Tesis sobre el tema "Private attribute"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 43 mejores tesis para su investigación sobre el tema "Private attribute".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Ahadzi, Marcus K. "Public private partnerships in infrastructure procurement : a generic multi-attribute hierarchical model for minimising pre-contract time and cost overruns (GmAHM)". Thesis, Heriot-Watt University, 2004. http://hdl.handle.net/10399/1151.
Texto completoGuerreiro, Ana José. "Marcas de distribuidor no sector alimentar". Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/16182.
Texto completoAlipour, Pijani Bizhan. "Attaques par inférence d'attributs sur les publications des réseaux sociaux". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.
Texto completoOnline Social Networks (OSN) are full of personal information such as gender, age, relationship status. The popularity and growth of OSN have rendered their platforms vulnerable to malicious activities and increased user privacy concerns. The privacy settings available in OSN do not prevent users from attribute inference attacks where an attacker seeks to illegitimately obtain their personal attributes (such as the gender attribute) from publicly available information. Disclosure of personal information can have serious outcomes such as personal spam, bullying, profile cloning for malicious activities, or sexual harassment. Existing inference techniques are either based on the target user behavior analysis through their liked pages and group memberships or based on the target user friend list. However, in real cases, the amount of available information to an attacker is small since users have realized the vulnerability of standard attribute inference attacks and concealed their generated information. To increase awareness of OSN users about threats to their privacy, in this thesis, we introduce a new class of attribute inference attacks against OSN users. We show the feasibility of these attacks from a very limited amount of data. They are applicable even when users hide all their profile information and their own comments. Our proposed methodology is to analyze Facebook picture metadata, namely (i) alt-text generated by Facebook to describe picture contents, and (ii) commenters’ words and emojis preferences while commenting underneath the picture, to infer sensitive attributes of the picture owner. We show how to launch these inference attacks on any Facebook user by i) handling online newly discovered vocabulary using a retrofitting process to enrich a core vocabulary that was built during offline training and ii) computing several embeddings for textual units (e.g., word, emoji), each one depending on a specific attribute value. Finally, we introduce ProPic, a protection mechanism that selects comments to be hidden in a computationally efficient way while minimizing utility loss according to a semantic measure. The proposed mechanism can help end-users to check their vulnerability to inference attacks and suggests comments to be hidden in order to mitigate the attacks. We have determined the success of the attacks and the protection mechanism by experiments on real data
Park, Sang Mork. "PRIVACY-PRESERVING ATTRIBUTE-BASED ACCESS CONTROL IN A GRID". Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1283121251.
Texto completoTHOBANI, SHAIRA. "CONTRATTO E ATTRIBUTI IMMATERIALI DELLA PERSONA". Doctoral thesis, Università degli Studi di Milano, 2016. http://hdl.handle.net/2434/351967.
Texto completoZHENG, YAO. "Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption". Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-theses/902.
Texto completoSeethamraju, Arun Tej. "Attribute Based Encryption of Electronic Health Records : Comparative study of existing algorithms". Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14093.
Texto completoEdirisinghe, Edirisinghe Mudiyanselage Nalaka Sandeepa. "What are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities?" Thesis, Boston University, 2002. https://hdl.handle.net/2144/33464.
Texto completoPLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Today, the demand for higher education is growing at a rapid rate in many developing countries throughout the world. Unfortunately, many governments have realized that their public higher education systems are unable to satisfy this demand. Under this condition and strong encouragement from international donors, private higher education has begun to emerge. Sri Lanka is an example where private higher education surfaced in response to a need from its society. However, private higher education remains a foreign and elusive concept for many Sri Lankans. This study seeks to determine what are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities. This study, using traditional push-pull theory, utilized a research design that combined both quantitative and qualitative research methods. The design focused on the pupil, student, teacher, and administrator populations in Colombo, Sri Lanka. Questionnaire surveys and interviews were administered. The data produced consisted of quantitative data from the questionnaire surveys and qualitative data from the interviews, all of which were analyzed for common themes. The study concluded that the major themes of the responses included the cost of higher education, quality of higher education, recognition of higher education, and the environment within higher education institutions. Further, the study also discovered several minor themes that played a role for some pupils and students. These included the medium of instruction and the issue of social class in higher education. The recommendations proposed include a need to provide pupils with loans to pursue higher education, to increase awareness of private higher education, to establish smaller private community colleges in rural areas of Sri Lanka and to provide more interaction between public and private higher education.
2031-01-01
Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux". Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.
Texto completoIn this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
Vasconcellos, Paulo Roberto Nascimento Meira. "Habilidades e Atitudes Relevantes na Composi??o do Perfil Profissional de Gestores de Institui??o de Ensino Superior de Car?ter Privado". Universidade Federal Rural do Rio de Janeiro, 2006. https://tede.ufrrj.br/jspui/handle/tede/970.
Texto completoThis study is based on a research aiming to verify the most relevant skills and attitudes for the composition of the professional profile of the managers of private institution of superior education. The methodology of exploratory study was adopted in this work, in order to contributes for academic literature, because it deepens a subject associated with abilities and business management. Nowadays, these subjects are highlighted because they help verifying the attributes that are perceived as important to compose the profile of the academics managers, aiming better performing their managerial functions. For the accomplishment of the present study, the data were collected by a questionnaire, which had been answered by professionals who work in a private institution of superior education located in the city of Rio de Janeiro, during the months of November of 2005 and January of 2006. The idea of competencies, more specifically centered in two of its components, the abilities and the attitudes, was evidenced according to the views of the interviews. The results observed in the present research point those attributes that had been considered as relevant. The abilities of communication, negotiation, creativity, logic and relationship; and the attitudes of responsibility, honesty, balance, ethics and disciplines are the attributes that have been most pointed out in this research.
Este trabalho realiza uma investiga??o com a finalidade de verificar as habilidades e atitudes relevantes para a composi??o do perfil profissional dos gestores de institui??o de ensino superior de car?ter privado. Empregando a metodologia do estudo explorat?rio, este trabalho contribui para a literatura acad?mica, por aprofundar um tema ligado ? compet?ncia e ? gest?o, ao verificar os atributos que s?o percebidos como importantes, por parte de diretores, coordenadores e professores, para compor o perfil dos gestores, visando o exerc?cio de suas fun??es. Para a consecu??o do presente estudo, optou-se pela confec??o de um question?rio, que foi respondido por profissionais pertencentes a uma institui??o de ensino superior de car?ter privado. A pesquisa foi levada a efeito entre os meses de novembro de 2005 e janeiro de 2006. A no??o de compet?ncia, mais especificamente centrada em dois de seus componentes, as habilidades e as atitudes, teve suas relev?ncias evidenciadas segundo a percep??o dos entrevistados. Os resultados alcan?ados na presente pesquisa apontam aqueles atributos que, de acordo com a percep??o dos entrevistados, foram considerados como relevantes. Dentre esses atributos foram evidenciadas, dentre outras, as habilidades de comunica??o, negocia??o, criatividade, l?gica e conviv?ncia, e as atitudes de responsabilidade, honestidade, equil?brio, ?tica e disciplina.
Ribeiro, Inês Rosado Gonçalves. "A marca de distribuidor na categoria de beleza e cuidados pessoais : antecedentes de compra". Master's thesis, Instituto Superior de Economia e Gestão, 2020. http://hdl.handle.net/10400.5/21110.
Texto completoO crescimento global das marcas de distribuidor veio transformar e dinamizar a distribuição moderna. Estas marcas vieram intensificar o espaço concorrencial, além de possibilitarem a construção de uma vantagem valiosa para os distribuidores. A aposta nestas marcas tem vindo a expandir-se em diversas categorias de produtos, no entanto algumas delas revelam maiores dificuldades de penetração. Um desses exemplos é a categoria de beleza e cuidados pessoais, que é fortemente dominada pelas marcas de fabricante. Este estudo pretende investigar e compreender os fatores antecedentes de compra de produtos de marca de distribuidor na categoria de beleza e cuidados pessoais. São abordados os antecedentes: familiaridade, espaço de linear, atributos extrínsecos e risco percebido e o seu impacto na decisão de compra. Foi adotada uma abordagem qualitativa com recurso a entrevistas semiestruturadas em profundidade.
The global growth of private brands has transformed and energized modern distribution. These brands have intensified the competitive space, also enabling the development of competitive advantage for distributors. The investment in these brands has been expanding in several product categories, however some of them reveal bigger difficulties in penetration. One example is the beauty and personal care category, which is heavily dominated by national brands. This study aims to investigate and understand the antecedents of private label products purchase in the beauty and personal care category. The following antecedents will be addressed: familiarity, shelf space, extrinsic attributes and perceived risk and their impact on the purchase decision. A qualitative analysis will be carried out using in-depth interviews.
info:eu-repo/semantics/publishedVersion
Zhu, Jian. "Access Control for Cross Organizational Collaboration". University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1334690364.
Texto completoAbid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux". Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088.
Texto completoIn this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
Kong, Jiantao. "Trusted data path protecting shared data in virtualized distributed systems". Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33820.
Texto completoVivan, Antonio Marcos. "Atributos de valor da atratividade em instituições de ensino superior privadas brasileiras". Universidade Nove de Julho, 2016. http://bibliotecatede.uninove.br/handle/tede/1597.
Texto completoMade available in DSpace on 2017-04-05T15:15:14Z (GMT). No. of bitstreams: 1 Antonio Marcos Vivan.pdf: 2697267 bytes, checksum: 298b43b52360cb2bd563fb52df4e3c39 (MD5) Previous issue date: 2016-04-07
The attractiveness of Higher Education Institutes (HEIs), especially private HEIs, has been infrequently referenced in bibliographical studies from 1926 to 2015. In fact, this study searched in the bibliography of the main bases of international publications, and found the nonexistence of research that binds attribute value to institutional attractiveness. Therefore, this work focuses on the relationship between the attributes of value and the tangible and intangible aspects for the construction of the attractiveness of private HEIs in Brazil. This was completed by validating a theoretical model, submitted to educational managers. 2376 private Brazilian HEIs, and non-profits, registered in MEC (Ministry of Education and Culture), were contacted, which resulted in obtaining 108 validated questionnaires responses. We tested two research models using multivariate analysis and modeling of structural equations. One of them, defined as linear, advocates a positive and significant relationship between tangible and intangible attributes, in that order, and considers the tangible attributes are responsible for these intangible attributes and the construction of institutional attractiveness. The other model, called competitor, considers that the tangible and intangible attributes are autonomous and simultaneously build the institutional attractiveness. The main results indicate that both the linear model and the competitor were validated. The linear model explained 64% of the existing variance in the dependent variable (attractiveness). The competing model, however, explained 81% of variance and after convergent and discriminant validity, this same model still had the ability to explain 79% of the variance observed in the dependent variable. The results also indicate that, among the 34 attributes of value surveyed, some stood out as the other grounds of possible strategies of attractiveness. It can be concluded that first, institutional attractiveness is built through attributes of tangible and intangible value. Second, the competing model of construction of attractiveness is more robust than the linear model for the explanation as the most effective format for construction of institutional attractiveness. Third, depending on the momentum of HEI it is possible to determine the best combination of routes of the attributes of value; so that it can build strategies that increase its institutional attractiveness. Finally, the models open a new frontier in the knowledge of the management of IES, for the expansion of knowledge and methodologies of institutional management of Higher Education Institutions.
A atratividade de Instituições de Ensino Superior (IES), em especial de IES privadas, tem sido apontada vagamente em estudos bibliográficos realizados no período de 1996 a 2015. Efetivamente, comprovou-se, neste estudo, prospectado na bibliografia das principais bases de publicações internacionais, a inexistência de pesquisas que ligassem atributos de valor à atratividade institucional. Assim, o presente trabalho foca a relação entre os atributos de valor, tangíveis e intangíveis, para a construção da atratividade de IES privadas no Brasil, por meio da validação de um modelo teórico, submetido à apreciação de gestores educacionais. Para tanto, foram contatadas 2376 IES privadas brasileiras, com e sem fins lucrativos, com cadastro regularizado no MEC, das quais se obtiveram respostas para 108 questionários validados. Foram testados dois modelos na pesquisa, utilizando-se análise multivariada e modelagem de equações estruturais. Um dos modelos, definido como linear, preconiza uma relação positiva e significante entre atributos tangíveis e atributos intangíveis, nesta ordem, considerando que os atributos tangíveis são responsáveis pelos atributos intangíveis e estes pela construção da atratividade institucional. O outro modelo, chamado concorrente, considera que os atributos tangíveis e intangíveis, autônoma e simultaneamente, constroem a atratividade institucional. Os principais resultados indicaram que tanto o modelo linear quanto o concorrente foram validados. O modelo linear explicou 64% da variância existente na variável dependente (atratividade). O modelo concorrente, no entanto, explicou 81% da variância e, após validação convergente e discriminante, ainda apresentou poder de explicação de 79% da variância observada na variável dependente. Os resultados indicaram ainda que, dentre os 34 atributos de valor pesquisados, alguns se sobressaíram aos demais, como fundamento de possíveis estratégias de atratividade. Pode-se concluir, portanto, que, em primeiro lugar, de fato, a atratividade institucional é construída por meio de atributos de valor tangíveis e intangíveis. Em segundo lugar, o modelo concorrente de construção da atratividade apresenta maior robustez do que o modelo linear, para a explicação do formato mais eficaz de construção da atratividade institucional. Em terceiro lugar, dependendo do momentum da IES, é possível determinar as melhores rotas de combinação dos atributos de valor, para que ela possa construir estratégias que proporcionem o aumento da sua atratividade institucional. Por fim, dado o seu caráter amplamente generalizante, a validação dos modelos de atratividade institucional abre uma nova fronteira no conhecimento da gestão de IES, para a expansão do conhecimento e metodologias de gestão institucional de instituições de ensino superior.
Ambrosin, Moreno. "Secure and Scalable Services for the Internet of Things". Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3424873.
Texto completoIl paradigma Internet of Things (IoT) sta popolando il mondo di milioni di dispositivi "smart" interconnessi tra loro, e in continua espansione in domini diversi. I dispositivi IoT variano da oggetti di piccole dimensioni, come i cosiddetti "wearables", a dispositivi industriali, e sono utilizzati per scopi diversi, per esempio automazione di edifici, controllo di accesso, o in ambito sanitario. Dato il grado di diffusione di IoT in vari aspetti delle nostre vite, ed in particolare in ambienti critici, come nel settore automobilistico o nel campo sanitario, diviene fondamentale progettare sistemi e servizi che garantiscano la sicurezza e la privacy degli utenti. Questa tesi analizza problematiche relative a sicurezza e privacy in diversi servizi IoT, e presenta soluzioni ad-hoc per mitigare potenziali minacce. Il contenuto della tesi è suddiviso in tre parti: (1) una introduzione dell'algoritmo di crittografia Attribute-Based Encryption (ABE), e un'analisi delle sue performance su dispositivi IoT; (2) la progettazione di soluzioni scalabili e sicure per la gestione e il controllo di sistemi IoT su larga scala; e (3) la progettazione di servizi IoT "privacy-friendly'. La prima parte di questa tesi introduce ABE, e presenta una valutazione delle sue performance su popolari dispositivi a basso costo e con ridotte capacità di calcolo, tipici del mondo IoT. ABE è un algoritmo di crittografia a chiave pubblica che permette di applicare (crittograficamente) politiche di controllo di accessi sui dati, specificando gli "attributi" che un utente deve avere per decifrarli. Grazie alla sua espressività e alle sue funzionalità, ABE è stato utilizzato sia in molti servizi IoT proposti in letteratura, che in due soluzioni che verranno introdotte nella tesi. La nostra valutazione sperimentale ha come obiettivo quello fornire mezzi per stimare a priori il costo, ed eventuali trade-off, derivanti dall'utilizzo di ABE. La seconda parte della tesi si focalizza sulla gestione e il controllo di dispositivi IoT in sistemi di larghe dimensioni. In particolare, questa parte presenta il nostro contributo nella risoluzione di due sottoproblemi: la distribuzione sicura di aggiornamenti software, e la valutazione dell'integrità del software in esecuzione nei dispositivi. Consideriamo uno scenario dove un'entità di controllo comunica con una rete di dispositivi IoT di larghe dimensioni tramite una rete di distribuzione intermedia "inaffidabile"; questa infrastruttura intermedia applica tecniche di caching e aggregazione dati con lo scopo di facilitare la distribuzione di contenuti (uno-a-molti) e la raccolta di dati dai dispositivi (molti-a-uno). In scenari realistici, questa infrastruttura può essere compromessa e/o controllata da attaccanti, e ció rende le attività di gestione e controllo dei dispositivi particolarmente complesse: l'entità di controllo non può infatti affidarsi completamente all'infrastruttura intermedia, ne per quanto riguarda l'aggregazione, ne per il mantenimento della confidenzialità e l'integrità dei dati distribuiti. Per questo motivo, in questa parte della tesi descriviamo prima il nostro protocollo per la distribuzioni di aggiornamenti software, il quale mantenendone confidenzialità e integrità sfruttando ABE; il design del protocollo viene presentato sopra a Named-Data Networking, un protocollo di rete di tipo "data centric" che fornisce nativamente aggregazione dati e caching a livello rete. Presentiamo poi il design di un protocollo per la verifica collettiva di una rete di dispositivi IoT. Il protocollo prevede la raccolta e l'aggregazione di prove di integrità del software da dispositivi IoT, e garantisce allo stesso tempo una ridotta complessità di processing lato entità di controllo, e l'integrità delle prove raccolte. La terza e ultima parte della tesi presenta soluzioni che forniscono garanzie di privacy in tre importanti servizi legati a IoT, e in particolare in servizi basati su: localizzazione (Location-Based Services, LBS), misurazione avanzata in ambito Smart Grid (noti come Advanced Metering Infrastructure, AMI), e comunicazione decentralizzata in sistemi muli-agente. Nei servizi LBS, gli utenti mobili condividono la loro posizione geografica con dei provider, i quali forniscono informazioni legate ad essa, come ad esempio l'ospedale, ristorante, o cinema, più vicini alla posizione dell'utente. Servizi di questo tipo possono rappresentare una minaccia per la privacy degli utenti: un provider può infatti tracciare o acquisire informazioni sensibili sugli utenti, in base alla loro posizione. Per ovviare a questo problema, presentiamo un protocollo che permette agli utenti di usufruire di tali servizi mantenendo l'anonimato. Il protocollo presentato funziona in modo collaborativo, e permette agli utenti di inviare richieste definendo il grado di privacy desiderato. Il secondo servizio considerato è quello di misurazione avanzata (AMI) fornito dalle moderne reti Smart Grid. Questo servizio permette ai gestori di energia elettrica di raccogliere misurazioni frequenti del consumo elettrico da dispositivi intelligenti denominati Smart Meters, per motivi di monitoraggio e/o controllo. Purtroppo, an- che questo servizio rappresenta una minaccia per la privacy gli utenti finali: infatti, ricercatori hanno dimostrato come le informazioni sul consumo energetico possano essere utilizzate in modo malevolo per inferire informazioni sensibili, come la presenza fisica di un utente in casa, o il tipo di elettrodomestici che utilizza. Presentiamo la nostra soluzione a questo problema, la quale permette allo stesso tempo agli utenti di condividere misurazioni in modo anonimo, e al gestore di energia elettrica di effettuare agevolmente la raccolta dei dati di consumo. Infine, in questa parte della tesi presentiamo la nostra soluzione per garantire "private information fusion" in servizi basati su sistemi multi-agente. In tali sistemi, dispositivi IoT (agenti) interconnessi tra loro spesso necessitano di combinare osservazioni locali per ottenere un unico valore, ed effettuare una decisione binaria (per esempio, decidere se un valore combinato di temperatura è inferiore ad una soglia data). L'obiettivo è quello di permettere ai vari dispositivi di effettuare tale "fusione", senza dover condividere le loro misurazioni locali in chiaro. La soluzione presentata in questa tesi permette ai dispositivi di raggiungere un consenso in modo decentralizzato, e in presenza di dispositivo "semi-trusted", utilizzando come building block additive blinding e proxy re-encryption, per raggiungere un consenso, mentre garbled circuit per effettuare lo step finale di decisione.
Antunes, Liliana Sofia dos Reis. "Estudo exploratório das preferências dos consumidores de leite e tabletes de chocolate". Master's thesis, Instituto Superior de Economia e Gestão, 2014. http://hdl.handle.net/10400.5/7570.
Texto completoCom o aparecimento da crise económica, as marcas de distribuidor entraram no mercado como uma alternativa a preços acessíveis e, ao longo dos anos, sofreram uma crescente popularidade entre os consumidores devido à sua melhoria de qualidade. Atualmente, as marcas de distribuidor têm uma grande presença no mercado e mantêm uma grande competitividade com as marcas de fabricante. Neste sentido, o presente estudo pretende conhecer as preferências dos consumidores de dois produtos opostos quanto à penetração das marcas de distribuidor, neste caso, o leite e as tabletes de chocolate. Para tal, pretende identificar os atributos mais valorizados pelos consumidores na escolha destes dois produtos e compreender se existem diferenças na preferência pela "marca" entre os mesmos. A técnica de pesquisa utilizada foi a Análise Conjunta, onde foram geradas dezasseis combinações para cada um dos produtos, baseadas em três atributos chave e seus respetivos níveis. Em ambos os produtos, a marca Continente é apresentada como um dos níveis do atributo "marca" porque foi esta a marca de distribuidor escolhida para o estudo. As combinações geradas foram avaliadas pelos consumidores através de um questionário presencial, onde obteve-se uma amostra não probabilística por conveniência de 210 inquiridos. O resultado retirado da análise aos questionários revela que o atributo mais valorizado pelos consumidores na escolha de leite é o teor de gordura, seguido da marca e do preço, e o atributo mais valorizado na escolha de tabletes de chocolate é o tipo de chocolate, seguindo-se a marca e o preço.
With the appearance of the economic crisis, private labels entered the market as an alternative, providing accessible prices and, over the years, experienced a growing popularity among consumers due to its quality improvement. Nowadays, the private labels have a big market presence and are able to compete with the manufacturer brands. Regarding this matter, the present study aims to understand the preferences of the consumers of the two opposite products in terms of penetration of private labels, in this case, milk and chocolate bars. For this purpose, it intends to identify the attributes that are most valued by consumers when choosing one of these products and understand if there are differences in the preference/utility of the "brand" attribute between these products. The searching technique used was the Conjoint Analysis, where sixteen combinations for each product, based on three key attributes and their respective levels, were generated. In both products, the Continente brand is presented as one of the levels of the brand attribute because this was the private label chosen for the study. The generated combinations were evaluated by consumers through a classroom questionnaire, which was obtained from a non-probabilistic convenience sample of 210 interviewed. The result obtained from the questionnaire analysis reveals that the most valued attribute by consumers in choosing milk is the fat, followed by brand and price, and the most valued attribute in choosing chocolate bars is the type of chocolate, followed by brand and the price.
Dzurenda, Petr. "Kryptografická ochrana digitální identity". Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403859.
Texto completoCohen, Caroline. "Les normes permissives en droit international privé. Etude critique". Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020081/document.
Texto completoIn order to study the paradoxical phenomenon of the rise of party autonomy in parallel with the multiplication of mandatory norms in contemporary private international law, the concept of permissive rule is particularly apposite. It accounts for all instances where the law-making body grants a beneficiary the possibility to do or not to do something; be it the judge when he is authorized to stay the proceedings in case of related actions, or the parties when they are authorized to choose the law applicable to an international contract.A study of the positive law shows that permissive rules are numerous in both Choice of laws and Jurisdiction and that they operate under distinct logics depending on whether they grant a possibility to a judge or to the parties. In the latter case, the issue at stake is no longer whether a right is granted by the legal rule, but rather whether a right is conceded in the choice of the legal rule. This specificity, together with the proliferation of permissive rules in private international law, warrants that their relevancy be tested.In this context, the assumption that permissive norms would adequately serve the purpose of foreseeability of solutions, which forms the basis for their adoption, must be questioned. This critical assessment leads to the proposal that permissive norms should, in the future, play only a residual role in private international law, either as a way to reach consensus or as a stopgap in the absence of a sufficiently foreseeable connecting factor
Kurien, Anish Mathew. "Approches pour la classification du trafic et l’optimisation des ressources radio dans les réseaux cellulaires : application à l’Afrique du Sud". Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1090/document.
Texto completoThe growth in the number of cellular mobile subscribers worldwide has far outpaced expected rates of growth with worldwide mobile subscriptions reaching 6 Billion subscribers in 2011 according to the International Telecommunication Union (ITU). More than 75% of this figure is in developing countries. With this rate of growth, greater pressure is placed on radio resources in mobile networks which impacts on the quality and grade of service (GOS) in the network. With varying demands that are generated from different subscriber classes in a network, the ability to distinguish between subscriber types in a network is vital to optimise infrastructure and resources in a mobile network. In this study, a new approach for subscriber classification in mobile cellular networks is proposed. In the proposed approach, traffic data extracted from two network providers in South Africa is considered. The traffic data is first decomposed using traditional feature extraction approaches such as the Empirical Mode Decomposition (EMD) and the Discrete Wavelet Packet Transform (DWPT) approach. The results are then compared with the Difference Histogram approach which considers the number of segments of increase in the time series. Based on the features extracted, classification is then achieved by making use of a Fuzzy C-means algorithm. It is shown from the results obtained that a clear separation between subscriber classes based on inputted traffic signals is possible through the proposed approach. Further, based on the subscriber classes extracted, a novel two-level hybrid channel allocation approach is proposed that makes use of a Mixed Integer Linear Programming (MILP) model to consider the optimisation of radio resources in a mobile network. In the proposed model, two levels of channel allocation are considered: the first considers defining a fixed threshold of channels allocated to each cell in the network. The second level considers a dynamic channel allocation model to account for the variations in traffic experienced in each traffic class identified. Using the optimisation solver, CPLEX, it is shown that an optimal solution can be achieved with the proposed two-level hybrid allocation model
Kpoahoun, Amoussou Aubin. "Les clauses attributives de compétence dans le transport maritime de marchandises". Aix-Marseille 3, 1999. http://www.theses.fr/1999AIX32050.
Texto completoImine, Youcef. "Cloud computing security". Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Texto completoThese last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Lounis, Ahmed. "Security in cloud computing". Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.
Texto completoCloud computing has recently emerged as a new paradigm where resources of the computing infrastructures are provided as services over the Internet. However, this paradigm also brings many new challenges for data security and access control when business or organizations data is outsourced in the cloud, they are not within the same trusted domain as their traditional infrastructures. This thesis contributes to overcome the data security challenges and issues due to using the cloud for critical applications. Specially, we consider using cloud storage services for medical applications such as Electronic Health Record (EHR) systems and medical Wireless Sensor Networks. First, we discuss the benefits and challenges of using cloud services for healthcare applications. Then, we study security risks of the cloud, and give an overview on existing works. After that, we propose a secure and scalable cloud-based architecture for medical applications. In our solution, we develop a fine-grained access control in order to tackle the challenge of sensitive data security, complex and dynamic access policies. Finally, we propose a secure architecture for emergency management to meet the challenge of emergency access
Archinard-Greil, Bérengère. "Lois de police et conflits de juridictions. (Essai sur la coordination des systèmes à l'aide de la notion d'ordre juridique prépondérant)". Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE3036/document.
Texto completoIn times of mandatory provisions becoming more and more prevalent, based on conflict of law, the concept of mandatory enforcement appears to be somehow diluted regarding the liberal solutions found in conflicts of jurisdictions. In positive law, mandatory rules do not prevent the enforcement of a forum clause, no more than they are considered during the enforcement stage of decisions. While the application of these rules before foreign courts and arbitrators is very uncertain and does not raise obstacles to the recognition of foreign judgments or arbitral judgment which overlook them, choice of forum clauses has become an instrument of forum shopping in order to avoid mandatory regulations. This solution paradoxically induces a search for a solution to restore there international imperativity. This result has appeared as a consequence of the principle of separation of conflicts of law and conflicts of jurisdictions. That observation leads to ask questions about the possibility of an exemption to this general principle. Indeed, this encourages to consider the possibility to admit a correlation between forum and jus in order to establish imperative and exclusive competence, based on the applicability of such mandatory rules. This forum legis would require to maintain the litigation in its courts and could ensure their application in international relations. However, unilateralism that governs rules of judicial competence should involve the establishment of a mechanism of different legal systems coordination. Depending on the type of mandatory rules concerned, it could be based on an adapted form of forum non conveniens, on international judicial Co-operation processes, or be inspired by the method of reference to the competent legal order envisaged by P. Picone. The deployment of these solutions could be based on using preponderant state notion, that would be the one with the most widely public policy involved. It would lead to the recognition of the strong vocation of it to assert its views for the resolution of a dispute and would justify both the priority jurisdiction of its courts and circumspection of the other jurisdictional authorities to exercise their competence. Such a solution, tightly defined and justified in view of the importance of the interests involved, would provide a satisfactory solution to both harmoniously articulate the pursuit of liberal politics required in conflicts of jurisdictions with respect of public policy, and reconcile the protection of imperativities with the coordination of legal systems
Serageldin, Sami. "Les clauses ayant effet à l'échelle des groupes de contrats". Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30052/document.
Texto completoThe objet of this thesis is to create a method that could explain a phenomenon that has been observed by scholars and practitioners of law for decades; which is the extension end the transmission of certain clauses in chain agreements and contractual sets. Through this method one should be able, on one hand, to justify this phenomenon in regard to general principals of law and, on the other hand, to find an explanation for some necessary derogations to the Law.The first step in this thesis was to find answers for some basic questions about groups of contracts that have a direct impact on our subject. We have demonstrated that the fundament of contractual sets relies in the concept of “economy of contract”. Members of chain agreements and contractual sets should be considered as third parties in their mutual relationships. Direct action, which constitutes the dynamic face of chain agreements, could be analyzed as a multilateral set-off. In multiparty contractual sets, the set could not produce its effects in regard to its members unless it could be proven that the concerned member has knowledge of the existence of the other contracts forming the set and of the links between these contracts and his own one. Finally, in two parties’ contractual sets, it’s mandatory to distinguish between a real contractual set, and complex contract which is merely a contract written in several documents. We have proposed a chronological method to establish this distinction, taking into account the number of times the parties have exchanged their consent. After this preliminary part, we have studied precedents regarding the extension and the transmission of some clauses in chain agreements and contractual sets. Jurisdiction clauses and arbitration clauses are by far the most represented, but other clauses such as clauses of disclaimer of warranty, clauses of limited liability, clauses of waiver of action and clauses of non-competition are also sometimes extended or transmitted to other contracts and/or to other members in the group. Through an analysis of these decisions, we have shown that some of them didn’t have enough legal ground. Using those decisions that seemed to us well-founded, we have deduced a number of rules that could be applied for other cases of extension and transmission of clauses in groups of contracts.The rules that we have deduces from the study of the case law, together with the answers that we have provided for some preliminary questions in the first part of the thesis, have lead us to find the method we are looking for in this study.The first step in this method is to recognize the type of group of contracts involved: is it a chain agreement, a multiparty contractual set or a two parties’ set ?If it’s a contractual set between two parties, the first question should be to decide whether it’s really a contractual set, or if it’s a complex contract. If the group of contracts involved is a chain agreement or a multiparty contractual set, then one should wonder whether the doctrine of privity of contract could form an obstacle against the extension or the transmission of the clause. We have demonstrated in this thesis that article 1165 of the Civil Code is only applicable to clauses that contain an obligation. In order to qualify recognize clauses having an “obligational” content, we have proposed five fundamental elements. If the clause contains an obligation it could not be extended to the other members of the chain agreement or the contractual set. Otherwise, the clause is potentially opposable.There are only two exceptions to the doctrine of privity of contract. The first one, in chain agreements is the transmission of rights to singular successors. This exception could be justified by article 1122 of the Civil Code and by the concept of accessoire. The second exception could be seen in contractual sets where the binding authority of the clause could not be respected unless it is extended to certain third parties
Purnomo, Denny Gozali y Denny Gozali Purnomo. "Private Data Sharing Platform Using Ciphertext-Policy Attribute-Based Encryption with Blockchain Network". Thesis, 2019. http://ndltd.ncl.edu.tw/handle/sshs4r.
Texto completo國立臺灣科技大學
資訊管理系
107
In these several years, the knowledge finding from big data keeps growing. Big companies or organization try to get an accurate prediction for their customer or targeted customer. The privacy of customer can be abused by the companies and also not get another benefit from the data that already provided to companies. In this thesis, we propose a private data buying-selling platform that not only secure but also can protect the user's identity. Utilizing ciphertext-policy attribute-based encryption for securing private data. Also uses a blockchain framework to create anonymity of user and securing transaction using a decentralized method. Moreover, our proposed platform is also proven to be secure and could withstand some well-known attacks.
Jagwani, Priti. "Attribute based privacy control and anonymization for location privacy". Thesis, 2018. http://localhost:8080/xmlui/handle/12345678/7689.
Texto completo"On Efficient and Scalable Attribute Based Security Systems". Doctoral diss., 2011. http://hdl.handle.net/2286/R.I.9154.
Texto completoDissertation/Thesis
Ph.D. Computer Science 2011
Rebolo, João Pedro Matias. "Can we seduce customers to buy private label products by using irrelevant attributes?" Master's thesis, 2020. http://hdl.handle.net/10400.14/29706.
Texto completoAs marcas próprias têm permitido aos retalhistas oferecer produtos de qualidade a preços acessíveis, que permitem uma melhor gestão do rendimento mensal disponível e a satisfação das necessidades das famílias. Contudo, estas marcas sofrem de falta de identidade, baixa perceção de qualidade e de ceticismo criado pelos consumidores, tendencialmente suprimido após consumir o produto. As marcas próprias tendem, por isso, a ser vistas como uma opção low-cost. Esta dissertação pretende testar se a presença de Atributos Irrelevantes contribui de forma eficaz para a redução do défice de qualidade percebido através da criação de uma personalidade, o que, facilitando a identificação do consumidor com a marca, impactaria positivamente o valor percebido, as expetativas, as intenções de compra e o valor que o consumidor está disposto a despender. Apesar de alguns autores afirmarem que a presença de Atributos Irrelevantes é vista pelos consumidores como um mecanismo a que as marcas recorrem para compensar pela performance deficitária de outros atributos (o que se verificou para as marcas de fabricante), as marcas próprias podem recorrer à utilização desta ferramenta para se diferenciarem em mercados competitivos. Este estudo revela que a presença de Atributos Irrelevantes permite às marcas enaltecer a sua personalidade e diferenciar-se da concorrência. Contudo, os resultados mostram que o valor percebido e as intenções de compra não aumentam significativamente, ao contrário do preço a pagar. A presença de Atributos Irrelevantes em marcas de fabricante tende a prejudicá-las, reforçando a importância dos mesmos para as marcas próprias enquanto ponto de diferenciação.
Zi-YunZeng y 曾子芸. "Privacy-aware Feature Representation Learning in Attributed Social Networks". Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9bkz2f.
Texto completoRasori, Marco. "Security & Privacy in Smart Cities and Industrial IoT". Doctoral thesis, 2020. http://hdl.handle.net/2158/1200334.
Texto completoChiou, Sheng-Pin y 邱勝濱. "Relationships among leadership behaviors,leadership attributes and leadership effectiveness of principals at private vocational high school". Thesis, 2000. http://ndltd.ncl.edu.tw/handle/86456821187177255290.
Texto completo國立彰化師範大學
工業教育學系
88
ABSTRACT The purpose of this study was to examine the relationships among leadership behaviors, leadership attributes and leadership effectiveness of principals at private vocational high schools. The study was designed to contribute to an understanding of the types of leadership behaviors and leadership attributes which can produce high leadership effectiveness. Therefore, this study attempted to explore the following five research concerns : (1) understanding the leadership behaviors, leadership attributes and leadership effectiveness of principals at private vocational high schools, (2) examining the relationships among background variables, leadership behaviors, leadership attributes and leadership effectiveness, (3) exploring the predictions of leadership behaviors by leadership attributes, (4) exploring the predictions of leadership effectiveness by leadership attributes, and (5) exploring the predictions of leadership effectiveness by leadership behaviors. The population of the study was the 8,962 private vocational high school teachers in Taiwan in 2000. The sample consisted of 1528 subjects who were selected by proportional stratified random sampling techniques. The total number of usable sets of instrument returned was 915 and a usable return rate of 59.88%. The research instrument was composed of four questionnaires : (1) the Personal Profile for vocational principals and teachers which was used to assess personal information, (2) the Leadership Behaviors Questionnaire (LBQ) for the vocational teachers which was used to assess transformational, transactional, and non-transactional leadership behaviors, (3) the Leadership Attributes Questionnaire (LAQ) for vocational teachers which was used to assess leadership attributes, and (4) the Leadership Effectiveness Questionnaire (LEQ) for vocational teachers which was used to assess leadership effectiveness. All the LBQ, LAQ and LEQ were revised by scholars and tested by factor analysis. The Cronbach α was .92, .98 and .95 ,respectively. Therefore, the validity and reliability of four questionnaires were acceptable. The data was analyzed by a number of statistical techniques such as descriptive statistics, t-test, one way ANOVA, and stepwise multiple regression. The results were as follows: (1) The transactional behaviors were moderate high, transformational behaviors were lower, and non-transactional behavior were the lowest performed by the private vocational principals. (2) The leadership attributes performed by the private vocational high school principals was higher than average, especially good at characteristic attributes but not good at organization management attributes. (3) The leadership effectiveness performed by the private vocational high school principals was higher than average, however, leadership satisfaction was the highest and organizational goal achievement, job satisfaction was the second. (4) There were significant differences among all aspects in terms of leadership behaviors, leadership attributes and leadership effectiveness based on different background variables. (5) According to all aspects of leadership behaviors, (a)energetic with stamina, (b)tolerant of ambiguity and complexity, (c)achievement-oriented, (d)initiating, (e)willing to accept responsibility, (f)sensitivity respect and (g)motivating others leadership attributes have higher predictions of all aspects of behaviors. (6) According to leadership effectiveness, (a)even disposition, (b)committed to the common good, (c)sensitivity respect, (d)motivating others and (e)ideological beliefs were appropriate are important leadership attributes, however, Motivating others leadership attribute is the most important. (7) The leadership behaviors such as individualized consideration, contingent reward, charisma, and intellectual stimulation were highly and positively related to perceived overall leadership effectiveness, however, individualized consideration, contingent reward, these two leadership behaviors were the most important.
YOU, BO-YUAN y 游博淵. "Privacy preserving anonymization for conserving the relation between series and tabular attributes". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/21732627231072642486.
Texto completo國立臺北大學
資訊工程學系
104
Under data mining to flourish in all areas get benefit, but because to get the information so generated data privacy issues, and in recent years many techniques on data protection, are focus one data types to protect, we are focus to different data types, so in this paper we propose CRebSTa method, which at the same time taking into consideration the relationship between tabular data and sequential data between, in order to retain more sequential multi-table data and the relevance of the format, in order to achieve less information loss, and thus enhance the good utility. In our experimental section of our approach with k-anonymity and (k, p) -anonymity compare our approach, although in attack to protect do not best, but our approach in the performance of three methods to center, but our approach in information loss and utility above, our approach is best which also shows the sequential and tabular data that need to be considered simultaneously.
Ho, Shih-Han y 何是翰. "Maximizing Discriminability on Dynamic Attributes for Privacy-Preserving Data Publishing Using K-Anonymity". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/w2cpcb.
Texto completo國立中興大學
電機工程學系所
107
There are increasing demands on open data for scientific, medical, and social applications. Open data is a new trend and more data are being released for data mining and decision-making. To avoid the leakage of personal privacy caused by the release of data, data must be processed through privacy protection methods before being released. Since the optimization of privacy preserving models like K-anonymity and L-diversity are NP problems, most previous privacy preserving methods trade off privacy preserving and data utility by designing heuristic algorithms to reduce information loss. Different from the previous works, our main idea is that the released data should be privacy protected meanwhile they should provide different levels of discrimination for different individuals, i.e., observers of different backgrounds shall get different levels of information from the released data. For example, data are required to be released for supervision of public administration or financial inspection of foundations. Also, for a mass casualty incident (MCI), the up to date information of injured and ill patients, especially their status and location, should be released for the ambulance and medical staff or the patients’ family for easy of finding the required resource for the patients. However, few privacy protection methods that take into account both privacy and data discrimination in the literature. In the thesis, we study the privacy protection and data discrimination problem and found that the attributes of a dataset could be classified into static and dynamic attributes. Considering the dynamic discrimination privacy preserving problem, we propose a new privacy-preserving model called K_1 K_2-anonymization model. It is to ensure that the equivalence class on static attributes is still K-anonymization while in a equivalence class, the numbers of data with the same dynamic attributes should be less than K_2. If the dynamic attribute values within equivalent classes are similar, there are no solutions because it is hard to differentiate. We propose a clustering-based SimDiv algorithm to make the dynamic attributes within equivalence classes more discriminable as a compromised solution to the K_1 K_2-anonymization problem. To validate the effectiveness, we conduct experiments on a real dataset. The experimental results show that the proposed method outperforms the other methods of similar models in term of discriminability on dynamic attributes.
Urigüen, Mónica I. "Attributes of quality programs in universities in developing countries : case studies of two private universities in Ecuador and beyond /". 2005. http://www.library.wisc.edu/databases/connect/dissertations.html.
Texto completoHsin-JungTseng y 曾信融. "An application of conjoint analysis to the optimal combination of the product attributes of the private brands of some retailing warehouses". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/05007292655745532319.
Texto completo國立成功大學
企業管理學系碩博士班
100
Private-brand products are well developed in foreign markets. On the other hand, due to the economic downturn, the concept of smart shopping, oligopolistic retailers and other factors in Taiwan, private-brand products are attracting the attention of consumers. This study uses the traditional model of conjoint analysis to discuss the preferences and the combinations of the attributes of the private brand, as well as different market segments. Furthermore, the results can be provided for the retailers as references while designing products. The results show that, store brand, quality, price and promotion are the four main attributes of private brand. In addition, there are four groups, which are promotion-averter, store-brand-advocator, public-resemblance and promotion-lover, after market segmented. The group of store-brand-advocator is the biggest group of these four. In most of market segments in this study, store brand is the most important attribute of private brand. Thus, the retailers should aware that the first condition of developing private brand is properly operating their own store brand to obtain the favor of consumers.
Wang, Tun-Cheng y 王敦正. "A research on customer attributes, the service quality of the financial advisors of private bank and customer satisfaction Evidence from Cathay United Bank". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/56198390647442921304.
Texto completo開南大學
財務金融學系
96
Along with the development trend of financial liberalization and internationalization, the first issue faced by commercial bank industry is exactly the promotion of service quality. The research adopts the questionnaire investigation method, from January 1 to April 30 of 2008, taking the customers served by financial advisors of Cathay United Bank in Taipei area as the research object to carry on tracing investigation. The main purpose lies in understanding customers’ value degree and satisfaction towards the service quality that financial advisors provide. The research can provide the financial advisors of the bank to improve the service quality, and it will be the reference of the future programs. The research has 230 valid questionnaires. The recovery rate of valid questionnaires is 93.5%. The statistic analyzes and explanations of the data mainly adopt the statistic software, SPSS. After the analysis of the reach, the conclusions are as follows. First, there are three aspects of financial advisors’ service quality towards customers profession, trust and concern. Second, through importance, expressive degree analysis method, we learn that financial advisors should improve the aspects of profession and trust of service quality. For the aspect of concern, the customers are very satisfied with it, which should be kept. Third, for customers, there is apparent difference between the value degree and satisfaction of financial advisors’ items of service quality. Besides, for every service item, the value degree is higher than the satisfaction. It means that for customers the value degree of service quality is very much higher than the satisfaction. Therefore, financial advisors should make efforts to strengthen service quality. Fourth, there is no apparent difference for customers with different backgrounds towards the value degree (satisfaction) of financial advisors’ service quality of profession, trust, concern. From the result of the examination, we know that financial advisors serve customers with different backgrounds in the same way, which exactly benefits business continuity. Fifth, financial advisors’ service quality is apparently related to the satisfaction of overall customers. The correlation coefficients are all positives. It means that the better the service quality is, the higher customer satisfaction will be.
Pei-ChiehHo y 何姵婕. "An application of conjoint analysis to the optimal combination of the product attributes of the private brands of some retailers - Mattress as an example". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/863q3h.
Texto completoΤσαγκανού, Μαρία. "Η κοινωνική παράμετρος στην προστασία της ιδιωτικότητας του ατόμου - χρήστη νέων τεχνολογιών". Thesis, 2014. http://hdl.handle.net/10889/7893.
Texto completoThe purpose of this paper is to study the behavior of users of new technologies and the factors that interact to build their confidence against them. In addition, we examine the attitude of users towards ABC credentials with minimal disclosure of personal data, as a solution to protect their privacy.
Sommer, Daniel A. "An assessment of regional institutional attributes in the New Jersey pinelands, the Adirondack State Park and the California coast implications for the sustainable management of the private lands of the Sierra Nevada ecosystem /". 1995. http://catalog.hathitrust.org/api/volumes/oclc/33021331.html.
Texto completoTypescript. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 73-75).
Morton, Stuart Michael. "An Improved Utility Driven Approach Towards K-Anonymity Using Data Constraint Rules". Thesis, 2013. http://hdl.handle.net/1805/3427.
Texto completoAs medical data continues to transition to electronic formats, opportunities arise for researchers to use this microdata to discover patterns and increase knowledge that can improve patient care. Now more than ever, it is critical to protect the identities of the patients contained in these databases. Even after removing obvious “identifier” attributes, such as social security numbers or first and last names, that clearly identify a specific person, it is possible to join “quasi-identifier” attributes from two or more publicly available databases to identify individuals. K-anonymity is an approach that has been used to ensure that no one individual can be distinguished within a group of at least k individuals. However, the majority of the proposed approaches implementing k-anonymity have focused on improving the efficiency of algorithms implementing k-anonymity; less emphasis has been put towards ensuring the “utility” of anonymized data from a researchers’ perspective. We propose a new data utility measurement, called the research value (RV), which extends existing utility measurements by employing data constraints rules that are designed to improve the effectiveness of queries against the anonymized data. To anonymize a given raw dataset, two algorithms are proposed that use predefined generalizations provided by the data content expert and their corresponding research values to assess an attribute’s data utility as it is generalizing the data to ensure k-anonymity. In addition, an automated algorithm is presented that uses clustering and the RV to anonymize the dataset. All of the proposed algorithms scale efficiently when the number of attributes in a dataset is large.
(6620474), Denis A. Ulybyshev. "Data Protection in Transit and at Rest with Leakage Detection". Thesis, 2019.
Buscar texto completoIn service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role-based and attribute-based access control for data so that each service can access only those data subsets for which the service is authorized, considering a context and service’s attributes such as security level of the web browser and trust level of service. My approach provides data protection in transit and at rest for both centralized and peer-to-peer service architectures. The methodology ensures confidentiality and integrity of data, including data stored in untrusted cloud. In addition to protecting data against malicious or curious cloud or database administrators, the capability of running a search through encrypted data, using SQL queries, and building analytics over encrypted data is supported. My solution is implemented in the “WAXEDPRUNE” (Web-based Access to Encrypted Data Processing in Untrusted Environments) project, funded by Northrop Grumman Cybersecurity Research Consortium. WAXEDPRUNE methodology is illustrated in this thesis for two use cases, including a Hospital Information System with secure storage and exchange of Electronic Health Records and a Vehicle-to-Everything communication system with secure exchange of vehicle’s and drivers’ data, as well as data on road events and road hazards.
To help with investigating data leakage incidents in service-oriented architecture, integrity of provenance data needs to be guaranteed. For that purpose, I integrate WAXEDPRUNE with IBM Hyperledger Fabric blockchain network, so that every data access, transfer or update is recorded in a public blockchain ledger, is non-repudiatable and can be verified at any time in the future. The work on this project, called “Blockhub,” is in progress.
BULGINI, Giulia. "Il progetto pedagogico della Rai: la televisione di Stato nei primi vent’anni. Il caso de ‹‹L’Approdo››". Doctoral thesis, 2018. http://hdl.handle.net/11393/251123.
Texto completo