Dissertations / Theses on the topic 'Computer security – Technological innovations'

To see the other types of publications on this topic, follow the link: Computer security – Technological innovations.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer security – Technological innovations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ransbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Full text
Abstract:
In the first essay, I examine value created through external acquisition of nascent technology innovation. External acquisition of new technology is a growing trend in the innovation process, particularly in high technology industries, as firms complement internal efforts with aggressive acquisition programs. Yet, despite its importance, there is little empirical research on the timing of acquisition decisions in high technology environments. I examine the impact of target age on value created for the buyer. Applying an event study methodology to technology acquisitions in the telecommunications industry from 1995 to 2001, empirical evidence supports acquiring early in the face of uncertainty. The equity markets reward the acquisition of younger companies. In sharp contrast to the first essay, the second essay examines the diffusion of negative innovations. While destruction can be creative, certainly not all destruction is creative. Some is just destruction. I examine two fundamentally different paths to information security compromise an opportunistic path and a deliberate path. Through a grounded approach using interviews, observations, and secondary data, I advance a model of the information security compromise process. Using one year of alert data from intrusion detection devices, empirical analysis provides evidence that these paths follow two distinct, but interrelated diffusion patterns. Although distinct, I find empirical evidence that these paths both converge and escalate. Beyond the specific findings in the Internet security context, the study leads to a richer understanding of the diffusion of negative technological innovation. In the third essay, I build on the second essay by examining the effectiveness of reward-based mechanisms in restricting the diffusion of negative innovations. Concerns have been raised that reward-based private infomediaries introduce information leakage which decreases social welfare. Using two years of alert data, I find evidence of their effectiveness despite any leakage which may be occurring. While reward-based disclosures are just as likely to be exploited as non-reward-baed disclosures, exploits from reward-based disclosures are less likely to occur in the first week after disclosure. Further the overall volume of alerts is reduced. This research helps determine the effectiveness of reward mechanisms and provides guidance for security policy makers.
APA, Harvard, Vancouver, ISO, and other styles
2

Collins, Michael. "Randomised shuffle and applied misinformation: An enhanced model for contact-based smart-card serial data transfer." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1997. https://ro.ecu.edu.au/theses/877.

Full text
Abstract:
Contact-based smart-cards, which comply to the International Standard IS0-7816, communicate with their associated read/write machines via a single bi-directional serial link. This link is easy to monitor with inexpensive equipment and resources, enabling captured data to be removed for later examination. In many contact-based smart-cards the logical abilities are provided by eight-bit microcontroller units (MCU) which are slow at performing effective cryptographic functions. Consequently, for expediency, much data may be transferred in plain-text across the vulnerable communications link, further easing an eavesdropper's task. Practitioners in military communications protect transmitted information by varying a link's carrier frequency in an apparently random sequence that is shared secretly between the sender and the authorised receiver. These multiplexing techniques, known as frequency or channel-hopping, serve to increase the task complexity for and/or confuse potential eavesdroppers. The study seeks to ascertain the applicability and value of protection provided by channel-hopping techniques, when realised with minimal additional overhead of microcontroller resources to the contact-based smart-card communications link. The apparent randomised shuffling of data transferred by these techniques has the potential benefit of deterring those observers who may lack the equipment and expertise to capture and decode the communicated message.
APA, Harvard, Vancouver, ISO, and other styles
3

Willett, Melanie. "A framework for assuring conformance of cloud-based email at higher education institutions." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1018664.

Full text
Abstract:
Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
APA, Harvard, Vancouver, ISO, and other styles
4

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Full text
Abstract:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTERISK-based system under development at Rhodes University. The practical investigation that focuses on ILANGA is based on performing six varied experiments on the different components of ILANGA. Before the six experiments are performed, basic preliminary security measures and the restrictions placed on the access to the database are discussed. The outcomes of these experiments are discussed and the precise reasons why these attacks were either successful or unsuccessful are given. Suggestions of a theoretical nature on how to defend against the successful attacks are also presented.
APA, Harvard, Vancouver, ISO, and other styles
5

Stocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.

Full text
Abstract:
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices.
APA, Harvard, Vancouver, ISO, and other styles
6

Hsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.

Full text
Abstract:
The main purpose of this project is to build a bank system that offers a friendly and simple interface to let users easily manage their lightweight currencies. The Lightweight Currency Protocol (LCP) was originally proposed to solve the problem of fairness in resource cooperatives. However, there are other possible applications of the protocol, including the control of spam and as a general purpose medium of exchange for low value transactions. This project investigates the implementation issues of the LCP, and also investigates LCP bank services to provide human interface to currency operations.
APA, Harvard, Vancouver, ISO, and other styles
7

Fuller, Marvin G. "Technological enhancements for personal computers." Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA247962.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control, and Communications))--Naval Postgraduate School, March 1992.
Thesis Advisor: Poock, Gary K. "March 1992." Includes bibliographical references (p. 54-55). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
8

Ratliff, John M. "The persistence of national regimes of innovation in a globalizing economy : Japanese developmentalism in the information and telecommunications industries, 1985-1997 /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 1998. http://wwwlib.umi.com/cr/ucsd/fullcit?p9837848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Chuen-Yueh. "Global sourcing in innovation." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1619148901&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Christy, Sheila Ann Colley. "Future developments of computer network technologies in K-12 educational environments /." free to MU campus, to others for purchase, 1997. http://wwwlib.umi.com/cr/mo/fullcit?p9842520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ransbotham, III Samuel B. "Acquisition and diffusion of technology innovation." Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Full text
Abstract:
Thesis (M. S.)--Management, Georgia Institute of Technology, 2008.
Committee Chair: Sabyasachi Mitra; Committee Member: Frank Rothaermel; Committee Member: Sandra Slaughter; Committee Member: Sridhar Narasimhan; Committee Member: Vivek Ghosal.
APA, Harvard, Vancouver, ISO, and other styles
12

Evert, Candice Elaine, and der Post Leda Van. "A model using Technological support for tutors in practical computing sessions." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12534.

Full text
Abstract:
The starting point of this research is the observation that tutors in the Computing Sciences (CS) Department at NMMU require more support than they currently receive in order to be effective. This research project investigated how technology could be used to support tutors during practical sessions. Focus group discussions with tutors in the CS Department revealed that challenges exist which hinder them from effectively assisting students during practical sessions. Through analysis of focus group discussions and literature regarding the use of technology in education, it was determined that a tablet PC could be used to support tutors by providing on-demand access to practical content and answers to frequently asked questions. Existing models using technology in education to support either students or tutors in learning were investigated. A conceptual model using technology to support tutors during practical sessions was designed and proposed based on features of the existing models which were considered relevant to the CS context, and ways in which they could support tutors. Relevant features of the conceptual model include the system, purpose, boundary, key variables and best practices applied to the technological component of the model. During development of the model, these features were considered. In the context of the CS Department, a tablet PC tool was used by tutors as a means to support themselves and assist students during practical sessions. The tool is a component of the model which provides practical information. Each layer of the model’s three layer architecture was tested to ensure that the correct information is provided, on demand, to tutors during practical sessions. Positive results from a field study evaluation revealed that the conceptual model, using a tablet PC tool, could be applied to the CS context with the intention of supporting tutors during practical sessions.
APA, Harvard, Vancouver, ISO, and other styles
13

Mashapa, Job. "A model for managing user experience." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1020765.

Full text
Abstract:
New innovative products are being designed while the user interface of existing products is constantly being revamped to give them a new look. All this is an effort to bring a satisfactory interacting experience for the user. However, in most cases users do not feel that they experience that benefit. The introduction of a new product, or the enhancement of the functionality and user interface of an existing product, often faces criticism and brings resistance to the acceptance and usage of the product by the users. Therefore, the change in user interface or introduction of new products does not only affect the business processes but also the lifestyles of the users, as well as their overall user experience. One of the most important components for the success of any product is a positive user experience. User experience refers to the subjective feeling of the user that results from their interaction or intention to interact with a product in order to perform a specific task in a specific environment. When the user interface and functionality of a product match the expectations of the users and make the users effective and efficient, feel safe and attain some level of self-worth from using or possessing the product, their interaction with the product becomes more satisfactory. User experience practitioners are in agreement that a change to the user interface influences the user experience of the people when interacting with the product; hence it affects change in the user experience of the people. A vast body of literature exists on the methods for evaluating user experience as well as on the principles that are aimed at guiding the design of products for a positive user experience. However, there is a lack of a means to manage this change in user experience that results from the changes in the features of the user interface or the product functionalities. This inadequacy opens up the potential for integrating change management principles in order to manage user experience. However, existing change management principles do not address the user experience aspects when managing change. Following the above premise, this study focused on the development of a model for managing user experience: the User Experience Management Model (UXM2). The UXM2 infers its components from the disciplines of user experience and change management. Its uniqueness is seated in its people-centred approach that aims to effect a free-will change in the individuals towards a long-term positive user experience. The proposed model further aims to promote the voluntary acceptance of a product, which is contrary to the mandatory change that is guided by the policies of the organization, as discussed in the study. The UXM2 was developed from a thorough argumentation of literature on user experience and change management. The components that were required for development of the model were identified from literature, and were evaluated for their relevance by means of academic publications in subject domain international conferences. The academic publications underwent double-blind peer review with subject domain experts. The model was evaluated for its relevance and potential applicability through interviews and discussions with subject domain experts. The subject domain experts consist of user experience practitioners and academic professionals in the domain of HCI. The subject domain experts also evaluated the model by means of an evaluation tool comprising of a Likert scale rating of the proposed components and related activities for managing user experience. The target users of the UXM2 are user experience practitioners and product developers who aim to promote a sustainable long-term positive user experience for the people interacting with their products. The UXM2 is aimed at being used for the design of products that are meant for institutional use, personal use, mandatory use and optional use. It is believed that adoption of the UXM2 will promote acceptance of the product by users, with an associated sustainable positive long-term user experience.
APA, Harvard, Vancouver, ISO, and other styles
14

Askins, Stephen Alexander. "Modeling of digital clay for evaluation of coordinated control." Thesis, Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/19541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Gray, Andrew Michael. "Telecommunication and computer technologies in distance education : recreating the classroom." Thesis, Queensland University of Technology, 1996. https://eprints.qut.edu.au/36285/1/36285_Gray_1991.pdf.

Full text
Abstract:
This is a study of the effectiveness of telecommunication and computer technologies when used as part of a modified distance education course. Using Salomon's communication theory, and Csikszentmihalyi's and Krugman's involvement theories the study examines the degree to which these technologies can replicate classroom learning. Relevant empirical studies in communication technologies and distance education are also examined. The study focussed on two small groups of secondary school students whose classes were linked using telecommunications and computer technologies to deliver a distance education course. Neither teacher nor students were provided with training in distance education methodology. The teacher adapted classroom materials already in use rather than use structured course materials normally available for distance education courses. Even though the schools in the study were forty-two kilometres apart the study found that conditions did exist which supported involvement. The study also found that involvement conditions were fragile and related to the capacity of the technology to maintain high quality telecommunications links. Control of technology was an important factor in developing students' perception of success and their degree of involvement in the course. It was also evident that telecommunications technology could replicate many of the classroom learning conditions such as exist when teacher and students are both present at the same location. Teacher-student and student-student relationship were found to be more productive if there had been a face-to-face meeting of the participants before the course commenced. It was also evident that this method of study encouraged both independent learning on the part of individual students as well as developing their co-operative learning skills.
APA, Harvard, Vancouver, ISO, and other styles
16

Francis, Dannie Bruce. "The diffusion of technological innovations in the educational setting expectations, practices, and the role of personality /." Laramie, Wyo. : University of Wyoming, 2008. http://proquest.umi.com/pqdweb?did=1679679911&sid=1&Fmt=2&clientId=18949&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Van, der Schyff Karl Izak. "Cloud information security : a higher education perspective." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011607.

Full text
Abstract:
In recent years higher education institutions have come under increasing financial pressure. This has not only prompted universities to investigate more cost effective means of delivering course content and maintaining research output, but also to investigate the administrative functions that accompany them. As such, many South African universities have either adopted or are in the process of adopting some form of cloud computing given the recent drop in bandwidth costs. However, this adoption process has raised concerns about the security of cloud-based information and this has, in some cases, had a negative impact on the adoption process. In an effort to study these concerns many researchers have employed a positivist approach with little, if any, focus on the operational context of these universities. Moreover, there has been very little research, specifically within the South African context. This study addresses some of these concerns by investigating the threats and security incident response life cycle within a higher education cloud. This was done by initially conducting a small scale survey and a detailed thematic analysis of twelve interviews from three South African universities. The identified themes and their corresponding analyses and interpretation contribute on both a practical and theoretical level with the practical contributions relating to a set of security driven criteria for selecting cloud providers as well as recommendations for universities who have or are in the process of adopting cloud computing. Theoretically several conceptual frameworks are offered allowing the researcher to convey his understanding of how the aforementioned practical concepts relate to each other as well as the concepts that constitute the research questions of this study.
APA, Harvard, Vancouver, ISO, and other styles
18

De, Silva Chamelle Rene. "Technology integration : tracing in-service primary teachers' technological, pedagogical and content knowledge development." Thesis, Cape Peninsula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2374.

Full text
Abstract:
Thesis (DEd (Education))--Cape Peninsula University of Technology, 2015.
The past decade has witnessed the proliferation and use of computer technologies or ICTs (Information and Communication Technologies) in varying levels in the traditional classroom within the South African context. The policy on e-Education (DoE, 2004) refers to the significance of e-Education and expects schools to be developed into e-Schools, consisting of a community of both teachers and learners. This policy also foregrounds how new models of learning are radically changing and challenging current conceptions of learning. As schools acquire technological infrastructure, teachers are expected to become technically skilled in order to deliver the curriculum utilising technology as a tool. Practising primary school teachers are generalists who subscribe to a more holistic approach of teaching. Specialised knowledge influences the in-service primary teacher's perceptions with regard to technology in the classroom. Technology integration,therefore, represents particular challenges for teachers as they search to construct a coherent, technological content base to inform their teaching. Learners with diverse ranges of learning abilities and needs are also present in classrooms, which may further compound the challenges teachers face within the confines of a rigid curriculum and emergent technologies. This study follows and documents the trajectory of a purposive sample of ten practising primary school teachers who had no specialised training in technology. A qualitative ethnographic research design, underpinned by an interpretive paradigm is employed. This research is premised on the argument that teachers can acquire the technical skill, underscored with the relevant pedagogical aims, needed for the seamless integration of emerging technologies required to enhance teaching and learning. "Without skilled pedagogical application of educational technology, technology in and of itself cannot provide innovative school practice and educational change" (Levin & Wadmany, 2006:158).
APA, Harvard, Vancouver, ISO, and other styles
19

Lukianenko, Sofia. "A critical reflection on teaching and learning music in the context of technological change /." Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=21235.

Full text
Abstract:
This essay explores the benefits and limits of teaching and learning music in a changing technological environment, where both students and instructors are faced with the perpetual problem of keeping up with new methods of practicing music for the purpose of maintaining competence. The essay critically reflects on the argument that present societies overvalue technical instruments, at times giving consumers a false hope of achieving quick results in a brief period of time, and with the unintended consequence that playing techniques can be compromised. The idealizing of mechanical devices has become strongly associated today with sophisticated taste and class. Following Mumford and Postman, the essay argues that these technological tools should be seen as posing a challenge to instructional values and to human agency. This essay concludes that while we cannot help the fact that tradition is constantly being renewed, in part through technological change, the role of teaching that learning music needs to be focused on are historic values which incorporate experience and reciprocity.
APA, Harvard, Vancouver, ISO, and other styles
20

Lewis, James Clayton. "Teachers' perceptions of computer technology's impact upon student achievement." CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2289.

Full text
Abstract:
The purpose of this study was to determine if computer technology is an effective tool for raising student achievement in education. Much of the related research indicated there is a pressing need for educators, at both the school site and district levels, to develop accurate assessment tools to accurately determine the most effective use of computers as it applies to instructional technology.
APA, Harvard, Vancouver, ISO, and other styles
21

Duncan, Margot. "Visual arts, technology and education : how can teaching and learning in high school visual arts classrooms be enriched by the use of computer technology?" Thesis, Queensland University of Technology, 1995. https://eprints.qut.edu.au/36494/1/Duncan_36494.pdf.

Full text
Abstract:
Whilst a variety of studies has appeared over the last decade addressing the gap between the potential promised by computers and the reality experienced in the classroom by teachers and students, few have specifically addressed the situation as it pertains to the visual arts classroom. The aim of this study was to explore the reality of the classroom use of computers for three visual arts highschool teachers and determine how computer technology might enrich visual arts teaching and learning. An action research approach was employed to enable the researcher to understand the situation from the teachers' points of view while contributing to their professional practice. The wider social context surrounding this study is characterised by an increase in visual communications brought about by rapid advances in computer technology. The powerful combination of visual imagery and computer technology is illustrated by continuing developments in the print, film and television industries. In particular, the recent growth of interactive multimedia epitomises this combination and is significant to this study as it represents a new form of publishing of great interest to educators and artists alike. In this social context, visual arts education has a significant role to play. By cultivating a critical awareness of the implications of technology use and promoting a creative approach to the application of computer technology within the visual arts, visual arts education is in a position to provide an essential service to students who will leave high school to participate in a visual information age as both consumers and producers.
APA, Harvard, Vancouver, ISO, and other styles
22

Lucas, David K. "Primitives and design of the intelligent pixel multimedia communicator." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/843.

Full text
Abstract:
Communication systems arc an ever more essential component of our modern global society. Mobile communications systems are still in a state of rapid advancement and growth. Technology is constantly evolving at a rapid pace in ever more diverse areas and the emerging mobile multimedia based communication systems offer new challenges for both current and future technologies. To realise the full potential of mobile multimedia communication systems there is a need to explore new options to solve some of the fundamental problems facing the technology. In particular, the complexity of such a system within an infrastructure framework that is inherently limited by its power sources and has very restricted transmission bandwidth demands new methodologies and approaches.
APA, Harvard, Vancouver, ISO, and other styles
23

李思維 and Sze-wai Wilson Lee. "Development of a synchronous system for collaborative product definition on the internet." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B31224659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Smith, Leone. "Computer-related musculoskeletal dysfunction among adolescent school learners in the Cape Metropolitan region." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/1545.

Full text
Abstract:
Thesis (MScPhysio (Physiotherapy))--University of Stellenbosch, 2007.
INTRODUCTION Computer use has been identified as a risk factor for the development of musculoskeletal dysfunction among children and adolescents internationally. Computer exposure has increased in the Western Cape since 2002, with the inception of a project to install computer laboratories in all schools in the province. As musculoskeletal dysfunction experienced during adolescence is predictive of musculoskeletal disorders in adulthood, it is essential to identify all risk and/or associative factors. METHODOLOGY A descriptive study was conducted with the aim to investigate whether the musculoskeletal dysfunction of high school learners in the Cape Metropolitan region was related to their computer use. This study was conducted in two phases. Phase 1 of the study entailed the completion of a new questionnaire, the Computer Usage Questionnaire, by grade 10-12 learners. The learner sample was divided in a computer and a non-computer group depending on their exposure to the school computer. Phase 2 of the study involved the assessment of the ergonomic design of the computer laboratories at randomly selected high schools within the Cape Metropolitan region. RESULTS A total of 1073 learners (65% girls & 35% boys), aged 14-18 years, completed the CUQ in phase 1 of the study. The results indicated that learners in the computer group had greater weekly exposure to computers than the non-computer group. The prevalence of musculoskeletal dysfunction among this learner sample was 74%. The most common body areas of dysfunction were the head, low back and neck. The female gender, playing sport and using the school computer for more than three years were associated with musculoskeletal dysfunction. Weekly computer use of more than seven hours was predictive of general musculoskeletal dysfunction, low back pain and neck pain. Twenty nine computer laboratories within 16 selected high schools were assessed by means of the Computer Workstation Design Assessment (CWDA). Out of a total score of 40, the computer laboratories obtained average scores of less than 45%, indicating compliance with less than half of the standard ergonomic requirements. The average scores for the workspace environment was less than 40%. The design of the desk, chair and computer screen had the poorest compliance to ergonomic guidelines. DISCUSSION AND CONCLUSION The prevalence of musculoskeletal dysfunction among this sample was higher than among other similar samples on the same study topic. The higher prevalence may be attributed to the poor ergonomic design of the computer laboratories in the Cape Metropolitan region. Learners’ reduced participation in activities such as sport and working on a computer due to their musculoskeletal dysfunction, may impact on their choice of a future career. The tendency of learners not to seek medical advice for their musculoskeletal dysfunction may predispose the development of chronic musculoskeletal disorders. Education of related parties on safe computing habits as well as advice on the ergonomic design of computer laboratories is recommended to prevent the progression of adolescent musculoskeletal dysfunction into chronic disorders in adulthood.
APA, Harvard, Vancouver, ISO, and other styles
25

White, Jeff. "A vital matter : adjunct faculty transitions in a computer-oriented writing program." Virtual Press, 2001. http://liblink.bsu.edu/uhtbin/catkey/1203651.

Full text
Abstract:
This study investigated the strategies employed by adjunct writing teachers in their attempts to reconcile changes in writing program policy with their existing pedagogies. The methods of investigation combined class observation with extensive interviews with three Ball State University adjunct faculty members to identify the means by which these writing instructors brought new pedagogical goals in their classrooms. It also sought to identify the mechanisms each teacher used to integrate computer-oriented teaching styles into his or her course planning. The purpose of this study was to identify means by which a writing program administration could better introduce change to its teachers of first year composition courses, who are largely adjunct staff.The results of this study showed that while each faculty member felt committed to using technology in his or her teaching, each confronted change differently. Studies in faculty vitality were examined to identify development strategies which could effectively address the differences in faculty change. This study recommends, based on the strategies of each participant, that writing programs seek more kairic models of development. These models would seek to foster continuous discussion of change in order that fitting incentives for development could arise in "the proper time," or kairically, for individual teachers.
Department of English
APA, Harvard, Vancouver, ISO, and other styles
26

Mooi, Alicia Tenjiswa. "Effectiveness of ICT education in the Northern school area of Port Elizabeth." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1605.

Full text
Abstract:
The use of information communication technology in the 21st Century is very important. The skills and knowledge of using these technologies should start at high school level, as it is at this stage where learners are equipped for tertiary education and the business world. This study seeks to answer how much ICT is used at the average school in Port Elizabeth and how effective such use is. South Africa is one of the countries in the whole world that is still behind in using the new technology. Learners from high school still enter university with no knowledge of how to use a computer. This becomes a problem in the world of technology as almost everything is done using technology. It also becomes a big problem when learners look for jobs in the business world. An active learning theory has been used on the study because, if learners can learn and have access computer at school, life will be easy for both learners and teachers, there would be co-operation and discussion and the fast way of doing school work. For the purpose of the study a qualitative research method has been used to ensure that answers are received straight from, teachers and learners for evidence. It is therefore clear that there are schools in South Africa that still needs the attention of the government in terms of getting access to computers and to have professional teachers for teaching the subject. The government has a responsibility of making sure that all learners and teachers in high schools have access to computers and internet. This will improve the working and learning conditions of both parties involved.
APA, Harvard, Vancouver, ISO, and other styles
27

Lee, Lit-hong, and 李躐康. "Exploring the use of Wiki in a secondary school science project." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B4746916X.

Full text
Abstract:
This study explores the use of wiki in supporting a science project undertaken in a Hong Kong secondary school through a mixed method approach involving triangulation of questionnaire survey, interviews, and analysis of students? wikis. The findings showed positive results on students? motivations, enjoyments, effort input, and perceived value. More important, the results highlighted the fact that satisfaction of students? perceived needs from teacher?s autonomy support improves their attributes, attitudes, and expectations of learning outcomes in general. The researcher identifies a discrepancy between students? expectations and their actual achievements of the learning outcomes. Specifically, students think in a higher order and construct knowledge at a wider level when comparing with what they have expected whereas their expectations of generic skills development significantly outweighed what they have actually achieved. To bridge this discrepancy, the researcher suggested that (a) flexibly balancing the structure and freedom of wiki, (b) carefully planning the project duration, (c) scaffolding in wiki project, (d) carefully choosing of the project topics, (e) explicitly emphasizing the learning outcomes, and (f) raising students? information literacy are all essential. The findings also indicated the exists of limitations in this small scale study and thus further investigations on the pedagogical challenges of integrating wiki in science project learning are required.
published_or_final_version
Education
Master
Master of Science in Information Technology in Education
APA, Harvard, Vancouver, ISO, and other styles
28

Turyagyenda, Joy Kyarimpa. "Participants' perceptions of Computer-Mediated Communication: a case study of the Global Teenager Project." Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1003570.

Full text
Abstract:
The study outlines general trends evident in Computer-Mediated Communication (CMC), participants’ perceptions and the promotion of CMC across the curriculum in a South African Secondary School. This case study focuses on the Global Teenager Project (GTP), which started as a bi-national pilot project in April 1999 between secondary schools in South Africa and the Netherlands. The study sets out to investigate how well the GTP can be incorporated into the existing school curriculum through the teacherresearcher’s direct involvement in facilitating the project at a school where she is a fulltime teacher. The main purpose of the study is to review existing literature to establish how collaborative learning could be achieved through a CMC environment between teenagers from various countries based on the research done at an international level and link the practice at this school to the existing international trends. It was found that the GTP has great potential in enhancing collaborative learning within various learning areas at Nathaniel Nyaluza Secondary School (NNSS). Despite the usefulness of the GTP and the overwhelming enthusiasm learners displayed, its success at NNSS depended on the motivation of teachers and how easily the activities of the GTP could be incorporated within day-to-day teachers’ activities.
Hodgkinson, Cheryl
APA, Harvard, Vancouver, ISO, and other styles
29

Malak, Joe. "An Analysis of the Technological, Organizational, and Environmental Factors Influencing Cloud Adoption." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2845.

Full text
Abstract:
Cloud computing provides an answer to the increasing costs of managing information technology (IT), and has become a model that aligns IT services with an organization's business strategies. However, concerns and uncertainties associated with cloud computing are deterring IT decision makers from making sound decisions regarding the adoption of the technology. The purpose of this online survey study was to examine the relationship between relative advantage, compatibility, organizational size, top management support, organizational readiness, mimetic pressure, normative pressures, coercive pressure, and the IT decision makers' intent to adopt cloud computing. The theoretical framework incorporated the diffusion of innovations theory, a technology-organization-environment framework, and institutional theory. The survey participants were 136 IT decision makers from different U.S. industries. The Pearson's coefficient analysis indicated a significant correlation between the dependent variable (intent to adopt) and all independent variables except organizational size. The regression model was a statistically significant predictor of the dependent variable and accounted for approximately 74% of the variance in the dependent variable, primarily predicted by top management support, normative pressure, relative advantage, and organization readiness. The implications for positive social change include the potential of implementing innovations that would augment technology efficiency, decrease workplace personnel issues, and create a more desirable and flexible workplace. Flexibility at work enables employees to be able to participate in other nonwork roles such as family, child, and elder care, or education.
APA, Harvard, Vancouver, ISO, and other styles
30

Jacobs, Ashley. "Investigating call control using MGCP in conjuction with SIP and H.323." Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1006516.

Full text
Abstract:
Telephony used to mean using a telephone to call another telephone on the Public Switched Telephone Network (PSTN), and data networks were used purely to allow computers to communicate. However, with the advent of the Internet, telephony services have been extended to run on data networks. Telephone calls within the IP network are known as Voice over IP. These calls are carried by a number of protocols, with the most popular ones currently being Session Initiation Protocol (SIP) and H.323. Calls can be made from the IP network to the PSTN and vice versa through the use of a gateway. The gateway translates the packets from the IP network to circuits on the PSTN and vice versa to facilitate calls between the two networks. Gateways have evolved and are now split into two entities using the master/slave architecture. The master is an intelligent Media Gateway Controller (MGC) that handles the call control and signalling. The slave is a "dumb" Media Gateway (MG) that handles the translation of the media. The current gateway control protocols in use are Megaco/H.248, MGCP and Skinny. These protocols have proved themselves on the edge of the network. Furthermore, since they communicate with the call signalling VoIP protocols as well as the PSTN, they have to be the lingua franca between the two networks. Within the VoIP network, the numbers of call signalling protocols make it difficult to communicate with each other and to create services. This research investigates the use of Gateway Control Protocols as the lowest common denominator between the call signalling protocols SIP and H.323. More specifically, it uses MGCP to investigate service creation. It also considers the use of MGCP as a protocol translator between SIP and H.323. A service was created using MGCP to allow H.323 endpoints to send Short Message Service (SMS) messages. This service was then extended with minimal effort to SIP endpoints. This service investigated MGCP’s ability to handle call control from the H.323 and SIP endpoints. An MGC was then successfully used to perform as a protocol translator between SIP and H.323.
APA, Harvard, Vancouver, ISO, and other styles
31

Schaeffer, Ben. "Computer Aided Design of Permutation, Linear, and Affine-Linear Reversible Circuits in the General and Linear Nearest-Neighbor Models." Thesis, Portland State University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1541050.

Full text
Abstract:

With the probable end of Moore's Law in the near future, and with advances in nanotechnology, new forms of computing are likely to become available. Reversible computing is one of these possible future technologies, and it employs reversible circuits. Reversible circuits in a classical form have the potential for lower power consumption than existing technology, and in a quantum form permit new types of encryption and computation.

One fundamental challenge in synthesizing the most general type of reversible circuit is that the storage space for fully specifying input-output descriptions becomes exponentially large as the number of inputs increases linearly. Certain restricted classes of reversible circuits, namely affine-linear, linear, and permutation circuits, have much more compact representations. The synthesis methods which operate on these restricted classes of reversible circuits are capable of synthesizing circuits with hundreds of inputs. In this thesis new types of synthesis methods are introduced for affine-linear, linear, and permutation circuits, as well as a synthesizable HDL design for a scalable, systolic processor for linear reversible circuit synthesis.

APA, Harvard, Vancouver, ISO, and other styles
32

Jakkula, Vikramaditya Reddy. "Enhancing smart home resident activity prediction and anomaly detection using temporal relations." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/v_jakkula_102207.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Xiaohuan, and 王晓欢. "Knowledge sharing and utilization of the ontological agent-based virtual enterprises." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46593056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Thompson, John Ronald. "Development and Analysis of a Model for Change in the Workplace, Using Quasi-Experimentation with Computer Professionals in Northwestern Investor Owned Utilities." PDXScholar, 1991. https://pdxscholar.library.pdx.edu/open_access_etds/1248.

Full text
Abstract:
Computer professionals have been agents of change in many organizations. In some cases the role inadvertently became theirs as they were the ones at the vanguard of implementing the new information processing technology in organizations. While in other cases they were the catalysts for change, to force new methods/procedures onto lethargic organizations. While introducing change on others in the organization and adapting to new technological changes themselves, the computer professionals have not really had to face a significant change in their status, power, or importance to the organization. The introduction of the personal computer has brought about significant change in the way the job of the computer professional is perceived by many in the business world. While this change is personally affecting the way they do their job, there has not been a noticeable attempt by those managing computer professionals to deal with the human emotions engendered by such a change. Part of the reason for this lack of attention may be due to the lack of a model as to how computer professionals react to change. Such a model would provide a system whereby it would be possible to recognize where efforts could be made to measure, predict, and modify situations so that a smooth transition can be made to the change. Toward this end a model was developed which presents a system as to how computer professionals react to change. This dissertation presents the model, surveys a population of computer professionals, and analyzes the model using data gathered from the population. The data was gathered in the form of a self administered survey which was given to computer professionals working for six investor owned electric and gas utilities in the Northwestern United states. They answered questions on a scale of from one to five as to their emotions and perceptions about the introduction of personal computers into their organizations. These questions spanned the timeframe as the organizations migrated from the early beginnings of personal computer introduction, to a situation where the use of personal computers was widespread in the company. In the case of three of the companies the personal computer had not yet achieved widespread use at the time of the survey. The data gathered from the computer professionals was statistically analyzed to see if relationships exist between the model and the data. Additionally, interesting demographic data was analyzed to see if certain other factors affected the computer professional's perception as to the impact of the personal computer on their quality of worklife.
APA, Harvard, Vancouver, ISO, and other styles
35

Day, Jason A. "Investigating learning with web lectures." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22627.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2008.
Committee Chair: Foley, James; Committee Member: Abowd, Gregory; Committee Member: Anderson, Richard; Committee Member: Catrambone, Richard; Committee Member: Guzdial, Mark.
APA, Harvard, Vancouver, ISO, and other styles
36

Marsolais-Johnson, Suzanne Florence. "Enhancing foreign language learning through the integration of computer technology." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2672.

Full text
Abstract:
This thesis demonstrates the effectiveness of using computer technology and the Internet to enhance classroom teaching. A variety of computer and internet based projects that complement lessons initiated by the classroom teacher provide real life situations for additional practice, reinforcement, motivation and greater student achievement.
APA, Harvard, Vancouver, ISO, and other styles
37

Julio, Luiz Mariano. "Catch-up tecnológico nos países de industrialização recente : o caso da indústria de computadores pessoais em Taiwan." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/287733.

Full text
Abstract:
Orientador: Ruy de Quadros Carvalho
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Geociências
Made available in DSpace on 2018-08-21T12:46:22Z (GMT). No. of bitstreams: 1 Julio_LuizMariano_M.pdf: 3161752 bytes, checksum: 304550773dfbbfa379846e627f9c8920 (MD5) Previous issue date: 2012
Resumo: O objetivo do trabalho é entender as estratégias adotadas pelas empresas sediadas em países de industrialização recente para poderem competir nos segmentos mais dinâmicos da economia mundial. Inicialmente se estabeleceu uma contextualização, apresentando a relevância econômica e a representatividade dos setores dinâmicos em termos de participação na economia, com isso demonstrando a lógica inerente a buscar um espaço de competição nesses segmentos. Uma vez determinados esses pontos, identificamos dentre os setores mais dinâmicos um setor particularmente relevante, o de Computação Pessoal, o qual foi analisado quanto à sua estrutura e cadeia de valor. De sua compreensão partimos para a identificação de quais são os países cuja indústria é dominante nesse segmento, onde identificamos Taiwan como um exemplo marcante de país em desenvolvimento que tem domínio tecnológico no setor. Partimos para o estudo de caso da indústria taiwanesa de computadores pessoais, estudando sua evolução histórica, ações governamentais e ações empresariais do segmento, identificando as maneiras como obtiveram seu aprendizado tecnológico e como isso influenciou seu sucesso empresarial. Além de recorrer à literatura entrevistamos executivos de diversas empresas ODM taiwanesas e com isso obtivemos uma visão interna do segmento, suas dificuldades e suas estratégias (antigas e atuais) para prosseguir evoluindo e se mantendo na vanguarda tecnológica do setor. A partir desses dados elaboramos um resumo das estratégias mais bem-sucedidas empregadas por tais empresas para atingirem seu (atualmente) elevado nível de competência tecnológica no segmento e apontamos estratégias e práticas que possivelmente poderão ser úteis a empresas que busquem similar evolução em outros segmentos onde a importância do domínio tecnológico seja significativa
Abstract: The objective is to understand the strategies adopted by firms in newly industrialized countries to compete in the more dynamic segments of the world economy. We initially established a context, presenting the economic relevance and representativeness of the dynamic sectors in terms of participation in the economy, thereby demonstrating the inherent logic to search a way to compete in these segments. Once determined these points, we identified among the most dynamic sectors a particularly important one, the Personal Computing segment, which was analyzed for its structure and value chain. From this point of understanding we proceed identifying which countries dominate this segment identifying Taiwan as a striking example of a developing country that has technological dominance in the sector. We left for the case study of Taiwanese Personal Computer Industry, studying its historical development, governmental and corporate actions of the segment, identifying the ways in which they acquired their technological learning and how it influenced their business success. Besides the available literature we interviewed executives from several Taiwanese ODM companies and therefore got insider view of the segment, their difficulties and their strategies (past and present) to proceed evolving and staying at the technological forefront of the sector. From these data we developed a summary of the most successful strategies employed by such companies to achieve their (currently) high level of technological competence in the segment and pointed out strategies and practices that could possibly be useful to companies seeking similar development in different segments, where the importance of technological mastery is significant
Mestrado
Mestre em Política Científica e Tecnológica
APA, Harvard, Vancouver, ISO, and other styles
38

Ford, Heather. "Fact factories : Wikipedia and the power to represent." Thesis, University of Oxford, 2015. http://ora.ox.ac.uk/objects/uuid:b34fdd6c-ec15-4bcd-acba-66a777739b4d.

Full text
Abstract:
Wikipedia is no longer just another source of knowledge about the world. It is fast becoming a central source, used by other powerful knowledge brokers like Google and Bing to offer authoritative answers to search queries about people, places and things and as information infrastructure for a growing number of Web applications and services. Researchers have found that Wikipedia offers a skewed representation of the world that favours some groups at the expense of others so that representations on the platform have repercussions for the subjects of those representations beyond Wikipedia's domain. It becomes critical in this context to understand how exactly Wikipedia's representations come about, what practices give rise to them and what socio-technical arrangements lead to their expression. This ethnographic study of Wikipedia explores the values, principles and practices that guide what knowledge Wikipedia represents. It follows the foundational principles of Wikipedia in its identity both as an encyclopaedia and a product of the free and open source software and internet freedom rhetoric of the early 2000s. Two case studies are analysed against the backdrop of this ideology, illustrating how different sets of actors battle to extend or reject the boundaries of Wikipedia, and in doing so, affect who are defined as the experts, subjects and revolutionaries of the knowledge that is taken up. The findings of this thesis indicate that Wikipedia's process of decision-making is neither hierarchical nor is it egalitarian; rather, the power to represent on Wikipedia is rhizoid: it happens at the edges rather than in the centre of the network. Instead of everyone having the same power to represent their views on Wikipedia, those who understand how to perform and speak according to Wikipedia's complex technical, symbolic and policy vocabulary tend to prevail over those who possess disciplinary knowledge about the subject being represented. Wikipedians are no amateurs as many would have us believe; nor are they passive collectors of knowledge held in sources; Wikipedians are, instead, active co-creators of knowledge in the form of facts that they support using specially chosen sources. The authority of Wikipedia and Wikipedians is garnered through the performative acts of citation, through the ability of individual editors to construct the traces that represent citation, and through the stabilization and destabilization of facts according to the ideological viewpoints of its editors. In venerating and selecting certain sources among others, Wikipedians also serve to reaffirm traditional centres of authority, while at the same time amplifying new centres of knowledge and denying the authority of knowledge that is not codified in practice. As a result, Wikipedia is becoming the site of new centres of expertise and authoritative knowledge creation, and is signalling a move towards the professionalization of the expertise required to produce factual data in the context of digital networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Chitnis, Anurag Ashok. "Mobile-Based Smart Auscultation." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc1011820/.

Full text
Abstract:
In developing countries, acute respiratory infections (ARIs) are responsible for two million deaths per year. Most victims are children who are less than 5 years old. Pneumonia kills 5000 children per day. The statistics for cardiovascular diseases (CVDs) are even more alarming. According to a 2009 report from the World Health Organization (WHO), CVDs kill 17 million people per year. In many resource-poor parts of the world such as India and China, many people are unable to access cardiologists, pulmonologists, and other specialists. Hence, low skilled health professionals are responsible for screening people for ARIs and CVDs in these areas. For example, in the rural areas of the Philippines, there is only one doctor for every 10,000 people. By contrast, the United States has one doctor for every 500 Americans. Due to advances in technology, it is now possible to use a smartphone for audio recording, signal processing, and machine learning. In my thesis, I have developed an Android application named Smart Auscultation. Auscultation is a process in which physicians listen to heart and lung sounds to diagnose disorders. Cardiologists spend years mastering this skill. The Smart Auscultation application is capable of recording and classifying heart sounds, and can be used by public or clinical health workers. This application can detect abnormal heart sounds with up to 92-98% accuracy. In addition, the application can record, but not yet classify, lung sounds. This application will be able to help save thousands of lives by allowing anyone to identify abnormal heart and lung sounds.
APA, Harvard, Vancouver, ISO, and other styles
40

Guillen, Linda Diane. "Curriculum for an online course in technical communications using the I-CARE delivery system." CSUSB ScholarWorks, 1999. https://scholarworks.lib.csusb.edu/etd-project/1851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mulumba, Patrick. "A common analysis framework for simulated streaming-video networks." Thesis, Rhodes University, 2009. http://eprints.ru.ac.za/1691/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Sedlack, Derek J. "Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/299.

Full text
Abstract:
A critical overreliance on the technical dimension of information security has recently shifted toward more robust, organizationally focused information security methods to countermand $54 billion lost from computer security incidents. Developing a more balanced approach is required since protecting information is not an all or nothing proposition. Inaccurate tradeoffs resulting from misidentified risk severity based on organizational group perceptions related to information risk form information security gaps. This dissertation applies dialogical action research to study the information security gap created by incongruent perceptions of organizational members related to information risk among different stakeholder communities. A new model, the Information Security Improvement model, based on Technological Frames of Reference (TFR), is proposed and tested to improve information security through reduced member incongruity. The model proved useful in realigning incongruent perceptions related to information risk within the studied organization. A process for identifying disparate information characteristics and potential influencing factors is also presented. The research suggested that the model is flexible and extensible, within the organizational context, and may be used to study incongruent individual perceptions (micro) or larger groups such as departments or divisions.
APA, Harvard, Vancouver, ISO, and other styles
43

Conniry, Krystal Lynn. "National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare." PDXScholar, 2016. http://pdxscholar.library.pdx.edu/open_access_etds/3204.

Full text
Abstract:
This paper explores the complex relationship between securing the rights of citizens to privacy and national security priorities under conditions of government mass surveillance. The inquiry examines the conflict between those who support and those who stand in opposition of government surveillance, and is framed around the question of whether changes in technology and the concept of nationalism help inform our understanding of the increase in surveillance post-9/11. From a peace and conflict studies perspective, the work analyzes how the rise of nationalism in the post-9/11 era and the protracted wars against terrorism, in combination with the growth of technological power, have impacted the relationship between state-surveillance and democracy. Findings identify protracted warfare, technology and corporate profits as conflict drivers within the surveillance system, which gives rise to moral dilemmas and structural polarizations in the political culture and institutions of the state and society. The analysis concludes that these dilemmas systematically create an imbalance of power between the citizen to the state, and cannot be fully addressed unless the efficacy of war is critically questioned.
APA, Harvard, Vancouver, ISO, and other styles
44

Kerr, Simon. "Visual based finger interactions for mobile phones." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006621.

Full text
Abstract:
Vision based technology such as motion detection has long been limited to the domain of powerful processor intensive systems such as desktop PCs and specialist hardware solutions. With the advent of much faster mobile phone processors and memory, a plethora of feature rich software and hardware is being deployed onto the mobile platform, most notably onto high powered devices called smart phones. Interaction interfaces such as touchscreens allow for improved usability but obscure the phone’s screen. Since the majority of smart phones are equipped with cameras, it has become feasible to combine their powerful processors, large memory capacity and the camera to support new ways of interacting with the phone which do not obscure the screen. However, it is not clear whether or not these processor intensive visual interactions can in fact be run at an acceptable speed on current mobile handsets or whether they will offer the user a better experience than the current number pad and direction keys present on the majority of mobile phones. A vision based finger interaction technique is proposed which uses the back of device camera to track the user’s finger. This allows the user to interact with the mobile phone with mouse based movements, gestures and steering based interactions. A simple colour thresholding algorithm was implemented in Java, Python and C++. Various benchmarks and tests conducted on a Nokia N95 smart phone revealed that on current hardware and with current programming environments only native C++ yields results plausible for real time interactions (a key requirement for vision based interactions). It is also shown that different lighting levels and background environments affects the accuracy of the system with background and finger contrast playing a large role. Finally a user study was conducted to ascertain the overall user’s satisfaction between keypad interactions and the finger interaction techniques concluding that the new finger interaction technique is well suited to steering based interactions and in time, mouse style movements. Simple navigation is better suited to the directional keypad.
APA, Harvard, Vancouver, ISO, and other styles
45

Helsel, Sandra Kay. "A set of criteria derived from curriculum theory to assist in the planning, use and evaluation of educational interactive videodisc." Diss., The University of Arizona, 1988. http://hdl.handle.net/10150/184372.

Full text
Abstract:
It was the purpose of this study to develop a set of criteria derived from curriculum theory to assist in the planning, use and evaluation of educational interactive videodisc. That set of criteria, referred to herein as the EIVD Curricular Base, consists of six sets of guidelines corresponding to Eisner's (1985) curriculum typologies: Development of Cognitive Processes, Curriculum as Technology, Curriculum for Personal Relevance, Curriculum for Social Adaptation, Curriculum for Social Reconstruction, and Academic Rationalism. The set of criteria was developed through the examination of three primary research questions: (1) What ways have those elements Beauchamp (1981) deemed necessary for any curriculum theory (definitions, values, design, engineering, and regeneration) been operationalized in Eisner's six curriculum typologies; (2) To what extent do interactive design characteristics identified by DeBloois (1979) apply to curriculum theory; (3) How can the ability of videodisc to simulate reality be integrated into the set of criteria? Further, the proposed set of criteria was critiqued against sample educational videodiscs to establish its veracity. The results of this study indicate that the Cognitive Processes curricular typology utilizes the potential of educational interactive videodisc to a greater extent than any other curricular typology in the EIVD Curricular Base. Therefore, it is recommended that an in-depth exploration of the Cognitive Process set of criteria be initiated. Ideally, the exploration would result in the research, design, production, use and evaluation of an actual videodisc program. Several, more general, recommendations regarding education's use of videodisc technology and courseware complete this study.
APA, Harvard, Vancouver, ISO, and other styles
46

Burgess, Stephen Keith 1958. "Business-to-consumer interactions on the Internet : a model for small businesses." Monash University, School of Information Management and Systems, 2001. http://arrow.monash.edu.au/hdl/1959.1/8027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ricci, Andrea. "The Early Political Web, 1995-2005: A ten-year observational research seeking evidence of eDemocracy in the information architecture of political parties web sites worldwide." Doctoral thesis, Universite Libre de Bruxelles, 2013. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209496.

Full text
Abstract:
Scholarly interest for the impact of technologies on democracy has raised in parallel to the decline of political participation. Technology has often been seen as either one of the causes of the crisis of representative democracy or as a powerful remedy to heal the negative externalities generated by party oligopolies.

The study of the impact of new media in party politics or presidential elections dates back the forties (with the outgrowth of radio) and has evolved in cyclical waves until today, covering the emergence of television, the development of global telecommunications, the birth of internet and finally what’s popularly called the Web 2.0.

The notion of eDemocracy emerges from this dynamic, but is in a league of its own.

There is no agreement on many of the terms that one needs to use to dissect its meaning. Scholars diverge on virtually every foundational concept: from the very definition of democracy and interactivity, to the core functions of political parties, to the definition of propaganda as opposed to political communication or to political marketing. As a consequence of this, there is little agreement on both what could be done in theory with eDemocracy and what is actually done in practice.

A permanent tension exist between idealtypes and real types in this domain.

The aim of this research is to prove this thesis with the largest and most global research unit of political parties web sites at the time of writing.

The choice of an information architecture approach has allowed to cover some uncharted territory while providing a first set of data on the structures of the political web (in 2004-2005) for public scrutiny.

The core of this research contribution consists in a basic taxonomy and a set of data (on the intentions and on the information architecture) resulting from a 10 years observational research on the early actors of the political web (stricto sensu i.e. 2073 political parties web sites), reviewed with a new degree of detail (through an ad hoc software procedure aiming at dissecting the structure of political web sites) and grouped into 3 main families (protosites, mesosites and neosites) of party web sites. These clusters of homogeneous web sites share a common way to deal with space, with files, with usability, with multimedia.

Classic views on eDemocracy insisted on the improvement deriving from more political information online: in theory, the more information we have, the more we can compare it and use it for our political orientation/participation. In practice, to describe the problem in cybernetic terms, this empirical research shows that load appears to be an issue for most party sites: there is too often either too little content (one out of five party sites around the world is a "protosite") or too much (11% of the observed universe materializes in real “content caverns”). A little more than 4% of the sites (a high end mesosite or neosite) had between 10000 and 48,000 links !

Cyber optimists have seen in the proliferation of party web sites a sign of improved party competition. For political minorities or for incumbent parties, in the political web, like in eCommerce, what really makes the difference is the conversion rate i.e. the number of visitors that turn into involved voters. Now, with the type of technical, socio-economical constraints reducing the widespread access to the net, with motivational factors (trust and degree of social connectedness) that may alter the individual’s response to the online information offer, with the imperfect implementation (in terms of usability) of the information architecture requirements for optimal political persuasion and communication online, the actual conversation rate of political parties web sites is likely to remain modest.

One of the most characteristic uses of the political web discovered in this research is to provide cloud like archival services for the party community. Parties - in the first ten years of the political web - were trying to check mainstream media and use their sites as a low cost, contemporary version of the party newspapers of the 70s.

Although this dissertation is not investigating the specific impact of party sites, the structural analysis carried out in the empirical validation suggests that the architecture of party sites in the years 1995-2005 was developing in such a way to be less and less capable of injecting meaningful inputs in the circuitry of modern democratic institutions. Engaged in a frontal competition with traditional news media (and deprived of the same assets), the early political web stricto sensu (and the set of interactive applications it contains) seems to be too a weak vector to channel adequate stimuli to alter and modify electoral processes or institutional dynamics.

The majority of the respondents of a political webmasters survey (107 individuals responded to the survey) carried out in the course of this research project indicates that the party site is not the party's leaders favourite platform to launch messages (64% of the answers disagree or strongly disagree to the statement). The majority of the respondents in the same empirical fieldwork agrees to the following statements: “the web is not the most important tool for the party communication strategy (58%)”, “key messages are published simultaneously on all media available (77%)”, “the party has created this site to allow people to contact candidates directly (63%)”, “the biggest part of the interaction with the public happens live, in meetings - the web is used essentially to post the party documents and to give news to the electorate (73%)”.

The most interesting results of this question are related to the transactive / mediating role of party communication online. It is beyond any doubt that in the view of these respondents their site has not been created “to invite the opposition to discuss with us (81%)”. If there is a politically relevant process that goes on in these sites it’s really among like-minded.

The mission statement [our party site is meant] “to gather the wants and needs of the electorate” splits respondents in two (54% of the respondents agrees and 47% and disagrees), but 73% of all respondents also agrees that most of the interactions with the electorate are non mediated, thus limiting the relevance of the political web stricto sensu to a mere information delivery platform.

The central thesis emerging from this first major reality check of the political web is that the structure of most party sites is simply not made to generate the ambitious levels of deliberative democracy. Not only a large number of party sites are microscopic, but they lack the basic means for human to human interactivity, a criticism that .In 34,7% of the cases scrutinized in the survey the sites lacked even of the mailto command (used to allow end users to write mails to the webmaster). In 51.9% of the cases there is no form at all, to facilitate structured communications between the party and the audience. The majority of the early actors of the political web were not structured to engage in deliberative activities. Only a fraction of the universe (between 1 and 2%) showed multiple forms and input methods corresponding to advanced neosites (along the model of the US Green Party Action Centre) or the so called over exposure sites (such as the Argentinian Humanista party). The bottom line is that interactivity levels found – worldwide - on the largest array of political parties sites were (in the period between 1995 and 2005) simply discouraging, if one tends to believe in the rhetoric of eDemocracy.

A corollary of my central thesis is that the reality of the political web generated by parties between 1995 and 2005, shows a significant presence of techniques and communication forms typical of political marketing and propaganda. ‘Commands’, calls for ortopraxy, confrontational communication and a growing number of ‘digital tricks’ structure the toolbox of the best party web architects. A form of weak propaganda (the only sort of ‘naked hand’ propaganda that most political parties can afford to pay) has invaded and captured cyberspace. And the user community is becoming increasingly aware of this.

This research does not cover the user dimension. However marginal data obtained in one of the three empirical sections (the Web Master survey) seem to indicate that the political web (of the early years) maintained the capacity to swing some marginal seats.

This research covers forms of interactivity based on BBS, online fora and blogs but does not cover the historical period of the development of social networks such as Facebook and Twitter. The scientific conclusions are therefore intrinsically limited in value to the decade they refer to, but it is argued in the conclusions that recent surveys (Internet and Campaign 2010 Survey by Pew) do not seem to indicate that the so called Web 2.0 is drastically changing the levels of online political participation.


Doctorat en Information et communication
info:eu-repo/semantics/nonPublished

APA, Harvard, Vancouver, ISO, and other styles
48

Chiza, Albin Boris Lugerero. "Adoption of cloud computing services amongst the micro-enterprise sector in Cape Town." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2862.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2018.
Micro-enterprises play a vital role towards the South Africa’s economic growth by contributing towards job creation. Despite the importance of the role of micro-enterprises, micro-enterprises face several challenges such as lack of finance, lack of skilled workers and lack of technological resources. Previous studies indicate that Information Technology has a distinct role in assisting micro-enterprises overcome several challenges. It is further evidenced in the extant literature that cloud computing, provides a low cost entry for enterprises to support several facets of their business operations. In the current era cloud computing requires a constant as well as fast internet connection and the South African government has various interventions to address the infrastructure divide. However, we have a scant understanding of the adoption challenges amongst micro-enterprises to adopt cloud solutions, which to date feature more prominently amongst larger organisations. This research investigated the factors that influence cloud computing adoption in the micro-enterprise sector in Cape Town. This is a city that promotes the contribution of micro-enterprises to their economic activity, and was such an ideal location to investigate cloud computing adoption amongst the micro-enterprise sector. This research provides a rich understanding of the factors that influence micro-enterprises in Cape Town to adopt cloud computing services and proposes guidelines to encourage micro-enterprises in Cape Town to use cloud services to improve their productivity. The researcher uses the UTAUT model as a framework and a qualitative research methodology to investigate the research question. Data for this research study was collected via face to face interviews with semi-structured questions of ten micro-enterprises and an IT expert. The findings showed that the factors influencing the adoption of cloud computing services are performance expectancy, effort expectancy, social influence, facilitating conditions, lack of training, cost efficiency and reduction of working hours.
APA, Harvard, Vancouver, ISO, and other styles
49

Schneider, Diana Sensenbaugh. "Descriptive analysis of technology use at the Riverside County Office of Education, Riverside, California." CSUSB ScholarWorks, 1997. https://scholarworks.lib.csusb.edu/etd-project/1377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rose, William B. (William Burford). "The Introduction of Robotic Technology: Perceptions of the Work Force of an Aerospace Defense Company." Thesis, University of North Texas, 1988. https://digital.library.unt.edu/ark:/67531/metadc330596/.

Full text
Abstract:
This dissertation examines the effect that the introduction of an advanced manufacturing technology, specifically robotics, has on the work force of an aerospace defense company. In this endeavor, there are two main objectives. First, this study determines whether workers feel that their jobs are threatened by the introduction of robotic technology. Secondly, the research compares the degree to which workers from different labor types feel this threat. A review of the literature reveals that the technical factors involving manufacturing technology have been thoroughly examined and discussed, but the effect that they have on the work force has been somewhat neglected. This dissertation develops ten hypotheses to ascertain the perceived threat to job security for workers within an aerospace defense company. This study is based on an employee survey that examined the employee's perceived threat to job security by the introduction of robotics. The primary research was obtained from employees within an aerospace defense company through the use of questionnaires in a three phase approach. The first phase utilized a pretest that sampled the questionnaire prior to the company-wide solicitation. The second phase administered the questionnaire to the three labor types within the work force. Phase three consisted of data reduction and the comparison of the primary data to the research hypotheses. The results of the study concluded that workers closer to the robotic technology (hands-on employees) felt more threatened about their job security than workers more removed from the technology (support personnel and management). It was further found that the hands-on workers felt that the major factor that lead to the introduction of robots was the desire to lower labor costs while support personnel and managers felt that the major factor that lead to the introduction of robots was due to increasing productivity. Additional hypotheses tested in this study include the effect that robots have on the perceptions of the work force toward the company's employment level, worker apprehension and reaction, training, safety, health, and competition.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography