Дисертації з теми "Privacy evaluation"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Privacy evaluation.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Privacy evaluation".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Jensen, Carlos. "Designing for Privacy in Interactive Systems." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7588.

Повний текст джерела
Анотація:
People are increasingly concerned about online privacy and how computers collect, process, share, and store their personal information. Such concerns are understandable given the growing number of privacy invasions and the pervasiveness of information capture and sharing between IT systems. This situation has led to an increasingly regulated environment, limiting what systems may do, and what safeguards they must offer users. Privacy is an especially important concern in the fields of computer supported collaborative work (CSCW), Ubiquitous Computing, and e-commerce, where the nature of the applications often requires some information collection and sharing. In order to minimize risks to users it is essential to identify privacy problems early in the design process. Several methods and frameworks for accomplishing this have been proposed in the last decades. These frameworks, though based on hard-earned experience and great insight, have not seen widespread adoption despite the high level of interest in this topic. Part of the reason for this is likely the lack of evaluation and study of these frameworks. In our research we examine the key design and analysis frameworks and their elements, and compare these to the kinds of problems users face and are concerned with in terms of privacy. Based on this analysis of the relative strengths and weaknesses of existing design frameworks we derive a new design framework; STRAP (STRuctured Analysis of Privacy). In STRAP we combine light-weight goal-oriented analysis with heuristics to provide a simple yet effective design framework. We validate our analysis by demonstrating in a series of design experiments that STRAP is more efficient and effective than any one of the existing design frameworks, and provide quantitative and qualitative evidence of the value of using such frameworks as part of the design process.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lundgren, Tony, and Wenjia Xu. "Evaluation of Privacy-Preserving Methods for Smart Grids." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200607.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mood, Benjamin, and Benjamin Mood. "Optimizing Secure Function Evaluation on Mobile Devices." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12505.

Повний текст джерела
Анотація:
Secure function evaluation (SFE) on mobile devices, such as smartphones, allows for the creation of new privacy-preserving applications. Generating the circuits on smartphones which allow for executing customized functions, however, is infeasible for most problems due to memory constraints. In this thesis, we develop a new methodology for generating circuits that is memory-efficient. Using the standard SFDL language for describing secure functions as input, we design a new pseudo- assembly language (PAL) and a template-driven compiler, generating circuits which can be evaluated with the canonical Fairplay evaluation framework. We deploy this compiler and demonstrate larger circuits can now be generated on smartphones. We show our compiler's ability to interface with other execution systems and perform optimizations on that execution system. We show how runtime generation of circuits can be used in practice. Our results demonstrate the feasibility of generating garbled circuits on mobile devices. This thesis includes previously published co-authored material.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

O'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.

Повний текст джерела
Анотація:
The legal system and the social sciences share an interest in privacy but have developed separate conceptualizations of the concept. The result is two similar but conflicting theories of privacy that make different assumptions about how people behave and how that behavior can be controlled. The purpose of this study was to begin testing these theories by examining the operationalization of privacy through mandated standards intended to ensure privacy for the mentally ill. Specifically, the standards set in Wyatt v. Stickney, which reflect the idea that privacy is a sphere of space free from outside intrusion, were examined to see if they did indeed ensure privacy. Using two units in a facility that met the standards mandated by the court in Wyatt v. Stickney, the research examined staff and patient perceptions of privacy. Thirty-five patients were interviewed and twenty-four staff completed questionnaires on the overall habitability of the unit and patient privacy. Results indicated that the Wyatt court's operationalization of privacy as primarily a visual phenomena was inadequate and although the specific standards ordered to ensure privacy were reported to be effective by a simple majority of patients, overall patients reported a lack of privacy. Staff responses were generally in agreement with patients but they tended to use more extreme or stronger ratings. The present study also has implications for the legal conceptualization of privacy. It was found that privacy was perceived as important by patients; that autonomy as evidenced by control was an important issue for a minority of patients; and, the right of selective disclosure was not a major concern of patients. Needed future areas of research that were identified included: comparing privacy ratings across a variety of group living situations, comparing the mentally ill's conceptualizations of privacy from others, determining the effect of privacy on the therapeutic goals of an institution and therapeutic outcome and, determine the relative importance of privacy to the mentally ill.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cvach, Marek, Menal Sanna Kahsay, and Micaela Shamoun. "Privacy online: Exploring consumers’ evaluation of privacy issues in relation to personalised advertisement when buying online." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40054.

Повний текст джерела
Анотація:
Background The development of the Internet has changed the direction of advertising. Personalised advertising has emerged as the most effective and most profitable form of advertisement. Although personalised advertisement has been praised by many, privacy related concerns have been raised since it can be perceived as a violation of the consumer's privacy. Online shopping is another activity growing on the Internet, which also raises concerns about privacy. Therefore, we find it interesting to look on how personalised advertisement in relation to privacy issues can affect the consumer when buying online. Purpose The purpose of this thesis is to investigate how online shoppers respond to privacy issues and personalised advertising. The research will focus on the shoppers’ perspective of privacy issues with personalised advertising online. It will also provide companies with useful insights into customer behaviour when shopping online, with the intention of evaluating various forms of personalised advertisement and their effectiveness in order to strengthen companies’ online personalised marketing campaigns. Method As multiple explanations to one and the same research question are sought, the research will be conducted from an interpretivist standpoint. A qualitative research method has been chosen in the form of twelve semi-structured interviews with individuals who have been residents of Sweden for more than six months, with a wide range of ages and an equal representation of the male and female gender. The empirical findings will be analysed based on the grounded theory where common themes based on similarities will be presented. Conclusion It was concluded that the attitudes towards personalised advertisement, privacy issues and its effect on buying behaviour depends on where the advertisement comes from as well as from where the individual is shopping. Furthermore, it was also found that although privacy concerns were raised it did not prevent individuals from continuing to purchase online, only from what sites the purchasing was conducted.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Majeed, Salman. "Evaluation of Collaborative Reputation System against Privacy-Invasive Software." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4338.

Повний текст джерела
Анотація:
As computers are getting integral part of daily lives, threats to privacy and personal information of users are increasing. Privacy-Invasive Software (PIS) is common problem now days. A reputation system named the PISKeeper system has been developed as countermeasure against PIS. This thesis aims at evaluating this system in order to know how and to what extent the PISKeeper system helps users in selecting the right software for their computers. Quantitative approach was adapted to evaluate the PISKeeper system. An experiment was designed and executed on computer users from different age groups and experiences in controlled lab environment. The results have proved that the PISKeeper system helped users in selecting right software for their computer by providing essential information about the specific software and comments from previous users of that software. Apart for evaluating the PISKeeper system, this thesis also aims to suggest improvements for the system. Sometimes PIS is bundled with legitimate software and users are informed about this by stating in End User License Agreement (EULA). Usually the users do not read EULA before accepting it giving consent to whatever written in it. This thesis also aims at suggesting an alternative way to present EULA content so the user may be informed about the behavior of the software in more convenient way.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Rohunen, A. (Anna). "Advancing information privacy concerns evaluation in personal data intensive services." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526224688.

Повний текст джерела
Анотація:
Abstract When personal data are collected and utilised to produce personal data intensive services, users of these services are exposed to the possibility of privacy losses. Users’ information privacy concerns may lead to non-adoption of new services and technologies, affecting the quality and the completeness of the collected data. These issues make it challenging to fully reap the benefits brought by the services. The evaluation of information privacy concerns makes it possible to address these concerns in the design and the development of personal data intensive services. This research investigated how privacy concerns evaluations should be developed to make them valid in the evolving data collection contexts. The research was conducted in two phases: employing a mixed-method research design and using a literature review methodology. In Phase 1, two empirical studies were conducted, following a mixed-method exploratory sequential design. In both studies, the data subjects’ privacy behaviour and privacy concerns that were associated with mobility data collection were first explored qualitatively, and quantitative instruments were then developed based on the qualitative results to generalise the findings. Phase 2 was planned to provide an extensive view on privacy behaviour and some possibilities to develop privacy concerns evaluation in new data collection contexts. Phase 2 consisted of two review studies: a systematic literature review of privacy behaviour models and a review of the EU data privacy legislation changes. The results show that in evolving data collection contexts, privacy behaviour and concerns have characteristics that differ from earlier ones. Privacy concerns have aspects specific to these contexts, and their multifaceted nature appears emphasised. Because privacy concerns are related to other privacy behaviour antecedents, it may be reasonable to incorporate some of these antecedents into evaluations. The existing privacy concerns evaluation instruments serve as valid starting points for evaluations in evolving personal data collection contexts. However, these instruments need to be revised and adapted to the new contexts. The development of privacy concerns evaluation may be challenging due to the incoherence of the existing privacy behaviour research. More overarching research is called for to facilitate the application of the existing knowledge
Tiivistelmä Kun henkilötietoja kerätään ja hyödynnetään dataintensiivisten palveluiden tuottamiseen, palveluiden käyttäjien tietosuoja saattaa heikentyä. Käyttäjien tietosuojahuolet voivat hidastaa uusien palveluiden ja teknologioiden käyttöönottoa sekä vaikuttaa kerättävän tiedon laatuun ja kattavuuteen. Tämä hankaloittaa palveluiden täysimittaista hyödyntämistä. Tietosuojahuolten arviointi mahdollistaa niiden huomioimisen henkilötietoperusteisten palveluiden suunnittelussa ja kehittämisessä. Tässä tutkimuksessa selvitettiin, kuinka tietosuojahuolten arviointia tulisi kehittää muuttuvissa tiedonkeruuympäristöissä. Kaksivaiheisessa tutkimuksessa toteutettiin aluksi empiirinen monimenetelmällinen tutkimus ja tämän jälkeen systemaattinen kirjallisuustutkimus. Ensimmäisessä vaiheessa tehtiin kaksi empiiristä tutkimusta monimenetelmällisen tutkimuksen tutkivan peräkkäisen asetelman mukaisesti. Näissä tutkimuksissa selvitettiin ensin laadullisin menetelmin tietosuojakäyttäytymistä ja tietosuojahuolia liikkumisen dataa kerättäessä. Laadullisten tulosten pohjalta kehitettiin kvantitatiiviset instrumentit tulosten yleistettävyyden tutkimiseksi. Tutkimuksen toisessa vaiheessa toteutettiin kaksi katsaustyyppistä tutkimusta, jotta saataisiin kattava käsitys tietosuojakäyttäytymisestä sekä mahdollisuuksista kehittää tietosuojahuolten arviointia uusissa tiedonkeruuympäristöissä. Nämä tutkimukset olivat systemaattinen kirjallisuuskatsaus tietosuojakäyttäytymisen malleista sekä katsaus EU:n tietosuojalainsäädännön muutoksista. Tutkimuksen tulokset osoittavat, että kehittyvissä tiedonkeruuympäristöissä tietosuojakäyttäytyminen ja tietosuojahuolet poikkeavat aikaisemmista ympäristöistä. Näissä ympäristöissä esiintyy niille ominaisia tietosuojahuolia ja huolten monitahoisuus korostuu. Koska tietosuojahuolet ovat kytköksissä muihin tietosuojakäyttäytymistä ennustaviin muuttujiin, arviointeihin voi olla aiheellista sisällyttää myös näitä muuttujia. Olemassa olevia tietosuojahuolten arviointi-instrumentteja on perusteltua käyttää arvioinnin lähtökohtana myös kehittyvissä tiedonkeruuympäristöissä, mutta niitä on mukautettava uusiin ympäristöihin soveltuviksi. Arvioinnin kehittäminen voi olla haasteellista, sillä aikaisempi tietosuojatutkimus on epäyhtenäistä. Jotta sitä voidaan soveltaa asianmukaisesti arviointien kehittämisessä, tutkimusta on vietävä kokonaisvaltaisempaan suuntaan
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Abril, Castellano Daniel. "Privacy protection methods for documents and risk evaluation for microdata." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/285353.

Повний текст джерела
Анотація:
La capacitat de recollir i emmagatzemar informació per agencies d'estadística, governs o individus ha creat grans oportunitats d'anàlisi de les dades i la creació de models basats en el coneixent. A més, amb el creixement d'Internet moltes companyies han decidit canviar els seus antics models de negoci per uns basats en la venta i l'explotació de les dades personals, les qual en molts dels casos contenen informació confidencial. Aquest fet ha creat la necessitat de desenvolupar mètodes per a la difusió de dades amb contingut confidencial amb fins de mineria de dades, assegurant que la informació confidencial no pugui ser vinculada als individus als qual pertanyen. D'aquesta manera, les dades prèviament protegides poden ser transferides, publicades o venudes a terceres parts assegurant la confidencialitat dels individus que hi apareixen i a la vegada sent útils per aquells que les vulguin analitzar. Una àrea d'aplicació molt clara són els documents de text els quals avui dia omplen la major part de la xarxa. Els documents de text són especialment difícils de protegir. A causa de la seva complicada estructura és difícil detectar les parts que poden contenir informació sensible. En aquesta tesi s'ha distingit dos models diferents de protecció de documents. Per una banda, s'ha considerat la protecció de col·leccions de documents, de manera que aquests conjunts de textos puguin ser analitzats utilitzant tècniques clàssiques de mineria de textos i d'aprenentatge automàtic. Per l'altra banda, s'ha considerat la protecció individualitzada de cada document. La sanitització de documents és el procés habitual mitjançant el qual les parts sensibles o confidencials d'un text són detectades i eliminades. L'aplicació manual d'aquesta tècnica és molt habitual per a la declassificació i possible difusió de documents governamentals confidencials. D'aquesta manera, els governs demostren que estan a favor del dret a la llibertat d'informació, mentre que la seguretat nacional no es veu compromesa. Aquesta tesi presenta un conjunt de proteccions i avaluacions per a la protecció de textos. A més, introdueix un mètode d'aprenentatge supervisat per l'avaluació del risc de revelació per mètodes de protecció de microdades. Les principals contribucions d'aquesta tesi són les següents: * El desenvolupament d'un mètode semiautomàtic per ajudar a la declassificació de documents confidencials. * La formalització de mesures específiques per a l'avaluació del risc de revelació i la informació perduda en aplicar mètodes de protecció per sanitització. * El desenvolupament de dos mètodes basats en el principi de k-anonimitat per la protecció de col·leccions de documents representades com un model d'espai vectorials. El primer mètode explota la distribució dels vectors mentre que el segon es basa en les possibles relacions semàntiques dels vectors de paraules. * L'estudi de mètodes avançats per avaluar el risc de revelació d'informació sensible sobre microdades després de ser protegides. En particular, es proposa un mètode d'aprenentatge supervisat per a l'enllaç de registres basat en distàncies. Aquest mètode es basa en l'aprenentatge dels paràmetres proporcionats per una funció. Diferents tipus de funcions han estat utilitzades per tal d'estudiar la seva eficàcia en l'avaluació del risc.
The capability to collect and store digital information by statistical agencies, governments or individuals has created huge opportunities to analyze and build knowledge-based models. With the rise of Internet many services and companies have exploited these opportunities collecting huge amounts of data, which most of the cases are considered confidential. This causes the need to develop methods that allow the dissemination of confidential data for data mining purposes while preserving individuals' private information. Thus, personal data could be collected, transferred or sold to third parties ensuring the individuals' confidentiality, but still being statistically useful. Internet is full of unstructured textual data like posts or documents with a large content of information that can be extracted and analyzed. Documents are especially difficult to protect due to their lack of structure. In this thesis we distinguish two different models to protect documents. On the one hand, we consider the protection of a collection of documents, so this set of documents can be analyzed by means of text mining and machine learning techniques. On the other hand, we consider the protection of single documents by means of the documents' sanitization. This is the process of detecting and removing the parts of the text considered sensitive. When dealing with governmental classified information, sanitization attempts to reduce the sensitiveness of the document, possibly yielding a non-classified document. In this way, governments show they uphold the freedom of information while the national security is not jeopardised. This thesis presents a set of different methods and experiments for the protection of unstructured textual data protection and besides, it introduces an advanced method to evaluate the security of microdata protection methods. The main contributions are: * The development of a new semi-automatic method to assist documents' declassification. * The definition of two specific metrics for evaluating the information loss and disclosure risk of sanitized documents. * The development of two cluster-based approaches based on the k-anonymity principle to anonymize vector space models. One exploits the sparsity and the other exploits the possible semantic relations of those vectors. * The study of advanced methods to evaluate the disclosure risk of microdata protection methods. In particular, we have developed a general supervised metric learning approach for distance-based record linkage. Moreover, we have reviewed the suitability of a set of parameterized distance functions that can be used together with the supervised approach.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Paananen, K. (Kimmo). "Evaluation of privacy, security and quality of Internet-based communication solutions." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201605221866.

Повний текст джерела
Анотація:
The privacy and security of communication in the Internet are gaining increased public interest. Highly popular Voice over Internet Protocol (VoIP) technology allows the use of easy, versatile and low-cost Internet communication solutions. There are, however, privacy and security concerns and threats related to VoIP-based communication, just like with any traffic transmitted over the public Internet. Possibility to integrate a VoIP solution as part of self-made applications is also important for many organizations. The problem is to find a low cost solution which provides possibility for integration, good level of security and privacy, and also acceptable service quality in varying wireless network conditions. This thesis examined the fundamentals of VoIP technology, reasons and background of security threats, and presented the ways to mitigate the risks. Based on this information, publicly available communication solutions were searched and evaluated using Quality Function Deployment (QFD) derived method. The products were compared from the perspective of privacy and security they provide, taking into account in particular the purchase and operating costs, and connectivity into self-made applications. The best solution from the comparison was also taken to further tests for service availability and video quality Mean Opinion Score (MOS) in the real-world mobile network. The measurements aimed to reveal how the solution performs in different radio network conditions, and what kind of video quality it can offer. The research results show that there were a few good solutions available based on search criteria. The best solution, Linphone, was taken to the further quality tests in the live 4G Long Term Evolution (LTE) network. Measurements revealed that Linphone can provide satisfactory quality and reliability even on poor network conditions, and also secure the traffic seemingly well. Only some minor problems with video stream starting were found during the tests. For the future work I would suggest more measurements using different wireless network technologies including Wi-Fi. The real protocol level security analysis of Linphone would also reveal if there are any security pitfalls in the current implementation.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Eschricht, Johannes. "mHealth and the need of evaluation processes." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16442.

Повний текст джерела
Анотація:
There are currently a great deal of available health applications available on various app-stores around the globe and more is being added each day. With that vast amount of available options, which health applications are trustworthy and offers the functionality that the users are looking for? With the current regulations and classification processes, it is difficult to know if mHealth services offers the high standards that it should. This thesis investigates the need for mHealth services tobe subject of an evaluation process, by a health organization or a government agency, to ensure that quality standards are high. We discover the current “state-of-the-art” of mHealth and the privacy-and usability aspects of mHealth, we find outif evaluated and approved mHealth applications are believed to be more attractive to use than the non-evaluated counterparts, and lastly, we identify what aspects is important to evaluate of mHealth applications. To provide answers to the thesis, we perform a literature review and distribute a survey to a small group of potential users of mHealth services. The literature review provides information about the current state of mHealth around the globe. Moreover, the literature review also reveals that both usability, but especially privacy, is of major importance when creating mHealth services. We also discover that there are voices from field experts that suggests mHealth services to be subject of an evaluation process, similar to what we suggest in this thesis. With the survey, we identify the respondents’ current utilization of mHealth services. We also find out what aspects they believe is important and if their trust and utilization of an evaluated and approved mHealth service would be affected compared to a non-evaluated counterpart. The respondents of the survey is parents of young children, a group that is likely in need of medical attention in one way or another and still has the technical experience that is required to answer the survey.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Chang, Wei. "Security and Privacy Issues in Social Information-Assisted Application Design." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/406720.

Повний текст джерела
Анотація:
Computer and Information Science
Ph.D.
In recent years, social networks and their related theories and applications attract widespread attentions in computer science. Many applications are designed by exploring the social information among users, such as social peer-to-peer systems, mobile cloud, and online recommendation systems. Most of the existing works only focus on how to use social information but ignore the fact that social information itself may cause severe security and privacy problems. In this dissertation, we first present some social information-assisted application systems that we have designed, and then, we present several social information-involved privacy and security risks and their countermeasures. Generally speaking, the design procedure of any social information-assisted application involves three tasks: publishing, accessing, and using social information. However, all of these tasks contain privacy and security issues. Social information can be published from a centralized system or a distributed one. For the centralized scheme, the social information is directly published from online social networking systems, such as Facebook or Twitter. However, we found that the data of a social network essentially is a time-evolving graph. Most of the existing approaches fail to preserve users' identity privacy once a malicious attacker has the external knowledge about the victim's time-varying behaviors. For avoiding the new privacy issue, we propose a time-based anonymization scheme. For the distributed social information-sharing scheme, each user's information is propagated from friend to friend's friends, and so on. We design a new scheme to gradually enhance the privacy protection along a propagation path, in the meanwhile, maximally preserve the overall utility of the user's data. From a data accessing aspect, social information can be used by malicious users for launching new attacks. In this dissertation, we find a friendship-based privacy disclosure attack, and a corresponding defense approach is designed. Location-based service has been widely adopted. In order to preserve location privacy, users usually turn off the corresponding applications when visiting sensitive locations. However, once social relationships are known, attackers are able to infer these hidden locations, which disclose users' location privacy. For preserving the location privacy, we design a fake location-based approach, which efficiently disorders the social-geographic relationships among users. From the data usage aspect, social information and its related data may come from users. A system may lose functioning if some malicious users inject plenty of fake information. Mobile clouds and Friend Locator are two typical systems, which are vulnerable to the fake information-related attacks. Mobile clouds explore the idle computing resources of surrounding devices by recruiting nearby friends to participate in the same task. However, malicious users may inject wrong friendships information to mess up the system. When visiting a new place, Friend Locator provides navigation services for participators by creating a map based their trajectories. The functioning of the system is based on the trust among participators. Once a user's device is controlled by attackers, all other users may receive wrong navigation. For defending these attacks, we provide different countermeasure.
Temple University--Theses
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Gariepy, Laura W. "Undergraduate Students' Attitudes About the Collection, Use, and Privacy of Search Data in Academic Libraries." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/6077.

Повний текст джерела
Анотація:
The purpose of this study was to understand undergraduate students’ attitudes about search data privacy in academic libraries and their preferences for how librarians should handle information about what students search for, borrow, and download. This is an important area of study due to the increasingly data-driven nature of evaluation, accountability, and improvement in higher education, along with libraries’ professional commitment to privacy, which has historically limited the amount of data collected about student use. Using a qualitative approach through the lens of interpretive description, I used the constant comparative method of data collection and analysis to conduct semi-structured interviews with 27 undergraduate students at a large, urban public research institution. Through inductive coding, I organized the data into interpretive themes and subthemes to describe students’ attitudes, and developed a conceptual/thematic description that illustrates how they are formed. Students revealed that a variety of life experiences and influences shaped their views on search data privacy in academic libraries. They viewed academic library search data as less personally revealing than internet search data. As a result, students were generally comfortable with libraries collecting search data so long as it is used for their benefit. They were comfortable with data being used to improve library collections and services, but were more ambivalent about use of search data for personalized search results and for learning analytics-based assessment. Most students expressed a desire for de-identification and user control of data. Some students expressed concern about search data being used in ways that reflect bias or favoritism. Participants had moderate concern about their library search data privacy being used by government agencies to protect public safety. Although some disagreed with the practice in concept, most did not feel that the search data would be useful, nor would it reveal much about their personal interests or selves. Students who were not comfortable with the idea of search data collection in academic libraries often held their convictions more strongly than peers who found the practice acceptable. The results of this study suggest that academic libraries should further explore student perspectives about search data collection in academic libraries to consider how and if they might adjust their data collection practices to be respectful of student preferences for privacy, while still meeting evaluation and improvement objectives. This study achieved the intended purpose of contributing a foundational body of knowledge about student attitudes regarding search data privacy in academic libraries. It positions librarian-researchers to develop studies that further this line of inquiry in an area that has significant implications for both user privacy and libraries’ practices for assessment and evaluation. Limitations of this study include its limited generalizability as a result of the qualitative research design, and the fact that it relied primarily on a convenience sampling method.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Jafer, Yasser. "Task Oriented Privacy-preserving (TOP) Technologies Using Automatic Feature Selection." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/34320.

Повний текст джерела
Анотація:
A large amount of digital information collected and stored in datasets creates vast opportunities for knowledge discovery and data mining. These datasets, however, may contain sensitive information about individuals and, therefore, it is imperative to ensure that their privacy is protected. Most research in the area of privacy preserving data publishing does not make any assumptions about an intended analysis task applied on the dataset. In many domains such as healthcare, finance, etc; however, it is possible to identify the analysis task beforehand. Incorporating such knowledge of the ultimate analysis task may improve the quality of the anonymized data while protecting the privacy of individuals. Furthermore, the existing research which consider the ultimate analysis task (e.g., classification) is not suitable for high-dimensional data. We show that automatic feature selection (which is a well-known dimensionality reduction technique) can be utilized in order to consider both aspects of privacy and utility simultaneously. In doing so, we show that feature selection can enhance existing privacy preserving techniques addressing k-anonymity and differential privacy and protect privacy while reducing the amount of modifications applied to the dataset; hence, in most of the cases achieving higher utility. We consider incorporating the concept of privacy-by-design within the feature selection process. We propose techniques that turn filter-based and wrapper-based feature selection into privacy-aware processes. To this end, we build a layer of privacy on top of regular feature selection process and obtain a privacy preserving feature selection that is not only guided by accuracy but also the amount of protected private information. In addition to considering privacy after feature selection we introduce a framework for a privacy-aware feature selection evaluation measure. That is, we incorporate privacy during feature selection and obtain a list of candidate privacy-aware attribute subsets that consider (and satisfy) both efficacy and privacy requirements simultaneously. Finally, we propose a multi-dimensional, privacy-aware evaluation function which incorporates efficacy, privacy, and dimensionality weights and enables the data holder to obtain a best attribute subset according to its preferences.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Nyzell, Robin. "Usability and pilot tests on privacy dialogues : Evaluation of prototypes for data sharing online." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-68855.

Повний текст джерела
Анотація:
This study aims to investigate what can be done to make internet users more aware of what information they share with service providers, as well as to serve as a pilot test for two prototypes as a part of a EU funded project called CREDENTIAL. For these tests 12 participants were recruited. They were divided into two groups, where one group used a tablet for the tests and the other group used a computer. The test participants are introduced to the tests under the pretense that they are going to rate photographs for a given category, when in reality the purpose is to study the participants interaction with the dialogues requesting personal information they have to handle in order to receive the photos to rate. The study shows that test participant rate both prototypes similarly in terms of usability, but for actually remembering what information they shared the prototype using drag and drop functionality proved superior. As for the study as a pilot test, several issues with both prototypes have been identified and possible solutions to these issues are presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Ndukwe, Cajetan Okechukwu. "Cyber Medicine: An Ethical Evaluation." Thesis, Linköping University, Centre for Applied Ethics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2919.

Повний текст джерела
Анотація:

It is self evident that our society is an information one. This is true from the things we see around us.The world is now a global village.It just take seconds for communication to be established from one part of the globe to another.What a tremendous achievement for information technology.Among the recent developments of information technology is the scientific wizardary of cyber medicine.The internet has definitely revolutionalised the healthcare industry. Many people in developed countries of the world seek medical information, advice or even buy drugs via the internet.So many websites rise every now and then claiming to provide various medical assistance to patients. But the application of information technology to medicine poses some ethical problems today. It is because of this that cyber medicine attracts my attention in this research.With this research, I hope to offer some recommendations for a morally acceptable cyber medicine .This will help to some extent in solving this all important problem ofcyber medicine for the good of the health care industry and the society at large.

Стилі APA, Harvard, Vancouver, ISO та ін.
16

Ozarar, Mert. "Secure Multiparty Computation Via Oblivious Polynomial Evaluation." Phd thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12615170/index.pdf.

Повний текст джерела
Анотація:
The number of opportunities for cooperative computation has exponentially been increasing with growing interaction via Internet technologies. These computations could occur between trusted partners, between partially trusted partners, or even between competitors. Most of the time, the communicating parties may not want to disclose their private data to the other principal while taking the advantage of collaboration, hence concentrating on the results rather than private and perhaps useless data values. For performing such computations, one party must know inputs from all the participants
however if none of the parties can be trusted enough to know all the inputs, privacy will become a primary concern. Hence the techniques for Secure Multiparty Computation (SMC) are quite relevant and practical to overcome such kind of privacy gaps. The subject of SMC has evolved from earlier solutions of combinational logic circuits to the recent proposals of anonymity-enabled computation. In this thesis, we put together the significant research that has been carried out on SMC. We demonstrate the concept by concentrating on a specific technique called Oblivious Polynomial Evaluation (OPE) together with concrete examples. We put critical issues, challenges and the level of adaptation achieved before the researchers. We also provide some future research opportunities based on the literature survey.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Lindegren, Daniel. "Designing for user awareness and usability : An evaluation of authorization dialogs on a mobile device." Thesis, Karlstads universitet, Handelshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-62731.

Повний текст джерела
Анотація:
Personal data is often disclosed with every registration, sharing, or request of an online service. With the increased usage of things connected to the Internet, users' information being collected and stored, the risks related to unknowingly sharing personal data increases. Sharing of personal information is a sensitive subject and can hurt people’s assets, dignity, personal integrity and other social aspects. In general, users’ concerns have grown regarding protecting their personal information which has led to the development of multiple privacy-oriented systems. In scenarios where users are logging onto a website or system, they rarely notice, understand or have desire to read the conditions to which they are implicitly agreeing. These systems are often referred to as identity management systems or single sign-on systems. Recent studies have shown that users are not aware of what data transactions take place by using various authentication solutions. It is critical for these types of system dealing with privacy that researchers examine users' understanding of the concepts through interface design. The purpose of this study is to investigate the usability and user awareness of data transactions for identity management systems on mobile devices by constructing and evaluating different design concepts. Therefore, four different mobile prototypes were designed (called CREDENTIAL Wallet) and explored to measure the usability and also the user awareness of users’ disclosures. 20 usability tests were conducted per prototype. Multiple conclusions can be drawn from this study. The findings showed that the drag-and-drop prototype scored a high user awareness score in terms of participants remembering their shared data and having a good idea of them not sharing more data than they had actually shared. Consequently, the drag-and-drop prototype achieved the highest usability result. A prototype that utilized swiping was created to fit the mobile medium. The prototype showed the highest user awareness score in the context of participants stating what data they had shared. However, people using the swiping prototype thought they were sharing more data than they actually were. Data show that users have an incorrect mental model of the sharing of their fingerprint pattern. Finally, the writing concerns recommendations and challenges of identity management systems – e.g. the importance of tutorial screens. Future studies within the CREDENTIAL project are already underway concerning users' incorrect mental model of sharing fingerprint to the service provider side.
CREDENTIAL
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Diakos, Thomas P. "An evaluation of security and privacy concerns in contactless payment systems through physical layer eavesdropping measurements." Thesis, University of Surrey, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.616478.

Повний текст джерела
Анотація:
Near-field contact less payments using contactless cards or NFC devices are quickly becoming a quicker and more convenient alternative to conventional means of carrying out small value purchases. Along with their increased popularity, there are rising concerns regarding their security. Existing research has shown that certain attacks can be used successfully against contact less technology, but it is unclear how such attacks can be translated into a feasible and clear threat to a user's privacy and financial security. Therefore there is a need for an evaluation to determine whether physical layer based attacks could be used by attackers to cause financial or anonymity loss to an individual. This dissertation presents the design and implementation of an inconspicuous, easily concealable and portable system that could be used to reliably eavesdrop contactless transactions. This includes guidelines on the effective and efficient design of eavesdropping antennas, including the use of large metallic structures already within the vicinity of such an attack, along with the assembly of a communications receiver consisting of readily available electronics with a moderate cost.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Siddiqui, Muhammad Anas. "Cloud Computing : Evaluation, as a platform for Scania Architecture." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-18896.

Повний текст джерела
Анотація:
Cloud computing has been given a great deal of attention during recent years. Almost all the technology market leaders and leading hosting service providers (like IBM, Microsoft and Verizon) have entered into the Cloud market as Cloud Providers. Cloud computing promises to provide highly available, secure, low cost, agile and highly scalable solution to the consumers. Scania is a global company and one of the world’s leading heavy vehicle manufacturers with 35,000+ employees. All the large organizations such as Scania, aim to constantly update themselves with the latest technology in order to meet their business requirements but, these organizations must always be convinced that there is a strong reason(s) to implement new technology. This research provides the method and criteria in relation to initiating Cloud computing. A number of Scania’s specific business requirements that it is possible to map to the Cloud are addressed in this thesis. The methodology of research is split in two parts. Firstly, the identification of business cases at Scania and their requirements with the Cloud and Secondly, the evaluation and comparison of the functionalities and capabilities of different vendors. The accumulated data is then compared and suitable vendors, according to those business requirements are suggested. This thesis also shares the experience of moving on premise applications to the Cloud. These are Scania specific applications which are currently being hosted in-house. The research also addresses the possibilities of portability between the Cloud providers. Although there is no standardization in relation to Cloud computing, some initiatives such as OpenStack are available and its current position and some application and data migration tools are also discussed. The thesis concludes with a general discussion, recommendations in relation to adapting Cloud computing and selecting the Cloud provider. This recommendation applies to every organization including Scania.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Raghunathan, Anusha. "EVALUATION OF INTELLIGIBILITY AND SPEAKER SIMILARITY OF VOICE TRANSFORMATION." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_theses/101.

Повний текст джерела
Анотація:
Voice transformation refers to a class of techniques that modify the voice characteristics either to conceal the identity or to mimic the voice characteristics of another speaker. Its applications include automatic dialogue replacement and voice generation for people with voice disorders. The diversity in applications makes evaluation of voice transformation a challenging task. The objective of this research is to propose a framework to evaluate intentional voice transformation techniques. Our proposed framework is based on two fundamental qualities: intelligibility and speaker similarity. Intelligibility refers to the clarity of the speech content after voice transformation and speaker similarity measures how well the modified output disguises the source speaker. We measure intelligibility with word error rates and speaker similarity with likelihood of identifying the correct speaker. The novelty of our approach is, we consider whether similarly transformed training data are available to the recognizer. We have demonstrated that this factor plays a significant role in intelligibility and speaker similarity for both human testers and automated recognizers. We thoroughly test two classes of voice transformation techniques: pitch distortion and voice conversion, using our proposed framework. We apply our results for patients with voice hypertension using video self-modeling and preliminary results are presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Agrawal, Vivek. "Performance evaluation of Group Signature schemes in Vehicular Communication : A feasibility study for Vehicular Communication." Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119816.

Повний текст джерела
Анотація:
The aim of this work is to show the effectiveness of techniques that allow a user to maintain its privacy and anonymity while participating in real word scenario. Users need to communicate with each other in many situations in order to share information. This creates the danger of the user’s privacy being breached and it can discourage users from taking active participation in any information sharing task. There are many real scenarios or application where users want to remain anonymous while having their communication secured. This is so in vehicular communication systems. Group signatures are versatile cryptographic tools that are suitable when we need security and privacy protection. A group signature scheme allows members of a group to sign messages on behalf of the group. Any receiver can verify the message validity but cannot discover the identity of the sender from the signed message or link two or more messages from the same signer. However, the identity of the signer can be discovered by an authority using a signed message. For this reason, Group Signature schemes were proposed in the context of vehicular communication systems. In this context, communication and computation overheads are critical. Thus, the focus of this thesis is to implement and compare different group signature schemes in terms of overhead introduced due to processing cost, and analytically evaluate their suitability for vehicular communication scenarios.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Rezazadeh, Baee Mir Ali. "Privacy-preserving authentication and key management for cooperative intelligent transportation systems." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/212412/1/Mir%20Ali_Rezazadeh%20Baee_Thesis.pdf.

Повний текст джерела
Анотація:
Car accidents kill or injure millions of people. Cooperative Intelligent Transportation Systems (C-ITS) can increase road safety and reduce accidents through the application of information and communication technologies for communicating vehicles. However, C-ITS applications are vulnerable to potential cyber-attacks involving message manipulation, where messages may be altered intentionally or fake messages sent, compromising the safety goals. Cryptographic techniques can be used to solve this, but this must be done in a way that preserves driver privacy, so that unauthorized surveillance and tracking of drivers is not possible. This research develops a secure conditional privacy-preserving authentication scheme for C-ITS applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Peng, Kun. "Analysis and Design of Secure Sealed-Bid Auction." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15848/1/Kun_Peng_Thesis.pdf.

Повний текст джерела
Анотація:
Auctions have a long history and are an effective method to distributed resources. In the era of Internet and e-commerce, electronic sealed-bid auction play an important role in business. However, it is a risk to run a sealed-bid auction through the Internet, which is an open and unreliable environment. There are many security concerns about correctness and fairness of the auction and privacy of the bidders in electronic sealed-bid auctions. Cryptology seems to be the only security solution for electronic sealed-bid auction. On the other hand, a practical electronic sealed-bid auction scheme must be efficient. So efficient application of cryptographic tools to electronic sealed-bid auction is the focus of this thesis. Firstly, security requirements of sealed-bid auctions are surveyed. The auction result must be determined correctly according to the submitted bids and the pre-defined auction rule. The bidders must compete with each other in a fair play and none of them can take advantage of others. The auction must be publicly verifiable, so that the auction result is acceptable by everyone. Usually, a losing bidder hopes to keep his bid secret, so the losing bids should be kept secret. In different applications, different auction rules may be applied. So, to avoid a tie, a large number of biddable prices must be accepted in some applications. Secondly, the currently known sealed-bid auction schemes are classified. In recent years, many sealed-bid auction schemes based on various cryptographic primitives have been proposed. Nearly all of them can be classified into five models. In the Model 1, each bid is known to the auctioneers, who can find the winning bid and winner very efficiently. Bid privacy is not implemented in Model 1. In Model 2 homomorphic bid opening is employed, so that the winning bid and winner can be found while the losing bids are kept secret. In Model 3 very strong bid privacy is achieved through a Dutch-style bid opening, which is highly inefficient. In Model 4, the link between the bids and bidders instead of confidentiality of the bids is kept secret. This kind of confidentiality is weaker than normal bid privacy and called relative bid privacy in this thesis. (Complete confidentiality of the bids in the end of the auction is called absolute bid privacy.) Implementation of relative bid privacy can be very efficient if an efficient anonymous channel can be constructed. Model 5 uses secure evaluation to open the bids and find the auction result and makes it possible to achieve absolute bid privacy efficiently. Three main cryptographic primitives are explored and employed to design new auction schemes in four auction models. The first tool is batch verification, which can improve computational efficiency in auction schemes. The second is mix network, which can be used to implement anonymous channels in Model 4 and Model 5. Two new efficient mix networks are designed and used in Model 2, Model 4 and Model 5. The third is secure evaluation, which is employed in two new auction schemes in Model 5 to achieve strong bid privacy efficiently. Other cryptographic primitives employed in the auction schemes include efficient 1-out-of-w oblivious transfer in Model 2 and key chain in Model 3. Five new auction schemes are proposed. The first scheme in Model 2 batch verifies bid validity to improve efficiency. The second scheme optimises the key chain used in Model 3 to obtain a more advanced auction scheme. The third scheme implements a concrete anonymous channel in Model 4 for the first time and achieves relative bid privacy and high efficiency convincingly. The last two employ new secure evaluation techniques to achieve absolute bid privacy and high efficiency. With these five new auction schemes, better solutions are achieved in various auction applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Peng, Kun. "Analysis and Design of Secure Sealed-Bid Auction." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15848/.

Повний текст джерела
Анотація:
Auctions have a long history and are an effective method to distributed resources. In the era of Internet and e-commerce, electronic sealed-bid auction play an important role in business. However, it is a risk to run a sealed-bid auction through the Internet, which is an open and unreliable environment. There are many security concerns about correctness and fairness of the auction and privacy of the bidders in electronic sealed-bid auctions. Cryptology seems to be the only security solution for electronic sealed-bid auction. On the other hand, a practical electronic sealed-bid auction scheme must be efficient. So efficient application of cryptographic tools to electronic sealed-bid auction is the focus of this thesis. Firstly, security requirements of sealed-bid auctions are surveyed. The auction result must be determined correctly according to the submitted bids and the pre-defined auction rule. The bidders must compete with each other in a fair play and none of them can take advantage of others. The auction must be publicly verifiable, so that the auction result is acceptable by everyone. Usually, a losing bidder hopes to keep his bid secret, so the losing bids should be kept secret. In different applications, different auction rules may be applied. So, to avoid a tie, a large number of biddable prices must be accepted in some applications. Secondly, the currently known sealed-bid auction schemes are classified. In recent years, many sealed-bid auction schemes based on various cryptographic primitives have been proposed. Nearly all of them can be classified into five models. In the Model 1, each bid is known to the auctioneers, who can find the winning bid and winner very efficiently. Bid privacy is not implemented in Model 1. In Model 2 homomorphic bid opening is employed, so that the winning bid and winner can be found while the losing bids are kept secret. In Model 3 very strong bid privacy is achieved through a Dutch-style bid opening, which is highly inefficient. In Model 4, the link between the bids and bidders instead of confidentiality of the bids is kept secret. This kind of confidentiality is weaker than normal bid privacy and called relative bid privacy in this thesis. (Complete confidentiality of the bids in the end of the auction is called absolute bid privacy.) Implementation of relative bid privacy can be very efficient if an efficient anonymous channel can be constructed. Model 5 uses secure evaluation to open the bids and find the auction result and makes it possible to achieve absolute bid privacy efficiently. Three main cryptographic primitives are explored and employed to design new auction schemes in four auction models. The first tool is batch verification, which can improve computational efficiency in auction schemes. The second is mix network, which can be used to implement anonymous channels in Model 4 and Model 5. Two new efficient mix networks are designed and used in Model 2, Model 4 and Model 5. The third is secure evaluation, which is employed in two new auction schemes in Model 5 to achieve strong bid privacy efficiently. Other cryptographic primitives employed in the auction schemes include efficient 1-out-of-w oblivious transfer in Model 2 and key chain in Model 3. Five new auction schemes are proposed. The first scheme in Model 2 batch verifies bid validity to improve efficiency. The second scheme optimises the key chain used in Model 3 to obtain a more advanced auction scheme. The third scheme implements a concrete anonymous channel in Model 4 for the first time and achieves relative bid privacy and high efficiency convincingly. The last two employ new secure evaluation techniques to achieve absolute bid privacy and high efficiency. With these five new auction schemes, better solutions are achieved in various auction applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Öknegård, Enavall Isabell, and Julia Mineur. "Privacy and user profiling : Profile-based evaluation of what different third party services may learn about a user." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177643.

Повний текст джерела
Анотація:
Online behavioural targeted advertising has become a leading method to increase theeffectiveness of advertisement online. The advertisement is based on information aboutusers’ internet activities collected by third party tracking services. However, there is a fineline between whether this should be considered a privacy leakage or an unharmful way toimprove the experience. This thesis presents a methodology for understanding and analyzing how significant personal information leakage to third parties is. To investigate theinformation leakage, a web crawler was implemented with the purpose to imitate fictiveusers browsing the web. The users’ activity online was based on the fictive user’s interestsand personal information. For every webpage visited, data such as text, URLs and screenshots were saved. The data were analyzed and the finding revealed that third parties generated targeted ads based on personal information regardless of the browser, user’s profile,and geographical location. However, we observed that targeted ads are a frequent practiceand noticed that categories valued more by advertisers are more intensely targeted.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Ozgur, Utku. "Development of a Remotely Accessible Wireless Testbed for Performance Evaluation of AMI Related Protocols." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3177.

Повний текст джерела
Анотація:
Although smart meters are deployed in many countries, the data collection process from smart meters in Smart Grid (SG) still has some challenges related to consumer privacy that needs to be addressed. Referred to as Advanced Metering Infrastructure (AMI), the data collected and transmitted through the AMI can leak sensitive information about the consumers if it is sent as a plaintext. While many solutions have been proposed in the past, the deployment of these solutions in real-life was not possible since the actual AMIs were not accessible to researchers. Therefore, a lot of solutions relied on simulations which may not be able to capture the real performance of these solutions. In this thesis, two 802.11s wireless mesh-based SG AMI network testbeds are developed with Beaglebone Black and Raspberry Pi 3 boards to provide a baseline for the simulations. The Raspberry Pi 3 testbed is also configured to be remotely accessible.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Friberg, Åsa. "An empirical evaluation of online privacy concerns with a special focus on the importance of information transparency and personality traits /." Luleå : Luleå University of Technology, 2007. http://epubl.ltu.se/1402-1757/2007/25/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Georgy, Constance. "Visibilité numérique et recrutement. Une sociologie de l’évaluation des compétences sur Internet." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLN006/document.

Повний текст джерела
Анотація:
L'enjeu de ma thèse est de mettre au jour les enjeux qui entourent la croissance des données trouvables en ligne sur les personnes, la multiplication et le fort usage des espaces numériques de sociabilité dont la vocation privée ou professionnelle peuvent tendre à mélanger les deux sphères. L'enjeu du droit des données est confronté au cas du recrutement. Cas où la volonté de valorisation de soi de la part de candidats en recherche d'emploi rencontre le besoin d’évaluation de la part des recruteurs. Le cas du recrutement permet d'aborder différents marchés émergents autour de la réputation numérique, d'interroger les pratiques de part et d'autre du marché du travail (exposition des candidats et recherches des recruteurs) et d'apporter des éléments de connaissances sur les normes de visibilité en cours d'établissement
The aim of my thesis is to underline what is at stake with the phenomenon of the massive growth of online personal data that we have witnessed for the last decade. This issue is seen through the case of hiring on the labor market. Candidates may want to disclose positive information about themselves and recruiters need to gather as much information as they can to evaluate potential candidates. This example allow us to investigate a new market for online reputation and to bring to knowledge the new norms of visibility and privacy in the age of social media
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Ma, Wenjun. "AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.

Повний текст джерела
Анотація:
Thesis (M.S.)--Georgia State University, 2007.
Title from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Andersson, Christer. "Design and Evaluation of Anonymity Solutions for Mobile Networks." Doctoral thesis, Karlstad : Faculty of Economic Sciences, Communication and IT, Computer Science, Karlstads universitet, 2007. http://www.diva-portal.org/kau/abstract.xsql?dbid=1282.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Ji, Shouling. "Evaluating the security of anonymized big graph/structural data." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54913.

Повний текст джерела
Анотація:
We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymization (DA) attacks, comprehensive anonymity, utility, and de-anonymizability quantifications, and a secure graph data publishing/sharing system SecGraph. New DA Attacks. We present two novel graph DA frameworks: cold start single-phase Optimization-based DA (ODA) and De-anonymizing Social-Attribute Graphs (De-SAG). Unlike existing seed-based DA attacks, ODA does not priori knowledge. In addition, ODA’s DA results can facilitate existing DA attacks by providing more seed information. De-SAG is the first attack that takes into account both graph structure and attribute information. Through extensive evaluations leveraging real world graph data, we validated the performance of both ODA and De-SAG. Graph Anonymity, Utility, and De-anonymizability Quantifications. We developed new techniques that enable comprehensive graph data anonymity, utility, and de-anonymizability evaluation. First, we proposed the first seed-free graph de-anonymizability quantification framework under a general data model which provides the theoretical foundation for seed-free SDA attacks. Second, we conducted the first seed-based quantification on the perfect and partial de-anonymizability of graph data. Our quantification closes the gap between seed-based DA practice and theory. Third, we conducted the first attribute-based anonymity analysis for Social-Attribute Graph (SAG) data. Our attribute-based anonymity analysis together with existing structure-based de-anonymizability quantifications provide data owners and researchers a more complete understanding of the privacy of graph data. Fourth, we conducted the first graph Anonymity-Utility-De-anonymity (AUD) correlation quantification and provided close-forms to explicitly demonstrate such correlation. Finally, based on our quantifications, we conducted large-scale evaluations leveraging 100+ real world graph datasets generated by various computer systems and services. Using the evaluations, we demonstrated the datasets’ anonymity, utility, and de-anonymizability, as well as the significance and validity of our quantifications. SecGraph. We designed, implemented, and evaluated the first uniform and open-source Secure Graph data publishing/sharing (SecGraph) system. SecGraph enables data owners and researchers to conduct accurate comparative studies of anonymization/DA techniques, and to comprehensively understand the resistance/vulnerability of existing or newly developed anonymization techniques, the effectiveness of existing or newly developed DA attacks, and graph and application utilities of anonymized data.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Owen, Gregory T. "Analysis of Background Check Policy in Higher Education." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/eps_diss/98.

Повний текст джерела
Анотація:
In the higher education environment today, lack of agreement about background checks between campus community members, fueled by unresolved tensions between security and privacy, has led many universities to adopt a patchwork of fragmented background check policies. Many of these policies have been created and accepted without careful consideration of the wide array of risks and complexities involved with background checks. This policy analysis examined the experiences and history behind Georgia Institute of Technology’s adoption of background check policy. This was achieved through interviewing relevant constituents and analyzing of all available/related official policy documents associated with Georgia Tech’s Pre-employment Background Check Policy and Program. This dissertation presents a chronological account of the events and influences associated with Georgia Tech’s adoption and revision of background check policy. Results of this study offer valuable insights and recommendations for further study in order to assist higher education policy makers and HR professionals at other universities in making more informed decisions regarding the challenges involved with background check, and similar, policy. Some of these insights include an awareness of societal tensions that exist between privacy and security policy; the importance of understanding how national, local, and organizational level triggering events have shaped and contributed to higher education background check policy that is based on a general concern for security; and my recommendation for further study into background check policy as it will relate to the higher matriculation process.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Rowe, Joshua Luke, and josh@email nu. "Improving internet usability - a framework for domain name policy evaluation." RMIT University. Business Information Technology, 2009. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20091111.101705.

Повний текст джерела
Анотація:
A domain name is a unique alphanumeric designation that facilitates reference to sets of numbers which actually locate a particular computer on the Internet. Domain names are a fundamental part of the Internet's user interface. Improving the usability of the Internet depends upon effective domain name policy. This study is intended to contribute to improvement in Internet usability for the end users of domain names. Benefits of more usable domain names include: higher sales, customer satisfaction and productivity, and reduced support costs. Domain name policies worldwide vary considerably. Consequently, end users are inconvenienced by contradictory domain name policies, diminishing the predictability of an entity's domain name, and thus decreasing usability for end users. The study objective was to develop criteria with which policy makers can evaluate their domain name policies, in order to improve the usability of domain names for end users. The main research question posed was: What are the criteria for an effective domain name policy? The research methodology included a literature review, domain name policy examination and an ethnographic narrative. The literature review found existing research examining either domain names or usability in isolation. However, research examining the intersection of the two is scarce. The existing research describes domain names as part of the web user interface. In practical terms, this is about how people use domain names to access web sites, email addresses and other Internet resources. It was established that the predictability (and thus usability) of domain names relies on effective domain name policy. The non-standardised and widely delegated process of domain name policy development leads to unpredictable and inconsistent domain names. The narrative recollection presented the researcher's inside perspective on the domain name industry, with a focus on domain name usability. The researcher provided first-hand insights into the evolution of the industry and policy development process, from Australian and international perspectives. To address the problem of poor domain name usability, a framework for domain name policy evaluation is proposed. The framework extends the current research that treats domain names as a user interface by proposing criteria which address usability concerns. The framework allows policy makers to critically assess domain name policies with end users in mind. Examples of the criteria include: understanding who are its intended and untended users, and whether it's consistent with other domain names. The framework has the potential to set an international standard for the critical evaluation of domain name policy, and become the basis for further research. This study was developed from the researcher's perspective as a participant in the domain name industry. A secondary lens regarding the usability of domain names was then applied. This study has only scraped the surface in terms of how the research fields of domain names and usability may be considered together. The research methodology for this study was primarily qualitative and interpretive. A quantitative study of domain name policies globally could provide further insight into areas including: the differences in second level country code domain names, and language implications of domain names.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Essén, Anna. "Technology as an extension of the human body : Exploring the potential role of technology in an elderly home care setting." Doctoral thesis, Stockholm University, School of Business, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-7487.

Повний текст джерела
Анотація:

The present thesis explores the potential role and implications of technology in elderly care from the users’ perspective. This exploration is undertaken in terms of five empirical studies of a telehealth project and a meta-analysis of their contributions. An important insight emerging from this work is the need to rethink the human subject as a body, rather than as a mere mind using technology. The thesis draws on phenomenology to reconceptualize the user of technology, and on this basis, to theorize about the potential role and implications of technology in care. It concludes that, in combination with humans that integrate technology with their other sensory and emotional capacities, technology can produce affect. The findings indicate that technology can contribute to senior citizens feeling safe, cared for and thereby less isolated. The findings further demonstrate that, because of the perceptual capacity gained from technology, the care workers become aware of new health problems that urgently call for their sensory and emotional responsiveness.

On this ground, the thesis challenges the determinist view that technology threatens the essentially ‘human’ aspect; rather, it concludes that feeling and other bodily resources are fundamental in the use of technology. Indeed, technology activates such ‘human’ capabilities.

Hence, technology plays a role as a complement for rather than as a replacement of care workers. It increases their work burden by informing them about new needs. This may improve care quality but at an increased cost, which is relevant from a practical perspective. At a more general level, the thesis challenges the dualist legacies in mainstream management research that have sought to divorce mind form body, nature from culture and reason from emotion. It can therefore contribute to broader theoretical developments and fuel existing debates beyond the care setting.

Стилі APA, Harvard, Vancouver, ISO та ін.
35

Xiong, Li. "Resilient Reputation and Trust Management: Models and Techniques." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7483.

Повний текст джерела
Анотація:
The continued advances in service-oriented computing and global communications have created a strong technology push for online information sharing and business transactions among enterprises, organizations and individuals. While these communities offer enormous opportunities, they also present potential threats due to a lack of trust. Reputation systems provide a way for building trust through social control by harnessing the community knowledge in the form of feedback. Although feedback-based reputation systems help community participants decide who to trust and encourage trustworthy behavior, they also introduce vulnerabilities due to potential manipulations by dishonest or malicious players. Therefore, building an effective and resilient reputation system remains a big challenge for the wide deployment of service-oriented computing. This dissertation proposes a decentralized reputation based trust supporting framework called PeerTrust, focusing on models and techniques for resilient reputation management against feedback aggregation related vulnerabilities, especially feedback sparsity with potential feedback manipulation, feedback oscillation, and loss of feedback privacy. This dissertation research has made three unique contributions for building a resilient decentralized reputation system. First, we develop a core reputation model with important trust parameters and a coherent trust metric for quantifying and comparing the trustworthiness of participants. We develop decentralized strategies for implementing the trust model in an efficient and secure manner. Second, we develop techniques countering potential vulnerabilities associated with feedback aggregation, including a similarity inference scheme to counter feedback sparsity with potential feedback manipulations, and a novel metric based on Proportional, Integral, and Derivative (PID) model to handle strategic oscillating behavior of participants. Third but not the least, we develop privacy-conscious trust management models and techniques to address the loss of feedback privacy. We develop a set of novel probabilistic decentralized privacy-preserving computation protocols for important primitive operations. We show how feedback aggregation can be divided into individual steps that utilize above primitive protocols through an example reputation algorithm based on kNN classification. We perform experimental evaluations for each of the schemes we proposed and show the feasibility, effectiveness, and cost of our approach. The PeerTrust framework presents an important step forward with respect to developing attack-resilient reputation trust systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Croome, Beric John. "Taxpayers rights in South Africa: An analysis and evaluation of the extent to which the powers of the South African Revenue service comply with the constitutional rights to poverty, privacy, administrative justice, access to information and access to." Doctoral thesis, University of Cape Town, 2008. http://hdl.handle.net/11427/4594.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Gajane, Pratik. "Multi-armed bandits with unconventional feedback." Thesis, Lille 3, 2017. http://www.theses.fr/2017LIL30045/document.

Повний текст джерела
Анотація:
Dans cette thèse, nous étudions des problèmes de prise de décisions séquentielles dans lesquels, pour chacune de ses décisions, l'apprenant reçoit une information qu'il utilise pour guider ses décisions futures. Pour aller au-delà du retour d’information conventionnel tel qu'il a été bien étudié pour des problèmes de prise de décision séquentielle tels que les bandits multi-bras, nous considérons des formes de retour d’information partielle motivées par des applications pratiques.En premier, nous considérons le problème des bandits duellistes, dans lequel l'apprenant sélectionne deux actions à chaque pas de temps et reçoit en retour une information relative (i.e. de préférence) entre les valeurs instantanées de ces deux actions.En particulier, nous proposons un algorithme optimal qui permet à l'apprenant d'obtenir un regret cumulatif quasi-optimal (le regret est la différence entre la récompense cumulative optimale et la récompense cumulative constatée de l’apprenant). Dans un second temps, nous considérons le problème des bandits corrompus, dans lequel un processus de corruption stochastique perturbe le retour d’information. Pour ce problème aussi, nous concevons des algorithmes pour obtenir un regret cumulatif asymptotiquement optimal. En outre, nous examinons la relation entre ces deux problèmes dans le cadre du monitoring partiel qui est un paradigme générique pour la prise de décision séquentielle avec retour d'information partielle
The multi-armed bandit (MAB) problem is a mathematical formulation of the exploration-exploitation trade-off inherent to reinforcement learning, in which the learner chooses an action (symbolized by an arm) from a set of available actions in a sequence of trials in order to maximize their reward. In the classical MAB problem, the learner receives absolute bandit feedback i.e. it receives as feedback the reward of the arm it selects. In many practical situations however, different kind of feedback is more readily available. In this thesis, we study two of such kinds of feedbacks, namely, relative feedback and corrupt feedback.The main practical motivation behind relative feedback arises from the task of online ranker evaluation. This task involves choosing the optimal ranker from a finite set of rankers using only pairwise comparisons, while minimizing the comparisons between sub-optimal rankers. This is formalized by the MAB problem with relative feedback, in which the learner selects two arms instead of one and receives the preference feedback. We consider the adversarial formulation of this problem which circumvents the stationarity assumption over the mean rewards for the arms. We provide a lower bound on the performance measure for any algorithm for this problem. We also provide an algorithm called "Relative Exponential-weight algorithm for Exploration and Exploitation" with performance guarantees. We present a thorough empirical study on several information retrieval datasets that confirm the validity of these theoretical results.The motivating theme behind corrupt feedback is that the feedback the learner receives is a corrupted form of the corresponding reward of the selected arm. Practically such a feedback is available in the tasks of online advertising, recommender systems etc. We consider two goals for the MAB problem with corrupt feedback: best arm identification and exploration-exploitation. For both the goals, we provide lower bounds on the performance measures for any algorithm. We also provide various algorithms for these settings. The main contribution of this module is the algorithms "KLUCB-CF" and "Thompson Sampling-CF" which asymptotically attain the best possible performance. We present experimental results to demonstrate the performance of these algorithms. We also show how this problem setting can be used for the practical application of enforcing differential privacy
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Primault, Vincent. "Practically preserving and evaluating location privacy." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI017/document.

Повний текст джерела
Анотація:
Depuis quelques dizaines d’années, l’utilisation de téléphones contenant un capteur GPS a fortement augmenté. Cependant, tous ces usages ne sont pas sans menace pour la vie privée des utilisateurs. En effet, les données de mobilité qu’ils envoient à ces services peuvent être utilisées pour inférer des informations sensibles telles que leur domicile ou leur lieu de travail. C’est à ce moment qu’entrent en action les mécanismes de protection, visant à redonner aux utilisateurs le contrôle sur leur vie privée. Nous commençons par répertorier les mécanismes de protection existants et les métriques utilisées pour les évaluer. Cette première analyse met en avant une information particulièrement sensible : les points d’intérêt. Ces derniers représentent tous les lieux où les utilisateurs passent la majeure partie de leur temps. Cela nous conduit à proposer un nouveau mécanisme de protection, PROMESSE, dont le but principal est de cacher ces points d’intérêt. Les mécanismes de protection sont en général configurés par des paramètres, qui ont un grand impact sur leur efficacité. Nous proposons ALP, une solution destinée à aider les utilisateurs à configurer leurs mécanismes de protection à partir d’objectifs qu’ils ont spécifié. Enfin, nous présentons Accio, un logiciel regroupant la majeure partie du travail de cette thèse. Il permet de lancer facilement des expériences destinées à étudier des mécanismes de protection, tout en renforçant leur reproductibilité
In the past decades, the usage of GPS-enabled smartphones has dramatically risen. However, all these usages do not come without privacy threats. Indeed, location data that users are sending to these services can be used to infer sensitive knowledge about them, such as where they live or where they work. This is were protection mechanisms come into play, whose goal is to put users back in control of their privacy. We start by surveying existing protection mechanisms and metrics used to evaluate them. This first analysis highlights a particularly sensitive information, namely the points of interest. These are all the places where users use to spend most of their time. This leads us towards building a new protection mechanism, PROMESSE, whose main goal is to hide these points of interest. Protection mechanisms tend to be configured by parameters, which highly impact their effectiveness in terms of privacy and utility. We propose ALP, a solution to help users to configure their protection mechanisms from a set of objectives they specified. Finally, we introduce Accio, which is a software encompassing most of our work. Its goal is to allow to easily launch location privacy experiments and enforce their reproducibility
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Melis, Luca. "Building and evaluating privacy-preserving data processing systems." Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10054633/.

Повний текст джерела
Анотація:
Large-scale data processing prompts a number of important challenges, including guaranteeing that collected or published data is not misused, preventing disclosure of sensitive information, and deploying privacy protection frameworks that support usable and scalable services. In this dissertation, we study and build systems geared for privacy-friendly data processing, enabling computational scenarios and applications where potentially sensitive data can be used to extract useful knowledge, and which would otherwise be impossible without such strong privacy guarantees. For instance, we show how to privately and efficiently aggregate data from many sources and large streams, and how to use the aggregates to extract useful statistics and train simple machine learning models. We also present a novel technique for privately releasing generative machine learning models and entire high-dimensional datasets produced by these models. Finally, we demonstrate that the data used by participants in training generative and collaborative learning models may be vulnerable to inference attacks and discuss possible mitigation strategies.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Kolivodiakos, Paraskevas. "Evaluating End Users’ Online Privacy Preferences and Identifying PET Design Requirements: A Literature Review." Thesis, Luleå tekniska universitet, Datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67720.

Повний текст джерела
Анотація:
In this research end user privacy preferences regarding online resources web and mobile applications and websites are investigated and design requirements needed for the development of a privacy focused, privacy enhancing technology tool are identified, as derived from the literature, the crowd source based solution is the most appealing solution so it is fully analyzed according to our research main focus.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Chucos, Bastidas Erin Dayan, and Rojas Carlos Alberto Paucar. "Propuesta de concesión de una vía alterna a la carretera central." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1327.

Повний текст джерела
Анотація:
La presente investigación se realizó para proponer una solución al problema de la Carretera Central, que conecta la región Lima con la región Junín, la cual presenta un nivel insuficiente de servicio ya que no cuenta con carriles de adelantamiento debido a la topografía ondulada y accidentada que presenta. El objetivo general, es proponer el desarrollo, en la modalidad de concesión, del proyecto de una vía alterna a la carretera central, para tal fin, se identificó el trazo más adecuado y características principales de la nueva vía alterna, además se realizó la evaluación privada para la concesión de la nueva vía y se proponen las principales características que deben considerar las bases para el concurso de selección del concesionario. Mediante criterios de rentabilidad como el VAN y TIR se analizó la posibilidad de intervención de la empresa privada para el desarrollo del proyecto, con el fin de determinar las características básicas del proyecto, de manera, que sea de interés para el sector privado. La metodología para el desarrollo del estudio es de tipo descriptivo, porque se definieron las variables que se van a medir, del tipo Correlacional, porque se halló el grado de relación de las variables, mediante hipótesis. El diseño de la investigación es Explicativa porque contiene un conjunto de definiciones y de suposiciones relacionado entre sí de manera organizada. De acuerdo al análisis realizado, se concluye, que la nueva vía, ruta Río Blanco – Huari, debe ser desarrollado en la modalidad de Concesión Cofinanciada, donde, por las características del proyecto, el estado sería el principal inversor. This research was conducted to propose a solution to the problem of the Carretera Central, which connects Lima with Junín, which has an insufficient level of service because do not have passing overtaking lanes due to the undulating topography it presents. The overall objective is to propose the development, in the form of concession, the project of an new alternate route to the Carretera Central, for this reason, we identified the most suitable stroke and main features of the new alternate route, also, private assessment for granting the new road was made and the main features that should be considered the basis for the competitive selection of the concessionaire are proposed. By criteria of profitability as the NPV and IRR analyzed the possibility of private sector participation for the development of the project, in order to determine the basic characteristics of the project so that is of interest to the private sector. The methodology for the development of the study is descriptive, because the variables to be measured, the correlation type, because the degree of relationship between the variables was found by hypotheses were defined. The design of the research is explanatory because it contains a set of definitions and assumptions related to each other in an organized way. According to the analysis, it is concluded that the new road, route Rio Blanco - Huari, must be developed in the form of Concession Co-financing, and the state would be the main investor according to the project characteristics.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

刑衛國 and Weiguo Xing. "Evaluation and scheduling of private power production." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31242522.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Xing, Weiguo. "Evaluation and scheduling of private power production." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B23295338.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Chou, Che-hui Jeffrey, and 周哲輝. "An evaluation of the private sector participation scheme." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B43893880.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Theron, Piet. "Criteria for the evaluation of private cloud computing." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85858.

Повний текст джерела
Анотація:
Thesis (MSc)--Stellenbosch University, 2013.
ENGLISH ABSTRACT: Cloud computing is seen as one of top 10 disruptive changes in IT for the next decade by leading research analysts. Consequently, enterprises are starting to investigate the effect it will have on the strategic direction of their businesses and technology stacks. Because of the disruptive nature of the paradigm shift introduced by it, as well as the strategic impact thereof, it is necessary that a structured approach with regard to risk, value and operational cost is followed with the decision on its relevance, as well as the selection of a platform if needed. The purpose of this thesis is to provide a reference model and its associating framework that can be used to evaluate private cloud management platforms, as well as the technologies associated with it.
AFRIKAANSE OPSOMMING: Wolk berekening word deur vooraanstaande navorsing ontleders as een van die top 10 ontwrigtende veranderings vir IT in die volgende dekade beskou. Gevolglik begin korporatiewe ondernemings met ondersoeke om te bepaal wat die invloed daarvan op hulle strategiese rigting en tegnologië gaan wees. Die ontwrigtende aard van die paradigma skuif, asook die strategiese impak daarvan, noodsaak ’n gestruktureerde ondersoek na die toepaslikheid en keuse van ’n platform, indien nodig, met betrekking tot risiko, waarde en operasionele koste. Die doel van hierdie tesis is om ’n verwysings model, en ’n raamwerk wat dit implementeer, saam te stel wat dan gebruik kan word om privaat wolk berekening platforms te evalueer.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Chou, Che-hui Jeffrey. "An evaluation of the private sector participation scheme." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B20129452.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Hallam, Megan Storey. "A Program Evaluation Of Fundations In A Private Urban Elementary School." W&M ScholarWorks, 2021. https://scholarworks.wm.edu/etd/1627407449.

Повний текст джерела
Анотація:
Early reading skills are strongly associated with long term academic and life achievement. Despite the recognized importance of literacy, indicators point to a literacy crisis in the United States. Research and policies have highlighted the necessity of selecting reading programs with documented effectiveness and implementing them with fidelity. This mixed methods program evaluation investigated the extent to which the Fundations reading program is being implemented with fidelity at a private urban elementary school and if there has been a change in student reading performance since introducing the program. This study also explored teachers’ perceptions regarding program strengths and challenges along with their own competency and need for support. Both quantitative and qualitative data were collected in the form of implementation checklists, student running records scores, and a teacher survey. Findings indicated that the program is not scheduled for the prescribed frequency or length of lessons. This limited program exposure is significantly impacting overall fidelity, although ratings of adherence to the program and student participation are high. Despite program exposure issues, ANCOVA results demonstrated significant differences between student cohorts before and after Fundations was introduced. Post hoc analysis indicated that adjusted mean reading scores following Fundations implementation had increased by almost one full reading level compared to two out of the three years prior to the program. In addition, teachers identified professional development and implementation support as areas of need. Recommendations include allocating the minimum instructional time prescribed for Fundations, incorporating other measures of reading and approaches to analyzing reading data, increasing fidelity checks, and providing additional professional development.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Fortney, Jenny. "An evaluation of West Virginia Managed Timberland forest tax incentive program." Morgantown, W. Va. : [West Virginia University Libraries], 2009. http://hdl.handle.net/10450/10553.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--West Virginia University, 2009.
Title from document title page. Document formatted into pages; contains viii, 112 p. : ill. Vita. Includes abstract. Includes bibliographical references (p. 85-90).
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Amaral, Maria Clara Ede. "Relações público-privado na educação de Mato Grosso." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/253936.

Повний текст джерела
Анотація:
Orientador: Luiz Carlos de Freitas
Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Educação
Made available in DSpace on 2018-08-24T21:00:43Z (GMT). No. of bitstreams: 1 Amaral_MariaClaraEde_D.pdf: 4551720 bytes, checksum: 20e74f515381a6232cc5b9fb8d8cdfc8 (MD5) Previous issue date: 2014
Resumo: Este estudo tem como objetivo analisar a implementação de duas parcerias público-privado entre a Secretaria de Estado de Educação de Mato Grosso e as seguintes entidades: Fundação CESGRANRIO, no ano de 2006, e o Instituto Ayrton Senna, entre 2007 e 2008. Dentre os referenciais teóricos selecionados para análise, destacam-se autores que tratam da reconfiguração do papel do Estado a partir da década de 1990, da diminuição de sua atuação no campo educacional, de organizações do Terceiro Setor em substituição ao papel do Estado e de parcerias público-privado na área educacional. Além disso, utilizamos os conceitos de neoliberalismo e de Terceira Via, qualidade social e suas relações com a Avaliação em Larga Escala e o IDEB. Trata-se de uma pesquisa de cunho qualitativo, cujos instrumentos de coleta de dados constaram de entrevistas individuais, grupos focais e análise dos dados do SAEB/Prova Brasil e IDEB, utilizando-se para análise e organização dos dados, a partir da triangulação de métodos de coleta, a análise de conteúdo. Este estudo teve como campo de investigação os municípios de Cáceres/MT e Cuiabá/MT e compõe-se de três diferentes instâncias da rede: a) a Secretaria de Estado de Educação - SEDUC; b) os CEFAPROs dos polos de Cáceres e Cuiabá; c) as escolas da rede nos dois municípios sede que estiveram envolvidas nas parcerias. Os resultados apontam as contradições que envolvem a relação público-privado na implementação de políticas públicas, sinalizando para seu aspecto dinâmico e intricado; a falta de transparência na contratação das parcerias; a forte precarização e intensificação do trabalho docente, em especial na parceria com o IAS. Por fim, a análise dos dados da Avaliação Nacional mostrou que não podemos afirmar com convicção que as parcerias por si só elevaram a proficiência e os índices do IDEB
Abstract: This study aims at analyzing the implementation of two public-private partnerships between the Department of Education of the State of Mato Grosso and the following agencies: CESGRANRIO Foundation in 2006 and Ayrton Senna Institute (IAS) in 2007 and 2008. As theoretical references selected to support the analysis, the study has relied on authors that have addressed the reconfiguration of the role of the State from the 1990s, its decreased action in the educational field, the replacement of the State with Third Sector organizations, and public-private partnerships in the educational area. In addition, we have used the concepts of neoliberalism, Third Way, social quality and their relations with the Large-Scale Evaluation and IDEB. This is a qualitative research whose instruments for data collection included individual interviews, focus groups and analysis of data from SAEB/Prova Brasil and IDEB, with the use of content analysis for data analysis and organization with a triangulation of collection methods. The study was carried out in the cities of Caceres/MT and Cuiaba/MT and involved three different network points: a) the State Department of Education - SEDUC; b) CEFAPROS of Caceres and Cuiaba; c) the schools engaged in partnerships in both cities. The results have pointed out contradictions in the public-private relationship along the implementation of public policies, thus signaling their dynamic and intricate features; the lack of transparency in partnership agreements; the strong precarization and intensification of teacher work, particularly in the partnerships with IAS. Finally, the analysis of data from the National Evaluation has shown that it is not possible to firmly state that partnerships alone have increased proficiency and IDEB indexes
Doutorado
Ensino e Práticas Culturais
Doutora em Educação
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Gonçalves, Rui Pedro Bispo. "O caso do franchising – Os Ursitos." Master's thesis, Instituto Superior de Economia e Gestão, 2017. http://hdl.handle.net/10400.5/15500.

Повний текст джерела
Анотація:
Mestrado em Contabilidade, Fiscalidade e Finanças Empresariais
Este estudo de caso de ensino apresenta uma história real que pode ser demonstrativa do tecido empresarial português, na medida em que se trata de uma empresa de índole familiar e não cotada em mercados de capitais. Retratando uma organização cujo principal objeto era o comércio por grosso de mobiliário infantil e que tinha um capital privado. Esta entidade desenvolvia as suas operações recorrendo a uma cadeia de franchising. Depois de uma fase de grande expansão e na sequência de um aumento substancial das dívidas que as lojas tinham para com a empresa-mãe, a empresa começou a ter graves problemas de liquidez. O que se propõe com este caso de ensino é que os alunos, com avançados conhecimentos de Corporate Finance, sejam capazes de desenvolver uma avaliação de uma empresa privada de caráter familiar. Os dados fornecidos são relativos aos processos, políticas internas e operações da empresa, bem como às demonstrações financeiras.
This case study presents a real story that can be demonstrative of the Portuguese business units insofar as it is a family business and not listed on capital markets. Portraying an organization whose main object was the wholesale trade of children's furniture and which had a private capital. This entity developed its operations using a franchising chain. After a major expansion and following a substantial increase in the debts that the stores had to the Master Franchise, the company began to have serious liquidity problems. What is proposed with this case is that students, with advanced knowledge of Corporate Finance, are able to develop a valuation of a private company with familiar structure. The data provided are related to the company's internal processes, policies and operations, as well as financial statements.
info:eu-repo/semantics/publishedVersion
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії