Thèses sur le sujet « Protection and management »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Protection and management.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Protection and management ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Harvey, Janell M. « Protecting Biscayne an analysis of strategies for the protection of Biscayne National Park / ». [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000530.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wong, Sau-lim Tim. « Airline revenue management passenger right and protection / ». Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B31633183.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Aizikovitz, Jacob. « Yield protection as a risk management strategy ». Thesis, Kansas State University, 2018. http://hdl.handle.net/2097/38662.

Texte intégral
Résumé :
Master of Agribusiness
Department of Agricultural Economics
Christine Wilson
Risk management is critical in crop production as the challenges farmers face on a year to year basis are quite variable due to Mother Nature. There are many tools a farmer can utilize to help manage risk such as crop insurance and forward contracting or hedging. In recent years with lower prices, these tools have been more heavily used than they were a few years ago when corn and soybean prices were $8 and $15 per bushel, respectively. Margins in crop production are tight when market prices are low and input prices are high relative to market prices, and due to land cost. In order for farmers to produce greater profit, they must find ways to lower expenses or produce more bushels to increase their revenue. As margins tighten, farmers typically try to lower expenses to be more profitable rather than trying to increase bushels that would ultimately increase their revenue. When farmers try to reduce expenses, agricultural retailers experience lower revenues holding all else equal; distributors have lower revenues because the retailer is not selling as much, and the manufacturers experience lower revenues because the retailer and distributor are not moving the inventory compared to when farmer margins are larger. This thesis examines how yield protection for grain corn can be utilized as a risk management tool for crop production farmers. This thesis explores how increasing bushels and ultimately increasing revenue by protecting the bushels the crop is physically able to produce, can help manage producer risk. This thesis uses yield protection as a tool alongside crop insurance and marketing, rather than as a tool to replace crop insurance or marketing. Data used for yield protection is replicated fungicide, fungicide with an adjuvant, and fungicide with insecticide, that were evaluated against the untreated check over multiple locations and years across the Midwestern United States. Fungicide data were chosen because it is truly the definition of yield protection, protecting the crop against disease. Fungicides are usually the first products cut from a farmer’s crop production program to help reduce expenses and maintain profitability as margins tighten. The results found in this study are consistent with work conducted at Iowa State University. Results exhibited an increase in corn yield, but were not consistently statistical significant across treatments and location. In conclusion, the average yield increase was not enough over multiple years to pay for itself, and it lacked sufficient evidence. Yield protection does not fit a risk management strategy annually. However, yield protection should be utilized when specific thresholds on disease or insects are present to warrant this strategy.
Styles APA, Harvard, Vancouver, ISO, etc.
4

王守廉 et Sau-lim Tim Wong. « Airline revenue management : passenger right and protection ». Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B31633183.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Monadi, Mehdi. « Protection and fault management in active distribution systems ». Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/404541.

Texte intégral
Résumé :
The integration of renewable energy resources (RES), as a type of distributed generation (OG) units, is increasing in distribution, systems. This integration, changes the topology, performance and the operational aspects of conventional distribution systems. Protection is one of the main issues that are affected after the high penetration of OGs. Therefore, new protection methods are necessary to guarantee the safety and the reliability of active distribution systems. On the other hand, most RESs are interfaced with the AC grids through power-electronic devices. These interfaces consist of at least one AC/DC conversion units. Hence, using OC distribution systems can contribute to the loss/cost reduction, as some power conversion stages are eliminated. Enhancement in system stability, reduction of power losses, and power quality 1 improvement are other advantages of OC networks. For these reasons as well as the simple integration of electronic loads that are supplied by OC power, the concept of OC distribution systems has attracted a considerable attention over the last years. In 1 fact, MVOC and LVDC grids can be an important part of the future distribution systems. Furthermore, AC and OC system can contribute to construct hybrid AC/DC distribution systems. According to these significant changes in the distribution systems, it is necessary to modify the algorithm of existing protection methods or to propose new protection schemes for both active AC and OC distribution systems. Moreover, in conventional distribution systems, loads are supplied by upstream grid, i.e. transmission lines; therefore, when a fault impacts the upstream grid and the faulty part disconnected by the protection system, all loads connected to distribution systems are disconnected as well. However, in active distribution systems, DGs can support the on-outage zones if the grid equipped with an appropriate fault management system. Therefore, automatic self-healing methods can increase the network reliability and power supply continuity. To provide the self-healing capability, distribution grids should be equipped with adequate algorithms that are able to guarantee the continuous and optima! operation for the isolated section of the grid. In this thesis, differences between protection issues in OC and AC systems are investigated and analyzed. Then, based on this analyze, effective protection and fault management methods are presented far OC distribution systems and microgrids. In the other part of this thesis, a fault management and self-healing algorithm is proposed far active distribution systems. The proposed methods have been evaluated by the hardware-in-the-loop approach using real-time simulators and suitable controllers.
La creciente integración de recursos energéticos renovables en el sistema eléctrico ha propiciado el aumento de sistemas de generación distribuida (DG) en los sistemas de distribución. Esta integración,influye en la topologla, el rendimiento y los aspectos operacionales de los sistemas de distribución convencionales. Su impacto sobre los sistemas de protección es uno de los principales problemas que se derivan de la alta penetración de DG. Por ese motivo es preciso diseñar nuevos métodos y sistemas de protección que sean capaces de garantizar la seguridad y la fiabilidad de los sistemas de distribución activos. Por otro lado, la mayoria de sistemas de generación basados en renovables están interconectados con la red de AC a través de convertidores electrónicos de potencia.Estas interfaces consisten en unidades de conversión DC/AC. Por lo tanto, el uso de sistemas de distribución de corriente continua puede contribuir a la reducción de las pérdidas/ costes, ya que algunas etapas de conversión de energía pueden ser eliminadas. La mejora en la estabilidad del sistema, la reducción de las pérdidas de energía,y la mejora la calidad de energía son otras de las ventajas que las redes de corriente continua pueden ofrecer. Por estos motivos, junto con la fácil integración de cargas electrónicas alimentadas en OC, el concepto de sistemas de distribución en OC ha atraido una considerable atención en los últimos anos. De hecho, los sistemas MVDC y las redes LVDC están llamados a ser una parte importante delos sistemas de distribución y transmisión en el futuro. Además, los sistemas de conversión OC y AC pueden contribuir a la construcción de sistemas de distribución de AC I DC híbridos. De acuerdo con estos cambios, significativos en los sistemas de distribución, es necesario modificar el algoritmo y los métodos de protección existentes y proponer nuevos esquemas de protección tanto para los sistemas de distribución en AC como para los de OC. Por otra parte, en los sistemas de distribución convencionales, las cargas son alimentadas por la red aguas arriba, es decir;por las lineas de transmisión; Por lo tanto, cuando una falta se produce en la red aguas arriba la parte defectuosa es desconectada por el sistema de protección, asimismo todas las cargas conectadas a los sistemas de distribución se desconectan también. Sin embargo, en los sistemas de distribución activos, los sistemas DG pueden soportar las zonas de no disponibilidad si la red está equipada con un sistema de gestión de fallos. Por lo tanto, los métodos automáticos de 'self-healing' pueden contribuir a aumentar la continuidad y la fiabilidad del suministro en ta red. Para proporcionar la capacidad de 'self-healing', las redes de distribución deben estar equipadas con algoritmos adecuados que sean capaces de garantizar el funcionamiento continuo y óptimo para la sección aislada de la red. En esta tesis, las diferencias entre tas protecciones para sistemas de OC y CA son investigadas y analizadas. Luego, en base a este analísis, se presentarán los métodos de protección y gestión de fallos adecuados para los sistemas y microrredes de distribución OC. En la otra parte de esta tesis, se propone un algoritmo de gestión de fallos y 'self-healing ' para sistemas de distribución activos. Para validar los métodos propuestos se ha trabajado con plataformas hardware-in­ the-loop avanzado utilizando simuladores en tiempo real y controladores trabajando en base a plataformas de control reales.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Nwankwo, Azubuike Sonny A. « Consumerism : management challenge of consumer protection in national enterprises ». Thesis, City University London, 1990. http://openaccess.city.ac.uk/7665/.

Texte intégral
Résumé :
Until recently, consumer policy researchers have concentrated almost exclusively on the competitive market, with little attention to the market failure scenario. This study investigates consumer protection behaviour of national enterprises. It does this by exploring the factors which determine or influence consumer policy decisions when the competitive market mechanism is hindered, and the dilemma facing management in such bounded marketing environments. Fundamentally, two basic approaches to structuring consumer protection have been identified. These relate to, (a) private enforcement, ic. market processes, and (b) public enforcement, ic. political processes. These perspectives were systematically collapsed into Hirschman's Exit/Voice theory and explored using qualitative methodology. Our findings did not broadly uphold the basic configuration of the Exit/Voice paradigm. It is intellectually flawed to insist that decisions about improving enterprises' performance on consumer protection should be impelled by strategies based on those dichotomous perspectives. Strengthening means for consumer advocacy or introducing and protecting competition in the hope that they will concomitantly protect consumers can not, in themselves, assure genuine consumer protection. Consumer protection came through as a discretionary agenda item. It is neither exclusively located in the political process nor in the market mechanism. It is a dependent variable whose behaviour is shaped by variations in management practices. At the enterprise-consumer interface, consumer protection becomes an explicit challenge of management. In terms of institutional arrangements for consumer protection, we did not observe any optimal structure. However, we did observe that the differing approaches that management can adopt can be classified and appraised in relation to four variables. These variables are, (i) Sensitivity (pro-active/reactive), (ii) Definition (consumer/company centered), (iii) Measurement (formal/informal) and, (iv) Implementation (tasks/responsibilities). These variables arc not independent. Their interrelationships lead to a method for evaluating the different approaches in terms of management response to the challenge of consumer protection.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Chu, Thi Thu Ha. « Environmental pollution in Vietnam : Challenges in management and protection ». Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A32573.

Texte intégral
Résumé :
Vietnam is facing big challenges in terms of environmental pollution caused by natural agents and anthropogenic activities. Environmental pollution in Vietnam is present in air, water and soil environments in many areas with contaminants including total suspended particles (TSP), organic substances, heavy metals, nutrients including ammonium, phosphate exceeding the allowable valuesof national standard. One of the most important causes of environmental pollution is the legal powers of environmental protection organizations, especially the environmental police force, not strong enough. In addition, the awareness of the people about environmental protection is very weak. Improving the system of laws on environmental protection, including sanctions that are strong enough to prevent violations, is of the most importance to enhance the effectiveness of environmental management and protection in Vietnam. On the other hand, educating people and even school children about environmental protection is a very meaningful activity to reduce the pressures and challenges of environmental management and protection in Vietnam.
Việt Nam đang phải đối mặt với những thách lớn về ô nhiễm môi trường gây ra bởi các tác nhân tự nhiên và các hoạt động của con người. Ô nhiễm môi trường ở Việt Nam biểu hiện ở cả môi trường không khí, nước và đất tại nhiều khu vực với hàm lượng các chất ô nhiễm gồm bui thô TSP. các chất hữu cơ, kim loại nặng, các chất dinh dưỡng gồm amoni, phosphat vượt quá tiêu chuẩn cho phép. Một trong những nguyên nhân quan trọng gây ô nhiễm môi trường là sức mạnh pháp lý của các cơ quan tổ chức hoạt động trong lĩnh vực môi trường, đặc biệt là lực lượng cảnh sát môi trường, chưa đủ mạnh. Bên cạnh đó, ý thức của người dân về giữ gìn bảo vệ môi trường còn rất yếu. Việc hoàn thiện hệ thống luật pháp về bảo vệ môi trường bao gồm các chế tài đủ mạnh để ngăn chặn các vi phạm là quan trọng hàng đầu nhằm tăng cường hiệu quả quản lý và bảo vệ môi trường ở Việt Nam. Mặt khác, giáo dục tuyên truyền ý thức cho người dân và thậm chí các học sinh trong trường học về giữ gìn bảo vệ môi trường là hoạt động rất ý nghĩa nhằm giảm bớt các áp lực và thách thức trong quản lý và bảo vệ môi trường ở Việt Nam.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Laribi, Atika. « A protection model for distributed data base management systems ». Diss., Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/53883.

Texte intégral
Résumé :
Security is important for Centralized Data Base Management Systems (CDBMS) and becomes crucial for Distributed Data Base Management Systems (DDBMS) when different organizations share information. Secure cooperation can be achieved only if each participating organization is assured that the data it makes available will not be abused by other users. In this work differences between CDBMS and DDBMS that characterize the nature of the protection problem in DDBMS are identified. These differences are translated into basic protection requirements. Policies that a distributed data base management protection system should allow are described. The system proposed in this work is powerful enough to satisfy the stated requirements and allow for variations on the policies. This system is a hybrid one where both authorizations and constraints can be defined. The system is termed hybrid because it combines features of both open and closed protection systems. In addition the hybrid system, although designed to offer the flexibility of discretionary systems, incorporates the flow control of information between users, a feature found only in some nondiscretionary systems. Furthermore, the proposed system is said to be integrated because authorizations and constraints can be defined on any of the data bases supported by the system including the data bases containing the authorizations, and the constraints themselves. The hybrid system is incorporated in a general model of DDBMS protection. A modular approach is taken for the design of the model. This approach allows us to represent the different options for the model depending on the set of policy choices taken. Three levels of abstraction describing different aspects of DDBMS protection problems are defined. The conceptual level describes the protection control of the DDBMS transactions and information flows. The logical level is concerned with the interaction between the different organizations participating in the DDBMS. The physical level is involved with the architectural implementation of the logical level.
Ph. D.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Houle, James J. « Community decisions about innovations in water resource management and protection ». Thesis, University of New Hampshire, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10000397.

Texte intégral
Résumé :

The purpose of this study was to investigate the social, economic and technological factors that influence rates of adoption of innovative stormwater management approaches in municipal organizations in the Great Bay watershed, NH. The scope of this study was to investigate how innovations spread through municipal populations in a specific region and watershed area of the US. The methodology used mixed qualitative methods, including semi-structured interviews, case studies, and surveys to examine perceptions, attitudes, and beliefs that influence the adoption of innovative stormwater management solutions, as well as the governance characteristics of municipalities at different stages of adoption. Major findings include: adopter categories can be relatively easily and quickly categorized into early and late majorities as a preliminary means to identify populations of ready and willing audiences interested in and capable of advancing innovations; early and late adopter classifications followed general diffusion theory, but differed in substantial ways that could influence overall project or program success; and finally that early majority communities have more internal and external capacity to advance innovations as well as higher levels of peer-to-peer trust to offset perceptions related to economic risk that can either advance or stall innovative stormwater management solution adoption. This research offers insights on how to allocate scarce resources to optimally improve water quality through stormwater management solutions, and makes recommendations for how to effectively and efficiently generate greater understanding of complex barriers to adoption that thwart innovation in municipal governance organizations. One significant implication is that agents of change who want to move innovations through a broad municipal population should focus their efforts on working with innovators and early adopters that have status within relevant peer networks and who have capacity to evaluate the strengths and weaknesses of innovations.

Styles APA, Harvard, Vancouver, ISO, etc.
10

Scarfe, Bradley Edward. « Oceanographic Considerations for the Management and Protection of Surfing Breaks ». The University of Waikato, 2008. http://hdl.handle.net/10289/2668.

Texte intégral
Résumé :
Although the physical characteristics of surfing breaks are well described in the literature, there is little specific research on surfing and coastal management. Such research is required because coastal engineering has had significant impacts to surfing breaks, both positive and negative. Strategic planning and environmental impact assessment methods, a central tenet of integrated coastal zone management (ICZM), are recommended by this thesis to maximise surfing amenities. The research reported here identifies key oceanographic considerations required for ICZM around surfing breaks including: surfing wave parameters; surfing break components; relationship between surfer skill, surfing manoeuvre type and wave parameters; wind effects on waves; currents; geomorphic surfing break categorisation; beach-state and morphology; and offshore wave transformations. Key coastal activities that can have impacts to surfing breaks are identified. Environmental data types to consider during coastal studies around surfing breaks are presented and geographic information systems (GIS) are used to manage and interpret such information. To monitor surfing breaks, a shallow water multibeam echo sounding system was utilised and a RTK GPS water level correction and hydrographic GIS methodology developed. Including surfing in coastal management requires coastal engineering solutions that incorporate surfing. As an example, the efficacy of the artificial surfing reef (ASR) at Mount Maunganui, New Zealand, was evaluated. GIS, multibeam echo soundings, oceanographic measurements, photography, and wave modelling were all applied to monitor sea floor morphology around the reef. Results showed that the beach-state has more cellular circulation since the reef was installed, and a groin effect on the offshore bar was caused by the structure within the monitoring period, trapping sediment updrift and eroding sediment downdrift. No identifiable shoreline salient was observed. Landward of the reef, a scour hole ~3 times the surface area of the reef has formed. The current literature on ASRs has primarily focused on reef shape and its role in creating surfing waves. However, this study suggests that impacts to the offshore bar, beach-state, scour hole and surf zone hydrodynamics should all be included in future surfing reef designs. More real world reef studies, including ongoing monitoring of existing surfing reefs are required to validate theoretical concepts in the published literature.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Brooke, Cassandra. « Marine pollution management under the Environment Protection Act 1993 (SA) / ». Title page, contents and abstract only, 1996. http://web4.library.adelaide.edu.au/theses/09ENV/09envb872.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Durbin, Chris. « Aspects of internet security - identity management and online child protection ». Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/8548.

Texte intégral
Résumé :
This thesis examines four main subjects; consumer federated Internet Identity Management (IdM), text analysis to detect grooming in Internet chat, a system for using steganographed emoticons as ‘digital fingerprints' in instant messaging and a systems analysis of online child protection. The Internet was never designed to support an identity framework. The current username / password model does not scale well and with an ever increasing number of sites and services users are suffering from password fatigue and using insecure practises such as using the same password across websites. In addition users are supplying personal information to vast number of sites and services with little, if any control over how that information is used. A new identity metasystem promises to bring federated identity, which has found success in the enterprise to the consumer, placing the user in control and limiting the disclosure of personal information. This thesis argues though technical feasible no business model exists to support consumer IdM and without a major change in Internet culture such as a breakdown in trust and security a new identity metasystem will not be realised. Is it possible to detect grooming or potential grooming from a statistical examination of Internet chat messages? Using techniques from speaker verification can grooming relationships be detected? Can this approach improve on the leading text analysis technique – Bayesian trigram analysis? Using a novel feature extraction technique and Gaussian Mixture Models (GMM) to detect potential grooming proved to be unreliable. Even with the benefit of extensive tuning the author doubts the technique would match or improve upon Bayesian analysis. Around 80% of child grooming is blatant with the groomer disguising neither their age nor sexual intent. Experiments conducted with Bayesian trigram analysis suggest this could be reliably detected, detecting the subtle, devious remaining 20% is considerably harder and reliable detection is questionable especially in systems using teenagers (the most at risk group). Observations of the MSN Messenger service and protocol lead the author to discover a method by which to leave digitally verifiable files on the computer of anyone who chats with a child by exploiting the custom emoticon feature. By employing techniques from steganography these custom emoticons can be made to appear innocuous. Finding and removing custom emoticons is a non-trivial matter and they cannot be easily spoofed. Identification is performed by examining the emoticon (file) hashes. If an emoticon is recovered e.g. in the course of an investigation it can be hashed and the hashed compared against a database of registered users and used to support non-repudiation and confirm if an individual has indeed been chatting with a child. Online child protection has been described as a classic systems problem. It covers a broad range of complex, and sometimes difficult to research issues including technology, sociology, psychology and law, and affects directly or indirectly the majority of the UK population. Yet despite this the problem and the challenges are poorly understood, thanks in no small part to mawkish attitudes and alarmist media coverage. Here the problem is examined holistically; how children use technology, what the risks are, and how they can best be protected – based not on idealism, but on the known behaviours of children. The overall protection message is often confused and unrealistic, leaving parents and children ill prepared to protect themselves. Technology does have a place in protecting children, but this is secondary to a strong and understanding parent/child relationship and education, both of the child and parent.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Taylor, Gareth Foley. « Management of Sand Beaches for the Protection of Shellfish Resources ». Thesis, University of Canterbury. Biological Sciences, 2013. http://hdl.handle.net/10092/8207.

Texte intégral
Résumé :
Exposed sand beaches are increasingly under pressure from human population growth and recreation. Activities, such as vehicle driving and horse riding, can pose a significant threat to specialist fauna living in the sediment. Few studies have evaluated how vehicles affect sand beach fauna and none have examined the impacts of horse users on burrowing bivalves. The research questions addressed were: do vehicles and/or horses on sand beaches impact on intertidal shellfish populations? Following on from this, can management policies mitigate any negative impacts from such activities on sand beaches? This research required an interdisciplinary approach utilising methodologies from coastal geomorphology, biological science and management. The intertidal distribution of the New Zealand surfclam Paphies donacina (southern tuatua) determined seasonally on six exposed surf beaches along Pegasus Bay. The impacts of vehicle and horse users on shellfish survival were experimentally investigated, and novel in situ methods were developed to examine the effects of horses on bivalve survival. Intertidal tuatua were small (< 30 mm) and shallowly buried. Found approximately 30 m below the last high tide line, they may be exposed to vehicle and horse users. There was a positive linear relationship between the number of vehicle passes and tuatua mortality (% tuatua mortality = 4.8 + 0.23 x number of vehicle passes). On average, horse riding resulted in 36.9% tuatua mortality within a single hoof print, but walking resulted in lower mortality than trotting or galloping. Extrapolative modelling predicted that the long-term presence of these users would be highly detrimental to shellfish. Reducing the temporal frequency and spatial extent of vehicle and horse users on sand beaches could decrease shellfish mortality. The thesis results were used to evaluate current management techniques and provide management options to minimise the potential impacts of beach users on shellfish resources.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Koy, Andrew Bruen. « Framing the force protection problem an application of knowledge management ». Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/5894.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited.
Using knowledge management and knowledge flow theories, personnel involved in force protection can better construct a trustworthy threat assessment of a port region. By ensuring that intelligence agents, regional experts, and force protection officers are linked in a knowledge flow system, our fleet's decision makers will be equipped with the proper tools to better prepare for port visits. A new organization, the Multi-Threat Alert Center, will be a vital organization that is charged with doing most of the knowledge construction in this system. Therefore its construction and implementation into the AT/FP organization is paramount to maintaining a successful system. Its ultimate knowledge product will be used by commands conducting port visits as the main assessment of the current threat conditions. A key component to ensuring that due diligence is maintained while using pre-fixed force protection plans is to ensure that knowledge is treated as a dynamic system instead of a static object. By analyzing the MTAC knowledge flow systems with current theories, the planners and organizers of force protection can ensure that a functioning and efficient system is in place.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Silengo, M. « An integrated framework for environmental management and protection in Zambia ». Thesis, University of Salford, 1996. http://usir.salford.ac.uk/14810/.

Texte intégral
Résumé :
This study identifies the major environmental issues and problems affecting Zambia and examines the current state and practice of environmental protection and management. A review of the existing legislation relating to environmental protection in Zambia is made. The relationship between the development process and the environment is explored, in particular giving an overview of the evolution of paradigms in environmental management and development. An outline of the environmental trends in sub- Saharan Africa and the environmental policy in the United Kingdom and how it relates to the framework of EC environmental policy is made. With such a background key issues have been identified to be addressed when considering environmental policy in Zambia. The mining, agricultural and tourism industries form the sectoral case studies of this study. These sectors have been selected on the basis of their dominance in Zambia's development strategy and their impact on the environment. The immense scale of the mining industry warrants its consideration; agriculture has now been given priority as the sector with the highest potential in the overall economy and; in diversifying the economy, tourism development is emerging as one of the most important sectors. The study recognises that the absence of definite crosssectoral guidelines for environmental resources management and a general paucity of information on the environment have been major constraints for the development of environmental protection strategies in Zambia. This has been due to insufficient institutional support for sustained research and monitoring of the environment. Therefore, the study mak?s general sectoral recommendations for addressing the environmental problems identified in the study.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Koy, Andrew B. « Framing the force protection problem : an application of knowledge management / ». Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FKoy.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Russell, Stephanie. « Enterprise unleashed ? : exercising power through isomorphism in the passive fire protection industry ». Thesis, Keele University, 2011. http://eprints.keele.ac.uk/3811/.

Texte intégral
Résumé :
This thesis focuses on the passive fire protection industry which is a sector of construction that has previously been neglected by researchers. I use insights from ethnographic research to present the challenges and daily struggles individuals experience as they contend with working in a deregulated environment. My analysis contributes to the scholarship on Institutional Theory (DiMaggio and Powell, 1983), which has been traditionally used to discuss how organizations become homogenised (similar) through isomorphic pressures (coercive, normative, mimetic) as they seek to enhance their legitimacy and reduce uncertainty. In contrast to previous accounts of Institutional Theory which have ignored a critical understanding of power, I draw on Foucault (1977) to argue that isomorphic pressures exercise disciplinary power by spreading an 'enterprise discourse' (du Gay and Salaman, 1992). Enterprise endeavours to reinvent employees as autonomous, responsible and self-regulating subjects. Although the enterprise discourse encourages self-regulation, in the passive fire industry, it became a counter-discourse as individuals call for more government regulation. In a 'lighter touch' environment (UKAS, 2004: 1), the principles of enterprise (choice, autonomy) were both endorsed and turned back on to the government as employees used it to engage in non-conformance. Consideration of these issues enables a contribution to be made by highlighting the limitations of conventional accounts of Institutional Theory. I suggest that gaps in scholarship can be filled by critically examining the role of isomorphic pressures in homogenising and normalising conduct; this also points to the impact such regimes can have on an industry whose main objective is to enhance life and building safety.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Govenor, Heather Lynn. « Sediment Management for Aquatic Life Protection Under the Clean Water Act ». Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/91448.

Texte intégral
Résumé :
Although sediment is a natural component of stream ecosystems, excess sediment presents a threat to natural freshwater ecosystems. Sediment management is complicated because sediment can be dissolved in the water column, suspended as particles in the water column, or rest on the bottom of the stream bed, and can move between these forms (e.g. bedded sediment can be resuspended). Each form of sediment affects aquatic life in a specific way. To manage stream sediment in a way that protects aquatic life, we need to understand the ways different forms of sediment affect living things, and we need to be able to predict how sediment changes form under different stream conditions (for example, during high water events). To improve our understanding of these things, the studies in this dissertation set out to: (1) identify how often sediment is specifically mentioned as the primary pollutant “stressor” of the benthic macroinvertebrate community (primarily aquatic insects); (2) determine which forms of sediment have the largest negative impacts on aquatic insects in Virginia and what levels of sediment may cause harm; and (3) measure the changes of sediment between suspended and bedded forms in a small stream to provide information needed to restore the health of stream ecosystems. An inventory of published US Clean Water Act Total Maximum Daily Load (TMDL) reports, which states write to identify their impaired waters and their plans to improve those waters, revealed that sediment is an important stressor in over 70% of waters that have altered aquatic insect communities. If the language used to describe how waters are evaluated and what is causing the impairments were standardized among states, data collected under the Clean Water Act could be more broadly used to help understand water quality issues and ways to address them. Analysis of 10 years of Virginia Department of Environmental Quality sediment and aquatic insect community data collected within 5 ecoregions of the state indicates that a combination of 9 sediment parameters reflecting dissolved, suspended, and bedded forms explains between 20.2% and 76.4% of the variability in the health of the aquatic insect community within these regions. Embeddedness, which measures how much larger particles such as gravel and cobble are buried by finer particles like sand; and conductivity, which is a measure of dissolved salts in the water column, both have substantial impacts on the aquatic insect community. Sensitivity thresholds for embeddedness and conductivity indicate the levels of these parameters above which 5% of insect families are absent from a stream; therefore, these levels are considered protective of 95% of the insect community. Thresholds for embeddedness are 68% for the 5 combined ecoregions, 65% for the Mountain bioregion (comprised of Central Appalachian, Ridge and Valley, and Blue Ridge ecoregions), and 88% for the Piedmont bioregion (comprised of Northern Piedmont and Piedmont ecoregions). Thresholds for conductivity are 366 µS/cm for combined ecoregions, 391 µS/cm for the Mountain bioregion, and 136 µS/cm for the Piedmont bioregion. These thresholds can be used by water quality professionals to identify waters with sediment impairments and can be used to help identify appropriate stream restoration goals. A study of sediment movement within the channel of a small stream indicated average transport speeds of ~ 0.21 m/s during floods with peak flows of ~ 55 L/s. The use of rare earth elements (REE) to trace sediment particles revealed individual particle transport distances ranging from 0 m to >850 m. Deposition on a unit area basis was greater in the stream channel than on the floodplain, and the movement of sediment from the stream bed to the water column and back again during sequential floods was evident. Approximately 80% of the tracer was deposited within the first 66 m of the reach. This information can aid the development of models that predict the impact of stream restoration practices on in-stream habitat and improve predictions on the time it will take between the initiation of stream restoration projects and when we see improvements in the biological community.
PHD
Styles APA, Harvard, Vancouver, ISO, etc.
19

Sears, Joseph D. « Simultaneous connection management and protection in a distributed multilevel security environment ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSears.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 65-66, 85, 117, 119-121). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Sheng, Ming. « Sizing Stream Setback Using GIS Tools for Stream Protection ». The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345049852.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Khumalo, Jan Lekopane. « Overview of the National Environmental Management Act 107 of 1998 ». Thesis, University of Limpopo (Turfloop Campus), 2011. http://hdl.handle.net/10386/497.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Guerinoni, Stephen C., et n/a. « An evaluation of coastal zone management ». University of Canberra. Applied Science, 1989. http://erl.canberra.edu.au./public/adt-AUC20060713.130610.

Texte intégral
Résumé :
The coastal zone is a valuable resource which provides a diversity of benefits. The difficulties facing the coastal zone tend to fall into three categories: (1) Pressure and conflict on resources. The beach residence value, an indicator of land use pressure, implies that, of the Australian states, New South Wales' coastal zone is under the greatest pressure. Associated with population is development pressure. Many forms of development are not compatible, hence conflicts of interest can arise. (2) The dynamic nature of the coast. That is, the physical and biological aspects of the coastal zone are in a state of flux. The dynamics make predictions for management controversial. (3) Organisational problems. The lack of direction, lack of coordination and fragmentation of management leads to ad hoc management of this valuable resource. This evaluation identified and confirmed the relevance of coastal issues which led to the enactment of the Coastal Protection Act, 1979. The coastal issues investigated were: coastal erosion and development; coastal erosion and protection works; coastal land degradation; degradation of coastal habitats, fish and wildlife resources; recreation opportunities; pollution; and increasing population pressure and competition betweeen alternative uses. The administrative arrangements for management of the issues were investigated. A broad range of coastal issues were evaluated using a mix of indicators with standards of comparison to measure progress. Management tools, policies and strategies used to address the issues were investigated. Finally prescriptions to further address the issues were made as was how to implement the prescriptions. The evaluation noted: increasing coastal population and development pressure; numerous examples of conflicts of interest; complex and often bewildering administrative arrangements for coastal zone management; widely varying levels of performance by agencies; and a lack of direction and co-ordination from State authorities. The principal conclusion was that strategic planning needed to be undertaken through a lead coastal agency. The lead agency should clarify and improve direction, co-ordination and co-operation in coastal management. This should improve the effectiveness of management and reduce the incidence and duration of conflict among the different and competing coastal values. This evaluation of the effectiveness of coastal management, at a State level, should not only assist New South Wales but also other States in the management of this valuable resource.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Lee, Po-kwan Edmund. « The role of the private sector in environmental conservation / ». Hong Kong : University of Hong Kong, 1993. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19740165.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

De, Lange Joshua. « A framework for information security management in local government ». Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7588.

Texte intégral
Résumé :
Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Schmitt, Andreas Joachim. « Digital Implementation of Power System Metering and Protection ». Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/51194.

Texte intégral
Résumé :
An entirely digital system is presented which has several benefits as compared to the systems that are deployed currently. Utilizing digital capabilities to a much greater extent than is currently used within the power system allows for various improvements upon the current system. One such improvement is the ease of configuring and using the system. Each device can easily alter its functionality through a user interface, and the addition of devices is as easy as plugging it in. Additionally, the burden on the transformer due to the increase in the number of devices is nullified. The information remains accurate and unchanged, even when new devices are added to the system. The entire system conforms to the IEC 61850 standard, such that it adheres to the requirements of the actual power system.
Master of Science
Styles APA, Harvard, Vancouver, ISO, etc.
26

Storck, Johann. « Management of Intellectual Property in China A Framework for Complementary Protection Methods / ». St. Gallen, 2006. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/01654573002/$FILE/01654573002.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Yoon, Eunju. « Food defense management plan implementation intention : an application of protection motivation theory ». Diss., Manhattan, Kan. : Kansas State University, 2007. http://hdl.handle.net/2097/439.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Saleh, Mohamed Saad Morsy. « Analysis of information security risks and protection management requirements for enterprise networks ». Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.

Texte intégral
Résumé :
With widespread of harmful attacks against enterprises' electronic services, information security readiness of these enterprises is becoming of increasing importance for establishing the required safe environment for such services. Various approaches are proposed to manage enterprise information security risks and to assess its information security readiness. These approaches are, however, not adequate to manage information security risks, as all required information security components of its structural and procedural dimensions have not considered. In addition, current assessment approaches lack numerical indicators in assessing enterprise information security readiness. Furthermore, there is no standard approach for analysing cost versus benefit in selecting recommended protection measures. This thesis aims at contributing to the knowledge by developing comprehensive Enterprise Information Security Risk Management (EISRM) framework that integrates typical approaches for information security risk management, and incorporates main components of key risk management methodologies. In addition, for supporting phases of the proposed EISRM framework, analytical models for enterprise information security readiness assessment and cost-benefit analysis are developed. The practical evaluation, using the proposed enterprise information security readiness assessment model has been performed depending on a developed investigation form that used to investigate nine enterprises inside Saudi Arabia. The results demonstrate the effectiveness of the model in assessing and comparing enterprises information security readiness at all levels of the model, using numerical indicators and graphical representations. The EISRM framework and the analytical models presented in this research can be used by enterprises as single point of reference for assessing and cost effectively improving their information security readiness.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Ma, Cheng. « Agent-based Power System Protection and Information Management System of a Substation ». Thesis, University of Liverpool, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.507730.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Saleh, Mohamed S. M. « Analysis of Information Security Risks and Protection Management Requirements for Enterprise Networks ». Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.

Texte intégral
Résumé :
With widespread of harmful attacks against enterprises¿ electronic services, information security readiness of these enterprises is becoming of increasing importance for establishing the required safe environment for such services. Various approaches are proposed to manage enterprise information security risks and to assess its information security readiness. These approaches are, however, not adequate to manage information security risks, as all required information security components of its structural and procedural dimensions have not considered. In addition, current assessment approaches lack numerical indicators in assessing enterprise information security readiness. Furthermore, there is no standard approach for analysing cost versus benefit in selecting recommended protection measures. This thesis aims at contributing to the knowledge by developing comprehensive Enterprise Information Security Risk Management (EISRM) framework that integrates typical approaches for information security risk management, and incorporates main components of key risk management methodologies. In addition, for supporting phases of the proposed EISRM framework, analytical models for enterprise information security readiness assessment and cost-benefit analysis are developed. The practical evaluation, using the proposed enterprise information security readiness assessment model has been performed depending on a developed investigation form that used to investigate nine enterprises inside Saudi Arabia. The results demonstrate the effectiveness of the model in assessing and comparing enterprises information security readiness at all levels of the model, using numerical indicators and graphical representations. The EISRM framework and the analytical models presented in this research can be used by enterprises as single point of reference for assessing and cost effectively improving their information security readiness.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Tam, Wai-kit Alex. « Investigating an ecosystem approach to environmental protection of Tolo Harbour / ». Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk:8888/cgi-bin/hkuto%5Ftoc%5Fpdf?B23425106.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Nix, Tanya. « Evolution of Physician-Centric Business Models Under Patient Protection and Affordable Care Act ». Thesis, Walden University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3641824.

Texte intégral
Résumé :

For several decades, the cost of medical care in the United States has increased exponentially. Congress enacted the Patient Protection and Affordable Care Act (PPACA) of 2010 to ensure affordable healthcare to the citizens of the United States. The purpose of this case study was to explore physicians' perspectives regarding physician-centric business models evolving under the requirements of PPACA legislation. Complex adaptive systems formed the conceptual framework for this study. Data were gathered through face-to-face, semistructured interviews and e-mail questionnaires with a purposeful sample of 20 participants across 14 medical specialties within Northeast Texas. Participant perceptions were elicited regarding opinions of PPACA legislation and the viability of business models under the PPACA. In addition, a word cloud was used to identify 3 prevalent or universal themes that emerged from participant interviews and questionnaires, including (a) use of mid-level practitioners, (b) changes to provider practices, and (c) lack of business education. The implications for positive social change include the potential to develop innovative models for the delivery of medical care that will improve the health of the aggregate population. Healthcare leaders may use the findings to advance the evolution of physician business models that meet the needs of healthcare stakeholders. These findings may also inform healthcare leaders of the need to develop cost-effective and innovative organizational models that are distinct to individual patient populations.

Styles APA, Harvard, Vancouver, ISO, etc.
33

Li, Wei-Chiang, et 黎維強. « Protection Management of Enterprise Endpoint Based on the ITIL Management Framework ». Thesis, 2012. http://ndltd.ncl.edu.tw/handle/03419256582406110454.

Texte intégral
Résumé :
碩士
中華大學
資訊管理學系碩士在職專班
100
In the modern enterprise's internal environment, there is the endpoint of the notebook and desktop computers. Convenient network applications accompanied by the threat of various forms of information, such as computer viruses, spyware, operating system vulnerabilities, a malicious Web site, malware, worms’ attack. The endpoint is the largest number of the subject in the corporate computer environment. If information threats affect the endpoint operation, the business operations and revenue will suffer the loss. This study will focus on the research of the endpoint protection for enterprises. Using ITIL management framework approach provides endpoint protection management and assessment methodology of effectiveness as planning reference for the business unit of information during endpoint protection management. Providing harm repair and protective mechanisms for the potential damage to enterprise endpoint will reduce the impact and influence from such information threat.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Lin, Kuei-Yu, et 林桂玉. « Investor Protection and Earnings Management : An International Comparison ». Thesis, 2006. http://ndltd.ncl.edu.tw/handle/72508978283132754545.

Texte intégral
Résumé :
碩士
中國文化大學
會計研究所
94
This paper examines the relation between earnings management and investor prote- ction. Using a sample of public corporations from Compustat database over the period 1995-2004, our research applies principal component analysis and cluster analysis to examining the level of earnings management across 31 countries. Our results indicate that the level of earnings management across 31 countries is different ; beside, the regression results show that earnings management is negatively associated with outside investor rights and legal enforcement. In sum, the level of investor protection would influence earnings management. If the Government want to provide better protection for investors, the government must practices corporate governance and protects investor’ rights, for example, independent directors and supervisors. These ways could protects investor’ rights.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Ke, Yi-Chuan, et 柯奕銓. « The Protection of Minority Shareholders in Management Buyouts ». Thesis, 2015. http://ndltd.ncl.edu.tw/handle/10334962068791400388.

Texte intégral
Résumé :
碩士
銘傳大學
法律學系碩士班
103
In view of the management buyouts (hereinafter refer as MBO), due to the nature of conflict of interest within management, the minority shareholders will have a great impact on their shareholder rights.First, the core of this thesis focused on protecting minority shareholder rights in the context of MBO, and then discussed in detail about the protection mechanisms for minority shareholders’right from point of view of comparative law, and reviewed on our legal system at present. In the end this thesis focused on the classic MBO case ― Yageo case ― and gave specific suggestions on reforming the fiduciary duty, strengthening the function of Independent special committees and the equitable treatment of shareholders in order to improve and advance the M & A financial institution in Taiwan. In Chapter II, it discussed the purpose, nature and type of MBO, and also articulated the influence and problems about foreign private equity funds in Taiwan. The Chapter III discussed the conflict of interests of management in the context of MBO. It will discussed in detail about the fiduciary duties of managers or directors, such as the duty of loyalty, duty of care and obligations of information disclosure. In Chapter IV, the key issue of this chapter is whether the acquisition of the target company''s share price can really reflect a fair price. And from the perspective of comparative law this chapter also discussed the establishment of objective and independent of the Special Committee in the target company. The Chapter V analyzed the classic MBO case of Yageo Corp. by Orion Investment. It discussed why this case was doomed to failure, and provided specific suggestions to improve the legal systems for minority shareholders’ protection in the context of MBO. The Chapter VI concluded the preceding chapters, giving concrete proposals on mergers and acquisitions in the context of MBO to improve our legal system so that the vulnerable minority shareholders’ interests could be really protected and demonstrated.
Styles APA, Harvard, Vancouver, ISO, etc.
36

chang, Ping-hai, et 張平海. « Multi-Purpose High-Building Fire Protection Management Research ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/4kh35e.

Texte intégral
Résumé :
碩士
國立中山大學
高階經營碩士班
96
The urbanized congregate housing and commercial buildings have long developed towards the super high-rise, enlarged and complex composition. The application, identification, usage and administration of such buildings are more complicated than general buildings; so too the fire facilities, organization, training, operation and management. Such tendency of development on super high-rise and large buildings is evident everywhere in various cities. In the area of fire prevention, there will be greater challenges. The general public remains ignorant about disaster prevention, while government authorities do not integrate and enhance regulation on categorization and identification of construction for super high-rise buildings with different applications and scales. Without accumulating our capabilities for fire prevention, it is likely incur the loss of countless lives and property in general buildings when disaster occurs. Since the implementation of the fire administration system in Taiwan from 1995, certain results have been achieved and further development is expected. However, it is found from literature review and questionnaire of this study that there are still many improvements to be made. Among numerous problems, “Human negligence” covers most of the cases, which also verifies the perspective discussed in the study that “people” are the keys to fire administration. Therefore, it is deemed in this study that in a super high-rise composite (general super high-rise), the caretaker, fire administrator, mutual fire administrator, professional building administration (security) company and various fire squads be the key persons to promote fire administration. Whether it is the administrational obligation of fire safety or fire rescue, the abovementioned units must link, cooperate and integrate with each other to form a group, so the capability of administrating fire safety of each super high-rise building can be controlled adequately. From various problems witnessed in this study, the following strategies are drafted to correspond with administration, which is expected to integrate the administrational level of fire safety. Under well mechanism of administration, the capacity of fire prevention can be reflected for reducing fire accidents to minimum: 1. Enhance administrative obligation and command mechanism of fire prevention for composite super high-rise buildings. 2. Establish administrative capability of fire prevention from professional building administration (security) company. 3. Regulate the categorization and identification of construction for super high-rise buildings with different applications and scales. 4. Integrate the capacity of fire prevention, operation in fire field and building’s disaster prevention for unified correspondence. 5. Request the government to promote publication and incentive system for information on administration and examination of fire safety.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Agarwal, Avesh Kumar. « Performance evaluation and protection management for wireless networks ». 2009. http://www.lib.ncsu.edu/theses/available/etd-05072009-141625/unrestricted/etd.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Nai-Kang, Huang, et 黃迺康. « A Study of Management Mechanism for Enterprise Privacy Protection Based on Personal Data Protection Act ». Thesis, 2011. http://ndltd.ncl.edu.tw/handle/97067221936394110771.

Texte intégral
Résumé :
碩士
國立中正大學
會計與資訊科技研究所
99
The Legislative Yuan passed the Personal Data Protection Act on April 27th, 2010, and it let the personal data protection issues call the public's attention. In the future organization, regardless of their size or the amount of personal data, will be subject to the Personal Data Protection Act. It affect the data collection and processing way and the marketing practices, and it also increase criminal penalties and compensation that is up to $200 million when the enterprise is against the law. Therefore, the enterprise should engage in planning and implement information security protection of personal data at this stage in quickly. ISO 27001 is an international standard of information security management system. But this is not representative for the integrity of personal data protection in the enterprise when they follow ISO 27001. The enterprise’s information security is focus on the confidential information and less to the customer's personal data. As a result, it make inadequate on personal data protection and enhance the possibility of conflict with the law. In this situation, the enterprise must adjust and build the appropriate security structure to control personal data processes to meet compliance requirements. So they require a complete set of standards to follow to ensure the enterprise adjust properly, comply with regulations, and fulfill the obligation of protecting personal data. This study applies the Gowin's Vee research strategy. In the conceptual side, we sorted out 4 control domains, 15 control objectives, and 75 control measures which develop the Enterprise Privacy Protection Management Mechanism by literature review about Personal Information Management System and Personal Data Protection Act. Then we apply the Delphi Expert Questionnaires to fix this mechanism and add a new control measure. In the methodological side, we use the case study to verify and assessment the practicality and availability of this mechanism. This research shows that the research outcome, the Enterprise Privacy Protection Management Mechanism, provides organizations a reference and compliance purpose to help them obey the law, reduce the risk of litigation, and fulfill the responsibilities of protect personal data.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Chou, Yen Chun, et 周彥均. « Integrity Protection Methods with Privilege Management for Digital Evidences ». Thesis, 2009. http://ndltd.ncl.edu.tw/handle/35905103024063666318.

Texte intégral
Résumé :
碩士
長庚大學
資訊管理學研究所
97
It is a tendency that digital evidence is to be the important basis in the court, and we can not abandon this critical witness because the characters of digital information such that digital evidence can be easily multified. Recently, domestic scholars or foreign scholars proposed relevant standard operating procedures and other regulations to preserve the integrity of digital evidence. When the integrity of digital evidence comes to be controversial, the judiciary bureaus can not bring the direct proof to the mass, however. The thesis proposed three integrity protection methods for digital evidence based on the flaws of the electronical character of digital information and judiciary circumstances. The simple digital evidence protection method is to confirm the digital evidence can be maintained its integrity, correctness, confidentiality, justice and legality in the transference between the police, the forensic staff and the judge. In the digital evidence protection method with supervision mechanism, the supervision mechanism is set between the superior and the subordinate in the cyber forensics laboratory and further divided into all-supervision and partial-supervision. In the digital evidence protection method with thresh- hold supervision mechanism, the method extends the relationships between the superior and the subordinate and provides six supervisal ways according to the combination of highly-authorized supervision, threshold-authorized supervision, lightly-authorized supervision with all-supervision and partial-supervision.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Li, Yue-Bin, et 李樂賓. « Protection and memory management in LM286 logical machine system ». Thesis, 1986. http://ndltd.ncl.edu.tw/handle/78671032465121881108.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Suggitt, Jeff. « The Spur Woods : a plan for protection and management ». 1993. http://hdl.handle.net/1993/22984.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Chen, Yong-Feng, et 陳永峰. « Process Management of Online Auction for Protection of Consumers ». Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b3ttef.

Texte intégral
Résumé :
碩士
明新科技大學
工業工程與管理系碩士在職專班
105
According to the characteristics of consumer online shopping in Taiwan, this study first analyzes the current business processes of security for both buyers and sellers. This research also uses the cases of Taiwan online auction of buyers during the online shopping processes. The business model is studied for further understanding the key activity of online auction. Business process management tool IDEF (ICAM Definition Method) is applied to provide better online shopping process security for buyers. A process model is finally developed for reference in the online auction market.
Styles APA, Harvard, Vancouver, ISO, etc.
43

WANG, HSIAO-MEI, et 王曉梅. « Relationship between Environmental Protection Expenditure Information and Earnings Management ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/32gg58.

Texte intégral
Résumé :
碩士
朝陽科技大學
會計系
106
Due to serious global warming in present day, environmental protection has become one of the important international issues for decades. The pollution caused by business production or other factors may do bigger and more serious destruction to the environment and harm to all mankind. The goal of business is to create biggest earnings, while at the same time may generate environmental pollution problems. Therefore, business should have relative amount of environmental expenditures to cope with the pollution caused by themselves. Thus, the study aims to explore relationship between business’ environmental protection expenditures information and earnings management, through business’ disclosures of environmental protection expenditures information to discuss whether such disclosures can restrain business from earnings management. The study used high risk pollutive listed industries from years 2007 to 2016 as study subject and applied regression analysis. The study finds that when businesses face fines and loss on disposal due to environmental pollution, they would be watched by governmental agencies, thus would reduce earnings management behaviors during sensitive periods. Businesses that pay more attention on social responsibility would propose environmental protection related policy and plan future environmental protection expenditures to prevent themselves from generating pollution, then increase environmental quality, lower risk of being fined by government in the future, and further enhancing business evaluation. Therefore, business would have less motives in earning management. Lastly, when differentiating scales of industries on the effect of environmental protection expenditures information on earnings management, large scale business gets results consistent with the original one. However, when small scale business face environmental pollution loss and disposal, due to the large effect of pollution fines on business themselves, they would practice earnings management to protect earnings on book.
Styles APA, Harvard, Vancouver, ISO, etc.
44

ZENG, YANWEI, et 曾延偉. « Knowledge Innovation and Protection in a Management Consulting Firm ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/wg8uc7.

Texte intégral
Résumé :
碩士
國立清華大學
科技管理研究所
106
As the knowledge-based economy comes, knowledge innovation and protection are the top issues for management consulting firms which highly rely on knowledge. The more knowledge intensive the companies are, the more dependent in knowledge innovation they do. Knowledge innovation comes from interation, so it is crucial for management consulting firms to protect their intellectual property and knowledge. Besides, management consulting firms should also concern the profitability from their innovation and knowledge. This study proposes the research framework that includes three ways of knowledge co-creation with: customers, colleagues, and the third parties. The research framework also concerns with knowledge protection from the angle of protection mechanisms. Furthermore, the study also explores the issues of appropriability regime and complementary assets. Then we verify it with one practical case of a Chinese consulting firm. . The study reveals that management consulting firms use piecemeal intellectual property strategy, and tight process control for protecting co-creating knowledge and tight contracts with their partners and customers for appropriating their innovation and knowledge. Finally, the managerial implications for protecting and profiting co-creating knowledge are suggested.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Khan, Abul Kalam. « Re-visioning child protection management embedded in family empowerment ». Thesis, 2016. https://researchonline.jcu.edu.au/49797/6/49797-khan-2016-thesis.pdf.

Texte intégral
Résumé :
The study explores the key question whether child protection practice management requires a re-visioning embedded in family empowerment. The principle objectives of the research were to promote our understanding of the views and experiences of families with the public child protection system by using empowerment framework as a lens for deeper exploration and mapping of the key themes of findings in articulating way forwards informed by the families. The concept has been examined within a qualitative framework through in-depth interviewing of a cohort of families about their individual experiences and expectations of the public child protection services. The project has progressed in two phases: Phase 1 was conducted through in-depth interviewing of the families. A critical social theoretical framework was developed to analyse the primary data. Phase 2 focused on a meta-synthesis of diverse empowerment approaches from a range of disciplines and developed a theoretical model/lens (lntegrated Construct of Empowerment Theories-lCET). This theoretical model/lens is later utilised to map and interpret the key themes emerged from the primary data and then reported on the outcomes. The research identified a number of concerns around frontline practice management, issues around consistency and coordination in leaderships in the system and resultant struggles and alienation of families from the services. The findings highlight the experiential stress and disempowerment of the families at all levels of child protection interventions, which were complicated by the images of the frontline workers as powerful and able to support and make decisions. However, in reality they were not always able, and at times over reactive, invalidating, coercive and inconsistent in communication amidst further struggles due to frequent changes in the work force. The families' difficulties to engage with the service were compounded due to lack of trust on the system and associated uncertainty about what's going on or going to happen in the significant areas like out of home care, assessment, interventions and legal processes. These findings are also reinforced by the research in the last 10 years in the Anglophone countries, which recommended for a relationally based practice approach and the process should be directed by experiences of the families. Building on previous work, the theoretical mapping process has indicated an association between the processes of empowerment of the families and the development of the child protection system. The outcome also outlines an integrated stage process, in individual (professional), group, and systemic domains, as a potential scope for rebuilding child protection services as a pathway for improved service outcomes and empowerment of families. The study suggests a need for further research to develop a broader understanding of the experiences of the families in building the discussion for family empowerment focused service as a vision for child protection management.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Von, Solms Rossouw. « Information security management : processes and metrics ». Thesis, 2014. http://hdl.handle.net/10210/12038.

Texte intégral
Résumé :
PhD. (Informatics)
Organizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization. These information resources and services should be secured to ensure a high level of availability, integrity and privacy of this information at all times. This process is referred to as Information Security Management. The main objective of this, thesis is to identify all the processes that constitute Information Security Management and to define a metric through which the information security status of the organization can be measured and presented. It is necessary to identify an individual or a department which will be responsible for introducing and managing the information security controls to maintain a high level of security within the organization. The position .and influence of this individual, called the Information Security officer, and/or department within the organization, is described in chapter 2. The various processes and subprocesses constituting Information Security Management are identified and grouped in chapter 3. One of these processes, Measuring and Reporting, is currently very ill-defined and few guidelines and/or tools exist currently to help the Information Security officer to perform this task. For this reason the rest of the thesis is devoted to providing an effective means to enable the Information Security officer to measure and report the information security status in an effective way...
Styles APA, Harvard, Vancouver, ISO, etc.
47

Han, Mau shan, et 韓茂山. « Compansation and management of water resource protection area is an example of Taipei water resource protection area ». Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47781021195159081790.

Texte intégral
Résumé :
碩士
國立臺北大學
資源管理研究所
90
Abstract Water not only supplies needs for all the lives, but also maintains humankinds for living, so that how to retain the pure, safe water resource is an important topic for water resource protection policy. Now national water resource policy is to build an upstream water resource district to conform we can have pure, safe drinking water, water resource pollution control is the major policy for the middle and downstream district. There is about one sixth land being managed for drinking water resource protection district in Taiwan. But for the owners of the land that being included in water resource protection area, the different restriction for land using in water resource area makes some invasion to land property rights. That makes the cost for water resource protection be charged on from the people living in this protection areas, the users of water in the middle and downstream areas needn’t share it, though they can enjoy the efficient water resource also. This makes the owners of the upstream district would not like to do anything for water resource protection, it’s not fair, and no justice. Government can use different means to push the owners of the upstream lands doing something good for water resource protection, at the mean time the middle and downstream water users should treasure the water resource. Due to the foreign experiences, in order to use good water resource for the middle and downstream water resource users, following the “users-to-pay” rule they must pay for the owners of the upstream areas that they engage in water resource protection. For example Perrier Vittel S.A., a drinking water company in France compensates the land owners who engage in water resource protection in the upstream area in order to conform the water is pure and clean, in Germany many drinking water companies also compensate the upstream farmers. In our country, if we have to compensate the people living in the water resource protection district? What to compensate that can make something good for water resource protection? For example in Taipei water resource district, adding 0.2 dollar per degree to the water fee for the sake of compensating the people living in the district, also help for local environmental and educational development, social interest, traditional actions, public buildings and another items. This kind of compensation is not useful for water resource protection, but apt to be abused especially for election bribery. Due to the property theory when the people property rights are restricted by the governmental public interest and up to “special sacrifice”, the government should give the property rights owners some compensation. Due to externality theory good water resource is created by means of doing some restriction of the land, this external efficiency should be internalized to compensate to the producers. Due to these theories mentioned above the feedback or compensation fee should be used for the workers who engaged in water resource protection, but not for the public buildings in the protection district. Water resource management should be characterized with watershed, and that charges the water flow rate, quality, flood, and biological condition etc. The stakeholders and civil watershed management department supervise and check the policy together. Using many kinds of tools such as water pollution fee, conservation easement to manage water resource, in order to promise permanent use of water resource.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Amon-Armah, Frederick. « ECONOMIC ANALYSIS OF NUTRIENT MANAGEMENT PRACTICES FOR WATER QUALITY PROTECTION ». 2012. http://hdl.handle.net/10222/15581.

Texte intégral
Résumé :
The main purpose of this study was to evaluate the effect of alternative cropping systems on farm net returns, and nitrate-N and sediment yields in Thomas Brook Watershed (TBW). The study involved integrated bio-physical and economic optimization modelling. Crop yield and nitrate-N pollution response functions were estimated and then used in trade-off analysis between farm returns and environmental quality improvement. Five crop rotation systems were evaluated for seven fertilizer levels under conventional tillage (CT) and no-till systems (NT). Nitrate-N leached, as well as estimated maximum economic rate of N (MERN) fertilizer level and marginal abatement costs depended on crop type, rotation system, and tillage type. The most cost effective cropping systems that met restrictions on Health Canada maximum limit on nitrate-N in water included corn-corn-corn-alfalfa-alfalfa under NT for corn-based cropping systems, potato-winter wheat-carrot-corn under CT for vegetable horticulture-based and potato-barley-winter wheat-potato-corn under NT for potato-based cropping systems.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Yang, Si-Wen, et 楊絲汶. « The Association between Stakeholder Management and “Environmental Protection” Performance Measures ». Thesis, 2015. http://ndltd.ncl.edu.tw/handle/bb6np7.

Texte intégral
Résumé :
碩士
中原大學
會計研究所
103
The study examines whether the stakeholder management implementation influences the use of “Environmental Protection” performance measures in compensation contracts. The results of this study show that the degree of the stakeholder management implementation is positively associated with the likelihood that “Environmental Protection” performance measures are used in compensation contracts.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Wang, Chieh-Chung, et 王峙中. « An Implementation of Digital Document Protection System with Right Management ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/48978772042133007664.

Texte intégral
Résumé :
碩士
國立成功大學
工程科學系專班
96
Along with the prosperity of information technique and the rapidly development of IT hardware, most of the industries of Taiwan have been transferred to the knowledge orientation. Under this environment the main competitiveness comes from the value of “information”. Almost all of the information is stored in the information facilities via any digital forms. Documents in digital form are easily to be duplicated and distributed. How to protect these digital documents and archiving them securely is a serious issue to be faced. In this study, the technique of Java Swing is applied to develop a digital document protect system which can be viewed under web browser. The system is under client-server architecture and the documents stored in the server are encrypted via AES technique for increasing its security. The group authorized mechanism and on-line review capabilities can provide easily using and controlling of the digital documents.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie