has been conducted to process the collected empirical data. The data has also been analyzed based on previous research and two different theories, coping and human relations. The study shows that social workers have been exposed to threats and violence at some point in their careers, where subtle threats occur more frequently than other forms of violence and threats. All participants describe that they currently have good support when incidents of threats and violence occur in the workplace, but that there is room for improvement in some areas of support. The support that they want to see more of in situations involving threats and violence includes: preventive routines, standing items on threats and violence at workplace meetings, guidance, managers having insight into cases and giving feedback, better onboardings to the work regarding threats and violence in the workplace, and more dialogues on the subject since threats and violence are often normalized in social work. Social workers share the desire for politicians to take responsibility for the issue of threats and violence against social workers.
417

Digital Threats Against Women Journalists in Mexico : Networks as a Coping Strategy

Krabbe, Marie January 2023 (has links)
Mexico is currently one the most dangerous countries in the world to practice journalism, with one of the highest death rates in the world. Violence against Mexican journalists has received significant attention from researchers, most recently when it comes to digital threats. Research suggests that online harassment against journalists is not only related to the profession or topic covered, but also individual characteristics like gender, race and sexuality. Digital threats affect everyone, but the threats women are faced with are disproportionate. While digital technologies are useful in developing reporting practices, it has also been shown as detrimental. Through a semi-structured WhatsApp interview with a Mexican women journalists and coordinator in an International Journalist Network, this study attempts to identify the perceptions of online threats against women journalists and the use of Networks as a coping strategy. Through the use of digital testimonies, this study attempts to further amplify Mexican women journalists’ voices and experiences when it comes to using Networks as a coping strategy to confront online violence.  The importance here is to understand the Mexican context and the dimensions to digital violence, the possibilities of resilience and the coping strategies practiced by Mexican women journalists. Through analysing perceptions of the threat and their experiences with Networks, this study attemps to identify the strengths and possibilities of Networks as a coping strategy, when it comes to digital threats, but also its barriers and limitations. This study is important to the field of Communication of Development and Social Change as it underscores the importance of listening, understanding local contexts, perceptions and resilience. This is crucial when undertaking intitaves on a larger scale for social change.
418

Women Farmers in Rural Uganda : A Case Study of Livelihood Threats and Building Resilience Among the Most Vulnerable / Kvinnliga jordbrukare i rurala Uganda : En fallstudie om försörjningshot och motståndskraft bland de mest utsatta

Tillenius, Sara, Forsberg, Joline January 2022 (has links)
This case study is conducted through ten weeks of field studies in South-Eastern Uganda. Both authors have received funding from Minor Field Study scholarships. These scholarships were provided by Sida, Sweden's government agency for development cooperation. This entails that the authors are contract bound to comply with the terms and regulations established by Sida and Jönköping University as well as write and submit a report to the Swedish Council of Higher Education upon return to Sweden.  Without the substantial contributions from the local community in Kamuzinda and neighbouring villages, this thesis would not have been completed. First and foremost, profound gratitude is expressed to the many people who contributed to making this study a reality, be it big or small. This includes our supervisor Åsa Westermark, who has been of great help and guidance throughout the entire research process. Secondly, we want to thank Uganda Child Care Sweden for a productive collaboration, with special recognition to Ponsiano Nyombi and Rebecca Nanyanzi for their welcoming hearts and support throughout our entire stay in Uganda. Lastly, we are forever grateful to the people who brought us into their homes and were willing to share their life stories with us. It is your participation and kindness that made this thesis possible.
419

Portabla enheter : Hot, risker, sårbarheter, lösningar och skyddande motåtgärder / Portable devices : Threats, risks, vulnerabilities, solutions and protection countermeasures

Moradinia, Pourya, Haule, Godfrey January 2012 (has links)
Detta examensarbete har utförts på uppdrag av Försvarsmakten. Arbetets målsättning är att undersöka hot, risker och sårbarheter som portabla enheter kan orsaka eller bidra till inom en organisation. Bärbara datorer med operativsystemet Windows och Mac, samt surfplattor och smartphones med operativsystemet Android, iOS och Windows Phone är de portabla enheter som är utvalda att ingå i denna rapport. Vidare diskuteras förslag på hur man kan förebygga olika säkerhetsrisker. Rapporten tar även upp dagens BYOD-lösningar (Bring Your Own Device). Exempel på olika produkter från kända företag tas upp för att åskådliggöra åtgärder som kan vidtas mot de hot, risker och sårbarheter som orsakas av de portabla enheter som nämns. Förslag på olika metoder och säkerhetslösningar diskuteras för att förenkla förståelsen av hur pass allvarliga problem de säkerhetsrisker som ingår i en portabel enhet kan orsaka.     Idag använder en stor mängd företag, myndigheter, organisationer och privatpersoner mobila enheter. Det kan röra sig om antingen företagsägda eller privata mobilenheter. Ökad produktivitet, förbättrad service mot kunder och minskade IT-kostnader är några av många fördelar med att använda portabla enheter i en verksamhet. Men när användning ökar, ökar också riskerna. De flesta mobila enheter har skapats med säkerhetsplattformar som saknar, eller har begränsade säkerhetslösningar, för att de har begränsade resurser i form av minneskapacitet, batteritid och hårddiskutrymme. Dessutom handlar det om ny teknologi som fortfarande är under utveckling. Just detta leder till att mobila enheter är särskilt attraktiva för inkräktare, eftersom de är lätta mål och effekterna blir stora.   Det ideala vore en säkerhetslösning som är kompatibel med de flesta mobilplattformar. Dessutom skulle den ha kapacitet att skydda data som sparas på enheten liksom data som skickas mellan enheter, eller mellan en portabel enhet och företagsnätverk. Denna lösning ska också vara anpassad till de behov som finns i en stor organisation, samtidigt som den också måste vara resurssnål med tanke på mobila enheters begränsade kapacitet. För tillfället saknas en sådan lösning på marknaden. Därför bör ett företag eller myndighet i dagsläget se sig om efter ett flertal lämpliga säkerhetslösningar som kan kombineras för att uppnå bästa möjliga säkerhetsnivå i enlighet med dess rådande säkerhetspolicy. / This thesis has been written on behalf of the Swedish Armed Forces (Försvarsmakten). The objective of this thesis is to investigate the threats, risks and vulnerabilities that can be caused by portable devices within an organization. Laptop computers with operative system Windows and Mac, tablet PCs and smart phones with operating system Android, iOS and Windows Phone are the only portable devices that have been selected to be part of this report. Proposals on how to prevent these risks are discussed in this work. The report also discusses today's BYOD solutions. Examples of different products from known companies are admitted to more easily describe the actions of the threats, risks and vulnerabilities caused by the portable devices mentioned. Different methods and security solutions are discussed to simplify the understanding of the severity of problems and security risks caused by the portable devices.   The mobile technology has recently become powerful and as a result large enterprises, government workers, small business and private consumers are all using smart phones or other mobile devices to manage both business and personal interactions. Increased employee productivity, improved client services and reduced IT cost are some of the advantages of using mobile devices in an enterprise. Securing these devices at the enterprise level has become a challenge for many IT security experts due to the fact that mobile devices have limited resources (memory, CPU, hard disk space and battery). Therefore, hackers are discovering the economic potential of attacking mobile devices on a course to compromise both business and personal data contained within mobile.   An ideal mobile security solution would be one that is compatible with all the major mobile platforms on the market. Moreover, it would have the capacity to protect data stored on the device as well as data sent between devices or between a portable device and an enterprise network. This solution should also be tailored to the needs of an authority or any large organization, while it also has to be resource-efficient, given that mobile devices tend to have limited resources. Unfortunately at the moment there is no such solution on the market. Therefore, a company or authority at the moment should look around for two or more appropriate mobile security solutions that can be combined to achieve the best possible security level in accordance with their current security policies.
420

Cybersäkerhet : Distansarbetets påverkan på cybersäkerhet inom företag

Håman, Philip, Kasum, Edin, Klingberg, Olof January 2022 (has links)
Digitaliseringen och den konstanta utvecklingen av teknologi i vårt samhälle har medfört många förändringar de senaste åren. I olika områden inom yrkeslivet har rutiner och system behövt uppdaterats för att hålla jämna steg med digitaliseringen. Idag är det inte ovanligt för anställda att arbeta på distans, vanligtvis från sina egna hem. Utöver detta, har Covid-19-pandemin som drabbade världen under 2020, endast utökat och påskyndat processen där företag behöver anpassa sig till denna typ av arbete. Trots att möjligheten att kunna jobba hemifrån reflekterar en modern arbetsplats såväl som ett modernt samhälle, öppnar det även upp frågan om potentiella cyberhot. På grund av detta undersöker nuvarande studie forskningsfrågan: Hur har cybersäkerhet inom företag påverkats av utökat distansarbete? Som avgränsning fokuserar studien specifikt på den finansiella sektorn. Forskningsmetoden som valts ut för studien har varit kvalitativ, i form av primär datainsamling genom semistrukturerade intervjuer som sedan analyserats med hjälp av tematisk analys. Samtliga respondenter arbetar med och har erfarenhet av cybersäkerhet samt har en koppling till finanssektorn. Vidare fokuserar dessa intervjuer på olika aspekter av hur säkerheten inom företag har påverkats av det ökade distansarbetet hemifrån. För att kunna besvara detta, ställdes en rad specifika frågor angående förändringar, kommunikation, cyberhot och utmaningar på grund av distansarbete till respondenterna. Det insamlade och analyserade resultatet visar på att majoriteten av respondenterna anser att jobba hemifrån betyder en ökad mängd förändringar i form av hantering av information, inloggningsrutiner, behörigheter, utrustning och ibland även förändring av IT-infrastrukturen i företagen. Resultaten visar även på hot och utmaningar som kan uppstå vid distansarbete. En slutsats som därmed kan dras från studien är att företagens cybersäkerhet påverkas och hanteras på olika sätt när det kommer till det ökade distansarbetet. Dessa bemöts enligt respondenterna med olika strategier, rutiner och riskminimering. För att vidare minimera cyberhoten vid arbete hemifrån i framtiden, är den generella uppfattningen i studien att företag behöver arbeta förebyggande och utbilda personal i frågan om cybersäkerhet när man inte befinner sig på ordinarie arbetsplats. Trots att respondenterna tillsammans med föregående studier anser att cyberhoten har ökat de senaste åren, håller de med varandra om svårigheten att fastställa om det är ett faktum att de har ökat på grund av just ökat distansarbete. Eftersom det inte alltid rapporteras om hoten som finns mot finanssektorn på grund av anseende- och trovärdighetsskäl, har det varit en utmaning att få tillräckliga svar i de i utförda intervjuerna. / The digitalization and constant development of technology in our society has brought many changes over the last few years. In various areas of the work field, routines and systems have been updated to keep up with the digitalization. Nowadays it is not unusual for employees to be teleworking, most commonly to work from their own homes. On top of that, the global Covid-19-pandemic that hit the world in 2020, has only increased and speeded up the process for companies to adjust to this type of work. Even though being able to work from home reflects a modern workplace as well as society, it does open the question about possible online threats. Therefore, this current study examines the question: How does the increasing teleworking trend affect cybersecurity in organizations? As a demarcation, the study specifically focuses on the financial sector. The research method selected for the study has been of qualitative nature, during which primary data was collected through semi-structured interviews which further were analyzed using thematic analysis. The respondents are all employees and have experience within cybersecurity, related to the financial sector. Furthermore, these interviews focus on different aspects of how the cybersecurity of companies has been affected by the recent increase in teleworking from home. To shed light on the matter, the respondents were asked a specific set of questions regarding changes in; communication, cyber threats and challenges all due to telework. The results gathered and analyzed do show that the majority of the respondents believe that working from home does mean an increased amount of changes in ways of handling information, login-routines, competence, equipment and sometimes even the infrastructure of their IT-systems. Additionally, the results also show threats and challenges that may occur due to increased teleworking, such as larger attack surfaces. Therefore, a conclusion that can be drawn from the study is that there are different ways in which the cybersecurity of companies can be affected by the increasing teleworking trend. According to the respondents, these challenges are met with different strategies, routines and risk minimization. To further minimize future cyberthreats when working from home, the general perception drawn from the study is that companies have to work preventively and as well as educate staff on threats and risks associated with increased teleworking. However, while the respondents and previous studies believe that threats have increased over the last couple of years, they do agree on the difficulty of determining whether it is in fact due to the increased amount of telework. Since the cyberthreats against the financial sector are not always spoken about or reported for reasons of reputation and credibility, there were also respondents who have been hersistant in providing full answers to the interviews.

Page generated in 0.1932 seconds