Dissertations / Theses on the topic 'Electronic data processing departments'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Electronic data processing departments.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Baxter, David. "Perception of organisational politics and workplace innovation : an investigation of the perceptions and behaviour of staff in an Australian IT services organisation /." Swinburne Research Bank, 2004. http://hdl.handle.net/1959.3/46062.
Full textA thesis submitted to the fulfilment of the requirements for the degree of Doctor of Philosophy, Australian Graduate School of Entrepreneurship, Swinburne University of Technology, 2004. Typescript. Includes bibliographical references (p. 229-230).
Javanshir, Marjan. "DC distribution system for data center." Thesis, Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39344952.
Full textMiles, Shaun Graeme. "An investigation of issues of privacy, anonymity and multi-factor authentication in an open environment." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006653.
Full textAdobe Acrobat Pro 9.5.1
Adobe Acrobat 9.51 Paper Capture Plug-in
Giesing, Ilse. "User perception related to identification through biometrics within electronic business." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.
Full textGoss, Ryan Gavin. "Enabling e-learning 2.0 in information security education: a semantic web approach." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/909.
Full textPerelson, Stephen. "SoDA : a model for the administration of separation of duty requirements in workflow systems." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/68.
Full textSmith, Michael Alan. "An empirical investigation of the determinants of information systems outsourcing." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/29455.
Full textLam, Cheuk-yung. "A case study of IT outsourcing in Hong Kong government /." Hong Kong : University of Hong Kong, 1995. http://sunzi.lib.hku.hk/hkuto/record.jsp?B14039023.
Full textBullock, Kenneth F. "Navy Marine Corps Intranet : an analysis of its approach to the challenges associated with seat management contracting." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBullock.pdf.
Full textViljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Full textBeavan, Robert Benjamin. "Leadership in local government computer service organizations within the state of California." CSUSB ScholarWorks, 1993. https://scholarworks.lib.csusb.edu/etd-project/654.
Full textChan, Yuk-wah Eliza, and 陳玉華. "A review of catastrophe planning for management information systems inHong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1989. http://hub.hku.hk/bib/B3126427X.
Full textGerber, Mariana. "The development of a technique to establish the security requirements of an organization." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/89.
Full textTansley, Natalie Vanessa. "A methodology for measuring and monitoring IT risk." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/772.
Full textBurdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.
Full textBeckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.
Full textChance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.
Full textLee, Kum-Yu Enid. "Privacy and security of an intelligent office form." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9930.
Full textMoller, Alison. "Strategies for sourcing IT skills for South African tertiary institutions." Thesis, Port Elizabeth Technikon, 2004. http://hdl.handle.net/10948/263.
Full textLam, Cheuk-yung, and 林卓蓉. "A case study of IT outsourcing in Hong Kong government." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1995. http://hub.hku.hk/bib/B31266575.
Full textBohnstedt, Jan. "Fernwartung : die rechtlichen Grenzen des IT-Outsourcing durch Banken /." Baden-Baden : Nomos, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014614364&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textShoeib, Ashraf. "Key Decision-making Phases And Tasks For Outsourcing Information Technology." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2000. https://ro.ecu.edu.au/theses/1537.
Full textBattikh, Dalia. "Sécurité de l’information par stéganographie basée sur les séquences chaotiques." Thesis, Rennes, INSA, 2015. http://www.theses.fr/2015ISAR0013/document.
Full textSteganography is the art of the dissimulation of a secret message in a cover medium such that the resultant medium (stego) is almost identical to the cover medium. Nowadays, with the globalization of the exchanges (Internet, messaging and e-commerce), using diverse mediums (sound, embellish with images, video), modern steganography is widely expanded. In this manuscript, we studied adaptive LSB methods of stéganography in spatial domain and frequency domain (DCT, and DWT), allowing of hiding the maximum of useful information in a cover image, such that the existence of the secret message in the stégo image is imperceptible and practically undetectable. Security of the message contents, in the case of its detection by an opponent, is not really insured by the methods proposed in the literature. To solve this question, we adapted and implemented two (known) methods of adaptive stéganographie LSB, by adding a strong chaotic system allowing a quasi-chaotic insertion of the bits of the secret message. The proposed chaotic system consists of a generator of strong chaotic sequences, supplying the dynamic keys of a modified chaotic 2D Cat map. Universal steganalysis (classification) of the developed methods of stéganography, is studied. On this question, we used the linear discriminating analysis of Fisher as classifier of the characteristic vectors of Farid, Shi and Wang. This choice is based on the wide variety of tested characteristic vectors that give an information about the properties of the image before and after message insertion. An analysis of the performances of three developed methods of steganalysis, applied to the produced stego images by the proposed adaptive methods of stéganography, is realized. Performance evaluation of the classification is realized by using the parameters: sensibility, specificity, precision and coefficient Kappa
Achieng, Mourine Sarah. "The adoption and challenges of electronic voting technologies within the South African context." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1366.
Full textThe use of ICTs such as computers, electronic databases and other technologies have been in use for a number of years within the public sector to organise, manage and disseminate information to the public as well as to facilitate day-to-day communication in government offices. In this context, the value of the use of ICTs has been to assist and streamline government operations. The technological development in South Africa has opened up the possibilities of the use of ICTs in the democratic and governance process. E-democracy has been defined as a tool for abandoning the representative system for one with more direct citizen engagement. This study sets out to explore the challenges of the current electoral process, and also determine the factors that could influence the adoption and diffusion of e-voting technologies within the South African context. Literature has shown that countries such as Brazil and India have successfully implemented electronic voting systems and other countries are at various piloting stages to address many challenges and problems associated with manual paper based system such as costs of physical ballot paper and other overheads, electoral delays, distribution of electoral materials, and general lack of confidence in the electoral process. It is in this context that the study also seeks to determine whether the South African electoral management body can leverage on the opportunities that e-voting presents. However, with all the benefits that e-voting presents, there are countries such Germany, the Netherlands etc. that have tried and tested e-voting systems and decided to abandon these system to go back to the manual paper ballot voting systems because of various reasons ranging from cost, security and verifiability. This research is exploratory in nature and adopts qualitative research approach and it is within the interpretivism paradigm. Survey and interview strategies were used to collect data. A purposive sampling method was used to select the participants for the survey. To gain an understanding of the views of voters and electoral management body (IEC) about the current electoral process and e-voting technologies, literature was explored, a questionnaire was distributed online to voters and an in-depth semi-structured interview was conducted with the IEC. The study targeted voters who had access to the internet since the survey questionnaire was distributed online. The analysis is based on thematic analysis and diffusion of innovation (DoI) theory was also used to provide an analytical framework for the study. Through this framework the aims and objectives of the study were conceptualized around three constructs from the theory (relative advantage, compatibility and complexity). The findings of the study revealed that the three constructs from the DoI framework are important factors that may influence the adoption process of e-voting technologies. The findings also revealed other factors such as availability of ICT enable infrastructure and resources, digital divide, trust in technology, awareness of the technology and environment could that also influence the adoption process. The contributions of this research are anticipated to be a better understanding of the adoption of e-voting technologies in South Africa. For the electoral management bodies, the contribution of this research is that the research to some extent portrays factors that could influence the adoption of e-voting technologies in South Africa. Therefore, findings such as availability of ICT infrastructure and accessibility of these infrastructures should be taken into consideration before introducing e-voting technologies. Keywords: DoI (diffusion of Innovation), e-voting (electronic voting) technologies, E-governance, e-participation.
Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Full textChinpanich, Vorapong. "Helpdesk Support Alert System." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2674.
Full textFunk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.
Full textENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global communication and the accompanying legal problems. This is followed by an examination of the different functions Internet providers have. A survey of some of the important crimes affecting the Internet and also some Internet-specific offences put the more general issue of liability in a more specific context. Traditional and new forms of crimes are discussed. This section is followed by an analysis of Internet provider liability under German criminal law and Germany's Teleservices Act. From an international criminal law perspective some international instruments, like the Cybercrime Convention of the Council of Europe, is discussed. National legislation, especially in the context of the European Union, must always be put in the proper regional and international context. The thesis concludes with some thoughts on alternative, or perhaps complementary, methods to fight illegal and criminal conduct on the Internet. This is done not as a critique of the responses to Internet crime, but rather to strengthen the many hands trying to reduce Internet crime.
AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers. Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA. Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur 'n ondersoek na die verskillende funksies van Internet verskaffers. 'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek. Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die relevante regionale en internasionale konteks geplaas. Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle rolspelers in die stryd teen Internet misdaad se hande te sterk.
Ostroumov, Ivan Victorovich. "Magnetic field data processing with personal electronic device." Thesis, Polit. Challenges of science today: International Scientific and Practical Conference of Young Researchers and Students, April 6–8, 2016 : theses. – К., 2016. – 83p, 2016. http://er.nau.edu.ua/handle/NAU/26649.
Full textRomig, Phillip R. "Parallel task processing of very large datasets." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/romigab.pdf.
Full textRehfuss, Paul Stephen. "Parallelism in contextual processing /." Full text open access at:, 1999. http://content.ohsu.edu/u?/etd,272.
Full textRobinson, Patrick Glen. "Distributed Linda : design, development, and characterization of the data subsystem /." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-07102009-040417/.
Full textParker, Greg. "Robust processing of diffusion weighted image data." Thesis, Cardiff University, 2014. http://orca.cf.ac.uk/61622/.
Full textTucker, Peter A. "Punctuated data streams /." Full text open access at:, 2005. http://content.ohsu.edu/u?/etd,255.
Full textGottemukkala, Vibby. "Scalability issues in distributed and parallel databases." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8176.
Full textLee, J. J. "The object-oriented database and processing of electronic warfare data." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA303112.
Full textBodorik, Peter Carleton University Dissertation Engineering Electrical. "Query processing strategies in a distributed data base." Ottawa, 1985.
Find full textSokolova, Karina. "Bridging the gap between Privacy by Design and mobile systems by patterns." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0008/document.
Full textNowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The “Privacy by Design” approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes “Privacy by Design” principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making “Privacy by Design” not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design
Lewis, Tony. "Electronic data interchange in the construction industry." Thesis, Loughborough University, 1998. https://dspace.lboro.ac.uk/2134/11183.
Full textChen, George C. M. "Strategic analysis of a data processing company /." Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/3624.
Full textResearch Project (Faculty of Business Administration) / Simon Fraser University. Senior supervisor : Dr. Ed Bukszar. EMBA Program. Also issued in digital format and available on the World Wide Web.
Thomas, Muffy. "The imperative implementation of algebraic data types." Thesis, University of St Andrews, 1988. http://hdl.handle.net/10023/13471.
Full textBostanudin, Nurul Jihan Farhah. "Computational methods for processing ground penetrating radar data." Thesis, University of Portsmouth, 2013. https://researchportal.port.ac.uk/portal/en/theses/computational-methods-for-processing-ground-penetrating-radar-data(d519f94f-04eb-42af-a504-a4c4275d51ae).html.
Full textCline, George E. "A control framework for distributed (parallel) processing environments." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-12042009-020227/.
Full textClayton, Peter Graham. "Interrupt-generating active data objects." Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1006700.
Full textJin, Xiaoming. "A practical realization of parallel disks for a distributed parallel computing system." [Gainesville, Fla.] : University of Florida, 2000. http://etd.fcla.edu/etd/uf/2000/ane5954/master.PDF.
Full textTitle from first page of PDF file. Document formatted into pages; contains ix, 41 p.; also contains graphics. Vita. Includes bibliographical references (p. 39-40).
Nader, Babak. "Parallel solution of sparse linear systems." Full text open access at:, 1987. http://content.ohsu.edu/u?/etd,138.
Full textKhare, Arjun. "ACT++ 3.0 : implementation of the actor model using POSIX threads /." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020041/.
Full textWan, Charn Wing. "The political economy of digital copyright in Hong Kong /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?jsd-slw-b23750893f.pdf.
Full text"Submitted to School of Law in partial fulfillment of the requirements for the degree of Doctor of Juridical Science." Includes bibliographical references (leaves 435-452)
Gardener, Michael Edwin. "A multichannel, general-purpose data logger." Thesis, Cape Technikon, 1986. http://hdl.handle.net/20.500.11838/2179.
Full textThis thesis describes the implementation of a general-purpose, microprocessor-based Data Logger. The Hardware allows analog data acquisition from one to thirty two channels with 12 bit resolution and at a data throughput of up to 2KHz. The data is logged directly to a Buffer memory and from there, at the end of each 109, it is dumped to an integral cassette data recorder. The recorded data can be transfered from the logger to a desk-top computer, via the IEEE 488 port, for further processing and display. All log parameters are user selectable by means of menu prompted keyboard entry and a Real-Time clock (RTC) provides date and time information automatically.
Fowler, Robert Joseph. "Decentralized object finding using forwarding address /." Thesis, Connect to this title online; UW restricted, 1985. http://hdl.handle.net/1773/6947.
Full textPu, Calton. "Replication and nested transactions in the Eden Distributed System /." Thesis, Connect to this title online; UW restricted, 1986. http://hdl.handle.net/1773/6881.
Full text