Dissertations / Theses on the topic 'Digital threats'

To see the other types of publications on this topic, follow the link: Digital threats.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 46 dissertations / theses for your research on the topic 'Digital threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Shridevi, Rajesh Jayashankara. "Emerging Security Threats in Modern Digital Computing Systems: A Power Management Perspective." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7483.

Full text
Abstract:
Design of computing systems — from pocket-sized smart phones to massive cloud based data-centers — have one common daunting challenge : minimizing the power consumption. In this effort, power management sector is undergoing a rapid and profound transformation to promote clean and energy proportional computing. At the hardware end of system design, there is proliferation of specialized, feature rich and complex power management hardware components. Similarly, in the software design layer complex power management suites are growing rapidly. Concurrent to this development, there has been an upsurge in the integration of third-party components to counter the pressures of shorter time-to-market. These trends collectively raise serious concerns about trust and security of power management solutions. In recent times, problems such as overheating, performance degradation and poor battery life, have dogged the mobile devices market, including the infamous recall of Samsung Note 7. Power outage in the data-center of a major airline left innumerable passengers stranded, with thousands of canceled flights costing over 100 million dollars. This research examines whether such events of unintentional reliability failure, can be replicated using targeted attacks by exploiting the security loopholes in the complex power management infrastructure of a computing system. At its core, this research answers an imminent research question: How can system designers ensure secure and reliable operation of third-party power management units? Specifically, this work investigates possible attack vectors, and novel non-invasive detection and defense mechanisms to safeguard system against malicious power attacks. By a joint exploration of the threat model and techniques to seamlessly detect and protect against power attacks, this project can have a lasting impact, by enabling the design of secure and cost-effective next generation hardware platforms.
APA, Harvard, Vancouver, ISO, and other styles
2

Berger, Stephan [Verfasser], and Maximilian [Akademischer Betreuer] Röglinger. "Digital Technologies in the Industrial Sector : Technology-driven Threats and Opportunities / Stephan Berger ; Betreuer: Maximilian Röglinger." Bayreuth : Universität Bayreuth, 2020. http://d-nb.info/1220356271/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lindström, Sofia, Sebastian Edemalm, and Erik Reinholdsson. "Marketers are Watching You : An exploration of AI in relation to marketing, existential threats, and opportunities." Thesis, Jönköping University, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-52744.

Full text
Abstract:
Background: As of today, it is apparent that with the ever-changing demands and needs of customers, companies are facing enormous pressure to deliver the right value, on time, in the right way, and proper manner. To realize the full potential of Artificial Intelligence (AI), a careful plan and method need to be established in the development and deployment when incorporating the technology with marketing. Technology is evolving at a rapid pace and Artificial Intelligence (AI) can be found in a variety of applications. AI in marketing can provide valuable data clusterization and insights for personalized recommendations, customer segmentation, or even advertising optimization.  Problem:  To date, a few studies have been made due to the rapid development of AI which has shown an opportunity for marketers. From this hype, companies are looking into speedy implementation where one can forget that this technology comes with risks and threats. “The problem is that everybody has unconscious biases and people embed their own biases into technology” (Kantayya, 2021). Although machines can deliver personalized numerical information, it cannot deliver new solutions such as products and services, nor classify different outputs with a cognitive mindset which could result in biased results. The objective of this research is to utilize the information and insights gathered from experts in the field of engineering and marketing to gain a holistic view of the current and future capabilities of AI in marketing.  Purpose: The focus of this bachelor thesis is to provide additional insights in regards to Artificial Intelligence in relation to marketing, taking into consideration bias, personalization, the black box, along with other possible implications of AI systems, also referred to as the dark side. To fulfill the researchers’ objective, qualitative interviews with practitioners and employees with different roles within the field of AI and Marketing were conducted. The paper will be focusing on concepts, theories, secondary data, and interviews which will be further discussed and give opportunities for future research.   Method: To perform this research, a qualitative research design was applied, and 12 structured interviews were conducted with those who have knowledge and experience with AI, marketing, or both.  Results: The study elucidates the potentials and fallbacks of Artificial Intelligence in marketing. Where the findings suggest a mixture of human intervention and technology is needed to work against the perceptions, bias, and manipulation the technology can possess. The aims then guide towards the conclusion presenting the important cognitive and emotional skills that humans obtain that are currently lacking in AI.  This study finds several key areas both in terms of opportunities and risks. Such key areas involve the possibility of delivering new, unique personalized content to a mass audience at lightning-quick speed and at the same time presenting a handful of risks by giving machines the permission to make human decisions. Risks found in this study presented as the dark side include the bubble, bias, manipulation, fear of losing jobs, lack of transparency creating the black-box phenomena. Therefore, this research is interesting especially for marketing managers in how AI could be used both from an opportunity perspective and possible risks to consider.
APA, Harvard, Vancouver, ISO, and other styles
4

Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.

Full text
Abstract:
The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their confidential data. Therefore, this study raises a critical and challenging research question: How can we restore the damaged consumer confidence and improve the uptake and security of cloud services? This study makes a plausible attempt at unpacking and answering the research question in order to holistically address the data leakage problem from three fronts, i.e. conflict-aware virtual machine (VM) placement, strong authentication and digital forensic readiness. Consequently, this study investigates, designs and develops an innovative conceptual architecture that integrates conflict-aware VM placement, cutting-edge authentication and digital forensic readiness to strengthen cloud security and address the data leakage problem in the hope of eventually restoring consumer confidence in cloud services. The study proposes and presents a conflict-aware VM placement model. This model uses varying degrees of conflict tolerance levels, the construct of sphere of conflict and sphere of non-conflict. These are used to provide the physical separation of VMs belonging to conflicting tenants that share the same cloud infrastructure. The model assists the cloud service provider to make informed VM placement decisions that factor in their tenants’ security profile and balance it against the relevant cost constraints and risk appetite. The study also proposes and presents a strong risk-based multi-factor authentication mechanism that scales up and down, based on threat levels or risks posed on the system. This ensures that users are authenticated using the right combination of access credentials according to the risk they pose. This also ensures end-to-end security of authentication data, both at rest and in transit, using an innovative cryptography system and steganography. Furthermore, the study proposes and presents a three-tier digital forensic process model that proactively collects and preserves digital evidence in anticipation of a legal lawsuit or policy breach investigation. This model aims to reduce the time it takes to conduct an investigation in the cloud. Moreover, the three-tier digital forensic readiness process model collects all user activity in a forensically sound manner and notifies investigators of potential security incidents before they occur. The current study also evaluates the effectiveness and efficiency of the proposed solution in addressing the data leakage problem. The results of the conflict-aware VM placement model are derived from simulated and real cloud environments. In both cases, the results show that the conflict-aware VM placement model is well suited to provide the necessary physical isolation of VM instances that belong to conflicting tenants in order to prevent data leakage threats. However, this comes with a performance cost in the sense that higher conflict tolerance levels on bigger VMs take more time to be placed, compared to smaller VM instances with low conflict tolerance levels. From the risk-based multifactor authentication point of view, the results reflect that the proposed solution is effective and to a certain extent also efficient in preventing unauthorised users, armed with legitimate credentials, from gaining access to systems that they are not authorised to access. The results also demonstrate the uniqueness of the approach in that even minor deviations from the norm are correctly classified as anomalies. Lastly, the results reflect that the proposed 3-tier digital forensic readiness process model is effective in the collection and storage of potential digital evidence. This is done in a forensically sound manner and stands to significantly improve the turnaround time of a digital forensic investigation process. Although the classification of incidents may not be perfect, this can be improved with time and is considered part of the future work suggested by the researcher.
Thesis (PhD)--University of Pretoria, 2020.
Computer Science
PhD
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
5

Dunkels, Elza. "Bridging the distance : children’s strategies on the internet." Doctoral thesis, Umeå University, Interactive Media and Learning, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-1340.

Full text
Abstract:

This thesis deals with the following questions: What do children find negative on the Internet? What counter strategies do they use? How have they developed these strategies? The method used is one-to-one online interviews and the analyses are qualitative in nature. The sample is children in grade 6 of the Swedish compulsory school, aged between 11 and 13. 104 children, 52 girls and 52 boys, from different parts of Sweden were interviewed.

The media debate seems to display consensus regarding what threats the Internet poses to young people. The conclusion of this thesis is, however, that children’s views of the Internet in many ways differ from the media related adult view. The children of this study do not express a great deal of anxiety about the negative sides of the Internet. They are aware of, and can describe many downsides but these are not present in their everyday use of the Internet. Digging deeper it turns out that many children have in fact well-developed counter strategies. However, these strategies are not conscious in the sense that the children discuss them. Instead, they seem integrated in their online environment. The counter strategies have been developed by the children alone or together with peers. In some, but remarkably few, cases adults have been giving tips or teaching the children strategies. Nevertheless, the study does not paint a picture of naïve children, unable to see actual threats, but of responsible young citizens who are aware of the threats that exist in their online setting – sometimes from personal experience – and have developed methods to avoid such threats.

APA, Harvard, Vancouver, ISO, and other styles
6

Ahlgren, Erik. "Does EU copyright law threaten digital freedom?" Thesis, Uppsala universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-324451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Victor. "Towards a feedback design process using Digital Thread." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122373.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 141-148).
Digital Thread is a data-driven architecture that links together information generated from across the product lifecycle. Though Digital Thread is gaining traction as a digital communication framework to streamline design, manufacturing, and operational processes in order to more efficiently design, build and maintain engineering products, a principled and unified formulation of the data-driven design problem using Digital Thread remains absent in the literature. Prior work on Digital Thread has targeted enterprise level risk/value assessments, addressing upcoming challenges and future visions, and establishing requirements from the vantage point of model-based systems engineering, product lifecycle management, and additive manufacturing. However, such a formulation must account for the fact that the design process is highly iterative and not all information is available at once.
Design decisions must be made not only on what data to collect but also on the costs and benefits involved to collect those data. Furthermore, since full use of acquired information can become computationally prohibitive, it is important to evaluate what minimal information is sufficient for design decisions and in what form that information is needed. The contribution of this thesis is to present such a formulation from the context of a data-driven design and decision problem under uncertainty. In particular, we lay down a mathematical foundation for Digital Thread and develop an dynamical feedback process model that governs the mechanics of the data-driven design problem that uses Digital Thread. From this model, we construct a Bayesian filter that describes the overall data assimilation process and formulate a multistage optimization problem that produces optimal data-informed decisions with respect to specified cost and constraint metrics.
A numerical approach based on function and policy approximation is detailed and an algorithm is provided to solve the multistage optimization problem. The overall methodology is illustrated on an example structural fiber-steered composite component. In this setting, the methodology enables design space explorations that assess the costs/benefits of future outcomes based on current design decisions. These design decisions can incorporate structural tailoring, sensor placement, and sensor selection in addition to fiber angle and thickness specification. Different design scenarios utilizing sensor placement and selection are compared and quantified. It is found that placement of sensors has less impact on cost than the choice of which sensors are used and how frequently. Accordingly, this method is able to assess how many sensors need to be used to resolve the dominant loading components effectively, and then use this knowledge to produce appropriate designs of low costs.
"The work in this thesis was supported in part by AFOSR grant FA9550-16-1-0108 under the Dynamic Data Driven Application System Program (Program Manager Dr. E. Blasch); The MIT-SUTD International Design Center; and the United States Department of Energy Office of Advanced Scientific Computing Research (ASCR) grants DE-FG02-08ER2585 and DE-SC0009297, as part of the DiaMonD Multifaceted Mathematics Integrated Capability Center"--Page 9.
by Victor Singh.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Aeronautics and Astronautics
APA, Harvard, Vancouver, ISO, and other styles
8

Hughes, Judith University of Ballarat. "Thread of truth." University of Ballarat, 2005. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/12766.

Full text
Abstract:
"It is thought that phobias are caused by a fear of the unknown and can be overcome by self-help learning resulting in better understanding. Observation and scientific investigation have been used to create a body of artwork for the purpose of helping to desensitize people who suffer from arachnophobia. Field trip collections, photography, printmaking and installations have been used to capture, explore and create visual artworks that have been designed to highlight fact-based features of spiders and their webs."
Master of Arts (Visual Arts)
APA, Harvard, Vancouver, ISO, and other styles
9

Hughes, Judith. "Thread of truth." University of Ballarat, 2005. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14601.

Full text
Abstract:
"It is thought that phobias are caused by a fear of the unknown and can be overcome by self-help learning resulting in better understanding. Observation and scientific investigation have been used to create a body of artwork for the purpose of helping to desensitize people who suffer from arachnophobia. Field trip collections, photography, printmaking and installations have been used to capture, explore and create visual artworks that have been designed to highlight fact-based features of spiders and their webs."
Master of Arts (Visual Arts)
APA, Harvard, Vancouver, ISO, and other styles
10

Hedberg, Thomas Daniel Jr. "Enabling Connections in the Product Lifecycle using the Digital Thread." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85627.

Full text
Abstract:
Product lifecycles are complex heterogeneous systems. Applying control methods to lifecycles requires significant human capital. Additionally, measuring lifecycles relies primarily on domain expertise and estimates. Presented in this dissertation is a way to semantically represent a product lifecycle as a cyber-physical system for enabling the application of control methods to the lifecycle. Control requires a model and no models exist currently that integrate each phase of lifecycles. The contribution is an integration framework that brings all phases and systems of a lifecycle together. First presented is a conceptual framework and technology innovation. Next, linking product lifecycle data dynamical is described and then how that linked data could be certified and traced for trustworthiness. After that, discussion is focused how the trusted linked data could be combined with machine learning to drive applications throughout the product lifecycle. Last, a case study is provided that integrates the framework and technology. Integrating all of this would enable efficient and effective measurements of the lifecycle to support prognostic and diagnostic control of that lifecycle and related decisions.
Ph. D.
The manufacturing sector is on a precipice to disruptive change that will signifcantly alter the way industrial organizations think, communicate, and interact. Industry has been chasing the dream of integrating and linking data across the product lifecycle and enterprises for decades. However, inexpensive and easy to implement technologies to integrate the people, processes, and things across various enterprises are still not available to the entire value stream. Industry needs technologies that use cyber-physical infrastructures efectively and efciently to collect and analyze data and information across an enterprise instead of a single domain of expertise. Meeting key technical needs would save over $100 billion annually in emerging advanced manufacturing sectors in the US. By enabling a systems-thinking approach, signifcant economic opportunities can be achieved through an industrial shift from paper-based processes to a digitally enabled model-based enterprise via the digital thread. The novel contribution of this dissertation is a verifed and validated integration framework, using trusted linked-data, that brings all phases and systems of the product lifecycle together. A technology agnostic approach was pursued for dynamically generating links. A demonstration is presented as a reference implementation using currently available technology. Requirements, models, and policies were explored for enabling product-data trustworthiness. All methods were developed around open, consensus-based standards to increase the likelihood of scalability. The expected outcome of this work is efcient and efective measurements of the lifecycle to support data-driven methods, specifcally related to knowledge building, decision support, requirements management, and control of the entire product lifecycle.
APA, Harvard, Vancouver, ISO, and other styles
11

Havlicek, Joseph P. "Median filtering for target detection in an airborne threat warning system." Thesis, Virginia Polytechnic Institute and State University, 1988. http://hdl.handle.net/10919/80083.

Full text
Abstract:
Detection of point targets and blurred point targets in midwave infrared imagery is difficult because few assumptions can be made concerning the characteristics of the background. In this thesis, real time spatial prefiltering algorithms that facilitate the detection of such targets in an airborne threat warning system are investigated. The objective of prefiltering is to pass target signals unattenuated while rejecting background and noise. The use of unsharp masking with median filter masking operators is recommended. Experiments involving simulated imagery are described, and the performance of median filter unsharp masking is found to be superior to that of the Laplacian filter, the linear point detection filter, and unsharp masking with a mean filter mask. A primary difficulty in implementing real time median filters is the design of a mechanism for extracting local order statistics from the input. By performing a space-time transformation on a standard selection network, a practical sorting architecture for this purpose is developed. A complete hardware median filter unsharp masking design with a throughput of 25.6 million bits per second is presented and recommended for use in the airborne threat warning system.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
12

BARROS, MONIQUE PEREIRA IBITINGA DE. "ANALYSIS OF THE BRAZILIAN PHONOGRAPHIC INDUSTRYNULLS FUTURE FACING THE THREAT OF PIRACY AND DIGITAL MUSIC." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2003. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=4820@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
Esta dissertação tem como objetivo avaliar qual a tendência da indústria fonográfica nos próximos anos, tendo em vista as mudanças estruturais que ela vêm passando em conseqüência das alterações ocorridas no ambiente. O setor vem sendo drasticamente abalado por uma oferta ilegal de produtos, além de inovações tecnológicas que podem ser utilizadas de forma benéfica, mas também possibilitam um acesso incontrolável à principal matéria prima das gravadoras. A metodologia utilizada para buscar esta tendência foi o método Delfos de previsão. Este método foi o escolhido por se tratar de um setor desprovido de um histórico confiável, devido às constantes mudanças tecnológicas e de padrão de consumo, e dos eventos atuais que provocam a insegurança sobre o futuro da indústria proporcionarem alterações inesperadas. O método permite a elaboração de uma previsão com base na opinião de especialistas, e tem como resultado uma avaliação do futuro da indústria com base na percepção de pessoas diretamente ligadas a ela. Através deste estudo foi possível verificar que existe uma expectativa de que o governo vá se posicionar mais fortemente com relação à repressão da pirataria musical e que as gravadoras eventualmente passem a tratar como negócio não só a produção de CDs, mas também outros produtos e serviços diretamente ligados à música. Também foi possível concluir que a música digital, de forma geral, não é percebida como uma ameaça à indústria de música tradicional, e pode ser vista como uma oportunidade de negócio. Assim, foi possível diagnosticar o futuro mais provável para as empresas e a estrutura do setor fonográfico brasileiro, além de verificar as variáveis que indicarão a formação deste cenário.
The present work intends to evaluate the most probable scenario for the Brazilian phonographic industry in the next few years, taking in account the structural changes that have been going on in the environment. This industry has been suffering from the continuous increase on the illegal products offering, in addition to new technological solutions, which may have positive implications, but may also allow innovative and uncontrollable ways of obtaining the recording companies´ main asset without paying for it. The Delfos technique has been the methodology chosen for this study. The method was the best choice bearing in mind that the industry does not have a trustworthy historical data, partially because of the technological innovation and chances on the consumption pattern, and the current events on the sector had resulted on unexpected turn a rounds on the industry´s development. Trough this work it has become possible to identify that it is expected from the government to take stronger measures to reprehend the music piracy and also that the recording organizations will eventually make their ways not only with CDs themselves but also with everything music related. Besides, digital music is not perceived as a threat, but in fact is expected to become a business and distribution opportunity for the music industry. Therefore, it has been possible to forecast the most likely future for the companies on the Brazilian music business, along with defining the variables that will indicate the structuring of this scenario.
APA, Harvard, Vancouver, ISO, and other styles
13

Brown, Jillian. "Bacterial community composition, TCE degradation, isotopic fractionation and toxicity of a TCE contaminated aquifer." Thesis, Available from the University of Aberdeen Library and Historic Collections Digital Resources, 2009. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=33520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Carlsson, Maria. "Hotbilden i Sverige : En undersökning av den digitala hotbilden mot ett medelstort svenskt företag." Thesis, Uppsala universitet, Data- och systemvetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-126658.

Full text
Abstract:
Internet and information technology today has a rather obvious role in the activities of companies and organizations. All cash transactions within and between companies is digitized, communication within the company is done via e-mail, sales and marketing is done largely with marketing and ads on the Internet. This has resulted in economic benefits for companies and organizations, and facilitated the work for them. However, this has also led to new threats have emerged. Companies and organizations is well aware that there are numerous threats that comes with using the Internet and Information Technologies but exactly what those threats are for a mid-sized company in Sweden is not clarified anywhere. New reports made annually by various companies and government agencies around the world but no one puts a medium-sized Swedish business in focus. In this study several reports, made by different companies and government agencies are compared and compiled, too try too make an overview over the threats against a mid-sized company in Sweden. Together with interviews done with key people in the field of IT-security this study identifies the threats, draws conclusions of how to prevent them and also try to take a look into the future to see what threats a mid-sized company or organization can expect in just a matter of years. In the study we notice how all of the IT threats are increasing and that the digital crime are becoming more organized, that some of the key protections for a company is staff training and standard technical solutions such as antivirus software and firewalls. In the future operating systems will no longer be the target for intrusion, but instead web application be the major vulnerabilities. This essay is written in Swedish.
APA, Harvard, Vancouver, ISO, and other styles
15

Paiz, Fernando J. (Fernando Joaquin) 1976. "Tartan Threads : a method for the real-time digital recognition of secure documents in ink-jet printers." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9797.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Includes bibliographical references (leaves 27-28).
Thanks to today's digital imaging technology, any ten year old child with basic computer skills can create convincing counterfeit currency. It comes as no surprise that as output quality and costs have improved in ink-jet printers, there has been a corresponding surge in digital counterfeiting of security documents. The design of a system, through which a printer can recognize a security or other protected document though identification of a watermark, presents a challenge for the application of information hiding techniques. The marking should be strong enough to provide certainty that a document was intentionally marked and robust enough to withstand the transformations inherent in the scanning and printing process. Using an extended spread­spectrum technique, a small one-dimensional thread encoded with a known multi-bit signature is generated. If the printer detects a match, printing halts and a warning message is output to the user. By applying several such threads at varying orientations, this can provide an effective first line of defense against the casual digital counterfeiter.
by Fernando J. Paiz.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
16

Lee, Giseong. "U.S. coercive diplomacy towards North Korea." Thesis, Available from the University of Aberdeen Library and Historic Collections Digital Resources, 2009. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=33426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ahsan, Nabeel. "OCTG Premium Threaded Connection 3D Parametric Finite Element Model." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71791.

Full text
Abstract:
Full 360 degree 3D finite element models are the most complete representation of Oil Country Tubular Goods (OCTG) premium threaded connections. Full 3D models can represent helical threads and boundary conditions required to simulate make-up and service loading. A methodology is developed to create a 360 degree full 3D parametric finite element model with helical threads as an effective design and analysis tool. The approach is demonstrated with the creation of a metal-to-metal seal integral joint full 3D model with manufacturer supplied geometry. The premium connection is decomposed into smaller parts to generate parametric geometric features. A controlled parametric meshing scheme is developed to manage mesh density in contact regions to effectively represent the mechanics in regions of interest while minimizing total element count. The scripted parametric approach allows for efficient geometric and mesh updates. Several methods to reduce and manage model runtimes are presented. An elastic-plastic material model is created with material coupon tensile tests results. Digital Image Correlation (DIC) is used to measure full-field displacement and strain data on the surface of the box. Experimental set up and data processing procedures are discussed. Error metrics are developed to correlate the finite element model results with the DIC experimental data. The DIC make-up experimental results are used to reconcile the finite element model to develop a minimum error make-up model relative to the pin rotation. The friction coefficient is estimated and the make-up torque-turn behavior is verified. The calibrated 3D finite element model is validated with ISO_13769 load series B axial and internal pressure loading experimental DIC data. Metal-to-metal seal metrics of contact pressure and seal length are evaluated.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
18

Sweitzer, Wayne F. "Hypermedia and digital optical media technologies as applied to a prototype Geographic and Threat Recognition (GEOTREC) training and reference tool." Thesis, Monterey, California: Naval Postgraduate School, 1990. http://hdl.handle.net/10945/34864.

Full text
Abstract:
Approved for public release; distribution is unlimited.
Threat recognition and geographical training are fundamental parts of the requisite knowledge base for a large number of naval personnel who are assigned to operational or operations-oriented support billets. Yet readiness in these areas is often lacking, in large part due to the paucity of readily available, motivational instruction tools. This thesis explores major issues involved in integrating two emerging technologies, hypermedia and digital optical media (DOM), in the context of developing a prototype of just such an application: the GEOgraphic and Threat RECognition (GEOTREC) training and reference tool. The hypermedia software package used to develop the GEOTREC prototype, Hyperdoc version 1.12, gives evidence of the maturation yet needed in the integration of hypermedia and DOM technologies in application authoring tools. This thesis recommends the development of a system at least somewhat analogous to the GEOTREC prototype. Such a tool, using both hypermedia and DOM, would not only provide an enjoyable, intuitive, yet challenging way to foster multi-sensory learning, but also a quick, powerful, and easy-to-use reference to geographical and threat information needed for a myriad of operational scenarios.
APA, Harvard, Vancouver, ISO, and other styles
19

Silva, Blanc Luisina. "Colonial threads: Clothing and identity in Eighteenth and Early Nineteenth-Century Lima and Mexico City." Doctoral thesis, Universitat Pompeu Fabra, 2019. http://hdl.handle.net/10803/668772.

Full text
Abstract:
Attention toward textile production and clothing consumption in Spanish Latin American increased during the end of the colonial period and was reflected in new regulations, newspaper articles, tighter control by the Catholic Church and the Bourbon reforms. My dissertation addresses why clothing had such significant economic and cultural value and how individuals formed their identity through appearance. I focus on Lima and Mexico City as the primary production, distribution and consumption centers of colonial Latin America. My study centers on several historical documents that I analyze with digital tools as I explore the complex social and cultural negotiation of the colonial fashion system. I argue that dress could both reveal or hide ones’ identity and could display individuality or highlight commonality. My work expands on the notion that clothing reflected moral values whereby luxury and excess were as improper as nakedness. To conclude, I unveil a network of surveillance developed to ensure the secure and accurate distinction of individuals and guarantee proper consumption.
La atención hacia la producción textil y el consumo de indumentaria aumentó en el último período de las colonias españolas en Latinoamérica. Esto se vio reflejado en nuevas regulaciones, artículos de diarios, un control más estricto de la iglesia católica y las reformas borbónicas. Mi tesis doctoral investiga por qué la vestimenta tenía un valor económico y cultural tan importante y cómo las personas construían su identidad a través de la apariencia. Este estudio se centra en Lima y Ciudad de México como los principales puntos de producción, distribución y consumo de moda de Latinoamérica colonial. Mi trabajo se basa en documentos históricos que analizo con herramientas digitales para explorar la compleja negociación social y cultural del sistema de moda transatlántica. La vestimenta podía revelar u ocultar la identidad de la persona y mostrar individualidad o pertenencia a grupos específicos. Mi trabajo amplía la noción de que la apariencia reflejaba valores morales según los cuales el lujo y el exceso eran tan inadecuados como la desnudez. Para concluir, presento una red de vigilancia desarrollada para garantizar el fácil y preciso reconocimiento de los individuos a través de la apariencia y garantizar un consumo adecuado.
APA, Harvard, Vancouver, ISO, and other styles
20

Lõugas, Marilin. "Weaving Mental Threads: Exploring the Touchpoints Between Parallel Game Worlds in an Ended World Setting." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22784.

Full text
Abstract:
This master thesis researches parallel digital world design in computer games in the setting of An Ended World. The main focus of the research is the touchpoints between two or more worlds and how the inputs from a designer can influence the type of experience received by the player.The overall research takes inspiration from both game and interaction design and follows a very user-centric approach with numerous play sessions and a workshop. The final outcome is presented in the form of attributes and a prototype built as a modification for an existing game.
APA, Harvard, Vancouver, ISO, and other styles
21

Alic, Enes, and Agon Kamberi. "Vad sker med redovisningsassistenterna i en digital föränderlig värld?" Thesis, Högskolan Kristianstad, Fakulteten för ekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20149.

Full text
Abstract:
Digitization has an impact on the change that the accounting industry is undergoing. The vision of development is to automate and systematize society, which means that the technology mainly implements tasks of society. The study aims to dig deeper which effects the digitization has on the accounting firm. These effects are derived from an analysis model in which the role of the accounting assistants is questioned. Employees with different occupational positions at the accounting firm have been interviewed for empirical data collection. The interviews were conducted in a purposeful manner, since the selection is aimed at employees who are helpful in answering the study's question and purpose. The interviews were used to find links with the theoretical reference frames. With the help of the theoretical frame of reference and the collected empirical data, conclusions have been drawn that digitization causes different effects. The work approach is streamlined by automating the basic tasks of the accounting firm. The streamlining will lead to the accounting firm being able to deliver a broader service during the same time frame, which leads to increased client satisfaction. Quality achieves higher levels by increasing customer satisfaction. When the accounting firm delivers services with higher time gains, profitability will be higher. Profitability is something accounting firms and other businesses strive for, therefore it is likely that digitization will be implemented even more. Finally, the different effects of digitization show that the need for accounting assistants is diminishing, which is why digitization is partly perceived as a threat.
APA, Harvard, Vancouver, ISO, and other styles
22

McMahon, Sarah Caitlin. "Containers:An Exploration of Self Through Pixel and Thread." Kent State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=kent1524491293446776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Martins, Neto Rorai Pereira. "Extração de variáveis dendrométricas em árvores de Pinus taeda L. a partir de dados TLS e ALS." Universidade do Estado de Santa Catarina, 2016. http://tede.udesc.br/handle/handle/2333.

Full text
Abstract:
Submitted by Claudia Rocha (claudia.rocha@udesc.br) on 2017-12-11T13:13:27Z No. of bitstreams: 1 PGEF16MA069.pdf: 4337970 bytes, checksum: ff5740a29d7c5f8547ee871caf653bdb (MD5)
Made available in DSpace on 2017-12-11T13:13:27Z (GMT). No. of bitstreams: 1 PGEF16MA069.pdf: 4337970 bytes, checksum: ff5740a29d7c5f8547ee871caf653bdb (MD5) Previous issue date: 2016-02-25
Capes
New tree measurement techniques have been developed to improve the precision and quality of the dendrometric measurements performed. Among them the LIDAR technology stands out through which it is possible to obtain high precision three-dimensional data. Thereby the general objective of this work was to evaluate the use of the LIDAR ALS (Airborne Laser Scanner) and of the TLS (Terrestrial Laser Scanner) technologies for obtaining the dendrometric variables in commercial planting of Pinus taeda. The study area was a 16 years old plot without silvicultural treatment located in Doutor Pedrinho – North of the SC State, inside the Cerro Azul Farm owned by the Valor Florestal Company. A circular plot with 400 square meters was selected for the study. All the trees were numbered, marked and the DBHs and 10% of the heights were measured. The TLS data was obtained on the field with the Leica Scanstation P40 equipment on five different sweep positions to assure that all the shafting were covered by LASER points. The parcel was also georeferenced and points were taken from its inside with the total station equipment. The ALS points cloud data was supplied by EMBRAPA FLORESTAS and was collected in a flight performed on Jan, 2014. The 4 chapters of this dissertation demonstrates the ALS and TLS technologies state of the art in the forestry field (chapter 1); different filters were tested for obtaining the DTM from the ALS data and compared with the total station data where the ATIN filter presented the best results (chapter 2); segmentation and delineation of the treetops from the ALS cloud and automatic identification of the tree trunks in the TLS cloud in which the lack of thinning and silvicultural treatment had a negative impact on the results (chapter 3); and on chapter 4, the comparison of the dendrometric variables obtained through the ALS and TLS technologies with the heights and volume modeling obtained on the field presented statistic differences through the Dunnett statistic test (α = 5%) when compared with the ALS data for total height and the TLS for DBH and volume Lastly it is given a general conclusion about the theme explored in the dissertation with recommendations for future work
Novas técnicas de mensuração de árvores têm sido desenvolvidas para melhorar a precisão e qualidade das medidas dendrométricas realizadas. Dentre eles destaca – se a tecnologia LIDAR, com a qual é possível a obtenção de dados tridimensionais de alta precisão. Com isso, o objetivo geral deste trabalho foi avaliar o emprego das tecnologias LIDAR ALS (Airborne Laser Scanner) e TLS (Terrestrial Laser Scanner) para a obtenção de variáveis dendrométricas em plantios comerciais de Pinus taeda. A área de estudo, um talhão de 16 anos de idade sem tratos silviculturais, localizada em Doutor Pedrinho – SC, norte do estado, na Fazenda Cerro Azul, pertencente a empresa Valor Florestal. Foi selecionada uma parcela circular, de área igual a 400 m² foi instalada para realização dos estudos. Todas as árvores foram numeradas, marcadas e mensurados os DAPs e 10% das alturas foram medidas. Os dados TLS foram obtidos em campo com o equipamento Leica Scanstation P40 em cinco diferentes posições de varredura para garantir que todos os fustes fossem recobertos por pontos LASER. A parcela também foi georreferenciada e tomados pontos com estação total no seu interior. A nuvem de pontos ALS foi fornecida pela EMBRAPA FLORESTAS em um voo realizado em janeiro de 2014. No decorrer dos 4 capítulos desta dissertação foi demonstrado o estado da arte das tecnologias ALS e TLS na área florestal (capítulo 1); testados diferentes filtros para obtenção do MDT a partir dos dados ALS, comparados com os dados de estação total, no qual o filtro ATIN demonstrou os melhores resultados (capítulo 2); segmentação e delineamento das copas a partir da nuvem ALS e identificação automática de troncos na nuvem TLS, no qual a falta de desbastes e tratos silviculturais influenciou negativamente nos resultados (capítulo 3); e no capítulo 4 a comparação entre as variáveis dendrométricas obtidas pelo ALS e TLS com as modelagens de altura e volume obtidas em campo, na qual foi constatada diferenças estatísticas com os dados ALS para altura total e com os dados TLS para DAP e Volume por meio do teste estatístico de Dunnett, α = 5%. Por fim é dada uma conclusão geral acerca do tema explorado na dissertação, com recomendações para os trabalhos futuros
APA, Harvard, Vancouver, ISO, and other styles
24

Du, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal methods in protocol security verification. The implication is that it may prove suitable for developing secure protocols in other electronic business domains. In depth investigations are conducted into a range of issues in relation to establishing generic security requirements for e-tendering systems. The outcomes are presented in a form of basic and advanced security requirements for e-tendering process. This analysis shows that advanced security services are required to secure e-tender negotiation integrity and the submission process. Two generic issues discovered in the course of this research, functional difference and functional limitations, are fundamental in constructing secure protocols for tender negotiation and submission processes. Functional difference identification derives advanced security requirements. Functional limitation assessment defines how the logic of generic security mechanisms should be constructed. These principles form a proactive analysis applied prior to the construction of security protocols. Security protocols have been successfully constructed using generic cryptographic security mechanisms. These protocols are secure e-tender negotiation integrity protocol suite, and secure e-tender submission protocols. Their security has been verified progressively during the design. Verification results show that protocols are secure against common threat scenarios. The primary contribution of this stage are the procedures developed for the complex e-business protocol analysis using formal methods. The research shows that proactive analysis has made this formal security verification possible and practical for complex protocols. These primary outcomes have raised awareness of security issues in e-tendering. The security solutions proposed in the protocol format are the first in e-tendering with verifiable security against common threat scenarios, and which are also practical for implementation. The procedures developed for securing the e-tendering process are generic and can be applied to other business domains. The study has made improvements in: establishing adequate security for a business process; applying proactive analysis prior to secure protocol construction; and verifying security of complex e-business protocols using tool aided formal methods.
APA, Harvard, Vancouver, ISO, and other styles
25

Du, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal methods in protocol security verification. The implication is that it may prove suitable for developing secure protocols in other electronic business domains. In depth investigations are conducted into a range of issues in relation to establishing generic security requirements for e-tendering systems. The outcomes are presented in a form of basic and advanced security requirements for e-tendering process. This analysis shows that advanced security services are required to secure e-tender negotiation integrity and the submission process. Two generic issues discovered in the course of this research, functional difference and functional limitations, are fundamental in constructing secure protocols for tender negotiation and submission processes. Functional difference identification derives advanced security requirements. Functional limitation assessment defines how the logic of generic security mechanisms should be constructed. These principles form a proactive analysis applied prior to the construction of security protocols. Security protocols have been successfully constructed using generic cryptographic security mechanisms. These protocols are secure e-tender negotiation integrity protocol suite, and secure e-tender submission protocols. Their security has been verified progressively during the design. Verification results show that protocols are secure against common threat scenarios. The primary contribution of this stage are the procedures developed for the complex e-business protocol analysis using formal methods. The research shows that proactive analysis has made this formal security verification possible and practical for complex protocols. These primary outcomes have raised awareness of security issues in e-tendering. The security solutions proposed in the protocol format are the first in e-tendering with verifiable security against common threat scenarios, and which are also practical for implementation. The procedures developed for securing the e-tendering process are generic and can be applied to other business domains. The study has made improvements in: establishing adequate security for a business process; applying proactive analysis prior to secure protocol construction; and verifying security of complex e-business protocols using tool aided formal methods.
APA, Harvard, Vancouver, ISO, and other styles
26

Aragón, Pablo. "Characterizing online participation in civic technologies." Doctoral thesis, Universitat Pompeu Fabra, 2019. http://hdl.handle.net/10803/668042.

Full text
Abstract:
This thesis constitutes one of the first investigations focused on characterizing online participation in civic technologies, a type of platform increasingly popular on the Internet that allows citizens new forms, on a larger scale, of political participation. Given the opportunities of civic technologies in democratic governance, it should be noted that their design, like that of any online platform, is not neutral. The ways in which information is presented or interaction between users is allowed can greatly alter the results of participation. For this reason, we analyze the impact of different interventions in civic technologies in relation to online conversation views, ordering criteria for ranking petitions, and deliberative interfaces. Since these interventions were carried out by the corresponding development teams, the analyses have required to develop novel computational and statistical methods, while also extending generative models of discussion threads to better characterise the dynamics of online conversations. Results of the different case studies highlight the social and political impact of these interventions, suggesting new directions for future research and the need to develop a paradigm of citizen experimentation for democracy.
Esta tesis constituye una de las primeras investigaciones en caracterizar la participación online en tecnologías cívicas, un tipo de plataforma cada vez más popular en Internet que permite a la ciudadanía nuevas formas, a una mayor escala, de participación política. Dadas las oportunidades de las tecnologías cívicas para la gobernanza democrática, cabe señalar que su diseño, al igual que el de cualquier plataforma online, no es neutral. La forma en que se presenta la información o se permite la interacción entre las usuarias puede alterar en gran medida los resultados de la participación. Por este motivo, analizamos el impacto de diferentes intervenciones en tecnologías cívicas en relación a las vistas de las conversaciones online, los criterios de ordenación en rankings de peticiones e interfaces deliberativas. Dado que estas intervenciones fueron llevadas a cabo por los propios equipos de desarrollo, los análisis han requerido desarrollar nuevos métodos computacionales y estadísticos, a la vez que se han ampliado modelos generativos de hilos de discusión para caracterizar mejor la dinámica de las conversaciones online. Los resultados de los diferentes estudios de caso destacan el impacto social y político de estas intervenciones, sugiriendo nuevas líneas de investigación en el futuro y la necesidad de desarrollar un paradigma de experimentación ciudadana para la democracia.
Aquesta tesi és una de les primeres investigacions que té per objecte la caracterització de la participació en línia en tecnologies cíviques, un tipus de plataforma cada vegada més popular a Internet que permet a la ciutadania noves formes, a major escala, de participació política. Donades les oportunitats de les tecnologies cíviques per a la governança democràtica, cal assenyalar que el seu disseny, com el de qualsevol plataforma en línia, no és neutral. La forma en què com es presenta la informació o es permet la interacció entre les usuàries pot alterar en gran mesura els resultats de la participació. Per aquest motiu, analitzem l'impacte de diferents intervencions en tecnologies cíviques en relació amb les vistes de conversa en línia, els criteris d'ordenació en rànquings de peticions i amb interfícies deliberatives. Atès que aquestes intervencions van ser dutes a terme pels propis equips de desenvolupament, les anàlisis han requerit desenvolupar nous mètodes computacionals i estadístics, alhora que s'han ampliat models generatius de fils de discussió per caracteritzar millor la dinàmica de les converses en línia. Els resultats dels diferents estudis de cas destaquen l'impacte social i polític d'aquestes intervencions, suggerint noves línies d'investigació en el futur i la necessitat de desenvolupar un paradigma d'experimentació ciutadana per a la democràcia.
Cette thèse constitue l'une des premières recherches sur la caractérisation de la participation en ligne à des technologies civiques, un type de plateforme de plus en plus populaire sur Internet qui permet aux citoyens de nouvelles formes, à plus grande échelle, de participation politique. Compte tenu des opportunités offertes par les technologies civiques dans la gouvernance démocratique, il convient de noter que leur design, comme celui de toute plateforme en ligne, n'est pas neutre. La façon dont l'information est présentée ou l'interaction entre les utilisateurs est permise peut grandement modifier les résultats de la participation. Pour cette raison, nous analysons l'impact de différentes interventions dans le domaine des technologies civiques par rapport à l’agencementaux des conversations en ligne, aux critères d'ordre de classement des pétitions et aux interfaces délibératives. Comme ces interventions ont été réalisées par les équipes de développement correspondantes, les analyses ont nécessité de développer nouvelles méthodes informatiques et statistiques, tout en élargissant les modèles génératifs de fils de discussion afin de mieux caractériser la dynamique des conversations en ligne. Les résultats des différentes études de cas mettent en évidence l'impact social et politique de ces interventions, suggérant de nouveaux axes de recherches futures et la nécessité de développer un paradigme d'expérimentation citoyenne pour la démocratie.
APA, Harvard, Vancouver, ISO, and other styles
27

Яровенко, Ганна Миколаївна, Анна Николаевна Яровенко, and Hanna Mykolaivna Yarovenko. "Інформаційна безпека як драйвер розвитку національної економіки." Thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/83664.

Full text
Abstract:
У дисертації уточнено змістовну сутність інформаційної безпеки та сформовано концептуальну модель її забезпечення в системі управління національної економіки; структуровано науковий доробок щодо напрямів дослідження інформаційної безпеки як драйверу розвитку національної економіки; сформовано склад показників для оцінювання її рівня шляхом канонічного аналізу взаємного впливу індикаторів її розвитку та інформатизації; розроблено методологію інтегрального оцінювання рівня інформаційної безпеки національної економіки та аналізу її ефективності; досліджено залежність національних патернів забезпечення інформаційної безпеки населення від рівня економічного розвитку країни та суспільних традицій; обгрунтовано вплив рівня кібербезпеки країни на її привабливість для легалізації кримінальних доходів; визначено часові характеристики впливу "інформаційних бульбашок" на функціонування глобального цифрового економічного простору; удосконалено методологічні засади обгрунтування таргетів та напрямків реформування системи забезпечення інформаційної безпеки в Україні; поглиблено методологію обгрунтування пріоритетів формування державних секторальних та галузевих програм у напрямку її забезпечення; розроблено методологію визначення ролі цифрової спроможності та кібербезпеки країни у забезпеченні збалансованості розвитку національної економіки; поглиблено методичні засади експрес-оцінювання ризиків втрати інформації; на засадах системно-динамічного імітаційного моделювання поглиблено підхід до вибору найбільш ефективної системи захисту інформації; запропоновано трьохрівневу систему попередження фінансових кіберзагроз.
The development of the latest information technologies and the digitalization of the national economy are accompanied by an increase in cybercrime and losses from information leaks. Thus, the creation of a reliable information security system at all levels of management of the national economy is required to prevent various kinds of cyber threats and stimulate its development. This research was aimed at solving such issues as substantiating the essence and role of information security in the national economy, developing an assessment methodology and determining its place in ensuring the national economic development, establishing cause-and-effect relationships in studying the impact of information security on the balance of the national economy, developing applied methodological tools for increasing the information security. The suggested concept of “information security”, taking into account its multi-component and dynamism, made it possible to form the concept of its provision in the national economy management system, which formalizes threats as prerequisites for violating the integrity, confidentiality, and availability of information security objects, defines the agents, means, and mechanisms of control. The bibliometric analysis of scientific papers allows determining the relevance of information security issues and defining the dominant vectors of its research in the context of economic areas. The use of canonical analysis for a group of indicators of the digital capacity of the national economy and cybersecurity and seven groups of indicators characterizing the economic, social and financial development of the national economy, foreign economic activity, innovative activity, the quality of information infrastructure and the institutional capacity of the state revealed that the digital national economic and cybersecurity capabilities and institutional capacity have the most significant mutual influence. These results contributed to the development of an integral index of information security of the national economy using the method of advantages and the Harrington-Mencher function and to create a rating of the countries according to them. It turned out that Ukraine has a satisfactory level of information security of the national economy. The clustering of countries through constructing self-organizing maps was carried out, and the analysis of the comparative effectiveness of the components of the information security system of the national economy using the DEA analysis revealed the structural inefficiency of the sub-indices of the integral index of the information security of the national economy to ensure its maximum level. For Ukraine, the value of its effectiveness is 63.7%, which is a consequence of the inefficiency of institutional capacity indicators. Their improvement from 8.91% to 88.57% will ensure the maximum increase in the efficiency of information security of the national economy by 57.04%. The cluster analysis confirmed an influence of measures of public authorities on the consequences of cyber incidents and dependencies between the level of well-being, national social traditions, mental and cultural characteristics of the country, and personal security measures that are preferred by the population of European countries. Gravity modeling was used to prove that the level of their information security affects the level of attractiveness of countries for money laundering. The results provided a list of countries for which Ukraine is the most attractive in terms of money laundering. This step will improve regulatory policy and promote the convergence of cybersecurity and state financial monitoring systems. The results of modeling information activities using the Sedva-Taylor model have proven the existence of destabilizing effects of the information environment on the national economy, which will allow timely identification of signs of collapse in its various sectors. Multiple attribute decision making was used to found that the most critical targets of information security for Ukraine are the system of analysis and information about cyber threats, cyber crisis management, Ukraine’s activities regarding its contribution to global cybersecurity, and the organization of military cyber operations. The justification of the priorities for the formation of state sectoral and industrial programs towards ensuring the information security of the national economy made it possible to identify enterprises that are most vulnerable to the consequences of cyber threats and to establish an economically feasible limit range of costs for information security. The methodology for constructing a four-pole barycentric model allows determining the level of balance between economic, political, social development and the development of digital capabilities and cybersecurity of countries. Ukraine was found to be an outsider among unbalanced countries, for which the most promising factor is a composite indicator of digital capability and cybersecurity. To ensure the development of applied methodological tools for increasing information security, methods are proposed for express assessment of the risks of information and data loss, which can be used to determine the probable catalysts of incidents, taking into account the frequency of their recurrence and the monetary assessment of damage from loss of information, regardless of the information security subjects. The developed method of system dynamics modeling allows substantiating the processes of rebuilding security systems, and its testing for blockchain technology showed its efficiency. The proposed methodology for creating an applied three-tier system for preventing financial and cyber threats allows identifying “bottlenecks” in the protection system that cause uncontrolled information leakage or cybercriminals’ interference; identify the agents of operations according to various criteria corresponding to the elements of cybercrimes; identify operations based on cybercrime elements. The methods tested on financial sector data have helped prevent financial and cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
28

Huang, Tse-Hsin, and 黃則馨. "The Development of Digital Footprint and the threats to privacy." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/97361523630110422287.

Full text
Abstract:
碩士
國立臺灣大學
國家發展研究所
101
Technological development has significantly improved the flow and the use of information, bringing our present lives more conveniences and systems to manage operational efficiency. However, information technology has also brought negative effects for individuals. It has spurred the public and private sectors ability to deeply track our daily activities, possibly revealing the most intimate of details. With electronic monitoring, frequent tracking and information systems becoming more massive in scale, privacy is threatened. This article will be divided into six chapters. The first chapter is the introduction. The second chapter is the development of the concept of privacy. The 2nd chapter discusses the historical development of privacy rights in United States and Taiwan. The value of privacy must be understood through social and cultural context. The second chapter will examine public authorities that are using technology in criminal investigations and its use in trials, detailing possible privacy threat implications. A discussion will examine the public authority’s electronic monitoring and tracking of people and its related privacy issues. When the majority of domestic literature only addresses the U.S. Department of Homeland Security’s establishment of several large-scale information systems, this paper will address the local case that has originated in the past two years concerning Taiwan’s New Taipei City "Defense Science and Technology City" program and its content. While integrating information systems and constructing policing technology and management systems, we will scrutinize how there is a lack of consideration in the corresponding planning for privacy. The third chapter will cover surveillance in the workplace and its threat to privacy. The employers justify their electronic monitoring and tracking with "Electronic Performance Monitoring", "Enterprise Confidential", "Employees’ Consent" reasoning. This reasoning has been resulting in a dilemma for privacy. The fifth chapter investigates consumer privacy protection in a network information society. Industry provides free services, and in exchange, the user provides relevant personal information on friendships, interests and activities. The industry, then using this information, attracts advertisers, application developers and other commercial entities that see opportunities. Access to large-scale personal information has been so simple in recent years. This chapter, examines how data mining is now commonly used "marketing approach" and discuses the collection, processing, and its using of the three stages respectively for what privacy issues may encounter. Last, chapter six will conlcude.
APA, Harvard, Vancouver, ISO, and other styles
29

TSAI, WEI-PIN, and 蔡維平. "The Opportunities and Threats in Facing Digital Era for Taiwan Biomedical Industry." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3yg7y2.

Full text
Abstract:
碩士
逢甲大學
經營管理碩士在職學位學程
106
Since 1980, the government has actively invested in the development of the biotechnology industry. After more than 30 years of development, the current performance is not only lagging behind the advanced countries in the world, but also at a relative disadvantage in facing major Asian competitors. In today’s digital era, many industries’ development models and competition rules have been substantially revised. When thinking about the future of industrial development, the impact of digital technology will be either dominant or disadvantageous. This study aims to explore the current state of development of the biotechnology and medical industry in various countries, and then analyzes the changes in science and technology and the evolution of medical theory in the digital era. The study found the following four points: 1. Taiwan's development in the traditional biotechnology and medical industries (new drugs, vaccines) is currently lagging behind; 2. The medical industry in the digital age has caused tremendous changes in the industrial structure due to the introduction of a large number of digital technologies. 3. Medical theory changes due to the development of quantum mechanics, many attempts have been made to think medically from the perspective of physics. The preliminary results are surprising; 4. Taiwan’s existing industry advantage in the international arena is the information and communication technology industry, among which the leader is the semiconductor industry. Based on the above observations, this study concludes with a possible development strategy for the biotech medical industry as a reference.
APA, Harvard, Vancouver, ISO, and other styles
30

Liou, Geng Shiu, and 劉耿旭. "A Study on Constructing the Integrated Digital Evidence Forensics SOP for Cloud Threats to Mitigate Organization Risks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/95191221740593967759.

Full text
Abstract:
碩士
國防大學管理學院
資訊管理學系
101
It is Extremely rapid development of cloud computing applications . Each cloud service providers have been developed numbers of applications and services in recent years. However, cloud computing is a new generation of technology transfer developed from internet. It is not only having the characteristics of the network but also inherited its weaknesses. Especially virtualization, regulations, data privacy, and other issues further make digital forensics work difficult. The purpose of this study was to correspond the four-oriented from digital evidence forensics standard operate procedure (DEFSOP) which published by domestic scholars Professor Lin Yi long for 24 security risks proposed by the European Network and Information Security Agency(ENISA), and comprehensive various cloud threat corresponding tools, strategies to discussion of the risk assessment of the security of cloud service. Furthermore, based on the above theoretical to propose Integrative Digital Evidence Forensics Standard Operate Procedure for Cloud Threats (I-DEFSOP) to solve the problems faced by the cloud forensics. Finally, verifying the I-DEFSOP’s integrity, reliability and validity by the Delphi expert survey.
APA, Harvard, Vancouver, ISO, and other styles
31

(9826157), Amantha Perera. "The impact of online trauma threats faced by journalists: The case of COVID-19-imposed remote-working regimes." Thesis, 2022. https://figshare.com/articles/thesis/The_impact_of_online_trauma_threats_faced_by_journalists_The_case_of_COVID-19-imposed_remote-working_regimes/21555312.

Full text
Abstract:
Abstract The global reach of the COVID-19 pandemic, with its sustained infection and fatality rates from the first quarter of 2020, has deeply affected the majority of journalists across the world, who now find themselves working on stories of trauma linked to the pandemic from remote locations and under restrictive working conditions. These COVID-19-enforced working conditions have exponentially increased the exposure levels of online trauma threats faced by journalists. This research examines the confluence of online trauma threats and their manifestations and impacts, along with mitigative measures some journalists took to ease the impact of this confluence. The research is guided by the central question: ‘How are journalists experiencing and responding to online trauma threats they face in the line of work during and ‘post’ COVID-19 lockdowns?’ The research utilises three distinct yet interrelated methods: an online survey; in-depth, semi-structured interviews; and narrative case studies in the form of feature-length journalism. Thematic analysis of the survey and interviews provides a framework for the works of journalism, which are situated in broader contexts of the journalism profession and online trauma reporting. Responding to the increase in online trauma threat activity exacerbated by the COVID-19 pandemic, the research points towards potential transformations within the profession that might assist journalists to continue undertaking their important role in and for society.
APA, Harvard, Vancouver, ISO, and other styles
32

Sigholm, Johan. "Secure Tactical Communications for Inter-Organizational Collaboration : The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the Digital Battlefield." Doctoral thesis, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6326.

Full text
Abstract:
The development within the area of information and communications technology (ICT) has been rapid during the last couple of decades. Advancements in mobile technology, such as smartphones and other portable devices with embedded sensors, rapid expansion of communications infrastructure, and increased spectrum utilization, has had a major impact on civilian society, but increasingly also on professional organizations such as the Swedish Armed Forces. While this technology allows for enhanced capabilities in the areas of command and control, situational awareness, and information management, it also leads to new challenges in such areas as cyber security and privacy. For armed forces in many parts of the world, being able to deploy in new types of missions, such as humanitarian assistance and response operations due to natural or man-made disasters, is an increasingly sought-after capability. Such operations commonly require collaboration amongst several heterogeneous organizations, which in turn requires technical as well as organizational interoperability. While the actors must be able to share certain information efficiently, with regards to integrity and availability, sensitive or classified information must be safeguarded in terms of confidentiality. This thesis is concerned with studying emerging ICT for use on the battlefield of tomorrow, investigating how it can lead to more effective operations, and what preconditions that must be met in order for the technology to be of utility for inter-organizational collaboration. In particular, the thesis studies how an acceptable level of information security can be upheld in interconnected tactical communications networks. It is found that Mobile Ad-hoc Networks, Software-Defined Radio and Cognitive Radio are emerging technologies that, while still immature, can contribute to improved capabilities for communications, command and control, and information collection. Furthermore, Hastily Formed Networks is found to be an effective framework for collaboration between heterogeneous actors. However, in order for emerging ICTs to provide military utility, several non-technical requirements must be met. These include usability, trust, legality, cost, and verifying that the technology is in accordance with current military doctrine. Antagonistic as well as unintentional threats must also be mitigated, including information leaks caused by cyberattacks or insiders, and possible consequences of reduced user privacy. Besides to the Swedish Armed Forces, this thesis should be of interest to armed forces of comparable countries, and for professional organizations faced with similar challenges. Among the drawn conclusions, the thesis recommends continuously evaluating emerging ICT in support of new capabilities, through academic research as well as internal concept development. Adopting an incremental and modular process is also recommended when developing or procuring new ICT systems, instead of making long-term investments in proprietary technology. Furthermore, a focus should be put on promoting military requirements in future civilian ICT standards. In this way development costs can be reduced, while facilitating tactical use of commercial off-the-shelf products. Regarding information security in tactical networks for inter-organizational collaboration the thesis concludes that employing best-effort methods could allow for efficient information exchange between actors, while upholding acceptable risk levels regarding data leakage.
Informations- och kommunikationsteknik (IKT) har under de senaste årtiondena varit under stark utveckling. Ökad tillgänglighet av mobil teknik, såsom smarta mobiltelefoner och andra bärbara enheter med inbyggda sensorer, kraftig utbyggnad av kommunikationsinfrastruktur samt framsteg inom spektrumeffektivitet, har haft en stor betydelse för civilsamhället samt i ökande grad även för insatsorganisationer såsom Försvarsmakten. Tekniken bidrar till ökad förmåga till ledning, situationsuppfattning och informationshantering, men medför samtidigt flera utmaningar inom områden som cybersäkerhet och personlig integritet. Nya uppgifter som parallellt kommit i fokus för försvarsmakter i många länder inkluderar förmågan att kunna delta i stödjande insatser i samband med naturkatastrofer, terrorattacker, eller att kunna erbjuda humanitärt bistånd i internationella miljöer. Sådana insatser kräver vanligtvis samverkan mellan många olika heterogena organisationer, vilket medför ett behov av såväl teknisk som organisatorisk interoperabilitet. Viss information måste kunna delas effektivt mellan de ingående aktörerna med avseende på riktighet och tillgänglighet, samtidigt som känsliga uppgifter måste skyddas avseende sekretess. I denna avhandling studeras taktiskt användande av framväxande IKT på morgondagens slagfält, hur tekniken kan bidra till mer effektiva operationer, samt vilka förutsättningar och krav som måste uppfyllas för att tekniken ska kunna vara till nytta vid interorganisatorisk samverkan. Särskilt undersöks möjligheten att upprätthålla en acceptabel nivå av informationssäkerhet i gemensamma taktiska sambandssystem, samtidigt som dessa kan användas effektivt under påfrestande förhållanden. Avhandlingen finner att tekniker som mobila ad hoc-nätverk, mjukvarudefinierad radio och kognitiv radio, trots att de ännu är omogna, kan komma att bidra till förbättrade eller helt nya förmågor inom bland annat samband, ledning och informationsinhämtning. Vidare dras slutsatsen att ramverket Hastily Formed Networks är effektivt för samverkan mellan heterogena aktörer. För att framväxande IKT ska kunna vara av militär nytta krävs dock att flera icke-tekniska krav kan mötas. Dessa inkluderar användbarhet, tillit, legalitet, kostnad, samt att tekniken ligger i linje med rådande militär doktrin. Såväl antagonistiska som oavsiktliga hot måste samtidigt hanteras, såsom informationsläckor orsakade av cyberattacker eller insiders, samt konsekvensen av en minskad personlig integritet för användarna. Avhandlingen förväntas vara av intresse för såväl Försvarsmakten som organisationer med liknande förutsättningar i Sverige och jämförbara länder. Som slutsats rekommenderas i avhandlingen att framväxande IKT till stöd för nya förmågor kontinuerligt utvärderas genom såväl akademisk forskning som intern konceptutveckling, samt att en inkrementell och modulär modell bör väljas vid utveckling och anskaffning, snarare än att göra omfattande investeringar i proprietär teknik. Fokus bör även vara på att tidigt få med militära krav i civila IKT-standarder. På så vis kan utvecklingskostnader reduceras, samtidigt som militär användning av kommersiellt tillgängliga produkter förenklas. En slutsats gällande informationssäkerhet är att man med metoder som baseras på så kallad ”best-effort” kan effektivisera utbytet i ett gemensamt informationssystem, samtidigt som risken för dataläckage kan behållas på en acceptabel nivå.
APA, Harvard, Vancouver, ISO, and other styles
33

Bopape, Rudy Katlego. "Towards a unified fraud management and digital forensic framework for mobile applications." Diss., 2015. http://hdl.handle.net/10500/21202.

Full text
Abstract:
Historically, progress in technology development has continually created new opportunities for criminal activities which, in turn, have triggered the need for the development of new security-sensitive systems. Organisations are now adopting mobile technologies for numerous applications to capitalise on the mobile revolution. They are now able to increase their operational efficiency as well as responsiveness and competitiveness and, most importantly, can now meet new, growing customers’ demands. However, although mobile technologies and applications present many new opportunities, they also present challenges. Threats to mobile phone applications are always on the rise and, therefore, compel organisations to invest money and time, among other technical controls, in an attempt to protect them from incurring losses. The computerisation of core activities (such as mobile banking in the banking industry, for example) has effectively exposed organisations to a host of complex fraud challenges that they have to deal with in addition to their core business of providing services to their end consumers. Fraudsters are able to use mobile devices to remotely access enterprise applications and subsequently perform fraudulent transactions. When this occurs, it is important to effectively investigate and manage the cause and findings, as well as to prevent any future similar attacks. Unfortunately, clients and consumers of these organisations are often ignorant of the risks to their assets and the consequences of the compromises that might occur. Organisations are therefore obliged, at least, to put in place measures that will not only minimise fraud but also be capable of detecting and preventing further similar incidents. The goal of this research was to develop a unified fraud management and digital forensic framework to improve the security of Information Technology (IT) processes and operations in organisations that make available mobile phone applications to their clients for business purposes. The research was motivated not only by the increasing reliance of organisations on mobile applications to service their customers but also by the fact that digital forensics and fraud management are often considered to be separate entities at an organisational level. This study proposes a unified approach to fraud management and digital forensic analysis to simultaneously manage and investigate fraud that occurs through the use of mobile phone applications. The unified Fraud Management and Digital Forensic (FMDF) framework is designed to (a) determine the suspicious degree of fraudulent transactions and (b) at the same time, to feed into a process that facilitates the investigation of incidents. A survey was conducted with subject matter experts in the banking environment. Data was generated through a participatory self-administered online questionnaire. Collected data was then presented, analysed and interpreted quantitatively and qualitatively. The study found that there was a general understanding of the common fraud management methodologies and approaches throughout the banking industry and the use thereof. However, while many of the respondents indicated that fraud detection was an integral part of their processes, they take a rather reactive approach when it comes to fraud management and digital forensics. Part of the reason for the reactive approach is that many investigations are conducted in silos, with no central knowledge repository where previous cases can be retrieved for comparative purposes. Therefore, confidentiality, integrity and availability of data are critical for continued business operations. To mitigate the pending risks, the study proposed a new way of thinking that combines both components of fraud management and digital forensics for an optimised approach to managing security in mobile applications. The research concluded that the unified FMDF approach was considered to be helpful and valuable to professionals who participated in the survey. Although the case study focused on the banking industry, the study appears to be instrumental in informing other types of organisations that make available the use of mobile applications for their clients in fraud risk awareness and risk management in general.
Computing
M. Sc. (Computing)
APA, Harvard, Vancouver, ISO, and other styles
34

Greco, Angelica. "Digital transformation and disruption: threat or opportunity for the traditional insurance incumbents?" Master's thesis, 2018. http://hdl.handle.net/10362/39067.

Full text
Abstract:
Digital technology often destroys value. What happens is, for some companies to become market winners and for others, digital technology turns to be the reason of their failure. There is one clear winner coming out from this battle: consumers. Traditional insurance business model seemed resilient from digital technology. However, this resilience is not lasting forever. Actually, it is now starting to collapse. Digital is transforming the way products and services are served to the customers and also the underlying business models. Big data and analytics, Internet of Things (IoT), Automated Driver Assistance Systems (ADAS) are just some of the forces analyzed in this research that are disrupting the traditional insurance market and that are slowly shaping a new competition landscape with the emergence of Ecosystems. This new market situation can turn to be a great opportunity for some insurance company, but as it will be explained in this thesis, the success will not be evenly shared. What will make the difference is the speed and decisive motivation at which incumbents will embrace and actuate the change.
APA, Harvard, Vancouver, ISO, and other styles
35

Udoeyop, Akaninyene Walter. "Cyber Profiling for Insider Threat Detection." 2010. http://trace.tennessee.edu/utk_gradthes/756.

Full text
Abstract:
Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles based on behavioral data. We then compare user behavior against the normal profiles to identify abnormal patterns of behavior.
APA, Harvard, Vancouver, ISO, and other styles
36

Krause, André. "The crime threat analysis process, an assessment." Diss., 2007. http://hdl.handle.net/10500/1727.

Full text
Abstract:
The study investigated the application of the crime threat analysis process at station level within the Nelson Mandela Metro City area with the objective of determining inhibiting factors (constraints) and best practices. Qualitative research methodology was applied and interviews were conducted with crime analysts and specialised investigators/intelligence analysts. The research design can be best described as descriptive and explorative in nature. The crime threat analysis process embroils the application of various crime analysis techniques and the outcomes thereof intends to have a dual purpose of generating operational crime management information in assisting crime prevention initiatives and crime detection efforts, mainly focussing on the criminal activities of group offenders (organised crime related), repeat offenders and serial offenders. During the study it became evident that crime analysts understand and thus apply the crime threat analysis process indifferently, which impeded on the relevancy and the utilisation thereof as an effective crime management tool.
Criminology
M.Tech. (Policing)
APA, Harvard, Vancouver, ISO, and other styles
37

"Analysis of the brazilian phonographic industry's future facing the threat of piracy and digital music." Tese, MAXWELL, 2003. http://www.maxwell.lambda.ele.puc-rio.br/cgi-bin/db2www/PRG_0991.D2W/SHOW?Cont=4820:pt&Mat=&Sys=&Nr=&Fun=&CdLinPrg=pt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hernandez, Alexandra Belle. "Educating health care professionals in the threat of biological attacks : a digital guide to smallpox." 2004. http://edissertations.library.swmed.edu/pdf/HernandezA081904/HernandezAlexandra.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Romano, Laura Palange. "Golden thread: exploring the resistance to digital literacies and digital literacy by second-generation back-to-the-landers." 2014. http://cardinalscholar.bsu.edu/handle/123456789/198443.

Full text
Abstract:
This project looks at the resistance to digital technologies and digital literacy practices by families that deliberately choose to live without the technologies that many would consider essential to daily life. I examine this resistance, and study the ways that uses of digital technologies and digital composing processes are intertwined with identity. In order to explore this topic, I conducted oral history interviews and used ethnographic observation to study twelve participants; members of seven different families, all from the state of Maine. My participants, all of whom self-identify as people who consciously do not use or limit their use of digital technologies, engaged with digital technologies to varying degrees, from members of a family who live “off the grid,” choosing to not use electricity, telephones, televisions, or the Internet, to a family that uses computers, the Internet and cell phones in the home, but limits the children’s use of these technologies. All of the participant families engage regularly in non-digital literacy practices, whether they be the playing of music, the sharing of recipes, or the contribution to or publication of a community newsletter. For all of the research participants in this study, an identity formed by the rejection of digital or electronic technologies is important. Each participant represents him or herself as one who rejects or avoids digital technologies, even though my research reveals that digital technologies are, indeed, used in some way by most participants. This is a study that is timely, as we are currently in an unprecedented age of digital technology use, and many people wonder about the effects of such immersion. Additionally, many families are trying to negotiate the extent to which the use of digital technologies is beneficial to their children, and the data gathered during this study speaks to this.
APA, Harvard, Vancouver, ISO, and other styles
40

"Blurring Safety Between Online and Offline Worlds: Archival, Correlational, and Experimental Evidence of Generalized Threat in the Digital Age." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.44025.

Full text
Abstract:
abstract: Decades of research in cyberpsychology and human-computer interaction has pointed to a strong distinction between the online and offline worlds, suggesting that attitudes and behaviors in one domain do not necessarily generalize to the other. However, as humans spend increasing amounts of time in the digital world, psychological understandings of safety may begin to influence human perceptions of threat while online. This dissertation therefore examines whether perceived threat generalizes between domains across archival, correlational, and experimental research methods. Four studies offer insight into the relationship between objective indicators of physical and online safety on the levels of nation and state; the relationship between perceptions of these forms of safety on the individual level; and whether experimental manipulations of one form of threat influence perceptions of threat in the opposite domain. In addition, this work explores the impact of threat perception-related personal and situational factors, as well as the impact of threat type (i.e., self-protection, resource), on this hypothesized relationship. Collectively, these studies evince a positive relationship between physical and online safety in macro-level actuality and individual-level perception. Among individuals, objective indicators of community safety—as measured by zip code crime data—were a positive reflection of perceptions of physical safety; these perceptions, in turn, mapped onto perceived online safety. The generalization between perceived physical threat and online threat was stronger after being exposed to self-protection threat manipulations, possibly underscoring the more dire nature of threats to bodily safety than those to valuable resources. Most notably, experimental findings suggest that it is not the physical that informs the digital, but rather the opposite: Online threats blur more readily into physical domains, possibly speaking to the concern that dangers specific to the digital world will bleed into the physical one. This generalization of threat may function as a strategy to prepare oneself for future dangers wherever they might appear; and indeed, perceived threat in either world positively influenced desires to act on recommended safety practices. Taken together, this research suggests that in the realm of threat perception, the boundaries between physical and digital are less rigid than may have been previously believed.
Dissertation/Thesis
Doctoral Dissertation Psychology 2017
APA, Harvard, Vancouver, ISO, and other styles
41

Chuma, Kabelo Given. "Security of electronic personal health information in a public hospital in South Africa." Diss., 2020. http://hdl.handle.net/10500/27239.

Full text
Abstract:
The adoption of digital health technologies has dramatically changed the healthcare sector landscape and thus generates new opportunities to collect, capture, store, access and retrieve electronic personal health information (ePHI). With the introduction of digital health technologies and the digitisation of health data, an increasing number of hospitals and peripheral health facilities across the globe are transitioning from a paper-based environment to an electronic or paper-light environment. However, the growing use of digital health technologies within healthcare facilities has caused ePHI to be exposed to a variety of threats such as cyber security threats, human-related threats, technological threats and environmental threats. These threats have the potential to cause harm to hospital systems and severely compromise the integrity and confidentiality of ePHI. Because of the growing number of security threats, many hospitals, both private and public, are struggling to secure ePHI due to a lack of robust data security plans, systems and security control measures. The purpose of this study was to explore the security of electronic personal health information in a public hospital in South Africa. The study was underpinned by the interpretivism paradigm with qualitative data collected through semi-structured interviews with purposively selected IT technicians, network controllers’, administrative clerks and records management clerks, and triangulated with document and system analysis. Audio-recorded interviews were transcribed verbatim. Data was coded and analysed using ATLAS.ti, version 8 software, to generate themes and codes within the data, from which findings were derived. The key results revealed that the public hospital is witnessing a deluge of sophisticated cyber threats such as worm viruses, Trojan horses and shortcut viruses. This is compounded by technological threats such as power and system failure, network connection failure, obsolete computers and operating systems, and outdated hospital systems. However, defensive security measures such as data encryption, windows firewall, antivirus software and security audit log system exist in the public hospital for securing and protecting ePHI against threats and breaches. The study recommended the need to implement Intrusion Protection System (IPS), and constantly update the Windows firewall and antivirus program to protect hospital computers and networks against newly released viruses and other malicious codes. In addition to the use of password and username to control access to ePHI in the public hospital, the study recommends that the hospital should put in place authentication mechanisms such as biometric system and Radio Frequency Identification (RFID) system restrict access to ePHI, as well as to upgrade hospital computers and the Patient Administration and Billing (PAAB) System. In the absence of security policy, there is a need for the hospital to put in place a clear written security policy aimed at protecting ePHI. The study concluded that healthcare organisations should upgrade the security of their information systems to protect ePHI stored in databases against unauthorised access, malicious codes and other cyber-attacks.
Information Science
M. Inf. (Information Security)
APA, Harvard, Vancouver, ISO, and other styles
42

Kortekaas, Birgit Friederike. "Internet-based electronic payment systems." Diss., 2002. http://hdl.handle.net/10500/858.

Full text
Abstract:
As today, the traditional payment systems of cash, cheques and credit cards are being supplemented by electronic cheques, electronic credit card-based systems, and token-based systems, online security is of utmost importance and one of the biggest criteria used for evaluating electronic payment systems. Electronic payment systems must guarantee the essential security requirements: confidentiality, privacy, integrity, availability. authentication, non-repudiation as well as anonymity and trust. This paper compares the various payment systems (both traditional and electronic) available today mainly according to their security aspects. Secure processing can be accomplished including access controls and detection techniques, such as, encrypted communication channels, user and/or message authentication, symmetric and asymmetric encryption, digital certificates and firewalls. These effective security measures, which are outlined in detail in this paper, will protect the information and payment systems against security risks that currently threaten the Internet
Computing
M.Sc. (Information Systems)
APA, Harvard, Vancouver, ISO, and other styles
43

(9164600), Jared M. Wright. "Digital Contention: Collective Action Dynamics in Social Movements for Internet Freedom." Thesis, 2020.

Find full text
Abstract:

How does collective action operate in digital space, particularly for those social movements at the cutting edge of technologically innovative contentious politics? This dissertation analyzes activist (and hacktivist) groups engaged in what I call digital contention with state and corporate institutions over the future of Internet policy and governance, or what they see as “the freedom of the Internet.” Based on case studies of the Digital Rights movement and the Anonymous hacktivist collective, I use a combination of computational and qualitative analyses of online texts, along with participant-observation at meetings and protest events, to explore how certain collective action dynamics are changing in digital space. Specifically, these include how movements internally perceive political opportunities and threats, as well as how they construct frames to communicate to external audiences. I find that: 1) Political opportunity is less important than threat for activists in digital contention, which is likely due to the lower costs of collective action; and 2) The digital divide and technological knowledge gap create a barrier to frame resonance which digital activists address either through “strategic inclusiveness” or “communities of anonymity,” both of which encourage diversity among participants while also reifying other inequalities in different ways. These findings have significance for the study of social movements, communication and technology studies, and Internet policy. I argue that they portend changing dynamics that may ultimately affect all forms of collective action, and indeed the balance of power in whole societies, in the future as digital technology continues to spread into every facet of our lives.

APA, Harvard, Vancouver, ISO, and other styles
44

Stein, Jan-Philipp. "Exploring the Uncanny Valley of Mind." 2018. https://monarch.qucosa.de/id/qucosa%3A33768.

Full text
Abstract:
Inspired by the enormous technological advancements of previous decades, this doctoral thesis revolves around users’ perception of emotion-sensitive artificial intelligence (AI), with particular focus on the role of human likeness attributions. For the development of my hypotheses, I acknowledge both cognitive scientific as well as philosophical and cultural psychological literature. Eventually, my interdisciplinary review culminates in one central assumption: Since many people regard the recognition of mental and emotional states in other entities as a core component of their human uniqueness, affective technology with similar capabilities runs the risk of being seen as uncanny or aversive—turning into a discomforting ‘challenger’ of an inherently human domain. Indeed, a first empirical study (N = 92) provides evidence for the validity of my hypothesis. My findings show that empathically acting characters in a virtual environment are met with much stronger aversion if participants suspect them to be controlled by highly complex AI (autonomous agents) instead of other humans (avatars). Acknowledging statements from my participants which repeatedly hint towards the importance of threat perceptions, I turn this concept into the main subject of a second study. Based on additional literature research, I develop a “Model of Autonomous Technology Threat”, which combines two potential determinants of technology aversion: Whereas the model’s distal facet summarizes overarching attitudes about human uniqueness, I also postulate a strong influence of immediate (proximal) perceptions, including the experience of situational control or users’ concern about their immediate physical well-being. Using yet another virtual reality (VR) setting, I ask participants (N = 125) to interact with an allegedly autonomous—in fact remotely controlled—digital agent under different conditions, which allow for a statistical comparison of my proposed model. Although the yielded results do lend some support to the validity of the distal path, it is mostly the proposed proximal factor that connects to participants’ threat experience, which in turn emerges as a negative predictor of technology acceptance. Lastly, a third study is designed to investigate whether perceptions of human likeness possess any relevance in the context of disembodied emotion-sensitive AI. Moreover, I now focus on potential cross-cultural differences, inviting participants from different cultural backgrounds (N = 89) to familiarize themselves with automatic emotion recognition software. Whereas Chinese participants, whose cultural socialization encompasses a much broader understanding of ‘animacy’, only show brief arousal after feedback from the affective software, I observe a significantly longer increase in physiological activity among German participants. At the same time, the obtained subjective measures paint a surprising picture: The more participants attribute human likeness to the emotion-sensitive machine—an abstract mechanical box in this scenario—the higher they actually rate the technology’s attractiveness. By summarizing the three conducted studies, I reach the conclusion that only AI stimuli involving elaborate embodiments activated both paths of the developed threat model, which might be a requirement for a distinctly aversive reaction. The presentation of the abstract software in Study 3, on the other hand, did not influence participants’ immediate control perceptions—a possible explanation as to why attributions of human likeness turned out as a positive predictor for the subjective evaluations in this experiment.
Inspiriert von den enormen technologischen Fortschritten der letzten Jahrzehnte beschäftigt sich die vorliegende Dissertation mit der Wahrnehmung emotionssensitiver künstlicher Intelligenz (KI) und nimmt dabei vor allem die Bedeutung von erlebter Menschenhaftigkeit in den Fokus. Bei der Entwicklung meiner Hypothesen finden Befunde von kognitionswissenschaftlichen Studien ebenso Beachtung wie philosophische und kulturpsychologische Literatur. Tatsächlich gipfelt die interdisziplinäre Recherche in einer deutlichen Vermutung: Da das Erkennen von Geistes- und Gefühlszuständen in anderen Lebewesen von vielen Personen als Kernkomponente ihrer menschlichen Einzigartigkeit betrachtet wird, laufen affektive Technologien mit ähnlichen Fähigkeiten Gefahr, unheimlich oder abstoßend zu wirken – sie werden zu unliebsamen ‚Eroberern‘ einer urmenschlichen Domäne. In einer ersten empirischen Studie (N = 92) finde ich Hinweise auf die Gültigkeit der getroffenen Annahme. Es zeigt sich, dass empathisch agierende Figuren in einer virtuellen Umgebung deutlich stärkere Ablehnung hervorrufen, wenn Probanden dahinter keine Menschen (Avatare), sondern ein hochkomplexes KI-System (autonome Agenten) vermuten. Nachdem persönliche Beobachtungen und Aussagen der Versuchspersonen wiederholt auf die Rolle von Bedrohungswahrnehmnungen hindeuten, stelle ich diese Variable ins Zentrum einer zweiten Untersuchung. Mithilfe vertiefender Literaturrecherche entwickle ich ein „Model of Autonomous Technology Threat“ („Modell der Bedrohung durch autonome Technologie“), welches zwei potentielle Determinanten von Technologieaversion kombiniert: Während die distale Facette übergeordnete Einstellungen zu menschlicher Einzigartigkeit bündelt, wird zudem ein starker Einfluss von unmittelbaren (proximalen) Wahrnehmungen postuliert, etwa dem erlebten Ausmaß an situativer Kontrolle oder der Sorge um die eigene physische Unversehrtheit. Ein neues Virtual-Reality-Experiment, in dem Probanden (N = 125) mit einem angeblich autonomen – tatsächlich jedoch ferngesteuerten – Agenten interagieren, dient dazu, das Modell statistisch zu überprüfen. Obgleich sich durchaus Hinweise zur Bedeutsamkeit des distalen Pfades abzeichnen, erweisen sich vor allem proximale Faktoren als signifikanter Prädiktor von Bedrohungsempfinden und infolgedessen der Nutzerakzeptanz. Mit einer dritten Studie soll schließlich exploriert werden, inwieweit die Wahrnehmung von Menschenartigkeit auch bei nicht verkörperlichten, emotionssensitiven KIs Relevanz besitzt. Zugleich rücke ich nun Kultureinflüsse in den Fokus, indem ich Versuchspersonen verschiedener kultureller Herkunft (N = 89) eine automatisierte Emotionserkennungssoftware kennenlernen lasse. Während chinesische Probanden, deren kulturelle Sozialisation tendenziell ein breiteres Verständnis von ‚Beseeltheit‘ umfasst, nur kurzzeitig vom Feedback der affektiven Software in Erregung versetzt werden, lässt sich bei deutschen Versuchspersonen ein deutlich längerer Anstieg physiologischer Aktivierung feststellen. Zugleich zeichnet die Messung subjektiver Empfindungen ein überraschendes Bild: Die emotionssensitive Maschine – in diesem Fall ein abstrakter, mechanischer Kasten – wird umso positiver bewertet, je mehr Menschenhaftigkeit Probanden in ihr erkennen. Angesichts der drei durchgeführten Studien komme ich zu dem Schluss, dass lediglich Szenarien mit verkörperlichter KI im Sinne des entwickelten Bedrohungsmodells beide Pfade bedienen, was für eine eindeutig aversive Reaktion erforderlich sein könnte. Die Gestaltung der Software in Studie 3 spielte unterdessen für das unmittelbare Kontrollerleben der Versuchspersonen keine Rolle; eine mögliche Erklärung, warum sich Attributionen von Menschenähnlichkeit hier sogar positiv in den subjektiven Evaluationen niederschlugen.
APA, Harvard, Vancouver, ISO, and other styles
45

(7659032), Zachary Brooks Smith. "DIGITAL TWIN: FACTORY DISCRETE EVENT SIMULATION." 2019.

Find full text
Abstract:
Industrial revolutions bring dynamic change to industry through major technological advances (Freeman & Louca, 2002). People and companies must take advantage of industrial revolutions in order to reap its benefits (Bruland & Smith, 2013). Currently, the 4th industrial revolution, industry is transforming advanced manufacturing and engineering capabilities through digital transformation. Company X’s production system was investigated in the research. Detailed evaluation the production process revealed bottlenecks and inefficiency (Melton, 2005). Using the Digital Twin and Discrete Event Factory Simulation, the researcher gathered factory and production input data to simulate the process and provide a system level, holistic view of Company X’s production system to show how factory simulation enables process improvement. The National Academy of Engineering supports Discrete Event Factory Simulation as advancing Personalized Learning through its ability to meet the unique problem solving needs of engineering and manufacturing process through advanced simulation technology (National Academy of Engineering, 2018). The directed project applied two process optimization experiments to the production system through the simulation tool, 3DExperience wiht the DELMIA application from Dassualt Systemes (Dassault, 2018). The experiment resulted in a 10% improvement in production time and a 10% reduction in labor costs due to the optimization
APA, Harvard, Vancouver, ISO, and other styles
46

(10716654), Eric J. Kozikowski. "DEVELOPMENT AND EVALUATION OF A DIGITAL SYSTEM FOR ASSEMBLY BOLT PATTERN TRACEABILITY AND POKA-YOKE." Thesis, 2021.

Find full text
Abstract:
The manufacturing industry has begun its transition into a digital age, where data-driven decisions aim to improve product quality, output, and efficiency. Decisions made based on manufacturing data can help identify key problem areas in an assembly line and mitigate any defects from progressing through to the next step in the assembly process. But what if the products’ as manufactured data was inaccurate or didn’t exist at all? Decisions based on incorrect data can lead to defective parts being passed as good parts, costing manufacturers millions of dollars in rework or recalls. When specifically referring to mechanically fastened assemblies, products that experience rotation, like an aircraft propeller, or compress to create a seal, like an oil pipe flange, all require specific torque pattern sequences to be followed during assembly. When incorrectly torqued, the parts can have catastrophic failures resulting in consumer injury or ecological contamination. This paper outlines the development and feasibility of a system and its components for tracking and error-proofing the assembly of bolted joints in an industrial environment.
Using a machine vision system, the system traces the tool location relative to the mechanical fastener and records which order the fasteners were torqued in, if an error is detected, the system does not allow the user to progress through the assembly process, notifying if an error is detected. The system leverages open source machine learning algorithms from TensorFlow2 and OpenCv, that allow efficient object detection model training. The proposed system was tested using a series of tests and evaluated using the STEP method. The data collected aims to understand the system's feasibility and effectiveness in an industrial setting.
The tests aim to understand the effectiveness of the system under standard and variable industrial work conditions. Using the STEP method and other statistical analysis, an evaluation matrix was completed, ranking the system's ability to successfully meet all predetermined benchmarks and successfully record the torque pattern used to assemble apart
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography