• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 56
  • 35
  • 22
  • 12
  • 9
  • 7
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 188
  • 34
  • 22
  • 22
  • 18
  • 18
  • 16
  • 14
  • 13
  • 13
  • 13
  • 13
  • 12
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

FROM THE SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION AND RATIONALIZATION

Subia Ansari (9175607) 29 July 2020 (has links)
<p>Cybercrime and online scams are rampant in today’s tech-savvy world. In the past, scammers relied heavily on emails to contact potential victims but today, the presence and widespread usage of social networking platforms and e-commerce businesses has increased the availability of potential victims and made them easily accessible. It could be assumed that since unsuspecting users seek various products or services online - rentals, booking trips, seeking jobs, dating, it makes them easy targets for scammers yet, it is not just individual users who suffer from fraud, but organizations and institutions as well. A study at the Bank of America Merrill Lynch Global Research found that cybercrime costs the global economy up to approximately 540 billion euros annually. There is plenty of research on the technical measures that individuals and organizations may take to prevent themselves from falling prey to fraudsters, however, research trends in the recent past have shifted towards analyzing the human element present in the scenarios. Researchers have argued that identifying the underlying psychological and sociological factors used by fraudsters could help tackle the very root cause of such fraudulent attacks. While there exists some research focusing on the experiences and psychology of victims of these attacks as well as the countermeasures that can be taken to protect them from such attacks, there is little research on the psychology and motivation of those who commit online fraud. This study aims to identify the psychological factors that affect the predilection of scammers to commit online fraud.</p>
142

Multi-facet Roles of MG29, a Synaptophysin Family Protein, in Skeletal Muscle Development, Regeneration, and Metabolic Function

Yi, Frank January 2021 (has links)
No description available.
143

Postoj Srbské pravoslavné církve k režimu Slobodana Miloševiće: Ideál symfonie církve a státu versus realita. / The position of the Serbian Orthodox Church to the regime of Slobodan Miloševic: The ideal of symfony between church and state versus reality.

Hofmeisterová, Karin January 2014 (has links)
The presented work deals with the topic of the relationship between the Serbian Orthodox Church (SOC) and the regime of Slobodan Milosevic in the years 1987 - 2000, which is a topic that has scarcely been elaborated upon in academic circles. It specifically deals with the concept of symphony as an Orthodox ideal of the arrangement of relationship between the Church and the state in the SOC policy towards the Serbian political leadership of that time. The thesis illuminates the origins and the essence of this concept and defines the adjustments which it went through in the Serbian milieu. In comparison to the original concept of symphonic interaction between the Church and the power of the state, the author establishes the core alteration as the addition of a national aspect and the creation of an organizational triad of nation, Church and state, which became a characteristic feature of the Serbian Orthodox theology. Based upon the analysis of SOC discourse, the treatise then refreshes the proposition that the symphony of Church and state, taking into account specific attributes, forms a key framework that has influenced and to this day to a certain extent still influences the SOC policy and its approach to a particular political power and regime.
144

Internet of Things inom integrerad vård för äldre : En kvalitativ studie ur ett säkerhetsperspektiv / Internet of Things in integrated care for the elderly : A qualitative study from a security perspective

Filip, Tomas, Kirill, Kobets January 2020 (has links)
I samma takt som den äldre populationen i de flesta länder fortsatt växer så ökar efterfrågan för äldrevård. Samtidigt har Internet of Things (IoT) snabbt blivit ett av det mest välkända och omtalade begreppet kring företag och teknologi. Ett tillämpningsområde som IoT idag riktar sig mot är hälso- och sjukvården. IoT förväntas inom detta område kunna förse äldre med integrerad vård som i framtiden kan minska sjukvård och kostnader. Teknologins alla fördelar har dock även medfört nackdelar i form av nya säkerhetsattacker och sårbarheter i hälso- och sjukvårdssystemen. Problemet med IoT teknologin är att den i dagsläget inte stöds av adekvata åtgärder för sekretess och säkerhet. Syftet med studien var att undersöka hur frågor kring säkerhet påverkar utvecklingen av IoT lösningar riktade mot integrerad vård för äldre. Via semi-strukturerade intervjuer med fem informanter med erfarenhet och kompetens inom området för integrerad vård för äldre, IoT och säkerhet kunde empirin för studien samlas in. Vidare analyserades det empiriska resultatet tillsammans med litteraturen vilket resulterade i att ett antal faktorer som påverkar utvecklingen av IoT lösningar riktade mot integrerad vård för äldre identifierades. Resultatet för studien visar att faktorerna tid, ekonomi och användarvänlighet påverkar aktörers val av att prioritera funktionalitet före säkerhet under utveckling. Aktörer tvingas istället göra ett antal avvägningar och arbeta på olika sätt för att implementera tillräcklig säkerhet i sina IoT lösningar. Vidare visar resultatet att bristen på tydliga riktlinjer och standarder är en faktor som påverkar aktörers förenlighet med lagar och regler som ställer hårda krav på säkerheten. Utöver detta visar resultatet att det är viktigt att definiera ägandefrågan under utvecklingsstadiet eftersom frågan i dagsläget är otydlig och diffus. / As the elderly population in most countries continues to grow, the demand for elderly care is increasing. At the same time, the Internet of Things (IoT) has quickly become one of the most well-known and widely spoken concept of business and technology. One area of use that IoT is currently addressing is healthcare. In this area, IoT is expected to be able to provide the elderly with integrated care that in the future can reduce healthcare and costs. All the advantages of IoT have also brought disadvantages in the form of new security attacks and vulnerabilities in the health care systems. The problem with the IoT technology is that it is not currently supported by adequate privacy and security measures. The purpose of the study was to investigate how security issues affect the development of IoT solutions aimed at integrated care for the elderly. Through semi-structured interviews with five informants with experience and competence in the field of integrated care for elderly, IoT and security, the empirical data for the study could be collected. Furthermore, the empirical result was analyzed together with the literature, and a number of factors were identified that have influence on the development of IoT solutions aimed at integrated care for the elderly. The results of the study show that the factors of time, economy and user friendliness affect the actors' choice of prioritizing functionality before security during development. Instead, actors are forced to make a number of tradeoffs and work in different ways to implement adequate security in their IoT solutions. Furthermore, the results show that the lack of clear guidelines and standards is a factor that influences actors' compliance with laws and regulations that impose strict safety requirements. In addition, the results show that it is important to define the ownership issue during the development stage, as the issue is currently unclear and diffuse.
145

IOT inom hemautomation : Jämförande av open-source kontrollers / IOT in home automation : Comparison of open-source controllers

Carohl Qvist, Amanda January 2020 (has links)
Internet Of Things (IoT) och hemautomation innebär möjligheten att koppla upp diverse enheter i ett hem gentemot internet, som därefter har som mål att underlätta och göra konsumenters vardag mer bekvämt. Hemautomation kan exempelvis handla om att låsa dörrar och tända lampor från en enda enhet (kontrollern), vilket underlättar då konsumenten inte behöver gå till vardera enhet för att utföra önskade aktiviteter. Kontrollers är den del av ett IoT-system inom hemautomation som agerar gränssnittet mellan konsumenten och enheterna.Open-source erbjuder konsumenter ett mer fritt nyttjande av produkter pga. dess öppna källkod. Många problem och frågor som uppstår i samband med dessa produkter härstammar inom området av säkerhet, samt vad som skiljer produkterna åt avseende säkerhet.Denna studie har samlat ihop sex open-source kontrollers och genomfört en jämförelse för att identifiera vilka kontrollers som uppnår säkerhet avseende konfidentialitet, integritet och tillgänglighet. Detta har utförts genom att identifiera vilka värden som förekommer i tidigare artiklar där säkerheten utvärderas för IoT och hemautomation, och för kontrollers.Studien kopplar ihop identifierade värden med CIA modellen, vilket står för confidentiality, integrity och availability (konfidentialitet, integritet och tillgänglighet). I samband med CIA modellen presenteras ett resultat där studiens aktuella kontrollers visar till vilken nivå de upprätthåller CIA modellen, baserat på det identifierade värden som fastställts. De kontrollers som förekommer i studien är Home Genie, OpenHAB, Home Assistant, Domoticz, Calaos och Pimatic.Studiens resultat erhålls via en litterär undersökning av 25 tidigare studier samt 12st tillkommande tekniska dokumentationer och forum för samtliga tillhörande kontrollers. Samtliga studier har blivit hämtade från databaserna Google Scholar, IEEE Xplore och ACM Digital Library och har därefter blivit analyserade och tematiskt kodade för vidare information. Totalt har studiens material genomgått urval i fem steg för att garantera relevant material som stämmer överens med studiens kriterier och mål för innehåll. Studiens resultat presenterar en ögonblicksbild som ger kunskap om jämförda kontrollers, specifikt i samband med CIA modellen, vilket belyser produkterna i samband för området av säkerhet avseende konfidentialitet, integritet och tillgänglighet. / Internet of Things (IoT) and home automation means the opportunity to connect various devices in a home to the Internet, which has the goal of facilitating and making consumers’ everyday lives more comfortable. For example, home automation could be about locking doors and lighting lamps from a single device (the controller), which may make it easier for the consumer since the consumer does not have to go to each device to perform the desired activity. Controllers are the part of a home automation IoT-system that acts as an interface between the consumer and the devices.Open-source offers consumers a freer use of products, due to its open-source code. Many problems and issues that arise in connection with these products originate in the field of security, as well as what distinguishes the products in terms of security.This study has collected six open-source controllers and conducted a comparison to identify which controllers achieve security regarding confidentiality, integrity and availability. This has been done by identifying the values that appear in previous articles where security is evaluated for IoT and home automation, and controllers.This study links identified values with the CIA model, which stands for confidentiality, integrity, and availability. In accordance with the CIA model, a result is presented where the study’s current controllers show to what level they maintain the CIA model, based on the identifies values established. The controllers that appears in this study are Home Genie, OpenHAB, Home Assistant, Domoticz, Calaos, and Pimatic.This study’s results are obtained through a literary study of 25 studies, and 12 additional technical documentations and information through forums for all the associated controllers. All studies have been retrieved from the Google Scholar database, IEEE Xplore, and ACM Digital Library, and subsequently analyzed and thematically coded for further information. In total, the material of this study has been selected in five steps to ensure relevant material that meets this study’s criteria and objectives for content. This study’s results present an overview that provides knowledge about compared controllers, specifically in connection with the CIA model which highlights the products in the field of security, regarding confidentiality, integrity, and availability.
146

"Everybody is Good Enough": Band Teacher Agency in a Highly Competitive Environment

Tucker, Olivia Gail 08 1900 (has links)
Relations between music education structures and teacher agency are under-researched and under-theorized, and scholars have indicated that the traditions and competitions of school bands in the U. S. may constrain educator agency. The need for research on teacher agency in competitive environments is compounded by policy trends toward administrators' use of festival scores in music educator evaluations. The purpose of this instrumental case study was to investigate band teacher agency in a highly competitive music education environment. I used the chordal triad of agency as the primary theoretical framework. Participants were four mid-career band educators in Texas, and I collected data through interviews, observations, journal entries, website review, and email correspondence. Throughout the data, participants' agency largely reproduced existing structures. Findings coalesced around (a) participants' core values of music, students' development, hard work, and competition, (b) an inductive, cohesive collection of band teaching norms despite participants' employment in schools of varying urbanicity and student demographics, (c) power sources that transmitted values and directed teachers' agency, and (d) a compelling story of one participant's generative agency that contrasted with the rest of the data. I provide directions for further research on music teacher agency and suggest implications for band educators, professional music education organizations, and music teacher educators.
147

[en] ACESS TO ORIGINS AT ADOPTION S CONTEXT: DEMANDAS AND EXPERIENCE AT THE JUDICIARY / [pt] ACESSO ÀS ORIGENS NO CONTEXTO DA ADOÇÃO: DEMANDAS E EXPERIÊNCIA NO JUDICIÁRIO

PATRICIA GLYCERIO RODRIGUES PINHO 24 May 2021 (has links)
[pt] A presente pesquisa, apresentada no formato de dois artigos, tem como objetivo geral investigar a amplitude do direito de acesso às origens, assegurado por Lei aos adotados. O interesse pela temática surgiu a partir de um atendimento paradigmático em uma das Varas da Infância do Estado do Rio de Janeiro, no qual a genitora buscou o Judiciário a fim de estabelecer contato com a filha que fora entregue para adoção há mais de 30 anos. Para atingir o objetivo geral do trabalho, refletimos sobre a importância de serem incluídos no estudo de campo os representantes de cada um dos vértices da tríade adotiva –família biológica, filho e família adotiva – frente às particularidades de sua dinâmica de funcionamento para a análise do tema proposto. Assim, realizamos entrevistas semiestruturadas em separado com a genitora, demandante do contato, a filha e a mãe por adoção. As entrevistas foram analisadas segundo o método de análise de conteúdo e as categorias emergidas do material coletado foram articuladas à literatura sobre entrega voluntária, busca de contato entre as famílias biológica e adotiva e mediação do Judiciário. Percebemos que a experiência do encontro mediado pela Justiça teve avaliação positiva dos envolvidos, funcionando de forma integrativa para os componentes da tríade. Entretanto, a inexistência de um protocolo específico para atuar em situações dessa natureza quase inviabilizou a intervenção técnica, o que aponta para a necessidade de alguma sistematização pelo Judiciário no atendimento a esse tipo demanda. / [en] The present research, presented in the format of two articles, has the general objective of investigating the dimension of the right to access the origins, guaranteed by Law to adoptees. The interest in the theme emerged from a paradigmatic situation held in one of the Juvenile Courts of the State of Rio de Janeiro, in which the biological mother sought the Judiciary in order to establish contact with her daughter who had been voluntarily relinquished more than 30 years ago. To achieve the general objective of this work, we reflected on the importance of including in the field study the representatives of each of the vertices of the adoptive triad – biological family, adoptee and adoptive family - in view of the particularities of its dynamics for the analysis of the proposed theme. Thus, we conducted separate semi-structured interviews with the mother, the contact applicant, the daughter and the adoptive mother. The interviews were analyzed according to the content analysis method and the categories that emerged from the collected material were linked to the literature on voluntary relinquish, search and reunion and mediation by the Judiciary. We realized that the experience of the contact mediated by justice had a positive evaluation of those involved, working in an integrative way for the components of the triad. However, the lack of a specific protocol related to this kind of situation almost made the technical intervention in the case unfeasible, which points to the need for some systematization by the Judiciary on this type of demand.
148

Mechanisms and consequences of DNA damage, response and apoptosis in spermatozoa.

Laubenthal, Julian January 2011 (has links)
DNA damage in spermatozoa is a crucial contributor to spontaneous abortion, severe genetic disease in the offspring and infertility. The chromatin of spermatozoa is highly compacted, transcriptionally and translationally silent, hence lacking DNA damage response (DDR). DDR foci follow within seconds after a DNA double strand break (DSB) and correlate to an abortive topoisomerase-IIb activity during spermiogenesis. When comparing the DSB frequencies at the two most fragile genomic loci (fragile sites FRA3B, FRA16D) in human and murine spermatozoa with lymphocytes, significantly increased DSB levels were detected in spermatozoa in both species. This corroborates that spermatozoa are more prone to DSBs than somatic cells. When comparing the DSB frequencies at FRA3B/FRA16D in spermatozoa of smokers with non-smokers, two-fold increases were found, probably caused by cigarette smoke components triggering abortive topoisomerase-II¿ activity. The phosphorylated DDR proteins H2AX and ATM were identified in human spermatozoa and murine spermatids using multicolour immunostaining with laser-scanning confocal microscopy (LSCM) and Western blots. Based on significantly increased DDR foci in spermatozoa of smoking men, but lacking DDR foci in response to in vitro challenge with H2O2, an abortive topoisomerase-IIb activity is the likely cause of DDR foci in spermatozoa. As DDR foci are susceptible to cigarette smoke, they can potentially be used as a novel biomarker. When comparing paternal spermatozoa, and lymphocytes as well as maternal and cord lymphocytes from 39 families for DSBs (via high-throughput LSCM pH2AX detection) and DNA fragmentation (Comet assay), significant increases were found in newborns of mothers exposed to environmental tobacco smoke and smoking fathers. When challenging lymphocytes and spermatozoa to different genotoxicants, significantly increased DNA damage in newborns compared to adults was found. This confirms an exceptional vulnerability in newborns, believed to cause increased susceptibly to disease in later life, including cancer. / European Union¿s 6th Framework project Newborns and genotoxic exposure risk (NewGeneris), British Council¿s United Kingdom Indian Education Research Initiative (UKIER)
149

Применение ИТ-сервиса «Облако проектов» в организации проектного обучения : магистерская диссертация / Application of it service "Projects Cloud" in the organization of project learning

Казеева, М. А., Kazeeva, M. A. January 2019 (has links)
The master's thesis is executed on 88 pages, contains 12 tables, 22 figures, 76 used sources, 1 Appendix. The relevance of this dissertation is due to the increasing popularity of the project approach in training, while there are no systems for automating the management of educational project activities. The purpose and objectives of the master's thesis. The aim of the study is to study communications in project groups and identify parameters for managing project training activities, automated service "project Cloud". Objectives: to study the basics of the project approach in training; to build a process map; to analyze the structural and temporal characteristics of projects. During the writing of the master's thesis was selected and studied literature on a given subject. For research purposes, data were collected and processed, the analysis of students ' work within the "Cloud projects". The analysis of educational project activity of students can be useful to teachers for an assessment of quality of work and efficiency of students. The results allow us to determine the direction of further development and improvement of the system. According to the results of the evaluation of the economic efficiency of the project, the benefit from the introduction of the information system "Cloud projects" will be 98 357 rubles per semester. The project pays off within 6 months. / Магистерская диссертация выполнена на 88 страницах, содержит 12 таблиц, 22 рисунка, 76 использованных источников, 1 приложение. Актуальность данной диссертации обусловлена возрастающей популярностью проектного подхода в обучении, при этом нет систем для автоматизации управления учебной проектной деятельностью. Цель и задачи магистерской диссертации. Целью исследования является исследование коммуникаций в проектных группах и выявление параметров для управления проектной учебной деятельности, автоматизируемой сервисом «Облако проектов». Поставленные задачи: изучить основы применения проектного подхода в обучении; построить карту процессов; провести анализ структурных и временных характеристик проектов. В ходе написания магистерской диссертации была подобрана и изучена литература по заданной тематике. Для целей исследования были собраны и обработаны данные, произведен анализ работы студентов внутри системы «Облако проектов». Анализ учебной проектной деятельности студентов может быть полезен преподавателям для оценки качества работы и эффективности студентов. Полученные результаты позволяют определить направления дальнейшей разработки и усовершенствования системы. По результатам проведенной оценки экономической эффективности проекта выгода от внедрения информационной системы «Облако проектов» составит 98 357 рубля за семестр. Проект окупается в срок 6 месяцев.
150

Musiktheorie und die Theorie des Lehrens

Polth, Michael 17 October 2023 (has links)
No description available.

Page generated in 0.0753 seconds