Дисертації з теми "Car security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Car security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Svensson, Benjamin, and Kristian Varnai. "Servicing a Connected Car Service." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453.
Повний текст джерелаBerner, Madeleine. "Where’s My Car? Ethical Hacking of a Smart Garage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280298.
Повний текст джерелаIoT-produkter bryter ny mark inom spridda branscher, och introducerar potentiella attackvektorer i oförberedda miljöer. Det är inte förvånande att till och med den nya generationen garageöppnare har tagit ett kliv in i världen av IoT. Vilket innebär att garageöppnarna är uppkopplade till Internet, kallas för smarta garage och levereras med målet att bidra till ökad säkerhet med sina nya funktioner tagna från trenden av hemmaövervakning. Men kan de hålla vad de lovar? Det här examensarbetet har utvärderat säkerheten av ett utvalt smart garage som säljs världen över – iSmartgate PRO. Penetrationstestning genomfördes med fokus på webbapplikationen. Totalt sett rapporterades elva sårbarheter, varav en inkluderade en one-click-root-attack som kombinerade tre sårbarheter till att ge en icke autentisierad fjärrangripare ett root-skal. Den dragna slutsatsen var att produkten hade utrymme för att förbättra säkerheten.
Bouard, Alexandre [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Refik [Akademischer Betreuer] Molva. "Middleware-based Security for Future In-Car Networks / Alexandre Bouard. Gutachter: Claudia Eckert ; Refik Molva. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2014. http://d-nb.info/1058214268/34.
Повний текст джерелаRamquist, Robin. "Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences." Thesis, Umeå universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128612.
Повний текст джерелаSemančík, Matej. "Zabezpečení bezklíčových systémů u automobilů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400867.
Повний текст джерелаЛевченко, Віталій Михайлович. "Пристрій активної безпеки автомобіля". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/25876.
Повний текст джерелаThe purpose of the master's thesis is to improve the parameters and characteristics of active safety of the car and extend its application. The objectives of the study are: an analytical review of existing car security systems; development of the automobile safety device and its simulation; research and analysis of characteristics of the designed device. the object of research - a device for reducing the probability of road traffic accidents and ensuring the safety of passengers of the car. subject of research - parameters and characteristics of the device and active safety systems of the car on its basis. research methods: theoretical calculation and experimental study of parameters of the device layout. scientific novelty of the obtained results: the use of the device of automobile safety with the presented algorithm of work is offered and researched. approbation of the results of the dissertation. International Scientific Internet Conference "Information Society: Technological, Economic and Technical Aspects of Formation" (Issue 32, October 16, 2018).
Pirner, Adam. "Vyprošťování osob z havarovaných vozidel s ohledem na jejich konstrukci." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232682.
Повний текст джерелаČtvrtečka, Lukáš. "Podnikatelský plán." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72730.
Повний текст джерелаGoikoetxea, Yanci Asier. "Smart card security." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3091/.
Повний текст джерелаBengtsson, Robin. "Security creating technology for elderly care." Thesis, Tekniska Högskolan, Jönköping University, JTH, Industridesign, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50760.
Повний текст джерелаBrown, Christine S. H. "Pathways into High Security Psychiatric Care." Thesis, University of Exeter, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.486662.
Повний текст джерелаShields, Lisa. "Growing with Care : Building care relationships to plan for food security." Thesis, Linnéuniversitetet, Institutionen för design (DE), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75440.
Повний текст джерелаDahabiyeh, Laila Ali. "IS security networks in credit card fraud prevention." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/88609/.
Повний текст джерелаThomson, Lindsay D. G. "Patients in special security psychiatric care in Scotland." Thesis, University of Edinburgh, 2000. http://hdl.handle.net/1842/22691.
Повний текст джерелаAthanasopoulos, Vasileios D. "Design and development of a web-based DOD PKI common access card (CAC) instruction tool." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1714.
Повний текст джерелаPublic key cryptography and the infrastructure that has been designed to successfully implement it: Public Key Infrastructure (PKI) is a very promising computer security technology. As a significant enhancement to this infrastructure, the DoD is now issuing smart card tokens, in the form of the Common Access Card (CAC), to its service members. This card is a relatively complex cryptographic device that contains its user's private keys, digital certificates, and other personal/administrative information. Service personnel are being issued these cards with little or no training regarding what they are or how they function. Such an omission detracts from the infrastructure's overall security. This thesis presents an introductory-level description of public key cryptography and its supporting infrastructure (PKI). The thesis then goes on to develop a web-based training tool that could provide all DoD CAC holders with the rudimentary knowledge of how their CAC fits into the broader infrastructure. The training tool will require no instructor, and will present a validation test to each user. DoD commands could utilize this tool to provide basic CAC training to their members.
Pham, Thi Van Anh. "Security of NFC applications." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-124368.
Повний текст джерелаNear Field Communication (NFC) hänvisar till en kommunikationsteknik som möjliggör en enkel anslutning och dataöverföring mellan två enheter genom att sätta dem i en närhet. Förutom kontaktlös betalning och biljetthantering ansökningar, vilket var den ursprungliga viktiga drivkrafter för denna teknik, kan ett stort antal nya användningsfall dra nytta av denna snabbt växande teknik, som har visats i olika NFC-aktiverade program förslag och pilotförsök. Typiska NFC-applikationer kombinerar NFC-taggar, NFC-kompatibla mobiltelefoner och online-servrar. Denna avhandling utforskar förtroenderelationer, säkerhetskrav och säkerhetsprotokoll utformning i dessa komplexa system. Vi studerar hur man kan tillämpa de säkerhetsfunktioner för olika typer av NFC-taggar för att säkra NFC-applikationer. Vi undersöker först potentiella svagheter och problem i vissa nya användningsfall där NFC kan användas. Därefter analyserar vi de krav och föreslå vårt system design för att säkra varje användningsfall. Dessutom utvecklade vi proof-of-concept implementationer för två av våra föreslagna protokoll: en NFC-aktiverad säkerhet-guard övervakningssystem och en NFC-aktiverad restaurang meny. Dessutom, för fd bruk fallet, kontrollerade vi formellt vår föreslagna säkerhetsprotokoll. Vår analys visar att bland de diskuterade taggar, NFC taggar som baseras på säkra minneskort har minst kapacitet och dlexibilitet. Deras inbyggda trepass ömsesidig autentisering kan användas för att bevisa färskhet av händelsen när taggen tappas. De programmerbara beröringsfria smarta kort är mer flexibla eftersom de kan programmeras för att genomföra nya säkerhetsprotokoll. Dessutom kan de hålla reda på ett löpnummer och kan användas i system som inte kräver ansökan-specik mjukvara på mobiltelefonen. Sekvensnumret framtvingar ordning av händelser, vilket ger en viss nivå av replay förebyggande. Den mest kraftfulla typen av taggen är den emulerade kortet eftersom det ger en klocka, större beräkningskapacitet, och möjligen sin egen Internet-anslutning, naturligtvis till högre kostnad för utplacering.
Zhang, Shaorong. "Essays on security issuance /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p3144472.
Повний текст джерелаToms, Anders. "Information Security when Integrating Actors in Health Care Processes." Thesis, University of Skövde, Department of Computer Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-825.
Повний текст джерелаThere is a growing interest within organisations today to focus on the core processes, i.e. the processes that create value for the intended customer, in order to stay compatible within the ever-fiercer competition. To have full control of the key processes may be a great step forward towards a more lean and effective organisation, not only for profit seeking companies but also for public welfare institutions like health care. Software aimed at supporting a process focus is continuously being developed and one such family of programs is commonly referred to as process managers.
A process manager lets the people in an organisation who have complete knowledge of the processes model these without requiring them to have expert knowledge of computers and programming. Once a process has been defined graphically according to a predefined modelling language, it can be deployed and monitored. The process manager software takes care of the routing of messages between actors, both human as well as non-human (e.g. other applications), and it drives the individual errand forward according to how the process flow has been defined in the model. However, applying a process manager approach in health care processes requires a certain amount of caution. Messages sent between actors in health care organisations are often of a delicate nature since they may contain sensitive information, such as illness, mental state, family situation and similar, that is related to an identifiable individual. There are also other aspects of security that need to be addressed besides the confidentiality aspect. For example, it must be guaranteed that the information is correct and not altered during transfer, the information must be available when needed and it should be possible to trace a message to its sender, among other things.
This work identifies a set of security requirements from the literature that need to be fulfilled in health care organisations when applying a process manager approach. With these requirements as a basis, a process manager system is evaluated with regards to security and the conclusion is that future versions need improvement on some points. Future work is also suggested that could help to explore the area further.
Dagdelen, Özgür. "The Cryptographic Security of the German Electronic Identity Card." Phd thesis, tuprints, 2013. https://tuprints.ulb.tu-darmstadt.de/3538/7/%C3%96zg%C3%BCrDagdelen-Thesis.pdf.
Повний текст джерелаOldfield, Georgina F. "The adequacy of foster care allowances." Thesis, University of York, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241079.
Повний текст джерелаDi, Crescenzo Giovanni. "Security amplification of cryptographic primitives /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 1999. http://wwwlib.umi.com/cr/ucsd/fullcit?p9952653.
Повний текст джерелаPetersen, Kimberly Ann. "The Affordable Care Act: a prescription for homeland security preparedness?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43979.
Повний текст джерелаCHDS State/Local
Prior to implementation of the Affordable Care Act (ACA), tens of millions of U.S. citizens were without health insurance coverage. Without health insurance, health care can be unaffordable or inaccessible, or both. Our ability to obtain health care is part of the homeland security preparedness puzzle. If the Affordable Care Act increases health insurance coverage and helps to control costs as promised, it has enormous potential to bolster homeland security simultaneously. This thesis asks, How will the implementation of the Affordable Care Act positively impact homeland security in its efforts to achieve its all-hazards preparedness goal? This thesis first draws the links between health insurance coverage, health care and homeland security. Using empirical evidence and deductive analysis, it then forward-maps the positive impacts ACA implementation is likely have on homeland security in the areas of health and economic security. Recommendations aimed at enhancing the positive effects of the ACA are provided, including expanding ACA access and benefits to immigrants, better educating the public on the ACA tax penalty, and utilizing grants to encourage state participation.
Mutsuddi, Monoreet. "Smart card enabled security services to support secure telemedicine applications." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1213.
Повний текст джерелаTitle from document title page. Document formatted into pages; contains vi, 70 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 70-71).
Puvaneswaran, A. (Amirthan). "Network security for augmented reality application in health care sector." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201908152766.
Повний текст джерелаFurnell, Steven Marcus. "Data security in European healthcare information systems." Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/411.
Повний текст джерелаLiang, Xiaoli. "Three essays on Social Security and retirement." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2005. http://wwwlib.umi.com/cr/syr/main.
Повний текст джерелаWong, Chung Kei. "Network security services for flows and multicasts /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Повний текст джерелаMityagin, Anton. "Protocols and security proofs for data authentication." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3211929.
Повний текст джерелаTitle from first page of PDF file (viewed June 21, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 116-121).
Desai, Anand. "Encryption schemes : security notions, designs and analyses /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2000. http://wwwlib.umi.com/cr/ucsd/fullcit?p9988320.
Повний текст джерелаGlass, Thomas Westbrook. "Essays on the distributional aspects of Social Security /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Повний текст джерелаLangenbach, Andreas. "Shared identity and reconciliation: can a future security framework in Northeast Asia draw from experiences of the North Atlantic security cooperation?" Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34694.
Повний текст джерелаIn the wake of the deteriorating relations between the former Allies of the Second World War, several European countries, the United States of America, and Canada came together to provide for their security and in 1949 formed a unique security alliance, the North Atlantic Treaty Organization. In addition to its collective defense function, the creators of NATO also paid attention to community building among the alliance members. After reconciliation with its former enemies, the re-armed Germany was allowed to join this community even though it had caused the Second World War. These observations lead to the question of the importance of community and reconciliation for the creation and success of NATO. On the other hand, Northeast Asia, which had also been severely affected by Japanese colonialism and the Pacific War, did not evolve into an area of peace and security. This situation might be even more surprising given the number of existing forums dealing with security issues. This thesis examines the possibility of NATO-like security cooperation in Northeast Asia that features community building aspects and reconciliation, both of which are assumed to be normative prerequisites of a security community.
Herd, Pamela. "Crediting care, citizenship or marriage? Gender, race, class, and Social Security reform." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2002. http://wwwlib.umi.com/cr/syr/main.
Повний текст джерелаGrundström, Niklas. "A Security Analysis of a Credit Card Payment System for Bitcoin Transactions." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148230.
Повний текст джерелаGalal, Daria, and Martin Tillberg. "Security Test of iZettle's Reader 2 : A card terminal for safe payments?" Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913.
Повний текст джерелаEtisk hackning och penetrationstestning är två metoder som ofta tillämpas i sammanhang när organisationer och företag vill mäta sin nivå av informationssäkerhet, samt även ta reda på om eventuella åtgärder kan tas för att stärka säkerheten. Denna rapport beskriver ett säkerhetstest av kortterminalen iZettle Reader 2, med syftet att undersöka dess nivå av säkerhet grundat på enhetens frekventa uppträdande i samhället. Genomförandet är uppdelat i tre faser: förstudie och hotmodellering, penetrationstestning samt utvärdering och avgörande av säkerheten. Hotmodellen skapades med hjälp av de två vedertagna modellerna STRIDE & DREAD, vars syfte är att identifiera enhetens olika hot och attackvektorer. Utifrån hotmodellen valdes några attackvektorer som sedan penetrationstestades. Genom att använda etablerade modeller samt erhålla kännedom om konventionella attacker såsom Man-in-the-middle, Spoofing och Replay, kunde man testa enheten och betallösningen med ett systematiskt och pålitligt tillvägagångssätt. Ett urval gjordes av de mest lovande attackvektorerna, varav dessa senare testades; Man-in-the-middle av Bluetooth och Wi-Fi samt Reverse Engineering av den tillhörande mobilapplikationen "iZettle Go". Resultatet av testerna påvisade en stark säkerhet gällande enheten och dess omgivande system, men att säkerheten kan kompletteras ytterligare med ett par olika åtgärder som certificate pinning och mutual authentication vid kommunikation med TLS, samt manipuleringssäker mjukvara med avseende på mobilapplikationen.
Beek, Mary. "Security and permanence in longterm foster care : family relationships and professional systems." Thesis, University of East Anglia, 2014. https://ueaeprints.uea.ac.uk/49839/.
Повний текст джерелаLee, Seung-won. "Exploring security implications of the AMD STREAM PROCESSOR." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2008. http://wwwlib.umi.com/cr/ucsd/fullcit?p1457287.
Повний текст джерелаTitle from first page of PDF file (viewed November 14, 2008). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 51-53).
Wald, Susanne. "Homelessness among young women leaving care - an exploratory study." Thesis, Cranfield University, 1997. http://hdl.handle.net/1826/3544.
Повний текст джерелаKarray, Khaled. "Cyber-security of connected vehicles : contributions to enhance the risk analysis and security of in-vehicle communications." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT023.
Повний текст джерелаDuring the last decade, technological advances have made the car more and more connected to the outside world. On the flip side, thistechnological transformation has made modern vehicles subject to advanced cyber attacks. The cyber-physical architectures of automotive systems were not designed with security in mind. With the integration of connected platforms into these cyberphysical systems, the threat landscape has radically changed. Lately, multiple security breaches targeting different car manufacturers have been reported mainly by the scientific community. This makes security a critical concern, with a high impact especially on future autonomous driving. In order to address this gap, rigorous security engineering needs to be integrated into the design process of an automotive system and new protection methods adapted to the specificities of the vehicle systems must be introduced. Threat modeling and risk analysis are essential building blocks of this process. In this context, attack trees proved to be a reasonably good way to model attack steps. Nevertheless, given the diversity of architectures, it can quickly become a burden to draw attack trees for all architectures. This thesis tackles the issues of security of connected vehicles. The proposed approach allows enhancing the threat analysis with the automated generation of attack tree used to assist in the risk assessment step. We also propose novel and efficient protection mechanisms for in-vehicle communication networks capable of coping with existing cyber-physical attacks
Joyce, Nola. "Can you lead me now? leading in the complex world of Homeland Security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FJoyce.pdf.
Повний текст джерелаThesis Advisor(s): Bellavita, Christopher ; Bach, Robert. "September 2007." Description based on title screen as viewed on October 23, 2007. Includes bibliographical references (p.79-83). Also available in print.
Kanyongolo, Ngeyi Ruth. "Social security and women in Malawi : a legal discourse on solidarity of care." Thesis, University of Warwick, 2007. http://wrap.warwick.ac.uk/1152/.
Повний текст джерелаKalkan, Kutay. "A critical look at payment card industry data security standards implementation in restaurants." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 110 p, 2009. http://proquest.umi.com/pqdweb?did=1885544321&sid=4&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Повний текст джерелаHopma, Justa. ""No-one can solve this problem but God" : counter discourses of food security." Thesis, Aberystwyth University, 2017. http://hdl.handle.net/2160/0120070a-90e9-40d7-8b86-86fb312f16c9.
Повний текст джерелаHuff, Patrick D. "China Study| Emerging Challenges in Social Security, Health Care, and Leadership| Volume I." Thesis, Pepperdine University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13807532.
Повний текст джерелаChina is poised to introduce sweeping innovation and disruptive social change onto their national stage. As China’s leadership, economic power, and authority increase the country will be subject to increasing internal and external challenges. This study seeks to identify the significant internal social challenges China is most likely to confront along its path to global leadership. The purpose is to explore and discover the social challenges that are likely to face China and to predict the direction the country’s leadership will take over the next decade. The study approaches the problem by undertaking an initial 9-step process of investigating 6 environmental categories as influencers or drivers of change. This approach utilizes Schmieder and Mallette’s SPELIT Matrix Model; Saldana’s Themeing and Coding technique; and, Turoff’s Real-time Policy Delphi Method to identify these influential environmental categories and factors. The study then focuses on examining cultural ideologies, leadership, and organizational behavior as they converge to influence China’s social priorities. This study’s design and approach places emphasis on developing an extensive background and investigation into China’s historic, present, and future leadership ideologies as they are likely to drive the country’s social security and health care reforms. As a means of identifying critical themes and determining a valid focus, the study combines complex algorithmic analysis with a relevant Policy Delphi study to discover and confirm a set of valid policy reform predictions. This study assumes that China’s future challenges will be shaped by the country’s global growth, internal social environmental, transitioning ethnological, and intercultural ideologies as it shifts to a position of global superiority. This study’s findings and recommendations are significant in the context of assisting leaders, scholars, and analysts frame a subsequent narrative toward shaping policy decisions by addressing China’s present and future internal tensions due to a social security and health care crisis.
Huff, Patrick D. "China Study| Emerging Challenges in Social Security, Health Care, and Leadership| Volume II." Thesis, Pepperdine University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13812642.
Повний текст джерелаChina is poised to introduce sweeping innovation and disruptive social change onto their national stage. As China’s leadership, economic power, and authority increase the country will be subject to increasing internal and external challenges. This study seeks to identify the significant internal social challenges China is most likely to confront along its path to global leadership. The purpose is to explore and discover the social challenges that are likely to face China and to predict the direction the country’s leadership will take over the next decade. The study approaches the problem by undertaking an initial 9-step process of investigating 6 environmental categories as influencers or drivers of change. This approach utilizes Schmieder and Mallette’s SPELIT Matrix Model; Saldana’s Themeing and Coding technique; and, Turoff’s Real-time Policy Delphi Method to identify these influential environmental categories and factors. The study then focuses on examining cultural ideologies, leadership, and organizational behavior as they converge to influence China’s social priorities. This study’s design and approach places emphasis on developing an extensive background and investigation into China’s historic, present, and future leadership ideologies as they are likely to drive the country’s social security and health care reforms. As a means of identifying critical themes and determining a valid focus, the study combines complex algorithmic analysis with a relevant Policy Delphi study to discover and confirm a set of valid policy reform predictions. This study assumes that China’s future challenges will be shaped by the country’s global growth, internal social environmental, transitioning ethnological, and intercultural ideologies as it shifts to a position of global superiority. This study’s findings and recommendations are significant in the context of assisting leaders, scholars, and analysts frame a subsequent narrative toward shaping policy decisions by addressing China’s present and future internal tensions due to a social security and health care crisis.
Lindgren, Niclas. "How can gamification enable behavior change related to information security : A literature review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19115.
Повний текст джерелаPapakonstantinou, Maria. "e-Prescriptions : Privacy concerns and security risks in Greece’s e-Health care system." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-67143.
Повний текст джерелаChuang, Weihaw. "Maintaining safe memory for security, debugging, and multi-threading." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3223012.
Повний текст джерелаTitle from first page of PDF file (viewed September 21, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 164-172).
Long, Cheri Lanette. "A socio-technical perspective on information security knowledge and attitudes /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Повний текст джерелаKunning, Mao. "Strong Authentication Protocol using PIV Card with Mobile Devices." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418.
Повний текст джерелаAkram, Raja. "A user centric security model for tamper-resistant devices." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/aca52f8c-6233-4f73-a9da-025d25ab1295/1/.
Повний текст джерела