Tesi sul tema "Electronic data processing departments"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Electronic data processing departments".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Baxter, David. "Perception of organisational politics and workplace innovation : an investigation of the perceptions and behaviour of staff in an Australian IT services organisation /". Swinburne Research Bank, 2004. http://hdl.handle.net/1959.3/46062.
Testo completoA thesis submitted to the fulfilment of the requirements for the degree of Doctor of Philosophy, Australian Graduate School of Entrepreneurship, Swinburne University of Technology, 2004. Typescript. Includes bibliographical references (p. 229-230).
Javanshir, Marjan. "DC distribution system for data center". Thesis, Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39344952.
Testo completoMiles, Shaun Graeme. "An investigation of issues of privacy, anonymity and multi-factor authentication in an open environment". Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006653.
Testo completoAdobe Acrobat Pro 9.5.1
Adobe Acrobat 9.51 Paper Capture Plug-in
Giesing, Ilse. "User perception related to identification through biometrics within electronic business". Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.
Testo completoGoss, Ryan Gavin. "Enabling e-learning 2.0 in information security education: a semantic web approach". Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/909.
Testo completoPerelson, Stephen. "SoDA : a model for the administration of separation of duty requirements in workflow systems". Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/68.
Testo completoSmith, Michael Alan. "An empirical investigation of the determinants of information systems outsourcing". Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/29455.
Testo completoLam, Cheuk-yung. "A case study of IT outsourcing in Hong Kong government /". Hong Kong : University of Hong Kong, 1995. http://sunzi.lib.hku.hk/hkuto/record.jsp?B14039023.
Testo completoBullock, Kenneth F. "Navy Marine Corps Intranet : an analysis of its approach to the challenges associated with seat management contracting". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBullock.pdf.
Testo completoViljoen, Melanie. "A framework towards effective control in information security governance". Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Testo completoBeavan, Robert Benjamin. "Leadership in local government computer service organizations within the state of California". CSUSB ScholarWorks, 1993. https://scholarworks.lib.csusb.edu/etd-project/654.
Testo completoChan, Yuk-wah Eliza, e 陳玉華. "A review of catastrophe planning for management information systems inHong Kong". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1989. http://hub.hku.hk/bib/B3126427X.
Testo completoGerber, Mariana. "The development of a technique to establish the security requirements of an organization". Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/89.
Testo completoTansley, Natalie Vanessa. "A methodology for measuring and monitoring IT risk". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/772.
Testo completoBurdis, Keith Robert. "Distributed authentication for resource control". Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.
Testo completoBeckman, Joseph M. "Legal requirements of secure systems". Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.
Testo completoChance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel". Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.
Testo completoLee, Kum-Yu Enid. "Privacy and security of an intelligent office form". Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9930.
Testo completoMoller, Alison. "Strategies for sourcing IT skills for South African tertiary institutions". Thesis, Port Elizabeth Technikon, 2004. http://hdl.handle.net/10948/263.
Testo completoLam, Cheuk-yung, e 林卓蓉. "A case study of IT outsourcing in Hong Kong government". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1995. http://hub.hku.hk/bib/B31266575.
Testo completoBohnstedt, Jan. "Fernwartung : die rechtlichen Grenzen des IT-Outsourcing durch Banken /". Baden-Baden : Nomos, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014614364&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Testo completoShoeib, Ashraf. "Key Decision-making Phases And Tasks For Outsourcing Information Technology". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2000. https://ro.ecu.edu.au/theses/1537.
Testo completoBattikh, Dalia. "Sécurité de l’information par stéganographie basée sur les séquences chaotiques". Thesis, Rennes, INSA, 2015. http://www.theses.fr/2015ISAR0013/document.
Testo completoSteganography is the art of the dissimulation of a secret message in a cover medium such that the resultant medium (stego) is almost identical to the cover medium. Nowadays, with the globalization of the exchanges (Internet, messaging and e-commerce), using diverse mediums (sound, embellish with images, video), modern steganography is widely expanded. In this manuscript, we studied adaptive LSB methods of stéganography in spatial domain and frequency domain (DCT, and DWT), allowing of hiding the maximum of useful information in a cover image, such that the existence of the secret message in the stégo image is imperceptible and practically undetectable. Security of the message contents, in the case of its detection by an opponent, is not really insured by the methods proposed in the literature. To solve this question, we adapted and implemented two (known) methods of adaptive stéganographie LSB, by adding a strong chaotic system allowing a quasi-chaotic insertion of the bits of the secret message. The proposed chaotic system consists of a generator of strong chaotic sequences, supplying the dynamic keys of a modified chaotic 2D Cat map. Universal steganalysis (classification) of the developed methods of stéganography, is studied. On this question, we used the linear discriminating analysis of Fisher as classifier of the characteristic vectors of Farid, Shi and Wang. This choice is based on the wide variety of tested characteristic vectors that give an information about the properties of the image before and after message insertion. An analysis of the performances of three developed methods of steganalysis, applied to the produced stego images by the proposed adaptive methods of stéganography, is realized. Performance evaluation of the classification is realized by using the parameters: sensibility, specificity, precision and coefficient Kappa
Achieng, Mourine Sarah. "The adoption and challenges of electronic voting technologies within the South African context". Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1366.
Testo completoThe use of ICTs such as computers, electronic databases and other technologies have been in use for a number of years within the public sector to organise, manage and disseminate information to the public as well as to facilitate day-to-day communication in government offices. In this context, the value of the use of ICTs has been to assist and streamline government operations. The technological development in South Africa has opened up the possibilities of the use of ICTs in the democratic and governance process. E-democracy has been defined as a tool for abandoning the representative system for one with more direct citizen engagement. This study sets out to explore the challenges of the current electoral process, and also determine the factors that could influence the adoption and diffusion of e-voting technologies within the South African context. Literature has shown that countries such as Brazil and India have successfully implemented electronic voting systems and other countries are at various piloting stages to address many challenges and problems associated with manual paper based system such as costs of physical ballot paper and other overheads, electoral delays, distribution of electoral materials, and general lack of confidence in the electoral process. It is in this context that the study also seeks to determine whether the South African electoral management body can leverage on the opportunities that e-voting presents. However, with all the benefits that e-voting presents, there are countries such Germany, the Netherlands etc. that have tried and tested e-voting systems and decided to abandon these system to go back to the manual paper ballot voting systems because of various reasons ranging from cost, security and verifiability. This research is exploratory in nature and adopts qualitative research approach and it is within the interpretivism paradigm. Survey and interview strategies were used to collect data. A purposive sampling method was used to select the participants for the survey. To gain an understanding of the views of voters and electoral management body (IEC) about the current electoral process and e-voting technologies, literature was explored, a questionnaire was distributed online to voters and an in-depth semi-structured interview was conducted with the IEC. The study targeted voters who had access to the internet since the survey questionnaire was distributed online. The analysis is based on thematic analysis and diffusion of innovation (DoI) theory was also used to provide an analytical framework for the study. Through this framework the aims and objectives of the study were conceptualized around three constructs from the theory (relative advantage, compatibility and complexity). The findings of the study revealed that the three constructs from the DoI framework are important factors that may influence the adoption process of e-voting technologies. The findings also revealed other factors such as availability of ICT enable infrastructure and resources, digital divide, trust in technology, awareness of the technology and environment could that also influence the adoption process. The contributions of this research are anticipated to be a better understanding of the adoption of e-voting technologies in South Africa. For the electoral management bodies, the contribution of this research is that the research to some extent portrays factors that could influence the adoption of e-voting technologies in South Africa. Therefore, findings such as availability of ICT infrastructure and accessibility of these infrastructures should be taken into consideration before introducing e-voting technologies. Keywords: DoI (diffusion of Innovation), e-voting (electronic voting) technologies, E-governance, e-participation.
Wells, William Ward. "Information security program development". CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Testo completoChinpanich, Vorapong. "Helpdesk Support Alert System". CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2674.
Testo completoFunk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions". Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.
Testo completoENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global communication and the accompanying legal problems. This is followed by an examination of the different functions Internet providers have. A survey of some of the important crimes affecting the Internet and also some Internet-specific offences put the more general issue of liability in a more specific context. Traditional and new forms of crimes are discussed. This section is followed by an analysis of Internet provider liability under German criminal law and Germany's Teleservices Act. From an international criminal law perspective some international instruments, like the Cybercrime Convention of the Council of Europe, is discussed. National legislation, especially in the context of the European Union, must always be put in the proper regional and international context. The thesis concludes with some thoughts on alternative, or perhaps complementary, methods to fight illegal and criminal conduct on the Internet. This is done not as a critique of the responses to Internet crime, but rather to strengthen the many hands trying to reduce Internet crime.
AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers. Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA. Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur 'n ondersoek na die verskillende funksies van Internet verskaffers. 'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek. Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die relevante regionale en internasionale konteks geplaas. Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle rolspelers in die stryd teen Internet misdaad se hande te sterk.
Ostroumov, Ivan Victorovich. "Magnetic field data processing with personal electronic device". Thesis, Polit. Challenges of science today: International Scientific and Practical Conference of Young Researchers and Students, April 6–8, 2016 : theses. – К., 2016. – 83p, 2016. http://er.nau.edu.ua/handle/NAU/26649.
Testo completoRomig, Phillip R. "Parallel task processing of very large datasets". [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/romigab.pdf.
Testo completoRehfuss, Paul Stephen. "Parallelism in contextual processing /". Full text open access at:, 1999. http://content.ohsu.edu/u?/etd,272.
Testo completoRobinson, Patrick Glen. "Distributed Linda : design, development, and characterization of the data subsystem /". Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-07102009-040417/.
Testo completoParker, Greg. "Robust processing of diffusion weighted image data". Thesis, Cardiff University, 2014. http://orca.cf.ac.uk/61622/.
Testo completoTucker, Peter A. "Punctuated data streams /". Full text open access at:, 2005. http://content.ohsu.edu/u?/etd,255.
Testo completoGottemukkala, Vibby. "Scalability issues in distributed and parallel databases". Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8176.
Testo completoLee, J. J. "The object-oriented database and processing of electronic warfare data". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA303112.
Testo completoBodorik, Peter Carleton University Dissertation Engineering Electrical. "Query processing strategies in a distributed data base". Ottawa, 1985.
Cerca il testo completoSokolova, Karina. "Bridging the gap between Privacy by Design and mobile systems by patterns". Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0008/document.
Testo completoNowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The “Privacy by Design” approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes “Privacy by Design” principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making “Privacy by Design” not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design
Lewis, Tony. "Electronic data interchange in the construction industry". Thesis, Loughborough University, 1998. https://dspace.lboro.ac.uk/2134/11183.
Testo completoChen, George C. M. "Strategic analysis of a data processing company /". Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/3624.
Testo completoResearch Project (Faculty of Business Administration) / Simon Fraser University. Senior supervisor : Dr. Ed Bukszar. EMBA Program. Also issued in digital format and available on the World Wide Web.
Thomas, Muffy. "The imperative implementation of algebraic data types". Thesis, University of St Andrews, 1988. http://hdl.handle.net/10023/13471.
Testo completoBostanudin, Nurul Jihan Farhah. "Computational methods for processing ground penetrating radar data". Thesis, University of Portsmouth, 2013. https://researchportal.port.ac.uk/portal/en/theses/computational-methods-for-processing-ground-penetrating-radar-data(d519f94f-04eb-42af-a504-a4c4275d51ae).html.
Testo completoCline, George E. "A control framework for distributed (parallel) processing environments". Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-12042009-020227/.
Testo completoClayton, Peter Graham. "Interrupt-generating active data objects". Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1006700.
Testo completoJin, Xiaoming. "A practical realization of parallel disks for a distributed parallel computing system". [Gainesville, Fla.] : University of Florida, 2000. http://etd.fcla.edu/etd/uf/2000/ane5954/master.PDF.
Testo completoTitle from first page of PDF file. Document formatted into pages; contains ix, 41 p.; also contains graphics. Vita. Includes bibliographical references (p. 39-40).
Nader, Babak. "Parallel solution of sparse linear systems". Full text open access at:, 1987. http://content.ohsu.edu/u?/etd,138.
Testo completoKhare, Arjun. "ACT++ 3.0 : implementation of the actor model using POSIX threads /". Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020041/.
Testo completoWan, Charn Wing. "The political economy of digital copyright in Hong Kong /". access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?jsd-slw-b23750893f.pdf.
Testo completo"Submitted to School of Law in partial fulfillment of the requirements for the degree of Doctor of Juridical Science." Includes bibliographical references (leaves 435-452)
Gardener, Michael Edwin. "A multichannel, general-purpose data logger". Thesis, Cape Technikon, 1986. http://hdl.handle.net/20.500.11838/2179.
Testo completoThis thesis describes the implementation of a general-purpose, microprocessor-based Data Logger. The Hardware allows analog data acquisition from one to thirty two channels with 12 bit resolution and at a data throughput of up to 2KHz. The data is logged directly to a Buffer memory and from there, at the end of each 109, it is dumped to an integral cassette data recorder. The recorded data can be transfered from the logger to a desk-top computer, via the IEEE 488 port, for further processing and display. All log parameters are user selectable by means of menu prompted keyboard entry and a Real-Time clock (RTC) provides date and time information automatically.
Fowler, Robert Joseph. "Decentralized object finding using forwarding address /". Thesis, Connect to this title online; UW restricted, 1985. http://hdl.handle.net/1773/6947.
Testo completoPu, Calton. "Replication and nested transactions in the Eden Distributed System /". Thesis, Connect to this title online; UW restricted, 1986. http://hdl.handle.net/1773/6881.
Testo completo