Dissertations / Theses on the topic 'Sharing and access practices'

To see the other types of publications on this topic, follow the link: Sharing and access practices.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Sharing and access practices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lawrence-Kuether, Maureen Anne. "Beyond the Paywall: Examining Open Access and Data Sharing Practices Among Faculty at Virginia Tech Through the Lens of Social Exchange." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78236.

Full text
Abstract:
The movement towards open access has allowed academic researchers to communicate and share their scholarly content more widely by being freely available to Internet users. However, there are still issues of concern among faculty in regards to making their scholarly output open access. This study surveyed Virginia Tech faculty (N = 264) awareness and attitudes toward open access practices. In addition, faculty were asked to identify factors that inhibited or encouraged their participation in open access repositories. Findings indicate that while the majority of Virginia Tech faculty are seeking to publish in open access, many are unaware of the open access services provided by the university and even less are using the services available to them. Time, effort, and costs were identified as factors inhibiting open access and data sharing practices. Differences in awareness and attitudes towards open access were observed among faculty ranks and areas of research. Virginia Tech will need to increase faculty awareness of institutional open access repositories and maximize benefits over perceived costs if there is to be more faculty participation in open access practices.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
2

Lowman, Michael. "The effectiveness of access and benefit-sharing legislation in South Africa: practical considerations for national regimes." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/12090.

Full text
Abstract:
Includes abstract.
Includes bibliographical references.
The Convention on Biological Diversity provides an international regulatory framework for countries to develop their own access and benefit-sharing (ABS) legislation. This international convention governs the utilization of a country's genetic resources and associated traditional knowledge. Due to increased capabilities and demand from industry for these resources, a market is created over which ABS legislation is to govern. This is based on the realization of the objectives of the convention that provide for state sovereignty over a country's indigenous biological resources. This dissertation presents the results from an evaluation of ABS legislation and its implementation within South Africa. Key objectives are to analyze the implementation of regulations and procedures governing access to indigenous biological resources and traditional knowledge, and associated institutional arrangements.
APA, Harvard, Vancouver, ISO, and other styles
3

Gruen-Martin, Adèle. "Understanding consumer appropriation in access-based consumption as the creation of meanings : an investigation trough design." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLED016/document.

Full text
Abstract:
Cette dissertation a pour but de comprendre l’appropriation par les consommateurs d’objets ou lieux qu’ils partagent. En nous basant sur les théories de l’appropriation, de la consommation par l’accès et du design, nous questionnons la définition, l’émergence et la valeur perçue de l’appropriation en accès. Nous explorons les contextes de l’autopartage et du coworking au travers de quatre articles. Nos résultats mettent l’emphase sur le rôle des objets matériels dans la mise en pratique de l’appropriation par les consommateurs. Nous définissons l’appropriation du consommateur dans le cadre de l’accès comme la création de significations (valeur de signe, valeur de lien, bien-être dans l’usage) grâce à un ensemble routiniers de pratiques entre les consommateurs et les éléments matériels de l’activité de consommation par l’accès
This dissertation aims to understand consumer appropriation of objects and places shared with others. We draw from theories of appropriation, access-based consumption and design to question the definition, the value and the emergence of consumer appropriation in access. We explore the contexts of car sharing and coworking spaces through four research articles. Our findings highlight the role of material objects in the enactment of consumer appropriation practices. We define consumer appropriation as the creation of meanings (sign value, linking value, wellbeing in use) enacted through a routinized set of practices between the consumer and the material elements of the access-based activity
APA, Harvard, Vancouver, ISO, and other styles
4

Ebenezer, Catherine. "'Access denied'? : barriers for staff accessing, using and sharing published information online within the National Health Service (NHS) in England : technology, risk, culture, policy and practice." Thesis, University of Sheffield, 2017. http://etheses.whiterose.ac.uk/19826/.

Full text
Abstract:
The overall aim of the study was to investigate barriers to online professional information seeking, use and sharing occurring within the NHS in England, their possible effects (upon education, working practices, working lives and clinical and organisational effectiveness), and possible explanatory or causative factors. The investigation adopted a qualitative case study approach, using semi-structured interviews and documentary analysis as its methods, with three NHS Trusts of different types (acute - district general hospital, mental health / community, acute – teaching) as the nested sites of data collection. It aimed to be both exploratory and explanatory. A stratified sample of participants, including representatives of professions whose perspectives were deemed to be relevant, and clinicians with educational or staff development responsibilities, was recruited for each Trust. Three non-Trust specialists (the product manager of a secure web gateway vendor, an academic e-learning specialist, and the senior manager at NICE responsible for the NHS Evidence electronic content and web platform) were also interviewed. Policy documents, statistics, strategies, reports and quality accounts for the Trusts were obtained via public websites, from participants or via Freedom of Information requests. Thematic analysis following the approach of Braun and Clarke (2006) was adopted as the analytic method for both interviews and documents. The key themes of the results that emerged are presented: barriers to accessing and using information, education and training, professional cultures and norms, information governance and security, and communications policy. The findings are discussed under three main headings: power, culture, trust and risk in information security; use and regulation of Web 2.0 and social media, and the system of professions. It became evident that the roots of problems with access to and use of such information lay deep within the culture and organisational characteristics of the NHS and its use of IT. A possible model is presented to explain the interaction of the various technical and organisational factors that were identified as relevant. A number of policy recommendations are put forward to improve access to published information at Trust level, as well as recommendations for further research.
APA, Harvard, Vancouver, ISO, and other styles
5

Beiter, Bernd Michael. "Secret sharing schemes on general access structures /." Aachen : Shaker, 2008. http://d-nb.info/991819993/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sleeper, Manya. "Everyday Online Sharing." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/881.

Full text
Abstract:
People make a range of everyday decisions about how and whether to share content with different people, across different platforms and services, during a variety of tasks. These sharing decisions can encompass complex preferences and a variety of access-control dimensions. In this thesis I examine potential methods for improving sharing mechanisms by better understanding the everyday online sharing environment and evaluating a potential sharing tool. I first present two studies that explore how current sharing mechanisms may fall short on social networking sites, leading to suboptimal outcomes such as regret or self censorship. I discuss the implications of these suboptimal outcomes for the design of behavioral nudging tools and the potential for improving the design of selective-sharing mechanisms. I then draw on a third study to explore the broader “ecosystem” of available channels created by the services and platforms people move between and combine to share content in everyday contexts. I examine the role of selective-sharing features in the broader audience-driven and task-driven dynamics that drive sharing decisions in this environment. I discuss the implications of channel choice and dynamics for the design of selective-sharing mechanisms. Using insights from current shortfalls and ecosystem-level dynamics I then present a fourth study examining the potential for adding topic-driven sharing mechanisms to Facebook. I use design mockups and a lab-based interview to explore participants’ hypothetical use cases for such mechanisms. I find that these mechanisms could potentially be useful in a variety of situations, but successful implementation would require accounting for privacy requirements and users’ sharing strategies.
APA, Harvard, Vancouver, ISO, and other styles
7

Eren, Murat Erkan. "Knowledge-sharing Practices Among Turkish Peacekeeping Officers." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149588/.

Full text
Abstract:
The Turkish National Police (TNP) peacekeeping officers experience poor knowledge-sharing practices before, during, and after their tours of duty at the United Nations (UN) field missions, thus causing knowledge loss. The study aims to reveal the current knowledge-sharing practices of the TNP peacekeeping officers and proposes a knowledge-sharing system to share knowledge effectively. It also examines how applicable the knowledge management models are for their knowledge-sharing practices. In order to gain a better understanding about the knowledge-sharing practices of TNP officers, the researcher used a qualitative research method in this study. The researcher used semi-structured interviews in data collection. The participants were selected based on the non-probability and purposive sampling method. Content analysis and constant comparison was performed in the data analysis process. The most important knowledge sources of the peacekeeping officers are their colleagues, the Internet, and email groups. The peacekeepers recommend writing reports, organizing training programs, conducting exit interviews, adopting best practices, and creating a knowledge depository. The study uncovers that organizational culture, hierarchy, and physical proximity are significant factors that have a vital impact on knowledge sharing. Knowledge Conversion Model is substantially applicable for the knowledge-sharing practices of the TNP peacekeeping officer.
APA, Harvard, Vancouver, ISO, and other styles
8

He, Kun. "Content privacy and access control in image-sharing platforms." Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.

Full text
Abstract:
Au cours de ces dernières années, de plus en plus d’utilisateurs choisissent de diffuser leurs photos sur des plateformes de partage d’images. Ces plateformes permettent aux utilisateurs de restreindre l’accès aux images à un groupe de personnes, afin de donner un sentiment de confiance aux utilisateurs vis-à-vis de la confidentialité de ces images. Malheureusement, la confidentialité ne peut être garantie sachant que le fournisseur de la plateforme a accès aux contenus de n’importe quelle image publiée sur sa plateforme. En revanche, si les images sont mises en ligne chiffrées, seules les personnes ayant la possibilité de déchiffrer les images, auront accès aux images. Ainsi, la confidentialité peut être assurée. Trois principales spécificités sont à prendre en compte lors du chiffrement d’une image : le schéma de chiffrement doit être effectué en respectant le format de l’image (e.g. format JPEG), garantir l’indistinguabilité (l’adversaire ne doit obtenir de l’information sur le contenu de l’image à partir de l’image chiffrée), et doit être compatible avec les traitements des images spécifiques à la plateforme de partage d’images. L’objectif principal de cette thèse a été de proposer un tel schéma de chiffrement pour les images JPEG. Nous avons d’abord proposé et implémenté un schéma de chiffrement garantissant la conservation de l’image et l’indistinguabilité. Malheureusement, nous avons montré que sur Facebook, Instagram, Weibo et Wechat, notre solution ne permettait de maintenir une qualité d’images suffisante après déchiffrement. Par conséquent, des codes correcteurs ont été ajoutés à notre schéma de chiffrement, afin de maintenir la qualité des images
In recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
APA, Harvard, Vancouver, ISO, and other styles
9

Kayem, Anne Voluntas dei Massah. "Adaptive Cryptographic Access Control for Dynamic Data Sharing Environments." Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaskaloglu, Kerem. "Some Generalized Multipartite Access Structures." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611965/index.pdf.

Full text
Abstract:
In this work, we study some generalized multipartite access structures and linear secret sharing schemes for their realizations. Given a multipartite set of participants with m compartments (or levels) and m conditions to be satisfied by an authorized set, we firstly examine the intermediary access structures arousing from the natural case concerning that any c out of m of these conditions suffice, instead of requiring anyone or all of the m conditions simultaneously, yielding to generalizations for both the compartmented and hierarchical cases. These are realized essentially by employing a series of Lagrange interpolations and a simple frequently-used connective tool called access structure product, as well as some known constructions for existing ideal schemes. The resulting schemes are non-ideal but perfect. We also consider nested multipartite access structures, where we let a compartment to be defined within another, so that the access structure is composed of some multipartite substructures. We extend formerly employed bivariate interpolation techniques to multivariate interpolation, in order to realize such access structures. The generic scheme we consider is perfect with a high probability such as 1-O(1/q) on a finite field F_q. In particular, we propose a non-nested generalization for the conventional compartmented access structures, which depicts a stronger way of controlling the additional participants.
APA, Harvard, Vancouver, ISO, and other styles
11

Brahma, Swastik Kumar. "Spectrum sharing and service pricing in dynamic spectrum access networks." Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4854.

Full text
Abstract:
Traditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the spectrum to higher valued uses, thereby resulting in inefficient spectrum utilization (23, 38, 42, 62, 67). These limitations have motivated a paradigm shift from static spectrum allocation towards a more 'liberalized' notion of spectrum management in which secondary users can borrow idle spectrum from primary spectrum licensees, without causing harmful interference to the latter- a notion commonly referred to as dynamic spectrum access (DSA) or open spectrum access (3), (82). Cognitive radio (30, 47), empowered by Software Defined Radio (SDR) (81), is poised to promote the efficient use of spectrum by adopting this open spectrum approach. In this dissertation, we first address the problem of dynamic channel (spectrum) access by a set of cognitive radio enabled nodes, where each node acting in a selfish manner tries to access and use as many channels as possible, subject to the interference constraints. We model the dynamic channel access problem as a modified Rubinstein-Stahl bargaining game. In our model, each node negotiates with the other nodes to obtain an agreeable sharing rule of the available channels, such that, no two interfering nodes use the same channel. We solve the bargaining game by finding Subgame Perfect Nash Equilibrium (SPNE) strategies of the nodes. First, we consider finite horizon version of the bargaining game and investigate its SPNE strategies that allow each node to maximize its utility against the other nodes (opponents).; We then extend these results to the infinite horizon bargaining game. Furthermore, we identify Pareto optimal equilibria of the game for improving spectrum utilization. The bargaining solution ensures that no node is starved of channels. The spectrum that a secondary node acquires comes to it at a cost. Thus it becomes important to study the 'end system' perspective of such a cost, by focusing on its implications. Specifically, we consider the problem of incentivizing nodes to provide the service of routing using the acquired spectrum. In this problem, each secondary node having a certain capacity incurs a cost for routing traffic through it. Secondary nodes will not have an incentive to relay traffic unless they are compensated for the costs they incur in forwarding traffic. We propose a path auction scheme in which each secondary node announces its cost and capacity to the routing mechanism, both of which are considered as private information known only to the node. We design a route selection mechanism and a pricing function that can induce nodes to reveal their cost and capacity honestly (making our auction truthful), while minimizing the payment that needs to be given to the nodes (making our auction optimal). By considering capacity constraint of the nodes, we explicitly support multiple path routing. For deploying our path auction based routing mechanism in DSA networks, we provide polynomial time algorithms to find the optimal route over which traffic should be routed and to compute the payment that each node should receive. All our proposed algorithms have been evaluated via extensive simulation experiments. These results help to validate our design philosophy and also illustrate the effectiveness of our solution approach.
ID: 030422691; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (Ph.D.)--University of Central Florida, 2011.; Includes bibliographical references (p. 161-166).
Ph.D.
Doctorate
Electrical Engineering and Computer Science
Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
12

Fu, Kevin E. (Kevin Edward) 1976. "Group sharing and random access in cryptographic storage file systems." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80534.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Vita.
Includes bibliographical references (p. 79-83).
by Kevin E. Fu.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, Haeyoung. "Dynamic spectrum sharing by opportunistic spectrum access with spectrum aggregation." Thesis, University of Surrey, 2015. http://epubs.surrey.ac.uk/807078/.

Full text
Abstract:
The rapid growth of wireless services and the breakneck proliferation of wireless devices continue to strain limited spectrum resource. While the need for efficient spectrum sharing mechanisms has been emphasized, opportunistic spectrum access has been considered as a promising mechanism for dynamic spectrum sharing. However, although the idle spectrum could exist, it is usually rather fragmented and distributed, and hence the secondary network users would face the difficulty in finding required contiguous spectrum. Spectrum aggregation can be exploited to provide effective wide bandwidth communication but at the cost of complexity and overhead. When a primary network uses spectrum dynamically, from the nature of opportunistic spectrum access, collisions can occur between primary and secondary transmissions and spectrum handoff can be utilised to provide reliable communication. However, collision occurrence results in spectrum handoff delay in a secondary network user (SU) along with short-term interference to a primary network user (PU). As a SU accesses more spectrum for higher data rates by spectrum aggregation, collisions can occur more frequently and frequent spectrum handoff will be required. While spectrum aggregation will allow the SU to have high flexibility in spectrum use and spectrum handoff can help improve the reliability of secondary transmissions, the SU faces a new spectrum allocation problem: How wide and which parts of spectrum opportunities should be aggregated while considering the complexity and the overhead for aggregation and for spectrum handoff? This thesis addresses the key challenge of opportunistic spectrum access, focusing on efficient spectrum sharing considering the fragmentation of spectrum opportunities in frequency and time domains. First, considering complexity and overhead for aggregation, the spectrum aggregation approach is investigated and guidelines are derived how to reduce spectrum fragmentation for the efficient spectrum utilisation based on simulation results. Second, the relationship between collision occurrence and spectrum aggregation is analysed. Collision probabilities between primary and secondary transmissions are derived and the impacts of spectrum aggregation on data rates and spectrum handoff are investigated. Then, a spectrum aggregation algorithm is proposed to maximise data rates for a given collision probability threshold. Third, when considering spectrum handoff, the impacts of spectrum aggregation on spectrum handoff and short-term interference to PUs are analysed. Then, the spectrum aggregation algorithm is designed with the aim to minimise collision. Finally, the results of this study are summarised, conclusions are presented and a number of future research topics are proposed.
APA, Harvard, Vancouver, ISO, and other styles
14

Tercero, Vargas Miurel. "Topics in Dynamic Spectrum Access : Market Based Spectrum Sharing and Secondary User Access in Radar Bands." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-33791.

Full text
Abstract:
The steady growth in demand for spectrum has increased research interest in dynamic spectrum access schemes. This thesis studies some challenges in dynamic spectrum access based on two strategies: open sharing and hierarchical access. (1) In the open sharing model, the channels are allocated based on an auction process, taking into account the propagation characteristics of the channels, termed as channel heterogeneity. Two distributed dynamic spectrum access schemes are evaluated, sequential and concurrent. We show that the concurrent accessmechanismperforms better in terms of channel utilization and energy consumption, especially in wireless cellular network with an energy constraint. (2) In the hierarchical model, we assess the opportunities for secondary access in the radar band at 5.6GHz. The primary user is a meteorological radar and WLANs are the secondary users. The secondary users implement an interference protection mechanism to protect the radar, such that the WLAN’s transmission is regulated by an interference threshold. We evaluate the aggregate interference caused to the radar from multiple WLANs transmitting. We derive a mathematicalmodel to approximate the probability distribution function of the aggregate interference at the primary user, considering two cases: when secondary users are homogeneously distributed, and when they are heterogeneously distributed. The heterogeneous distribution of secondary users is modeled using an annulus sector with a higher density, called a hot zone. Finally, we evaluate opportunities for secondary access when WLANs employ an interference protection mechanism that considers the radar’s antenna pattern, such that temporal opportunities for transmission exist. The analytical probability distribution function of the interference is verified showing a good agrement with a Monte Carlo simulation. We show that the aggregate interference is sensitive to the propagation environment, thus in the rural case interference is more severe when compared to the urban case. In the evaluation of the hot zonemodel, we observe that the heterogenous distribution of secondary users has impact on the aggregate interference if the hot zone is near to the radar. The mathematical framework presented in this thesis can easily be adapted to assess interference to other types of primary and secondary users.
QC 20110523
APA, Harvard, Vancouver, ISO, and other styles
15

Attia, Tarek. "Band sharing and satellite diversity techniques for CDMA." Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/842977/.

Full text
Abstract:
High levels of interference between satellite constellation systems, fading and shadowing are a major problem for the successful performance of communication systems using the allocated L/S frequency bands for Non-Geostationary Earth Orbit (NGEO) satellites. As free spectrum is nonexistent, new systems wishing to operate in this band must co-exist with other users, both satellite and terrestrial. This research is mainly concerned with two subjects. Firstly, band sharing between different systems Code Division Multiple Access (CDMA) and Time Division Multiple Access (TDMA) has been evaluated for maximizing capacity and optimising efficiency of using the spectrum available. For the case of widened channel bandwidth of the CDMA channel, the overlapping was tested under different degrees of channel overlap and different orders of filters. The best result shows that at the optimum degree of channel overlap, capacity increases by up to 21%. For the case of fixed channel bandwidth, the optimum overlapping between CDMA systems depends on the filtering Roll-off factor and achieves an improvement of the spectrum efficiency of up to 13.4%. Also, for a number of narrowband signal users sharing a CDMA channel, the best location of narrowband signals to share spectrum with a CDMA system was found to be at the edge of the CDMA channel. Simulation models have been constructed and developed which show the combination of DS- CDMA techniques, forward error correction (FEC) code techniques and satellite diversity with Rake receiver for improving performance of interference, fading and shadowing under different environments. Voice activity factor has been considered to reduce the effect of multiple access interference (MAI). The results have shown that satellite diversity has a significant effect on the system performance and satellite diversity gain achieves an improvement up to 6dB. Further improvements have been achieved by including concatenated codes to provide different BER for different services. Sharing the frequency band between a number of Low Earth Orbit (LEO) satellite constellation systems is feasible and very useful but only for a limited number of LEOS satellite CDMA based constellations. Furthermore, satellite diversity is an essential factor to achieve a satisfactory level of service availability, especially for urban and suburban environments.
APA, Harvard, Vancouver, ISO, and other styles
16

Dursun, Mustafa. "Data Sharing And Access With A Corba Data Distribution Service Implementation." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607681/index.pdf.

Full text
Abstract:
Data Distribution Service (DDS) specification defines an API for Data-Centric Publish-Subscribe (DCPS) model to achieve efficient data distribution in distributed computing environments. Lack of definition of interoperability architecture in DDS specification obstructs data distribution between different and heterogeneous DDS implementations. In this thesis, DDS is implemented as a CORBA service to achieve interoperability and a QoS policy is proposed for faster data distribution with CORBA features.
APA, Harvard, Vancouver, ISO, and other styles
17

Hultell, Johan. "Cooperative and non-cooperative wireless access : Resource and infrastructure sharing regimes." Doctoral thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-9680.

Full text
Abstract:
Future wireless networks will combine multiple radio technologies and subsystems, possibly managed by competing network providers. For such systems it may be advantageous to let the end nodes (terminals) make some or all of the resource management decisions. In addition to reducing complexity and costs, increasing redundancy, and facilitating more timely decisions; distributed resource sharing regimes can decouple the individual subsystems. Decoupled subsystems could be desirable both because competing operators can be business-wise separated and because it allows new technologies to be added (removed) in a modular fashion. However, distributed regimes can also lead to “selfish” wireless nodes who only try to maximize their own performance. The first part of this dissertation studies if selfish nodes can make efficient use of wireless resources, using multiaccess and network layers as examples. The related problems are formulated as noncooperative games between nodes. To maintain tractability nodes are confined to simple strategies that neither account for future payoffs nor allow for coordination. Yet, it is demonstrated that selfish nodes can achieve comparable performance to traditional protocols. These results should be interpreted as an argument in favor of distributed regimes. The second part of this dissertation evaluates the effects of multi-provider network architectures where users can roam freely across all networks. From a supply side perspective the benefits are improved path gain statistics and the fact that different networks may have non-overlapping busy hours. Several network configurations are analyzed and it is shown that cooperation between symmetric providers can yield significant capacity gains for both downlink and uplink; even if the providers have nearly collocated sites. When the providers have different site densities the gains from cooperation are reduced and the provider with a sparse network always gains more from cooperating. This suggests that initially, voluntary cooperation may be limited to some special cases. Lastly, the architecture is analyzed in a context where the providers compete for users on a per session basis by offering access at different prices. Although such architectures currently only exist in a few special cases, they could emerge in domestic markets where the costs to switch and search for new networks are low. Based on a game theoretic formulation it is shown that a competitive market for wireless access can be advantageous for both users and providers. The results presented suggest that the advantages of cooperation of competing providers occur in more than just a few cases.
QC 20100812
APA, Harvard, Vancouver, ISO, and other styles
18

Gonzalez, Sanchez Dina Pamela. "Resource Sharing and Network Deployment Games : In Open Wireless Access Markets." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-39480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mazurek, Michelle L. "A Tag-Based, Logical Access-Control Framework for Personal File Sharing." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/325.

Full text
Abstract:
People store and share ever-increasing numbers of digital documents, photos, and other files, both on personal devices and within online services. In this environment, proper access control is critical to help users obtain the benefits of sharing varied content with different groups of people while avoiding trouble at work, embarrassment, identity theft, and other problems related to unintended disclosure. Current approaches often fail, either because they insufficiently protect data or because they confuse users about policy specification. Historically, correctly managing access control has proven difficult, timeconsuming, and error-prone, even for experts; to make matters worse, access control remains a secondary task most non-experts are unwilling to spend significant time on. To solve this problem, access control for file-sharing tools and services should provide verifiable security, make policy configuration and management simple and understandable for users, reduce the risk of user error, and minimize the required user effort. This thesis presents three user studies that provide insight into people’s access-control needs and preferences. Drawing on the results of these studies, I present Penumbra, a prototype distributed file system that combines semantic, tag-based policy specification with logicbased access control, flexibly supporting intuitive policies while providing high assurance of correctness. Penumbra is evaluated using a set of detailed, realistic case studies drawn from the presented user studies. Using microbenchmarks and traces generated from the case studies, Penumbra can enforce users’ policies with overhead less than 5% for most system calls. Finally, I present lessons learned, which can inform the further development of usable access-control mechanisms both for sharing files and in the broader context of personal data.
APA, Harvard, Vancouver, ISO, and other styles
20

Chikono, Albert Nhawo. "Knowledge sharing practices amongst academics at the Zimbabwe Open University." University of the Western Cape, 2018. http://hdl.handle.net/11394/6426.

Full text
Abstract:
Magister Library and Information Studies - MLIS
This study investigated knowledge sharing (KS) practices at the Zimbabwe Open University (ZOU) in Zimbabwe. The study assessed the knowledge sharing practices in the ZOU regional campus faculty departments and identified gaps, with the aim to find out how knowledge is being managed, shared in an Open and distance learning institution and if knowledge management (KM) is playing a role. The quantitative study was undertaken at the 10 regional campuses of the Zimbabwe Open University. A questionnaire survey was carried out to collect data from a sample of 100 academic staff in the 10 Regional Centres. The underlying question was whether the university academic members were aware of the knowledge that exists, how this knowledge is created and, shared and flows in the organization. The study also sought to establish the views of academic staff, on the benefits that can be reaped from KM practices. The study confirmed that there is willingness to engage in knowledge sharing activities. However, the lack of a clear knowledge policy negatively impacts on the university’s ability to competitively position itself in the knowledge economy as a knowledge driven university and this impacts research productivity and distance learning course delivery at the ZOU. One of the key recommendations emanating from this research is that the university should have a Knowledge policy aligned to its strategic plan which will act as a guideline on the sharing of knowledge internally and externally as well as make it mandatory for academic staff to publish internally as well as to store their publications in the university repository.
APA, Harvard, Vancouver, ISO, and other styles
21

Effken, Judith, Charlotte Weaver, Kelly Cochran, Ida Androwich, and Ann O’Brien. "Toward a Central Repository for Sharing Nursing Informatics’ Best Practices." LIPPINCOTT WILLIAMS & WILKINS, 2016. http://hdl.handle.net/10150/621208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

MacPherson, Lesley. "Grey Level Visual Cryptography for General Access Structures." Thesis, University of Waterloo, 2002. http://hdl.handle.net/10012/1126.

Full text
Abstract:
Visual cryptography, first introduced by Naor and Shamir, allows a secret (black and white) image to be encoded and distributed to a set of participants such that certain predefined sets of participants may reconstruct the image without any computation. In 2000, Blundo, De Santis, and Naor introduced a model for grey-level visual cryptography which is a generalization of visual cryptography for general access structures. Grey-level visual cryptography extends this model to include grey-scale images. Decoding is done by the human visual system. In this thesis we survey known results of grey-level visual cryptography and visual cryptography for general access structures. We extend several visual cryptography constructions to grey-level visual cryptography, and derive new results on the minimum possible pixel expansion for all possible access structures on at most four participants.
APA, Harvard, Vancouver, ISO, and other styles
23

Morrison, Heather. "The dramatic growth of open access : implications and opportunities for resource sharing." Haworth Press, 2006. http://hdl.handle.net/2429/953.

Full text
Abstract:
The Open Access movement seeks to make scholarly, peer-reviewed journal articles freely available to anyone, anywhere over the World Wide Web. There were some very significant developments in the area of Open Access (OA) in 2004, including statements by major funders in support of Open Access. There are now so many Open Access scholarly journal articles freely available, that, in the author’s opinion, being aware of, and using, the resources and related tools is now essential for libraries. Libraries can provide more resources faster for users by supplementing paid resources with ones that are Open Access. Library resources, such as link resolvers, are beginning to incorporate Open Access materials and web searches for Open Access materials. For example, the reSearcher software suite includes Open Access collections along with subscription-based resources in the CUFTS journals knowledgebase, and a web search for an Open Access copy of an article in the GODOT link resolver. SFX also incorporates Open Access journals. After exhausting more traditional resources, interlibrary loans staff are beginning to include Google searching in their workflow. This article will discuss what Open Access is, the dramatic growth of Open Access, and major collections, resources and tools. Implications, issues, and leadership opportunities for resource sharing specialists will be explored.
APA, Harvard, Vancouver, ISO, and other styles
24

Nuur, Ahmed, and Fadel Randia. "Sell Me Yours? : Exploring Social Interaction in the Sharing Economy Practices." Thesis, Uppsala universitet, Institutionen för samhällsbyggnad och industriell teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447245.

Full text
Abstract:
Today, there has been growing concern on how to live a life more sustainable in terms of people’s needs and consumptions, globally with no exception in Sweden. It is due to the challenges that society faces to ensure the existence of resources availability for current as well as future generation. At the same time, we are looking at an era where the advancement of technology could incentivize people to shift their consumption pattern from acquiring new products to used goods from other peers. This technology provides the possibility for peer communication and matchmaking to exchange goods from local communities to different regions within the country. This practice is widely known as the sharing economy, although many other similar terms are used by academic scholars as well as business practitioners. As of today, several studies have attempted to understand people’s motives for participating in the sharing economy practice. Nevertheless, some other aspects have not been thoroughly researched, such as the social interaction within the practice. Social interaction is perceived as one of the essential features that the sharing economy heavily relies on among the two practitioners. Hence, the main aim of this study is to understand the role of social interaction between peers while outlining the dimensions within an interaction that affects participation. Therefore, a qualitative study was adopted for this thesis by interviewing eight Swedes while observing the second-hand platforms they were exercising. In this study, we adopted the Social Practice Theory as our theoretical framework to comprehend the meaning behind the practitioners’ involvement, the competence they display, and the materials they curate within the practice. The findings of this study illustrated that social interaction was not only an essential part in the second-hand practice, but also inevitable to avoid completely. Furthermore, our empirical findings illustrated social interaction as a gateway to receive financial benefits while simultaneously offering the practitioners the possibility of manifesting their virtues through the practice. Moreover, we also discovered that social interaction was a crucial element for promoting but also preserving practice. The aspect of social interaction makes the involved practitioners need to manage the adequate know-how/understanding and competencies to get benefits from the practice, such as negotiation capability, dispute handling, risk evaluation, and managing overly apprehension. In addition, we found it beneficial to distinguish the buying practice and the selling practice as two different practices instead of a single practice.
APA, Harvard, Vancouver, ISO, and other styles
25

Stuart, Nancy. "ETDs and Best Practices in Canada." Universidad Peruana de Ciencias Aplicadas (UPC), 2012. http://hdl.handle.net/10757/622614.

Full text
Abstract:
Conferencia realizado del 12 al 14 de setiembre en Lima, Peru del 2012 en el marco del 15º Simposio Internacional de Tesis y Disertaciones Electrónicas (ETD 2012). Evento aupiciado por la Universidad Nacional Mayor de San Marcos (UNMSM) y la Universidad Peruana de Ciencias Aplicadas (UPC).
Institutional Repositories (IRs) and ETD programs conducted in December 2011. The purpose of the survey was two-fold. The first was to show the growth of Institutional Repositories (IRs) across Canada. The second was to illustrate the state of the electronic theses and dissertations (ETD) submission programs at Canadian institutions. The survey was a follow up to a 2009 survey and illustrates there has been steady growth in both the number of IRs and ETD programs in Canada. Results of the survey include statistics on the number of IRs, types of materials in the IRs, the type software platform, the number of ETD programs, whether electronic submission is mandatory, if embargoed or restricted theses and dissertations are allowed, the number of institutions having their ETDs harvested by Library and Archives Canada and the number of institutions sending their theses to ProQuest and retaining a microfiche copy. The survey was sent to Canadian institutions where a thesis or dissertation is required for graduation and to Canadian institutions who are members of the Canadian Association for Research Libraries. Responses were received from 33 institutions. Best practices for ETD programs and workflows will also be discussed. Focus areas include the PDF format for multiple and multi-media files, OAI-PMH harvesting, mandatory submission and embargoes. By analyzing the results of the survey, it is clear that Canada is moving forward quickly in the implementation of ETD submission programs. The fact that over 70% of Canadian institutions have their ETDs harvested by Library and Archives Canada puts Canada, and it’s National Library, in a unique position to share its knowledge and expertise in ETD programs and ETD workflows.
APA, Harvard, Vancouver, ISO, and other styles
26

Bany, Salameh Haythem Ahmad Mohammed. "Channel Access Mechanisms and Protocols for Opportunistic Cognitive Radio Networks." Diss., The University of Arizona, 2009. http://hdl.handle.net/10150/193865.

Full text
Abstract:
High traffic load over the unlicensed portion of the radiospectrum (a.k.a., ISM bands) along with inefficient usage of thelicensed spectrum gave impetus for a new paradigm in spectrumallocation, whose main purpose is to improve spectrum efficiencythrough opportunistic access. Cognitive radios (CRs) havebeen proposed as a key enabling technology for such paradigm.Operating a CR network (CRN) without impacting the performance oflicensed (primary) users requires new protocols for informationexchange as well as mathematical tools to optimize thecontrollable parameters of the CRN. In this dissertation, wetarget the design of such protocols. First, we develop adistributed CRN MAC (COMAC) protocol that enables unlicensed usersto dynamically utilize the spectrum while limiting theinterference they inflict on primary (PR) users. The main noveltyin COMAC lies in not assuming a predefined CR-to-PR power mask andnot requiring coordination with PR users. Second, we propose anovel distance-dependent MAC protocol for CRNs in whicheach CR is equipped with multiple transceivers. Our protocol(called DDMAC) attempts to maximize the CRN throughput byfollowing a novel probabilistic channel assignment mechanism. Thismechanism exploits the dependence between the signal's attenuationmodel and the transmission distance while considering the trafficprofile. We show that through its distance- and traffic-aware,DDMAC significantly improves network throughput. Finally, weaddress the problem of assigning channels to CR transmissions,assuming one transceiver per CR. The main goal of our design is tomaximize the CRN throughput with respect to both spectrumassignment and transmission power. Specifically, we presentcentralized and distributed solutions that leverage the uniquecapabilities of CRs. Compared with previously proposed protocols,our schemes are shown to significantly improve network throughput.
APA, Harvard, Vancouver, ISO, and other styles
27

Rakshit, Sudipta. "ACCESS GAMES: A GAME THEORETIC FRAMEWORK FOR FAIR BANDWIDTH SHARING IN DISTRIBUTED SYSTEMS." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2444.

Full text
Abstract:
In this dissertation, the central objective is to achieve fairness in bandwidth sharing amongst selfish users in a distributed system. Because of the inherent contention-based nature of the distributed medium access and the selfishness of the users, the distributed medium access is modeled as a non-cooperative game; designated as the Access Game. A p-CSMA type medium access scenario is proposed for all the users. Therefore, in the Access Game, each user has two actions to choose from: "transmit" and "wait". The outcome of the Access Game and payoffs to each user depends on the actions taken by all the users. Further, the utility function of each user is constructed as a function of both Quality of Service (QoS) and Battery Power (BP). Various scenarios involving the relative importance of QoS and BP are considered. It is observed that, in general the Nash Equilibrium of the Access Game does not result into fairness. Therefore, Constrained Nash Equilibrium is proposed as a solution. The advantage of Constrained Nash Equilibrium is that it can be predicated on the fairness conditions and the solution will be guaranteed to result in fair sharing of bandwidth. However, Constrained Nash Equilibrium is that it is not self-enforcing. Therefore, two mechanisms are proposed to design the Access Game in such a way that in each case the Nash Equilibrium of the Access Game satisfies fairness and maximizes throughput. Hence, with any of these mechanisms the solution of the Access Game becomes self-enforcing.
Ph.D.
School of Computer Science
Arts and Sciences
Computer Science
APA, Harvard, Vancouver, ISO, and other styles
28

Sacramento, Junior Luiz Claudio Ferreira. "More than words: broader information sharing and access to the formal credit market." reponame:Repositório Institucional do FGV, 2017. http://hdl.handle.net/10438/18293.

Full text
Abstract:
Submitted by Luiz Claudio Ferreira Sacramento Junior (luizclaudiosacramento@hotmail.com) on 2017-05-22T23:07:02Z No. of bitstreams: 1 Dissertation_final version.docx: 377515 bytes, checksum: c5d360cbf921b7c3982e47f2705d59f4 (MD5)
Approved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2017-05-23T19:21:16Z (GMT) No. of bitstreams: 1 Dissertation_final version.docx: 377515 bytes, checksum: c5d360cbf921b7c3982e47f2705d59f4 (MD5)
Made available in DSpace on 2017-05-30T18:56:11Z (GMT). No. of bitstreams: 1 Dissertation_final version.docx: 377515 bytes, checksum: c5d360cbf921b7c3982e47f2705d59f4 (MD5) Previous issue date: 2017-03-28
This paper shows how information sharing mechanisms might enable Micro and Small Enterprises (MSEs) to increase their access to formal credit markets. Using a unique dataset provided by the Brazilian Central Bank and Ministry of Labor, a change is applied in the threshold of loans that must be reported and shared by all active financial institutions as a gradual increase in the available information on MSEs. Results suggest that borrowers that benefited by this change obtained more loans and smaller interest rates, and by building a good client pool ended up receiving smaller maturities. Firms were also less likely to delay repayments and present smaller loan losses. This evidence sheds light on information asymmetry and literature on financial inclusion by showing that information sharing mechanisms can improve the decision to offer credit, and MSEs can become less dependent of relationship lending to obtain loans.
Esse estudo mostra como mecanismos de compartilhamento de informação podem permitir Micro e Pequenas Empresas (MPEs) podem melhorar seu acesso a mercados de crédito formais. Utilizando uma base de dados única obtida junto ao Banco Central do Brasil e Ministério do Trabalho, uma mudança é aplicada no limite do valor de empréstimos que precisam ser reportados e compartilhados por todas as instituições financeiras ativas como uma mudança gradual na informação disponível sobre MPEs. Os resultados indicam que tomadores de empréstimo que se beneficiaram dessa mudança obtiveram mais empréstimos e menores taxas de juros, e por constituir um bom grupo de clientes acabam por receber menores vencimentos. As empresas são ainda menos prováveis de atrasar seus pagamentos e apresentam menores perdas aos bancos. As consequências desse estudo lançam luz sobre a literatura de assimetria de informação e inclusão financeira ao mostrar que mecanismos de compartilhamento de informação podem auxiliar na decisão de oferecer crédito e MPEs podem se tornar menos dependentes de empréstimos de relacionamento para obter empréstimos.
APA, Harvard, Vancouver, ISO, and other styles
29

Sánchez, Vergara José Ignacio. "Urban practices and social narratives in the sharing city. The construction of imaginaries from the new communities of sharing." Doctoral thesis, Universitat Rovira i Virgili, 2021. http://hdl.handle.net/10803/672218.

Full text
Abstract:
Aquesta tesi doctoral es centra en l'estudi interdisciplinari del concepte de sharing city (SC). L'objectiu general va ser explorar des de la gestió, els imaginaris que es creen en la SC a partir de les seves pràctiques urbanes i narratives socials. La tesi és un compendi de publicacions. La primera és una revisió sistemàtica de literatura sobre el concepte SC. Un valor important afegit d'aquest article és que es tracta del primer estudi acadèmic que examina i sistematitza les pràctiques del compartir a la SC. Els resultats consoliden la relació entre l'etiqueta sharing city i com utilitza estratègies de place branding i place management per consolidar la seva representació. La segona publicació s'enfoca en la implementació de la SC per l'actor institucional. Mitjançant el frame analysis es va explorar la comunicació estratègica de Barcelona com una SC. Els resultats demostren que el govern local acompanya el creixement urbà des d'una perspectiva social, fomenta narratives per identificar i incloure a més actors dins del procés, i transmet els valors del compartir de forma positiva. La tercera publicació tracta els espais de cotreball a la SC. L'estudi es va realitzar en oficines de Barcelona i Berlín, seguint el mètode de Teoria Fonamentada (Grounded Theory). Els resultats van identificar que es dissenyen atmosferes de lloc (place atmospheres) per promoure el compartir, el compromís dels membres amb l'espai / comunitat, i que la cultura de compartir es reforça amb eines de comunicació corporativa. Aquesta tesi contribueix a la discussió sobre la SC com una etiqueta emergent que enfoca idees i valors comunitaris. A més, situa l'atenció en pràctiques urbanes i narratives socials que promouen la relació permanent entre actors de la ciutat, així com la recerca de consens ciutadà.
Esta tesis doctoral se centra en el estudio interdisciplinar del concepto de sharing city (SC). El objetivo general fue explorar desde la gestión, los imaginarios que se crean en la SC a partir de sus prácticas urbanas y narrativas sociales. La tesis es un compendio de publicaciones. La primera es una revisión sistemática de literatura sobre el concepto SC. Un valor importante añadido de este artículo es que se trata del primer estudio académico que examina y sistematiza las prácticas del compartir en la SC. Los resultados afianzan la relación entre la etiqueta sharing city y cómo utiliza estrategias del place branding y place management para consolidar su representación. La segunda publicación se enfoca en la implementación de la SC por el actor institucional. Mediante el frame analysis se exploró la comunicación estratégica de Barcelona como una SC. Los resultados demuestran que el gobierno local acompaña el crecimiento urbano desde una perspectiva social, fomenta narrativas para identificar e incluir a más actores dentro del proceso, y transmite los valores del compartir de forma positiva. La tercera publicación trata los espacios de coworking en la SC. El estudio se realizó en oficinas de Barcelona y Berlín, siguiendo el método de Teoría Fundamentada. Los resultados identificaron que se diseñan atmósferas de lugar para promover el compartir, el compromiso de los miembros con el espacio/comunidad, y que la cultura de compartir se refuerza con herramientas de comunicación corporativa. Esta tesis contribuye a la discusión sobre la SC como una etiqueta emergente que enfoca ideas y valores comunitarios. Además, sitúa la atención en prácticas urbanas y narrativas sociales que promueven la relación permanente entre actores de la ciudad, así como la búsqueda del consenso ciudadano.
This doctoral thesis focuses on the interdisciplinary study of the concept of sharing city (SC). The general objective was to explore from management, the imaginaries that are created in SC from its urban practices and social narratives. The thesis is a compendium of publications. The first is a systematic literature review on the SC concept. An important added value of this article is that it is the first academic study that examines and systematizes the practices of sharing in SC. The results strengthen the relationship between the sharing city label and how it uses place branding and place management strategies to consolidate its representation. The second publication focuses on the implementation of the SC by the institutional actor. Through the frame analysis, the strategic communication of Barcelona as a SC was explored. The results show that the local government accompanies urban growth from a social perspective, fosters narratives to identify and include more actors in the process, and transmits the values of sharing in a positive way. The third publication deals with coworking spaces in SC. The study was carried out in offices in Barcelona and Berlin, following the Grounded Theory method. The results revealed that atmospheres of place are designed to promote sharing, the commitment of members with the space/community, and that the culture of sharing is reinforced with corporate communication tools. This thesis contributes to the discussion about SC as an emerging label that focuses on community ideas and values. In addition, it places attention on urban practices and social narratives that promote the permanent relationship between city actors, as well as the search for citizen consensus.
APA, Harvard, Vancouver, ISO, and other styles
30

Koppenhafer, Leslie. "Accounting for the Social Element in Access-Based Consumption." Thesis, University of Oregon, 2014. http://hdl.handle.net/1794/18511.

Full text
Abstract:
This dissertation examines how the inclusion of the social element in access-based consumption can influence affective and behavioral responses. The first essay builds upon the dimensions proposed by Bardhi and Eckhardt, who found that market mediation, anonymity, temporality, consumer involvement, type of accessed object and political consumerism are key dimensions on which to study access-based consumption. A reconceptualization of these dimensions is proposed in the current work to incorporate the social element. Foremost, a separation of renting and sharing based on the presence or absence of economic exchange is proposed. The implications for the remaining dimensions of anonymity, temporality, consumer participation, type of accessed object, political consumerism and governance are then discussed. Finally, key outcome variables of community, cooperation, loneliness and contagion are reviewed. In Essay 2, the guiding theory of social distance is used to empirically test the impact of the social element on evaluations of a rental service on the outcomes of satisfaction, attitude, disgust and community. In the rental context examined, users are interpersonally anonymous indicating that there is no relationship between the current user and other users. In addition, users must engage in extra-role behaviors because no intermediaries are present. In three experiments, it is shown that encounters with other users can lead to increased feelings of disgust and decreased satisfaction and attitude towards the rental service. Having information about other users, provided in the form of avatar images, can enhance feelings of community, as can certain types of communication between users. Given the benefits that emerge from feelings of community, Essay 3 explores factors that can enhance or detract from sense of community. Factors such as apathetic participation and similarity are considered. In addition, positive outcomes that emerge from feelings of community, such as sign-up likelihood and care behaviors, are measured.
2015-04-17
APA, Harvard, Vancouver, ISO, and other styles
31

Dulipovici, Alina Maria. "Exploring IT-Based Knowledge Sharing Practices: Representing Knowledge within and across Projects." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cis_diss/33.

Full text
Abstract:
EXPLORING IT-BASED KNOWLEDGE SHARING PRACTICES: REPRESENTING KNOWLEDGE WITHIN AND ACROSS PROJECTS Drawing on the social representation literature combined with a need to better understand knowledge sharing across projects, this research lays the ground for the development of a theoretical account seeking to explain the relationship between project members’ representations of knowledge sharing practices and the use of knowledge-based systems as boundary objects or shared systems. The concept of social representations is particularly appropriate for studying social issues in continuous evolution such as the adoption of a new information system. The research design is structured as an interpretive case study, focusing on the knowledge sharing practices within and across four project groups. The findings showed significant divergence among the groups’ social representations. Sharing knowledge across projects was rather challenging, despite the potential advantages provided by the knowledge-based system. Therefore, technological change does not automatically trigger the intended changes in work practices and routines. The groups’ social representations need to be aligned with the desired behaviour or patterns of actions.
APA, Harvard, Vancouver, ISO, and other styles
32

Monazam, Tabrizi Negar. "Models for describing knowledge sharing practices : the case study of UK hospitals." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/models-for-describing-knowledge-sharing-practices-the-case-study-of-uk-hospitals(149aef90-a6bf-4436-ae73-dca3b26492de).html.

Full text
Abstract:
A successful knowledge sharing process must take various elements into account, in order to ensure a positive outcome. In such a context, knowledge sharing means, knowledge sharing governance mechanisms and knowledge sharing process are identified as the key elements and enablers for the best knowledge sharing practices. Therefore, integrating various factors related to knowledge sharing phenomenon is an important task, which is ignored in current studies. Hence, this research investigates the knowledge-sharing phenomenon from different perspectives with the aim of providing a comprehensive view of knowledge sharing practices. Key concepts from the literature, i.e. knowledge sharing means, governance mechanisms and process, are integrated into a model and the intrinsic relationship among them is explored to explain how and why a strong approach of knowledge sharing can be achieved. The proposed model of the study is then applied as a critical theoretical tool to investigate medical knowledge sharing practices in NHS Trusts. One of the main challenges that have been argued in the literature, in the context of NHS, is about understanding the ways that sharing medical knowledge can be implemented more effectively. This study thus provides evidence on the medical knowledge sharing approaches which have worked well, and those which have not, with the aim of supporting the NHS Trusts for a better way of sharing medical knowledge. While the main focus here is the case of NHS Trusts, the findings can be useful for other healthcare organisations elsewhere. This study undertakes its philosophical standpoint from the perspective of critical realism, and thus provides an example of the application of the research paradigm in empirical knowledge sharing research. Adopting a dominantly qualitative method, two NHS Trusts are selected to conduct an empirical study to explore medical knowledge sharing practices. Evidence from the study indicates that the proposed model of the study can be seen as a powerful diagnostic tool for understanding knowledge sharing phenomenon, because it can provide a powerful explanation of the motivations and actions of both human and non-human (e.g. ICT) actors who establish the elements of knowledge sharing practices.!This study adds to the body of knowledge via proposing a new way of finding a new set of answers to explain the knowledge sharing practices by developing a holistic model. By using this model, factors that influence the knowledge sharing practices can be investigated and identified under the same umbrella. It also sheds new light on our understanding of the nature of the inner workings of the knowledge sharing process. The four stages of the knowledge sharing process allow scholars to investigate knowledge sharing practices systematically from the pre-implementation stage to implementation and post-implementation stages. Each stage has its own nature; therefore, the causes of the success/failure of knowledge sharing practices can be identified in deep detail. This concept can help to detect which actor(s) is the cause of strong/ weak approach of knowledge sharing, in what stage, and why. In terms of practical relevance, the proposed model of this study can help managers better understand knowledge sharing practices from different perspectives, and take a valuable insight as to how to choose the appropriate knowledge sharing means and governance mechanisms, in order to enable the medical knowledge sharing process more effectively and efficiently. We believe that the model can be applied as a diagnostic tool to determine the root causes of knowledge sharing problems and likely remedial actions.
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Yi. "Heteroglossic Chinese Online Literacy Practices On Micro-Blogging and Video-Sharing Sites." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6788.

Full text
Abstract:
This study investigates Chinese online users’ adoptions of various languages and other meaning making signs in their online literacy practices in two popular Chinese CMC sites, Weibo (micro-blogging) and bilibili.com (video-sharing). Adopting the theoretical framework of heteroglossia (Bakhtin, 1981), I explore how various meaning making resources are creatively and playfully utilized by Chinese users in their online communication. After two-month data collection, I sampled the non-standard literacy practices (e.g., foreign language transliteration) identified from micro-blogging postings and comments in Weibo, as well as spontaneous (known as “bullet curtain” comments) and traditional text-box comments from featured videos in bilibili.com. The findings resulted in 30,005 non-standard literacy practice types which contain meaning making features from languages (e.g., stylized Chinese Mandarin) and other meaning making signs (e.g., emojis) from both sites. The analysis suggests that Chinese online communication are noticeably hybrid with plurillingual and non-linguistic semiotic resources. These practices reflect the Bakhtinian notion of heteroglossic communication in which people stylize their language use with various meaning making resources. In addition, many practices are also “carnivalesque” (Bakhtin, 1984) which is characterized with creativity and playfulness. The study further deconstructs the notion of multilingualism and extends the discussion of how online communication opens up space for non-conventional and creative literacy practices, which potentially challenge the authoritative policies and voices.
APA, Harvard, Vancouver, ISO, and other styles
34

Dyer, Jennifer Nicole. "SHARING AFRICAN AMERICAN CHILDREN'S LITERATURE: MULTICULTURAL TEACHING PRACTICES OF TWO MALE TEACHERS." Columbus, Ohio : Ohio State University, 2002. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1039545071.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2002.
Title from first page of PDF file. Document formatted into pages; contains xii, 194 p.; also contains graphics (some col.). Includes abstract and vita. Advisor: Evelyn Freeman, College of Education. Includes bibliographical references (p. 174-192).
APA, Harvard, Vancouver, ISO, and other styles
35

Low, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Deli, Christopher. "Information sharing practices and the tools to support it: An interview study at ABB." Thesis, Linköping University, Economic Information Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-54541.

Full text
Abstract:

The purpose of this thesis is to investigate how information sharing in distributed development projects can be improved through the use of information sharing tools. Work published on this subject has been investigated and ABB employees whose work highly depends on information sharing have been interviewed.

APA, Harvard, Vancouver, ISO, and other styles
37

Bennis, M. (Mehdi). "Spectrum sharing for future mobile cellular systems." Doctoral thesis, University of Oulu, 2009. http://urn.fi/urn:isbn:9789514260582.

Full text
Abstract:
Abstract Spectrum sharing has become a high priority research area over the past few years. The motivation behind this lies in the fact that the limited spectrum is currently inefficiently utilized. As recognized by the World radio communication conference (WRC)-07, the amount of identified spectrum is not large enough to support large bandwidths for a substantial number of operators. Therefore, it is paramount for future mobile cellular systems to share the frequency spectrum and coexist in a more efficient manner. The present dissertation deals with the problem of spectrum scarcity by examining spectrum sharing paradigms where a migration from fixed to flexible resource allocation is investigated. First, a radio resource management (RRM) architecture is proposed where advanced spectrum functionalities accounting for the short-term variations of the spectrum are examined. The achievable gains are shown in a multi-cell, multi-network environment with realistic traffic patterns from a European operator, enhancing thereby spectrum utilization. Second, inter-operator resource sharing in a broadband network is considered where a packet-based cellular network is developed. It is shown that the obtained gains in terms of quality-of-service (QoS), number of operators and different data rates requirements improve the overall efficiency of the network. Besides and in order to cope with the stringent data rate requirements, direct terminal-to-terminal (T2T) communication is examined in which a realistic algorithm is proposed advocating resource reuse in a cellular system with simultaneous communications between mobiles. Numerical results confirm the advantages of resource reuse in terms of throughput, average frame delays and power consumption. In this thesis, a proposal is made as how to enhance spectrum sharing. The concept of hierarchy is proposed in which wireless competitive operators share the same spectrum band. The decentralized hierarchical approach is shown to bridge the gap between the selfish and centralized approach. Interference avoidance is studied for point-to-point communication in a selforganized network where different optimal power allocation strategies are examined along with the impact of frequency reuse on the ergodic capacity of the network.
APA, Harvard, Vancouver, ISO, and other styles
38

Oyediran, David. "Spectrum Sharing: Overview and Challenges of Small Cells Innovation in the Proposed 3.5 GHz Band." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596402.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV
Spectrum sharing between Federal and commercial users is a technique proposed by the FCC and NTIA to open up the 3.5 GHz band for wireless broadband use and small cell technology is one of the candidates for its' realization. The traffic on small cells is temporal and their chances of interfering with other services in shared spectrum are limited. DoD has a documented requirement of 865 MHz by 2025 to support telemetry but only 445 MHz is presently available. DoD is conducting researches to realize test and evaluation spectrum efficient technology with the aim to develop, demonstrate, and evaluate technology components required to enable flight and ground test telemetry operations. This paper will provide an overview on spectrum sharing using small cell technology for LTE-Advanced and dynamic spectrum access would be briefly described. Research challenges for protocols and algorithms would be addressed for future studies.
APA, Harvard, Vancouver, ISO, and other styles
39

Johansson, Klas. "Cost efficient provisioning of wireless access : infrastructure cost modeling and multi-operator resource sharing." Licentiate thesis, KTH, Skolan för elektro- och systemteknik (EES), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Jie. "Impact of disk access on the performance of load sharing policies in distributed systems." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq36882.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Chennells, Roger Scarlin. "Equitable access to human biological resources in developing countries : benefit sharing without undue inducement." Thesis, University of Central Lancashire, 2014. http://clok.uclan.ac.uk/10634/.

Full text
Abstract:
The main research question of this thesis is: How can cross-border access to human genetic resources, such as blood or DNA samples, be governed to achieve equity for developing countries? Access to and benefit sharing for human biological resources is not regulated through an international legal framework such as the Convention on Biological Diversity, which applies only to plants, animals and micro-organisms as well as associated traditional knowledge. This legal vacuum for the governance of human genetic resources can be attributed (in part) to the concern that benefit sharing might provide undue inducements to research participants and their communities. This thesis shows that: (a) Benefit sharing is crucial to avoiding the exploitation of developing countries in genomic research. (b) With functioning research ethics committees, undue inducement is less of a concern in genetic research than in other medical research (e.g. clinical trials). (c) Concerns remain over research involving indigenous populations and some recommendations are provided. In drawing its conclusions, the thesis resolves a highly pressing topic in global bioethics and international law. Originally, it combines bioethical argument with jurisprudence, in particular reference to the law of equity and the legal concepts of duress (coercion), unconscionable dealing, and undue influence.
APA, Harvard, Vancouver, ISO, and other styles
42

Sohul, Munawwar Mahmud. "Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/88018.

Full text
Abstract:
The radio spectrum dependent applications are facing a huge scarcity of the resource. To address this issue, future wireless systems require new wireless network architectures and new approaches to spectrum management. Spectrum sharing has emerged as a promising solution to address the radio frequency (RF) spectrum bottleneck. Although spectrum sharing is intended to provide flexible use of the spectrum, the architecture of the existing approaches, such as TV White Space [1] and Citizen Broadband Radio Services (CBRS) [2], have a relatively fixed sharing framework. This fixed structure limits the applicability of the architecture to other bands where the relationship between various new users and different types of legacy users co-exist. Specifically, an important aspect of sharing that has not been explored enough is the cooperation between the resource owner and the opportunistic user. Also in a shared spectrum system, the users do not have any information about the availability and duration of the available spectrum opportunities. This lack of understanding about the shared spectrum leads the research community to explore a number of core spectrum sharing tasks, such as opportunity detection, dynamic opportunity scheduling, and interference protection for the primary users, etc. This report proposes a Primary-Secondary Cooperation Framework to provide flexibility to all the involved parties in terms of choosing the level of cooperation that allow them to satisfy different objective priorities. The cooperation framework allows exchange of a probabilistic assurance: Spectrum Opportunity Duration Assurance (SODA) between the primary and secondary operations to improve the overall spectrum sharing experience for both the parties. This capability will give the spectrum sharing architectures new flexibility to handle evolutions in technologies, regulations, and the requirements of new bands being transitioned from fixed to share usage. In this dissertation we first look into the regulatory aspect of spectrum sharing. We analyze the Federal Communications Commission's (FCC) initiatives with regards to the commercial use of the 150 MHz spectrum block in the 3.5 GHz band. This analysis results into a Spectrum Access System (SAS) architecture and list of required functionalities. Then we address the nature of primary-secondary cooperation in spectrum sharing and propose to generate probabilistic assurances for spectrum opportunities. We use the generated assurance to observe the impact of cooperation from the perspective of spectrum sharing system management. We propose to incorporate primary user cooperation in the auctioning and resource allocation procedures to manage spectrum opportunities. We also analyze the improvement in spectrum sharing experience from the perspective of the primary and secondary users as a result of cooperation. We propose interference avoidance schemes that involve cooperation to improve the achievable quality of service. Primary-secondary cooperation has the potential to significantly influence the mechanism and outcomes of the spectrum sharing systems. Both the primary and secondary operations can benefit from cooperation in a sharing scenario. Based on the priorities of the primary and secondary operations, the users may decide on the level of cooperation that they are willing to participate. Also access to information about the availability and usability of the spectrum opportunity will result in efficient spectrum opportunity management and improved sharing performance for both the primary and secondary users. Thus offering assurances about the availability and duration of spectrum opportunity through primary-secondary cooperation will significantly improve the overall spectrum sharing experience. The research reported in this dissertation is expected to provide a fundamental analytical framework for characterizing and quantifying the implications of primary-secondary cooperation in a spectrum sharing context. It analyzes the technical challenges in modeling different level of cooperation and their impact on the spectrum sharing experience. We hope that this dissertation will establish the fundamentals of the spectrum sharing to allow the involved parties to participate in sharing mechanisms that is suitable to their objective priorities.
PHD
APA, Harvard, Vancouver, ISO, and other styles
43

Bhattarai, Sudeep. "Spectrum Efficiency and Security in Dynamic Spectrum Sharing." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82872.

Full text
Abstract:
We are in the midst of a major paradigm shift in how we manage the radio spectrum. This paradigm shift in spectrum management from exclusive access to shared access is necessitated by the growth of wireless services and the demand pressure imposed on limited spectrum resources under legacy management regimes. The primary constraint in any spectrum sharing regime is that the incumbent users (IUs) of the spectrum need to be protected from harmful interference caused due to transmissions from secondary users (SUs). Unfortunately, legacy techniques rely on inadequately flexible and overly conservative methods for prescribing interference protection that result in inefficient utilization of the shared spectrum. In this dissertation, we first propose an analytical approach for characterizing the aggregate interference experienced by the IU when it shares the spectrum with multiple SUs. Proper characterization of aggregate interference helps in defining incumbent protection boundaries, a.k.a. Exclusion Zones (EZs), that are neither overly aggressive to endanger the IU protection requirement, nor overly conservative to limit spectrum utilization efficiency. In particular, our proposed approach addresses the two main limitations of existing methods that use terrain based propagation models for estimating the aggregate interference. First, terrain-based propagation models are computationally intensive and data-hungry making them unsuitable for large real-time spectrum sharing applications such as the spectrum access system (SAS). Second, terrain based propagation models require accurate geo-locations of SUs which might not always be available, such as when SUs are mobile, or when their locations are obfuscated for location privacy concerns. Our second contribution in this dissertation is the novel concept of Multi-tiered Incumbent Protection Zones (MIPZ) that can be used to prescribe interference protection to the IUs. Based on the aforementioned analytical tool for characterizing the aggregate interference, we facilitate a framework that can be used to replace the legacy notion of static and overly conservative EZs with multi-tiered dynamic EZs. MIPZ is fundamentally different from legacy EZs in that it dynamically adjusts the IU's protection boundary based on the radio environment, network dynamics, and the IU interference protection requirement. Our extensive simulation results show that MIPZ can be used to improve the overall spectrum utilization while ensuring sufficient protection to the IUs. As our third contribution, we investigate the operational security (OPSEC) issue raised by the emergence of new spectrum access technologies and spectrum utilization paradigms. For instance, although the use of geolocation databases (GDB) is a practical approach for enabling efficient spectrum sharing, it raises a potentially serious OPSEC problem, especially when some of the IUs are federal government entities, including military users. We show that malicious queriers can readily infer the locations of the IUs even if the database's responses to the queries do not directly reveal such information. To address this issue, we propose a perturbation-based optimal obfuscation strategy that can be implemented by the GDB to preserve the location privacy of IUs. The proposed obfuscation strategy is optimal in the sense that it maximizes IUs' location privacy while ensuring that the expected degradation in the SUs' performance due to obfuscated responses does not exceed a threshold. In summary, this dissertation focuses on investigating techniques that improve the utilization efficiency of the shared spectrum while ensuring adequate protection to the IUs from SU induced interference as well as from potential OPSEC threats. We believe that this study facilitates the regulators and other stakeholders a better understanding of mechanisms that enable improved spectrum utilization efficiency and minimize the associated OPSEC threats, and hence, helps in wider adoption of dynamic spectrum sharing.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
44

Jameson, Barbara J. "Child custody and access, the views and practices of psychologists and lawyers." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ62519.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Cameron, Lewis J. "Energy 'access' for sustainable development : enabling modern energy practices in rural communities." Thesis, University of Sheffield, 2017. http://etheses.whiterose.ac.uk/18337/.

Full text
Abstract:
Modern energy services are a foundation for sustainable development. As recently acknowledged by the multilaterally supported UNDP’s ‘energy access for all’ objective, it is a missing cog for the socio-economic, empowerment, livelihood enhancement and sustainability of more than 2 billion people in developing and less developed countries. Efforts to provide modern energy services, however, face pervasive challenges reflective of wider development efforts, establishing the imperative for greater understanding of their underlying dimensions as a basis for enhancing sustainable development pathways. The thesis pursues this through ethnographic studies of innovative and contrasting energy access pathways in remote areas of Nepal. These were supported by preliminary site visits, semi-structured interviews, participant observation and observant participation with a range of key development actors, led by a reflexive, multi-sited research approach. The research reveals that the challenges and opportunities of effective energy access and sustainable development are embedded in under-recognised social routines and contexts that subsume essential dimensions of daily life. These are dynamic, multi-actor and interconnected through routinised codes, performances and institutions for which social emotions, meanings and relations are integral. Interventions, technologies and impacts interdepend on these mundane interactions and structures, signifying the vital role of social agency and conventions in everyday life. ‘Access’ is a constant (re)negotiation of these within a socio-technical context. The findings demonstrate the value of integrating these dimensions into development approaches through being attentive to, and co-produced by, the plurality of actors, settings and routines. A practice theory informed approach supported the analysis to signify further distinctive policy, research and pathway implications. The thesis thus demonstrates the potential of a social practice approach for enabling a more sensitive and effective framework for enabling energy access for sustainable development.
APA, Harvard, Vancouver, ISO, and other styles
46

Huntsman, Sherena. "Changing Access: Building a Culture of Accessibility Within Normalized Technical Communication Practices." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7560.

Full text
Abstract:
As a field intricately connected to human experience and interaction, technical and professional communication (TPC) is historically, ethically, and practically tooled to address issues of equality, diversity, and access. While these important issues have not always been the focal point of TPC, the recent turn toward social justice has scholars asking critical questions about how users access information, how specific design practices may privilege some and disenfranchise others, and how we can be more inclusive across our communication practices. In this dissertation, I argue that it is within reach of TPC to address the specific problem of access—the gap between what we believe to be accessible and what is actually accessible—and to begin to change specific norms (beliefs, standards, guidelines, etc.) that guide our practices. We change norms, or the typical way we do things, by exposing them, disrupting them, and developing new, more inclusive practices. I argue that we can create new norms that are liberated from unjust assumptions of embodied ability and include accessibility as a normalized part of the design process.
APA, Harvard, Vancouver, ISO, and other styles
47

Morelli, Vincenzo. "APostrophe WiFi Sharing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14419/.

Full text
Abstract:
Negli ultimi anni il tema dell’economia della condivisione ha assunto un piano sempre più attuale, lo sviluppo delle tecnologie mobile, contempora- neamente, è in continua ed esponenziale crescita, le applicazioni necessitano sempre più di un accesso alla rete internet sicuro ed efficiente. Questa tesi è incentrata sullo sviluppo di un’applicazione per sistemi An- droid che consenta la creazione di un network di utenti e permetta loro di condividere il proprio router casalingo. I dispositivi condivisi saranno collocati sulla mappa tramite un algoritmo di posizionamento che abbina le meccaniche di geolocalizzazione a quelle del WiFi Manager presente sui dispositivi. Selezionando l’hotspot più vicino sarà quindi possibile richiedere la con- nessione per un periodo limitato di tempo così da avere accesso ai servizi Facebook, Instagram, Maps e YouTube. Per la progettazione e l’implementazione di Apostrofe sono stati affron- tati e approfonditi argomenti riguardanti: l’implementazione di un algorit- mo di posizionamento , l’implementazione di un web service , cifratura e trasmissione dati tramite protocollo HTTP .
APA, Harvard, Vancouver, ISO, and other styles
48

Perez, Araos Agustin. "A methodology to support knowledge sharing networks and manufacturing excellence practices in SMEs." Thesis, University of Manchester, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.511244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Zarabi, Roshanak. "Storing, caring and sharing : examining organisational practices around material stuff in the home." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/6469.

Full text
Abstract:
Homes are a much discussed, but little empirically examined resource for action. Material stuff at home offer resources for social, organisational and individual activities that we routinely encounter and use on an everyday basis. Yet their purposes, storing and sharing practices of use and roles in social and organisational actions are hardly touched upon within Human Computer Interaction (HCI) and Computer Supported Cooperative Work (CSCW) academic literature. As a consequence of this, there are critical gaps in understanding home organisation and management methods as a means of informing the design of novel technologies. This thesis is an examination of everyday routines in home, paying particular attention to tidying, storing, retrieving and sharing practices. To examine these practices at home, this thesis presents a combination of two qualitative studies using ethnographically oriented methods. Study one (Home’s Tidying up, Storing and Retrieving) concerns the topic of home storage in practice; investigating how householders create and use domestic storage practices and the methods used to manage their storage at home. Study two (Social Interaction around Shared Resources) concerns social interaction around shared resources, and the methods used to manage sharing practices at home. Semi-structured interviews, fieldwork observation, tour around a home, and a photo diary were undertaken to produce a ‘rich’ description of how householders collaborate in storing and sharing set of practices to manage their everyday routines. Several key finding emerged from the research, that are used to identify important implications for design of home organisational technologies, for example to support effective lightweight interactions, providing user controlled mechanism to make different levels of privacy protection for family members, offering effective awareness of family communications and notifications of the activities of other people around these organisation systems, and making available a range of flexible options for family members to access a shared resource. The thesis make the case that flexible systems should be designed allowing people to categorise things in different ways, and have the values of home asserted in technologies, considering factors such as emotion around the use of space in home organisation to make homes become the unique places that they are understood to be.
APA, Harvard, Vancouver, ISO, and other styles
50

Brink, Barend. "Managing change to enable the transfer and sharing of knowledge and best practices." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52331.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2001.
ENGLISH ABSTRACT: This study project investigates the implementation of a Management Information System (MIS) in Telkom S.A. Ltd. With any implementation process, the affected company and its employees go through a change process. This report discusses knowledge management theory and the transfer of best practices theory, and how the implementation of these principles can improve the acceptance and use of the new software system. Following is a description and explanation of the structure and content of the report. Chapter 1 defines the research problem in detail. It also defines and briefly discusses the terms Management Information System, knowledge management and change management. Chapter 2, the literature review, consists of five sections. The five sections discuss; knowledge management concepts, knowledge management models, the comparison between models, knowledge management technology and the implementation of knowledge management. Section one, knowledge management concepts, discusses the basic theory on knowledge and learning. It looks at the basic differences between Western and Eastern philosophy and theories about learning. Concepts such as tacit knowledge, explicit knowledge and intellectual capital are introduced. A brief explanation of the start of knowledge management is offered. The four models that are discussed in section two are; The Knowledge Spiral, Best Practices Transfer, The Four Elements of Knowledge Management and The Tactical and Strategic Activities in Knowledge Management. The models discuss methods of identifying and capturing knowledge, ways in which innovation takes place in an organisation as well as identifying where a company is heading and finding ways to invest in intellectual capital to prepare for the future needs of the company. Section three compares all of the models discussed in section two. A comparison is made between the different approaches and the main focus of each model is highlighted. Technology, information management and knowledge management cannot be separated. Section four discusses the importance of technology in knowledge management, the technology backbone and applications of knowledge management. The reality of the implementation of knowledge management is discussed in section 5. The effect of knowledge management on the organisation as a whole, change management and knowledge management enablers are the topics discussed. Chapter three discusses the implementation environment, that is the business units affected by the implementation. It also gives an explanation of the design and workings of the MIS that was implemented. It is possible to read the study without reading chapter three and without background on the implementation environment and the product. The implementation of the MIS was reviewed one month and again two months after implementation. Chapter four discusses the review procedure and the main findings of the reviews. Chapter five ends the report with an evaluation on the implementation of the MIS and knowledge management practices.
AFRIKAANSE OPSOMMING: Hierdie studieprojek ondersoek die implementering van 'n Bestuurs Informasiestelsel in Telkom S.A. Bpk. Gedurende die implementeringsproses van enige nuwe stelsel, gaan die personeel, asook die maatskappy deur 'n veranderingsproses. Hierdie verslag bespreek kennisbestuur teorie, oordrag van beste praktyke teorie, en hoe die implementering van hierdie beginsels , die aanvaarding en gebruik van die nuwe sagtewaresisteem kan bevorder. Vervolgens 'n beskrywing van die struktuur en die inhoud van die verslag. Hoofstuk 1 definieer die probleemstelling in meer besonderhede. Die terme, Bestuurs Informasiestelsel, kennisbestuur en die bestuur van verandering word gedefineer en kortiks bespreek. Hoofstuk 2 bevat die literatuurstudie en bestaan uit 5 seksies. Die 5 seksies bespreek; kennisbestuur konsepte, kennisbestuur modelle, 'n vergelyking tussend die modelle, kennisbestuur-tegnologie asook die implementering van kennisbestuur. Die eerste seksie wat handel oor kennisbestuur konsepte, bespreek die basies begrippe van kennis en die leerporses. Die seksie kyk onder andere na die verskillende sienswyses tussen die Westerse en Oosterse filisofie oor kennis en die leerproses. Die konsepte, interne/eie-kennis, ekplisiete/eksterne kennis en intellektuelekapitaal word bespreek. Die seksie eindig met 'n kort weergawe van die ontstaan van kennisbestuur. Die vier kennisbestuurmodelle wat in die tweede seksie bespreek word is; "The Knowledge Spiral", "Best Practices Transfer", "The Four Elements of Knowledge Management" en "The Tactical and Strategic Activities in Knowledge Management". Verskillende metodes hoe om kennis vas te vang, maniere hoe innovasie plaasvind in maatskappy verband, asook vroegtydige identifisering van die maatskappy se toekomstige intellektuelekapitaalbehoeftes word deur die verskillende modelle voorgestel. Die modelle wat in seksie twee bespreek is, word vergelyk in die derde seksie. Die modelle word bespreek op grond van die verskille tussen die modelle, asook die hooffokus van elke model. Informasiebestuur, kennisbestuur en tegnologie kan nie van mekaar geskei word nie. Die vierde seksie bespreek die belangrikheid van tegnolgie in kennisbestuur, asook die toepassings as boublokke op die tegnologiebasis in kennisbestuur. Die realiteit wanneer kennisbestuur geimplementeer word, word bespreek in seksie 5. Daar word gekyk na die effek wat die implementering van kennisbestuur op die organisasie het. Faktore wat die implementering van kennisbestuur en verandering vergemaklik, word bespreek. Hoofstuk 3 verskaf inliging oor die omgewing waar die sagteware geimplementeer is. Agtergrond word verskaf oor die besigheidseenheid, asook die verskillende Iynseksies. Die Bestuursinligtingsprogram wat geimplementeer is, word in meer detail bespreek. Dit is moontlik om die studieprojek te lees sonder die agtergrond wat in hoofstuk 3 bespreek word. 'n Evaluasie is gehou 1 maand en weer 2 maande na die implementering van die sagteware. Die evalusieprosedure, asook die belangrikste gevolgtrekkings word bespreek in hoofstuk 4. Die verslag einding met 'n bespreking van die implementering van die sagteware asook kennisbestuur praktyke in hoofstuk 5.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography