Dissertations / Theses on the topic 'Protection and management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Protection and management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Harvey, Janell M. "Protecting Biscayne an analysis of strategies for the protection of Biscayne National Park /." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000530.
Full textWong, Sau-lim Tim. "Airline revenue management passenger right and protection /." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B31633183.
Full textAizikovitz, Jacob. "Yield protection as a risk management strategy." Thesis, Kansas State University, 2018. http://hdl.handle.net/2097/38662.
Full textDepartment of Agricultural Economics
Christine Wilson
Risk management is critical in crop production as the challenges farmers face on a year to year basis are quite variable due to Mother Nature. There are many tools a farmer can utilize to help manage risk such as crop insurance and forward contracting or hedging. In recent years with lower prices, these tools have been more heavily used than they were a few years ago when corn and soybean prices were $8 and $15 per bushel, respectively. Margins in crop production are tight when market prices are low and input prices are high relative to market prices, and due to land cost. In order for farmers to produce greater profit, they must find ways to lower expenses or produce more bushels to increase their revenue. As margins tighten, farmers typically try to lower expenses to be more profitable rather than trying to increase bushels that would ultimately increase their revenue. When farmers try to reduce expenses, agricultural retailers experience lower revenues holding all else equal; distributors have lower revenues because the retailer is not selling as much, and the manufacturers experience lower revenues because the retailer and distributor are not moving the inventory compared to when farmer margins are larger. This thesis examines how yield protection for grain corn can be utilized as a risk management tool for crop production farmers. This thesis explores how increasing bushels and ultimately increasing revenue by protecting the bushels the crop is physically able to produce, can help manage producer risk. This thesis uses yield protection as a tool alongside crop insurance and marketing, rather than as a tool to replace crop insurance or marketing. Data used for yield protection is replicated fungicide, fungicide with an adjuvant, and fungicide with insecticide, that were evaluated against the untreated check over multiple locations and years across the Midwestern United States. Fungicide data were chosen because it is truly the definition of yield protection, protecting the crop against disease. Fungicides are usually the first products cut from a farmer’s crop production program to help reduce expenses and maintain profitability as margins tighten. The results found in this study are consistent with work conducted at Iowa State University. Results exhibited an increase in corn yield, but were not consistently statistical significant across treatments and location. In conclusion, the average yield increase was not enough over multiple years to pay for itself, and it lacked sufficient evidence. Yield protection does not fit a risk management strategy annually. However, yield protection should be utilized when specific thresholds on disease or insects are present to warrant this strategy.
王守廉 and Sau-lim Tim Wong. "Airline revenue management: passenger right and protection." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B31633183.
Full textMonadi, Mehdi. "Protection and fault management in active distribution systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/404541.
Full textLa creciente integración de recursos energéticos renovables en el sistema eléctrico ha propiciado el aumento de sistemas de generación distribuida (DG) en los sistemas de distribución. Esta integración,influye en la topologla, el rendimiento y los aspectos operacionales de los sistemas de distribución convencionales. Su impacto sobre los sistemas de protección es uno de los principales problemas que se derivan de la alta penetración de DG. Por ese motivo es preciso diseñar nuevos métodos y sistemas de protección que sean capaces de garantizar la seguridad y la fiabilidad de los sistemas de distribución activos. Por otro lado, la mayoria de sistemas de generación basados en renovables están interconectados con la red de AC a través de convertidores electrónicos de potencia.Estas interfaces consisten en unidades de conversión DC/AC. Por lo tanto, el uso de sistemas de distribución de corriente continua puede contribuir a la reducción de las pérdidas/ costes, ya que algunas etapas de conversión de energía pueden ser eliminadas. La mejora en la estabilidad del sistema, la reducción de las pérdidas de energía,y la mejora la calidad de energía son otras de las ventajas que las redes de corriente continua pueden ofrecer. Por estos motivos, junto con la fácil integración de cargas electrónicas alimentadas en OC, el concepto de sistemas de distribución en OC ha atraido una considerable atención en los últimos anos. De hecho, los sistemas MVDC y las redes LVDC están llamados a ser una parte importante delos sistemas de distribución y transmisión en el futuro. Además, los sistemas de conversión OC y AC pueden contribuir a la construcción de sistemas de distribución de AC I DC híbridos. De acuerdo con estos cambios, significativos en los sistemas de distribución, es necesario modificar el algoritmo y los métodos de protección existentes y proponer nuevos esquemas de protección tanto para los sistemas de distribución en AC como para los de OC. Por otra parte, en los sistemas de distribución convencionales, las cargas son alimentadas por la red aguas arriba, es decir;por las lineas de transmisión; Por lo tanto, cuando una falta se produce en la red aguas arriba la parte defectuosa es desconectada por el sistema de protección, asimismo todas las cargas conectadas a los sistemas de distribución se desconectan también. Sin embargo, en los sistemas de distribución activos, los sistemas DG pueden soportar las zonas de no disponibilidad si la red está equipada con un sistema de gestión de fallos. Por lo tanto, los métodos automáticos de 'self-healing' pueden contribuir a aumentar la continuidad y la fiabilidad del suministro en ta red. Para proporcionar la capacidad de 'self-healing', las redes de distribución deben estar equipadas con algoritmos adecuados que sean capaces de garantizar el funcionamiento continuo y óptimo para la sección aislada de la red. En esta tesis, las diferencias entre tas protecciones para sistemas de OC y CA son investigadas y analizadas. Luego, en base a este analísis, se presentarán los métodos de protección y gestión de fallos adecuados para los sistemas y microrredes de distribución OC. En la otra parte de esta tesis, se propone un algoritmo de gestión de fallos y 'self-healing ' para sistemas de distribución activos. Para validar los métodos propuestos se ha trabajado con plataformas hardware-in the-loop avanzado utilizando simuladores en tiempo real y controladores trabajando en base a plataformas de control reales.
Nwankwo, Azubuike Sonny A. "Consumerism : management challenge of consumer protection in national enterprises." Thesis, City University London, 1990. http://openaccess.city.ac.uk/7665/.
Full textChu, Thi Thu Ha. "Environmental pollution in Vietnam: Challenges in management and protection." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A32573.
Full textViệt Nam đang phải đối mặt với những thách lớn về ô nhiễm môi trường gây ra bởi các tác nhân tự nhiên và các hoạt động của con người. Ô nhiễm môi trường ở Việt Nam biểu hiện ở cả môi trường không khí, nước và đất tại nhiều khu vực với hàm lượng các chất ô nhiễm gồm bui thô TSP. các chất hữu cơ, kim loại nặng, các chất dinh dưỡng gồm amoni, phosphat vượt quá tiêu chuẩn cho phép. Một trong những nguyên nhân quan trọng gây ô nhiễm môi trường là sức mạnh pháp lý của các cơ quan tổ chức hoạt động trong lĩnh vực môi trường, đặc biệt là lực lượng cảnh sát môi trường, chưa đủ mạnh. Bên cạnh đó, ý thức của người dân về giữ gìn bảo vệ môi trường còn rất yếu. Việc hoàn thiện hệ thống luật pháp về bảo vệ môi trường bao gồm các chế tài đủ mạnh để ngăn chặn các vi phạm là quan trọng hàng đầu nhằm tăng cường hiệu quả quản lý và bảo vệ môi trường ở Việt Nam. Mặt khác, giáo dục tuyên truyền ý thức cho người dân và thậm chí các học sinh trong trường học về giữ gìn bảo vệ môi trường là hoạt động rất ý nghĩa nhằm giảm bớt các áp lực và thách thức trong quản lý và bảo vệ môi trường ở Việt Nam.
Laribi, Atika. "A protection model for distributed data base management systems." Diss., Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/53883.
Full textPh. D.
Houle, James J. "Community decisions about innovations in water resource management and protection." Thesis, University of New Hampshire, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10000397.
Full textThe purpose of this study was to investigate the social, economic and technological factors that influence rates of adoption of innovative stormwater management approaches in municipal organizations in the Great Bay watershed, NH. The scope of this study was to investigate how innovations spread through municipal populations in a specific region and watershed area of the US. The methodology used mixed qualitative methods, including semi-structured interviews, case studies, and surveys to examine perceptions, attitudes, and beliefs that influence the adoption of innovative stormwater management solutions, as well as the governance characteristics of municipalities at different stages of adoption. Major findings include: adopter categories can be relatively easily and quickly categorized into early and late majorities as a preliminary means to identify populations of ready and willing audiences interested in and capable of advancing innovations; early and late adopter classifications followed general diffusion theory, but differed in substantial ways that could influence overall project or program success; and finally that early majority communities have more internal and external capacity to advance innovations as well as higher levels of peer-to-peer trust to offset perceptions related to economic risk that can either advance or stall innovative stormwater management solution adoption. This research offers insights on how to allocate scarce resources to optimally improve water quality through stormwater management solutions, and makes recommendations for how to effectively and efficiently generate greater understanding of complex barriers to adoption that thwart innovation in municipal governance organizations. One significant implication is that agents of change who want to move innovations through a broad municipal population should focus their efforts on working with innovators and early adopters that have status within relevant peer networks and who have capacity to evaluate the strengths and weaknesses of innovations.
Scarfe, Bradley Edward. "Oceanographic Considerations for the Management and Protection of Surfing Breaks." The University of Waikato, 2008. http://hdl.handle.net/10289/2668.
Full textBrooke, Cassandra. "Marine pollution management under the Environment Protection Act 1993 (SA) /." Title page, contents and abstract only, 1996. http://web4.library.adelaide.edu.au/theses/09ENV/09envb872.pdf.
Full textDurbin, Chris. "Aspects of internet security - identity management and online child protection." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/8548.
Full textTaylor, Gareth Foley. "Management of Sand Beaches for the Protection of Shellfish Resources." Thesis, University of Canterbury. Biological Sciences, 2013. http://hdl.handle.net/10092/8207.
Full textKoy, Andrew Bruen. "Framing the force protection problem an application of knowledge management." Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/5894.
Full textUsing knowledge management and knowledge flow theories, personnel involved in force protection can better construct a trustworthy threat assessment of a port region. By ensuring that intelligence agents, regional experts, and force protection officers are linked in a knowledge flow system, our fleet's decision makers will be equipped with the proper tools to better prepare for port visits. A new organization, the Multi-Threat Alert Center, will be a vital organization that is charged with doing most of the knowledge construction in this system. Therefore its construction and implementation into the AT/FP organization is paramount to maintaining a successful system. Its ultimate knowledge product will be used by commands conducting port visits as the main assessment of the current threat conditions. A key component to ensuring that due diligence is maintained while using pre-fixed force protection plans is to ensure that knowledge is treated as a dynamic system instead of a static object. By analyzing the MTAC knowledge flow systems with current theories, the planners and organizers of force protection can ensure that a functioning and efficient system is in place.
Silengo, M. "An integrated framework for environmental management and protection in Zambia." Thesis, University of Salford, 1996. http://usir.salford.ac.uk/14810/.
Full textKoy, Andrew B. "Framing the force protection problem : an application of knowledge management /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FKoy.pdf.
Full textRussell, Stephanie. "Enterprise unleashed? : exercising power through isomorphism in the passive fire protection industry." Thesis, Keele University, 2011. http://eprints.keele.ac.uk/3811/.
Full textGovenor, Heather Lynn. "Sediment Management for Aquatic Life Protection Under the Clean Water Act." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/91448.
Full textPHD
Sears, Joseph D. "Simultaneous connection management and protection in a distributed multilevel security environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSears.pdf.
Full textThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 65-66, 85, 117, 119-121). Also available online.
Sheng, Ming. "Sizing Stream Setback Using GIS Tools for Stream Protection." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345049852.
Full textKhumalo, Jan Lekopane. "Overview of the National Environmental Management Act 107 of 1998." Thesis, University of Limpopo (Turfloop Campus), 2011. http://hdl.handle.net/10386/497.
Full textGuerinoni, Stephen C., and n/a. "An evaluation of coastal zone management." University of Canberra. Applied Science, 1989. http://erl.canberra.edu.au./public/adt-AUC20060713.130610.
Full textLee, Po-kwan Edmund. "The role of the private sector in environmental conservation /." Hong Kong : University of Hong Kong, 1993. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19740165.
Full textDe, Lange Joshua. "A framework for information security management in local government." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7588.
Full textSchmitt, Andreas Joachim. "Digital Implementation of Power System Metering and Protection." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/51194.
Full textMaster of Science
Storck, Johann. "Management of Intellectual Property in China A Framework for Complementary Protection Methods /." St. Gallen, 2006. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/01654573002/$FILE/01654573002.pdf.
Full textYoon, Eunju. "Food defense management plan implementation intention : an application of protection motivation theory." Diss., Manhattan, Kan. : Kansas State University, 2007. http://hdl.handle.net/2097/439.
Full textSaleh, Mohamed Saad Morsy. "Analysis of information security risks and protection management requirements for enterprise networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.
Full textMa, Cheng. "Agent-based Power System Protection and Information Management System of a Substation." Thesis, University of Liverpool, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.507730.
Full textSaleh, Mohamed S. M. "Analysis of Information Security Risks and Protection Management Requirements for Enterprise Networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.
Full textTam, Wai-kit Alex. "Investigating an ecosystem approach to environmental protection of Tolo Harbour /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk:8888/cgi-bin/hkuto%5Ftoc%5Fpdf?B23425106.
Full textNix, Tanya. "Evolution of Physician-Centric Business Models Under Patient Protection and Affordable Care Act." Thesis, Walden University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3641824.
Full textFor several decades, the cost of medical care in the United States has increased exponentially. Congress enacted the Patient Protection and Affordable Care Act (PPACA) of 2010 to ensure affordable healthcare to the citizens of the United States. The purpose of this case study was to explore physicians' perspectives regarding physician-centric business models evolving under the requirements of PPACA legislation. Complex adaptive systems formed the conceptual framework for this study. Data were gathered through face-to-face, semistructured interviews and e-mail questionnaires with a purposeful sample of 20 participants across 14 medical specialties within Northeast Texas. Participant perceptions were elicited regarding opinions of PPACA legislation and the viability of business models under the PPACA. In addition, a word cloud was used to identify 3 prevalent or universal themes that emerged from participant interviews and questionnaires, including (a) use of mid-level practitioners, (b) changes to provider practices, and (c) lack of business education. The implications for positive social change include the potential to develop innovative models for the delivery of medical care that will improve the health of the aggregate population. Healthcare leaders may use the findings to advance the evolution of physician business models that meet the needs of healthcare stakeholders. These findings may also inform healthcare leaders of the need to develop cost-effective and innovative organizational models that are distinct to individual patient populations.
Li, Wei-Chiang, and 黎維強. "Protection Management of Enterprise Endpoint Based on the ITIL Management Framework." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/03419256582406110454.
Full text中華大學
資訊管理學系碩士在職專班
100
In the modern enterprise's internal environment, there is the endpoint of the notebook and desktop computers. Convenient network applications accompanied by the threat of various forms of information, such as computer viruses, spyware, operating system vulnerabilities, a malicious Web site, malware, worms’ attack. The endpoint is the largest number of the subject in the corporate computer environment. If information threats affect the endpoint operation, the business operations and revenue will suffer the loss. This study will focus on the research of the endpoint protection for enterprises. Using ITIL management framework approach provides endpoint protection management and assessment methodology of effectiveness as planning reference for the business unit of information during endpoint protection management. Providing harm repair and protective mechanisms for the potential damage to enterprise endpoint will reduce the impact and influence from such information threat.
Lin, Kuei-Yu, and 林桂玉. "Investor Protection and Earnings Management: An International Comparison." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/72508978283132754545.
Full text中國文化大學
會計研究所
94
This paper examines the relation between earnings management and investor prote- ction. Using a sample of public corporations from Compustat database over the period 1995-2004, our research applies principal component analysis and cluster analysis to examining the level of earnings management across 31 countries. Our results indicate that the level of earnings management across 31 countries is different ; beside, the regression results show that earnings management is negatively associated with outside investor rights and legal enforcement. In sum, the level of investor protection would influence earnings management. If the Government want to provide better protection for investors, the government must practices corporate governance and protects investor’ rights, for example, independent directors and supervisors. These ways could protects investor’ rights.
Ke, Yi-Chuan, and 柯奕銓. "The Protection of Minority Shareholders in Management Buyouts." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/10334962068791400388.
Full text銘傳大學
法律學系碩士班
103
In view of the management buyouts (hereinafter refer as MBO), due to the nature of conflict of interest within management, the minority shareholders will have a great impact on their shareholder rights.First, the core of this thesis focused on protecting minority shareholder rights in the context of MBO, and then discussed in detail about the protection mechanisms for minority shareholders’right from point of view of comparative law, and reviewed on our legal system at present. In the end this thesis focused on the classic MBO case ― Yageo case ― and gave specific suggestions on reforming the fiduciary duty, strengthening the function of Independent special committees and the equitable treatment of shareholders in order to improve and advance the M & A financial institution in Taiwan. In Chapter II, it discussed the purpose, nature and type of MBO, and also articulated the influence and problems about foreign private equity funds in Taiwan. The Chapter III discussed the conflict of interests of management in the context of MBO. It will discussed in detail about the fiduciary duties of managers or directors, such as the duty of loyalty, duty of care and obligations of information disclosure. In Chapter IV, the key issue of this chapter is whether the acquisition of the target company''s share price can really reflect a fair price. And from the perspective of comparative law this chapter also discussed the establishment of objective and independent of the Special Committee in the target company. The Chapter V analyzed the classic MBO case of Yageo Corp. by Orion Investment. It discussed why this case was doomed to failure, and provided specific suggestions to improve the legal systems for minority shareholders’ protection in the context of MBO. The Chapter VI concluded the preceding chapters, giving concrete proposals on mergers and acquisitions in the context of MBO to improve our legal system so that the vulnerable minority shareholders’ interests could be really protected and demonstrated.
chang, Ping-hai, and 張平海. "Multi-Purpose High-Building Fire Protection Management Research." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/4kh35e.
Full text國立中山大學
高階經營碩士班
96
The urbanized congregate housing and commercial buildings have long developed towards the super high-rise, enlarged and complex composition. The application, identification, usage and administration of such buildings are more complicated than general buildings; so too the fire facilities, organization, training, operation and management. Such tendency of development on super high-rise and large buildings is evident everywhere in various cities. In the area of fire prevention, there will be greater challenges. The general public remains ignorant about disaster prevention, while government authorities do not integrate and enhance regulation on categorization and identification of construction for super high-rise buildings with different applications and scales. Without accumulating our capabilities for fire prevention, it is likely incur the loss of countless lives and property in general buildings when disaster occurs. Since the implementation of the fire administration system in Taiwan from 1995, certain results have been achieved and further development is expected. However, it is found from literature review and questionnaire of this study that there are still many improvements to be made. Among numerous problems, “Human negligence” covers most of the cases, which also verifies the perspective discussed in the study that “people” are the keys to fire administration. Therefore, it is deemed in this study that in a super high-rise composite (general super high-rise), the caretaker, fire administrator, mutual fire administrator, professional building administration (security) company and various fire squads be the key persons to promote fire administration. Whether it is the administrational obligation of fire safety or fire rescue, the abovementioned units must link, cooperate and integrate with each other to form a group, so the capability of administrating fire safety of each super high-rise building can be controlled adequately. From various problems witnessed in this study, the following strategies are drafted to correspond with administration, which is expected to integrate the administrational level of fire safety. Under well mechanism of administration, the capacity of fire prevention can be reflected for reducing fire accidents to minimum: 1. Enhance administrative obligation and command mechanism of fire prevention for composite super high-rise buildings. 2. Establish administrative capability of fire prevention from professional building administration (security) company. 3. Regulate the categorization and identification of construction for super high-rise buildings with different applications and scales. 4. Integrate the capacity of fire prevention, operation in fire field and building’s disaster prevention for unified correspondence. 5. Request the government to promote publication and incentive system for information on administration and examination of fire safety.
Agarwal, Avesh Kumar. "Performance evaluation and protection management for wireless networks." 2009. http://www.lib.ncsu.edu/theses/available/etd-05072009-141625/unrestricted/etd.pdf.
Full textNai-Kang, Huang, and 黃迺康. "A Study of Management Mechanism for Enterprise Privacy Protection Based on Personal Data Protection Act." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/97067221936394110771.
Full text國立中正大學
會計與資訊科技研究所
99
The Legislative Yuan passed the Personal Data Protection Act on April 27th, 2010, and it let the personal data protection issues call the public's attention. In the future organization, regardless of their size or the amount of personal data, will be subject to the Personal Data Protection Act. It affect the data collection and processing way and the marketing practices, and it also increase criminal penalties and compensation that is up to $200 million when the enterprise is against the law. Therefore, the enterprise should engage in planning and implement information security protection of personal data at this stage in quickly. ISO 27001 is an international standard of information security management system. But this is not representative for the integrity of personal data protection in the enterprise when they follow ISO 27001. The enterprise’s information security is focus on the confidential information and less to the customer's personal data. As a result, it make inadequate on personal data protection and enhance the possibility of conflict with the law. In this situation, the enterprise must adjust and build the appropriate security structure to control personal data processes to meet compliance requirements. So they require a complete set of standards to follow to ensure the enterprise adjust properly, comply with regulations, and fulfill the obligation of protecting personal data. This study applies the Gowin's Vee research strategy. In the conceptual side, we sorted out 4 control domains, 15 control objectives, and 75 control measures which develop the Enterprise Privacy Protection Management Mechanism by literature review about Personal Information Management System and Personal Data Protection Act. Then we apply the Delphi Expert Questionnaires to fix this mechanism and add a new control measure. In the methodological side, we use the case study to verify and assessment the practicality and availability of this mechanism. This research shows that the research outcome, the Enterprise Privacy Protection Management Mechanism, provides organizations a reference and compliance purpose to help them obey the law, reduce the risk of litigation, and fulfill the responsibilities of protect personal data.
Chou, Yen Chun, and 周彥均. "Integrity Protection Methods with Privilege Management for Digital Evidences." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/35905103024063666318.
Full text長庚大學
資訊管理學研究所
97
It is a tendency that digital evidence is to be the important basis in the court, and we can not abandon this critical witness because the characters of digital information such that digital evidence can be easily multified. Recently, domestic scholars or foreign scholars proposed relevant standard operating procedures and other regulations to preserve the integrity of digital evidence. When the integrity of digital evidence comes to be controversial, the judiciary bureaus can not bring the direct proof to the mass, however. The thesis proposed three integrity protection methods for digital evidence based on the flaws of the electronical character of digital information and judiciary circumstances. The simple digital evidence protection method is to confirm the digital evidence can be maintained its integrity, correctness, confidentiality, justice and legality in the transference between the police, the forensic staff and the judge. In the digital evidence protection method with supervision mechanism, the supervision mechanism is set between the superior and the subordinate in the cyber forensics laboratory and further divided into all-supervision and partial-supervision. In the digital evidence protection method with thresh- hold supervision mechanism, the method extends the relationships between the superior and the subordinate and provides six supervisal ways according to the combination of highly-authorized supervision, threshold-authorized supervision, lightly-authorized supervision with all-supervision and partial-supervision.
Li, Yue-Bin, and 李樂賓. "Protection and memory management in LM286 logical machine system." Thesis, 1986. http://ndltd.ncl.edu.tw/handle/78671032465121881108.
Full textSuggitt, Jeff. "The Spur Woods : a plan for protection and management." 1993. http://hdl.handle.net/1993/22984.
Full textChen, Yong-Feng, and 陳永峰. "Process Management of Online Auction for Protection of Consumers." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b3ttef.
Full text明新科技大學
工業工程與管理系碩士在職專班
105
According to the characteristics of consumer online shopping in Taiwan, this study first analyzes the current business processes of security for both buyers and sellers. This research also uses the cases of Taiwan online auction of buyers during the online shopping processes. The business model is studied for further understanding the key activity of online auction. Business process management tool IDEF (ICAM Definition Method) is applied to provide better online shopping process security for buyers. A process model is finally developed for reference in the online auction market.
WANG, HSIAO-MEI, and 王曉梅. "Relationship between Environmental Protection Expenditure Information and Earnings Management." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/32gg58.
Full text朝陽科技大學
會計系
106
Due to serious global warming in present day, environmental protection has become one of the important international issues for decades. The pollution caused by business production or other factors may do bigger and more serious destruction to the environment and harm to all mankind. The goal of business is to create biggest earnings, while at the same time may generate environmental pollution problems. Therefore, business should have relative amount of environmental expenditures to cope with the pollution caused by themselves. Thus, the study aims to explore relationship between business’ environmental protection expenditures information and earnings management, through business’ disclosures of environmental protection expenditures information to discuss whether such disclosures can restrain business from earnings management. The study used high risk pollutive listed industries from years 2007 to 2016 as study subject and applied regression analysis. The study finds that when businesses face fines and loss on disposal due to environmental pollution, they would be watched by governmental agencies, thus would reduce earnings management behaviors during sensitive periods. Businesses that pay more attention on social responsibility would propose environmental protection related policy and plan future environmental protection expenditures to prevent themselves from generating pollution, then increase environmental quality, lower risk of being fined by government in the future, and further enhancing business evaluation. Therefore, business would have less motives in earning management. Lastly, when differentiating scales of industries on the effect of environmental protection expenditures information on earnings management, large scale business gets results consistent with the original one. However, when small scale business face environmental pollution loss and disposal, due to the large effect of pollution fines on business themselves, they would practice earnings management to protect earnings on book.
ZENG, YANWEI, and 曾延偉. "Knowledge Innovation and Protection in a Management Consulting Firm." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/wg8uc7.
Full text國立清華大學
科技管理研究所
106
As the knowledge-based economy comes, knowledge innovation and protection are the top issues for management consulting firms which highly rely on knowledge. The more knowledge intensive the companies are, the more dependent in knowledge innovation they do. Knowledge innovation comes from interation, so it is crucial for management consulting firms to protect their intellectual property and knowledge. Besides, management consulting firms should also concern the profitability from their innovation and knowledge. This study proposes the research framework that includes three ways of knowledge co-creation with: customers, colleagues, and the third parties. The research framework also concerns with knowledge protection from the angle of protection mechanisms. Furthermore, the study also explores the issues of appropriability regime and complementary assets. Then we verify it with one practical case of a Chinese consulting firm. . The study reveals that management consulting firms use piecemeal intellectual property strategy, and tight process control for protecting co-creating knowledge and tight contracts with their partners and customers for appropriating their innovation and knowledge. Finally, the managerial implications for protecting and profiting co-creating knowledge are suggested.
Khan, Abul Kalam. "Re-visioning child protection management embedded in family empowerment." Thesis, 2016. https://researchonline.jcu.edu.au/49797/6/49797-khan-2016-thesis.pdf.
Full textVon, Solms Rossouw. "Information security management : processes and metrics." Thesis, 2014. http://hdl.handle.net/10210/12038.
Full textOrganizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization. These information resources and services should be secured to ensure a high level of availability, integrity and privacy of this information at all times. This process is referred to as Information Security Management. The main objective of this, thesis is to identify all the processes that constitute Information Security Management and to define a metric through which the information security status of the organization can be measured and presented. It is necessary to identify an individual or a department which will be responsible for introducing and managing the information security controls to maintain a high level of security within the organization. The position .and influence of this individual, called the Information Security officer, and/or department within the organization, is described in chapter 2. The various processes and subprocesses constituting Information Security Management are identified and grouped in chapter 3. One of these processes, Measuring and Reporting, is currently very ill-defined and few guidelines and/or tools exist currently to help the Information Security officer to perform this task. For this reason the rest of the thesis is devoted to providing an effective means to enable the Information Security officer to measure and report the information security status in an effective way...
Han, Mau shan, and 韓茂山. "Compansation and management of water resource protection area is an example of Taipei water resource protection area." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47781021195159081790.
Full text國立臺北大學
資源管理研究所
90
Abstract Water not only supplies needs for all the lives, but also maintains humankinds for living, so that how to retain the pure, safe water resource is an important topic for water resource protection policy. Now national water resource policy is to build an upstream water resource district to conform we can have pure, safe drinking water, water resource pollution control is the major policy for the middle and downstream district. There is about one sixth land being managed for drinking water resource protection district in Taiwan. But for the owners of the land that being included in water resource protection area, the different restriction for land using in water resource area makes some invasion to land property rights. That makes the cost for water resource protection be charged on from the people living in this protection areas, the users of water in the middle and downstream areas needn’t share it, though they can enjoy the efficient water resource also. This makes the owners of the upstream district would not like to do anything for water resource protection, it’s not fair, and no justice. Government can use different means to push the owners of the upstream lands doing something good for water resource protection, at the mean time the middle and downstream water users should treasure the water resource. Due to the foreign experiences, in order to use good water resource for the middle and downstream water resource users, following the “users-to-pay” rule they must pay for the owners of the upstream areas that they engage in water resource protection. For example Perrier Vittel S.A., a drinking water company in France compensates the land owners who engage in water resource protection in the upstream area in order to conform the water is pure and clean, in Germany many drinking water companies also compensate the upstream farmers. In our country, if we have to compensate the people living in the water resource protection district? What to compensate that can make something good for water resource protection? For example in Taipei water resource district, adding 0.2 dollar per degree to the water fee for the sake of compensating the people living in the district, also help for local environmental and educational development, social interest, traditional actions, public buildings and another items. This kind of compensation is not useful for water resource protection, but apt to be abused especially for election bribery. Due to the property theory when the people property rights are restricted by the governmental public interest and up to “special sacrifice”, the government should give the property rights owners some compensation. Due to externality theory good water resource is created by means of doing some restriction of the land, this external efficiency should be internalized to compensate to the producers. Due to these theories mentioned above the feedback or compensation fee should be used for the workers who engaged in water resource protection, but not for the public buildings in the protection district. Water resource management should be characterized with watershed, and that charges the water flow rate, quality, flood, and biological condition etc. The stakeholders and civil watershed management department supervise and check the policy together. Using many kinds of tools such as water pollution fee, conservation easement to manage water resource, in order to promise permanent use of water resource.
Amon-Armah, Frederick. "ECONOMIC ANALYSIS OF NUTRIENT MANAGEMENT PRACTICES FOR WATER QUALITY PROTECTION." 2012. http://hdl.handle.net/10222/15581.
Full textYang, Si-Wen, and 楊絲汶. "The Association between Stakeholder Management and “Environmental Protection” Performance Measures." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/bb6np7.
Full text中原大學
會計研究所
103
The study examines whether the stakeholder management implementation influences the use of “Environmental Protection” performance measures in compensation contracts. The results of this study show that the degree of the stakeholder management implementation is positively associated with the likelihood that “Environmental Protection” performance measures are used in compensation contracts.
Wang, Chieh-Chung, and 王峙中. "An Implementation of Digital Document Protection System with Right Management." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/48978772042133007664.
Full text國立成功大學
工程科學系專班
96
Along with the prosperity of information technique and the rapidly development of IT hardware, most of the industries of Taiwan have been transferred to the knowledge orientation. Under this environment the main competitiveness comes from the value of “information”. Almost all of the information is stored in the information facilities via any digital forms. Documents in digital form are easily to be duplicated and distributed. How to protect these digital documents and archiving them securely is a serious issue to be faced. In this study, the technique of Java Swing is applied to develop a digital document protect system which can be viewed under web browser. The system is under client-server architecture and the documents stored in the server are encrypted via AES technique for increasing its security. The group authorized mechanism and on-line review capabilities can provide easily using and controlling of the digital documents.