Дисертації з теми "Privacy evaluation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Privacy evaluation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Jensen, Carlos. "Designing for Privacy in Interactive Systems." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7588.
Повний текст джерелаLundgren, Tony, and Wenjia Xu. "Evaluation of Privacy-Preserving Methods for Smart Grids." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200607.
Повний текст джерелаMood, Benjamin, and Benjamin Mood. "Optimizing Secure Function Evaluation on Mobile Devices." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12505.
Повний текст джерелаO'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.
Повний текст джерелаCvach, Marek, Menal Sanna Kahsay, and Micaela Shamoun. "Privacy online: Exploring consumers’ evaluation of privacy issues in relation to personalised advertisement when buying online." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40054.
Повний текст джерелаMajeed, Salman. "Evaluation of Collaborative Reputation System against Privacy-Invasive Software." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4338.
Повний текст джерелаRohunen, A. (Anna). "Advancing information privacy concerns evaluation in personal data intensive services." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526224688.
Повний текст джерелаTiivistelmä Kun henkilötietoja kerätään ja hyödynnetään dataintensiivisten palveluiden tuottamiseen, palveluiden käyttäjien tietosuoja saattaa heikentyä. Käyttäjien tietosuojahuolet voivat hidastaa uusien palveluiden ja teknologioiden käyttöönottoa sekä vaikuttaa kerättävän tiedon laatuun ja kattavuuteen. Tämä hankaloittaa palveluiden täysimittaista hyödyntämistä. Tietosuojahuolten arviointi mahdollistaa niiden huomioimisen henkilötietoperusteisten palveluiden suunnittelussa ja kehittämisessä. Tässä tutkimuksessa selvitettiin, kuinka tietosuojahuolten arviointia tulisi kehittää muuttuvissa tiedonkeruuympäristöissä. Kaksivaiheisessa tutkimuksessa toteutettiin aluksi empiirinen monimenetelmällinen tutkimus ja tämän jälkeen systemaattinen kirjallisuustutkimus. Ensimmäisessä vaiheessa tehtiin kaksi empiiristä tutkimusta monimenetelmällisen tutkimuksen tutkivan peräkkäisen asetelman mukaisesti. Näissä tutkimuksissa selvitettiin ensin laadullisin menetelmin tietosuojakäyttäytymistä ja tietosuojahuolia liikkumisen dataa kerättäessä. Laadullisten tulosten pohjalta kehitettiin kvantitatiiviset instrumentit tulosten yleistettävyyden tutkimiseksi. Tutkimuksen toisessa vaiheessa toteutettiin kaksi katsaustyyppistä tutkimusta, jotta saataisiin kattava käsitys tietosuojakäyttäytymisestä sekä mahdollisuuksista kehittää tietosuojahuolten arviointia uusissa tiedonkeruuympäristöissä. Nämä tutkimukset olivat systemaattinen kirjallisuuskatsaus tietosuojakäyttäytymisen malleista sekä katsaus EU:n tietosuojalainsäädännön muutoksista. Tutkimuksen tulokset osoittavat, että kehittyvissä tiedonkeruuympäristöissä tietosuojakäyttäytyminen ja tietosuojahuolet poikkeavat aikaisemmista ympäristöistä. Näissä ympäristöissä esiintyy niille ominaisia tietosuojahuolia ja huolten monitahoisuus korostuu. Koska tietosuojahuolet ovat kytköksissä muihin tietosuojakäyttäytymistä ennustaviin muuttujiin, arviointeihin voi olla aiheellista sisällyttää myös näitä muuttujia. Olemassa olevia tietosuojahuolten arviointi-instrumentteja on perusteltua käyttää arvioinnin lähtökohtana myös kehittyvissä tiedonkeruuympäristöissä, mutta niitä on mukautettava uusiin ympäristöihin soveltuviksi. Arvioinnin kehittäminen voi olla haasteellista, sillä aikaisempi tietosuojatutkimus on epäyhtenäistä. Jotta sitä voidaan soveltaa asianmukaisesti arviointien kehittämisessä, tutkimusta on vietävä kokonaisvaltaisempaan suuntaan
Abril, Castellano Daniel. "Privacy protection methods for documents and risk evaluation for microdata." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/285353.
Повний текст джерелаThe capability to collect and store digital information by statistical agencies, governments or individuals has created huge opportunities to analyze and build knowledge-based models. With the rise of Internet many services and companies have exploited these opportunities collecting huge amounts of data, which most of the cases are considered confidential. This causes the need to develop methods that allow the dissemination of confidential data for data mining purposes while preserving individuals' private information. Thus, personal data could be collected, transferred or sold to third parties ensuring the individuals' confidentiality, but still being statistically useful. Internet is full of unstructured textual data like posts or documents with a large content of information that can be extracted and analyzed. Documents are especially difficult to protect due to their lack of structure. In this thesis we distinguish two different models to protect documents. On the one hand, we consider the protection of a collection of documents, so this set of documents can be analyzed by means of text mining and machine learning techniques. On the other hand, we consider the protection of single documents by means of the documents' sanitization. This is the process of detecting and removing the parts of the text considered sensitive. When dealing with governmental classified information, sanitization attempts to reduce the sensitiveness of the document, possibly yielding a non-classified document. In this way, governments show they uphold the freedom of information while the national security is not jeopardised. This thesis presents a set of different methods and experiments for the protection of unstructured textual data protection and besides, it introduces an advanced method to evaluate the security of microdata protection methods. The main contributions are: * The development of a new semi-automatic method to assist documents' declassification. * The definition of two specific metrics for evaluating the information loss and disclosure risk of sanitized documents. * The development of two cluster-based approaches based on the k-anonymity principle to anonymize vector space models. One exploits the sparsity and the other exploits the possible semantic relations of those vectors. * The study of advanced methods to evaluate the disclosure risk of microdata protection methods. In particular, we have developed a general supervised metric learning approach for distance-based record linkage. Moreover, we have reviewed the suitability of a set of parameterized distance functions that can be used together with the supervised approach.
Paananen, K. (Kimmo). "Evaluation of privacy, security and quality of Internet-based communication solutions." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201605221866.
Повний текст джерелаEschricht, Johannes. "mHealth and the need of evaluation processes." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16442.
Повний текст джерелаChang, Wei. "Security and Privacy Issues in Social Information-Assisted Application Design." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/406720.
Повний текст джерелаPh.D.
In recent years, social networks and their related theories and applications attract widespread attentions in computer science. Many applications are designed by exploring the social information among users, such as social peer-to-peer systems, mobile cloud, and online recommendation systems. Most of the existing works only focus on how to use social information but ignore the fact that social information itself may cause severe security and privacy problems. In this dissertation, we first present some social information-assisted application systems that we have designed, and then, we present several social information-involved privacy and security risks and their countermeasures. Generally speaking, the design procedure of any social information-assisted application involves three tasks: publishing, accessing, and using social information. However, all of these tasks contain privacy and security issues. Social information can be published from a centralized system or a distributed one. For the centralized scheme, the social information is directly published from online social networking systems, such as Facebook or Twitter. However, we found that the data of a social network essentially is a time-evolving graph. Most of the existing approaches fail to preserve users' identity privacy once a malicious attacker has the external knowledge about the victim's time-varying behaviors. For avoiding the new privacy issue, we propose a time-based anonymization scheme. For the distributed social information-sharing scheme, each user's information is propagated from friend to friend's friends, and so on. We design a new scheme to gradually enhance the privacy protection along a propagation path, in the meanwhile, maximally preserve the overall utility of the user's data. From a data accessing aspect, social information can be used by malicious users for launching new attacks. In this dissertation, we find a friendship-based privacy disclosure attack, and a corresponding defense approach is designed. Location-based service has been widely adopted. In order to preserve location privacy, users usually turn off the corresponding applications when visiting sensitive locations. However, once social relationships are known, attackers are able to infer these hidden locations, which disclose users' location privacy. For preserving the location privacy, we design a fake location-based approach, which efficiently disorders the social-geographic relationships among users. From the data usage aspect, social information and its related data may come from users. A system may lose functioning if some malicious users inject plenty of fake information. Mobile clouds and Friend Locator are two typical systems, which are vulnerable to the fake information-related attacks. Mobile clouds explore the idle computing resources of surrounding devices by recruiting nearby friends to participate in the same task. However, malicious users may inject wrong friendships information to mess up the system. When visiting a new place, Friend Locator provides navigation services for participators by creating a map based their trajectories. The functioning of the system is based on the trust among participators. Once a user's device is controlled by attackers, all other users may receive wrong navigation. For defending these attacks, we provide different countermeasure.
Temple University--Theses
Gariepy, Laura W. "Undergraduate Students' Attitudes About the Collection, Use, and Privacy of Search Data in Academic Libraries." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/6077.
Повний текст джерелаJafer, Yasser. "Task Oriented Privacy-preserving (TOP) Technologies Using Automatic Feature Selection." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/34320.
Повний текст джерелаNyzell, Robin. "Usability and pilot tests on privacy dialogues : Evaluation of prototypes for data sharing online." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-68855.
Повний текст джерелаNdukwe, Cajetan Okechukwu. "Cyber Medicine: An Ethical Evaluation." Thesis, Linköping University, Centre for Applied Ethics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2919.
Повний текст джерелаIt is self evident that our society is an information one. This is true from the things we see around us.The world is now a global village.It just take seconds for communication to be established from one part of the globe to another.What a tremendous achievement for information technology.Among the recent developments of information technology is the scientific wizardary of cyber medicine.The internet has definitely revolutionalised the healthcare industry. Many people in developed countries of the world seek medical information, advice or even buy drugs via the internet.So many websites rise every now and then claiming to provide various medical assistance to patients. But the application of information technology to medicine poses some ethical problems today. It is because of this that cyber medicine attracts my attention in this research.With this research, I hope to offer some recommendations for a morally acceptable cyber medicine .This will help to some extent in solving this all important problem ofcyber medicine for the good of the health care industry and the society at large.
Ozarar, Mert. "Secure Multiparty Computation Via Oblivious Polynomial Evaluation." Phd thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12615170/index.pdf.
Повний текст джерелаhowever if none of the parties can be trusted enough to know all the inputs, privacy will become a primary concern. Hence the techniques for Secure Multiparty Computation (SMC) are quite relevant and practical to overcome such kind of privacy gaps. The subject of SMC has evolved from earlier solutions of combinational logic circuits to the recent proposals of anonymity-enabled computation. In this thesis, we put together the significant research that has been carried out on SMC. We demonstrate the concept by concentrating on a specific technique called Oblivious Polynomial Evaluation (OPE) together with concrete examples. We put critical issues, challenges and the level of adaptation achieved before the researchers. We also provide some future research opportunities based on the literature survey.
Lindegren, Daniel. "Designing for user awareness and usability : An evaluation of authorization dialogs on a mobile device." Thesis, Karlstads universitet, Handelshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-62731.
Повний текст джерелаCREDENTIAL
Diakos, Thomas P. "An evaluation of security and privacy concerns in contactless payment systems through physical layer eavesdropping measurements." Thesis, University of Surrey, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.616478.
Повний текст джерелаSiddiqui, Muhammad Anas. "Cloud Computing : Evaluation, as a platform for Scania Architecture." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-18896.
Повний текст джерелаRaghunathan, Anusha. "EVALUATION OF INTELLIGIBILITY AND SPEAKER SIMILARITY OF VOICE TRANSFORMATION." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_theses/101.
Повний текст джерелаAgrawal, Vivek. "Performance evaluation of Group Signature schemes in Vehicular Communication : A feasibility study for Vehicular Communication." Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119816.
Повний текст джерелаRezazadeh, Baee Mir Ali. "Privacy-preserving authentication and key management for cooperative intelligent transportation systems." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/212412/1/Mir%20Ali_Rezazadeh%20Baee_Thesis.pdf.
Повний текст джерелаPeng, Kun. "Analysis and Design of Secure Sealed-Bid Auction." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15848/1/Kun_Peng_Thesis.pdf.
Повний текст джерелаPeng, Kun. "Analysis and Design of Secure Sealed-Bid Auction." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15848/.
Повний текст джерелаÖknegård, Enavall Isabell, and Julia Mineur. "Privacy and user profiling : Profile-based evaluation of what different third party services may learn about a user." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177643.
Повний текст джерелаOzgur, Utku. "Development of a Remotely Accessible Wireless Testbed for Performance Evaluation of AMI Related Protocols." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3177.
Повний текст джерелаFriberg, Åsa. "An empirical evaluation of online privacy concerns with a special focus on the importance of information transparency and personality traits /." Luleå : Luleå University of Technology, 2007. http://epubl.ltu.se/1402-1757/2007/25/.
Повний текст джерелаGeorgy, Constance. "Visibilité numérique et recrutement. Une sociologie de l’évaluation des compétences sur Internet." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLN006/document.
Повний текст джерелаThe aim of my thesis is to underline what is at stake with the phenomenon of the massive growth of online personal data that we have witnessed for the last decade. This issue is seen through the case of hiring on the labor market. Candidates may want to disclose positive information about themselves and recruiters need to gather as much information as they can to evaluate potential candidates. This example allow us to investigate a new market for online reputation and to bring to knowledge the new norms of visibility and privacy in the age of social media
Ma, Wenjun. "AMMP-EXTN a user privacy and collaboration control framework for a multi-user collaboratory virtual reality system /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-09142007-204819/.
Повний текст джерелаTitle from file title page. Ying Zhu, committee chair; G.Scott Owen, Robert W. Harrison, committee members. Electronic text (87 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Feb. 7, 2008. Includes bibliographical references (p. 84-87).
Andersson, Christer. "Design and Evaluation of Anonymity Solutions for Mobile Networks." Doctoral thesis, Karlstad : Faculty of Economic Sciences, Communication and IT, Computer Science, Karlstads universitet, 2007. http://www.diva-portal.org/kau/abstract.xsql?dbid=1282.
Повний текст джерелаJi, Shouling. "Evaluating the security of anonymized big graph/structural data." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54913.
Повний текст джерелаOwen, Gregory T. "Analysis of Background Check Policy in Higher Education." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/eps_diss/98.
Повний текст джерелаRowe, Joshua Luke, and josh@email nu. "Improving internet usability - a framework for domain name policy evaluation." RMIT University. Business Information Technology, 2009. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20091111.101705.
Повний текст джерелаEssén, Anna. "Technology as an extension of the human body : Exploring the potential role of technology in an elderly home care setting." Doctoral thesis, Stockholm University, School of Business, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-7487.
Повний текст джерелаThe present thesis explores the potential role and implications of technology in elderly care from the users’ perspective. This exploration is undertaken in terms of five empirical studies of a telehealth project and a meta-analysis of their contributions. An important insight emerging from this work is the need to rethink the human subject as a body, rather than as a mere mind using technology. The thesis draws on phenomenology to reconceptualize the user of technology, and on this basis, to theorize about the potential role and implications of technology in care. It concludes that, in combination with humans that integrate technology with their other sensory and emotional capacities, technology can produce affect. The findings indicate that technology can contribute to senior citizens feeling safe, cared for and thereby less isolated. The findings further demonstrate that, because of the perceptual capacity gained from technology, the care workers become aware of new health problems that urgently call for their sensory and emotional responsiveness.
On this ground, the thesis challenges the determinist view that technology threatens the essentially ‘human’ aspect; rather, it concludes that feeling and other bodily resources are fundamental in the use of technology. Indeed, technology activates such ‘human’ capabilities.
Hence, technology plays a role as a complement for rather than as a replacement of care workers. It increases their work burden by informing them about new needs. This may improve care quality but at an increased cost, which is relevant from a practical perspective. At a more general level, the thesis challenges the dualist legacies in mainstream management research that have sought to divorce mind form body, nature from culture and reason from emotion. It can therefore contribute to broader theoretical developments and fuel existing debates beyond the care setting.
Xiong, Li. "Resilient Reputation and Trust Management: Models and Techniques." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7483.
Повний текст джерелаCroome, Beric John. "Taxpayers rights in South Africa: An analysis and evaluation of the extent to which the powers of the South African Revenue service comply with the constitutional rights to poverty, privacy, administrative justice, access to information and access to." Doctoral thesis, University of Cape Town, 2008. http://hdl.handle.net/11427/4594.
Повний текст джерелаGajane, Pratik. "Multi-armed bandits with unconventional feedback." Thesis, Lille 3, 2017. http://www.theses.fr/2017LIL30045/document.
Повний текст джерелаThe multi-armed bandit (MAB) problem is a mathematical formulation of the exploration-exploitation trade-off inherent to reinforcement learning, in which the learner chooses an action (symbolized by an arm) from a set of available actions in a sequence of trials in order to maximize their reward. In the classical MAB problem, the learner receives absolute bandit feedback i.e. it receives as feedback the reward of the arm it selects. In many practical situations however, different kind of feedback is more readily available. In this thesis, we study two of such kinds of feedbacks, namely, relative feedback and corrupt feedback.The main practical motivation behind relative feedback arises from the task of online ranker evaluation. This task involves choosing the optimal ranker from a finite set of rankers using only pairwise comparisons, while minimizing the comparisons between sub-optimal rankers. This is formalized by the MAB problem with relative feedback, in which the learner selects two arms instead of one and receives the preference feedback. We consider the adversarial formulation of this problem which circumvents the stationarity assumption over the mean rewards for the arms. We provide a lower bound on the performance measure for any algorithm for this problem. We also provide an algorithm called "Relative Exponential-weight algorithm for Exploration and Exploitation" with performance guarantees. We present a thorough empirical study on several information retrieval datasets that confirm the validity of these theoretical results.The motivating theme behind corrupt feedback is that the feedback the learner receives is a corrupted form of the corresponding reward of the selected arm. Practically such a feedback is available in the tasks of online advertising, recommender systems etc. We consider two goals for the MAB problem with corrupt feedback: best arm identification and exploration-exploitation. For both the goals, we provide lower bounds on the performance measures for any algorithm. We also provide various algorithms for these settings. The main contribution of this module is the algorithms "KLUCB-CF" and "Thompson Sampling-CF" which asymptotically attain the best possible performance. We present experimental results to demonstrate the performance of these algorithms. We also show how this problem setting can be used for the practical application of enforcing differential privacy
Primault, Vincent. "Practically preserving and evaluating location privacy." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI017/document.
Повний текст джерелаIn the past decades, the usage of GPS-enabled smartphones has dramatically risen. However, all these usages do not come without privacy threats. Indeed, location data that users are sending to these services can be used to infer sensitive knowledge about them, such as where they live or where they work. This is were protection mechanisms come into play, whose goal is to put users back in control of their privacy. We start by surveying existing protection mechanisms and metrics used to evaluate them. This first analysis highlights a particularly sensitive information, namely the points of interest. These are all the places where users use to spend most of their time. This leads us towards building a new protection mechanism, PROMESSE, whose main goal is to hide these points of interest. Protection mechanisms tend to be configured by parameters, which highly impact their effectiveness in terms of privacy and utility. We propose ALP, a solution to help users to configure their protection mechanisms from a set of objectives they specified. Finally, we introduce Accio, which is a software encompassing most of our work. Its goal is to allow to easily launch location privacy experiments and enforce their reproducibility
Melis, Luca. "Building and evaluating privacy-preserving data processing systems." Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10054633/.
Повний текст джерелаKolivodiakos, Paraskevas. "Evaluating End Users’ Online Privacy Preferences and Identifying PET Design Requirements: A Literature Review." Thesis, Luleå tekniska universitet, Datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67720.
Повний текст джерелаChucos, Bastidas Erin Dayan, and Rojas Carlos Alberto Paucar. "Propuesta de concesión de una vía alterna a la carretera central." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1327.
Повний текст джерела刑衛國 and Weiguo Xing. "Evaluation and scheduling of private power production." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31242522.
Повний текст джерелаXing, Weiguo. "Evaluation and scheduling of private power production." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B23295338.
Повний текст джерелаChou, Che-hui Jeffrey, and 周哲輝. "An evaluation of the private sector participation scheme." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B43893880.
Повний текст джерелаTheron, Piet. "Criteria for the evaluation of private cloud computing." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85858.
Повний текст джерелаENGLISH ABSTRACT: Cloud computing is seen as one of top 10 disruptive changes in IT for the next decade by leading research analysts. Consequently, enterprises are starting to investigate the effect it will have on the strategic direction of their businesses and technology stacks. Because of the disruptive nature of the paradigm shift introduced by it, as well as the strategic impact thereof, it is necessary that a structured approach with regard to risk, value and operational cost is followed with the decision on its relevance, as well as the selection of a platform if needed. The purpose of this thesis is to provide a reference model and its associating framework that can be used to evaluate private cloud management platforms, as well as the technologies associated with it.
AFRIKAANSE OPSOMMING: Wolk berekening word deur vooraanstaande navorsing ontleders as een van die top 10 ontwrigtende veranderings vir IT in die volgende dekade beskou. Gevolglik begin korporatiewe ondernemings met ondersoeke om te bepaal wat die invloed daarvan op hulle strategiese rigting en tegnologië gaan wees. Die ontwrigtende aard van die paradigma skuif, asook die strategiese impak daarvan, noodsaak ’n gestruktureerde ondersoek na die toepaslikheid en keuse van ’n platform, indien nodig, met betrekking tot risiko, waarde en operasionele koste. Die doel van hierdie tesis is om ’n verwysings model, en ’n raamwerk wat dit implementeer, saam te stel wat dan gebruik kan word om privaat wolk berekening platforms te evalueer.
Chou, Che-hui Jeffrey. "An evaluation of the private sector participation scheme." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B20129452.
Повний текст джерелаHallam, Megan Storey. "A Program Evaluation Of Fundations In A Private Urban Elementary School." W&M ScholarWorks, 2021. https://scholarworks.wm.edu/etd/1627407449.
Повний текст джерелаFortney, Jenny. "An evaluation of West Virginia Managed Timberland forest tax incentive program." Morgantown, W. Va. : [West Virginia University Libraries], 2009. http://hdl.handle.net/10450/10553.
Повний текст джерелаTitle from document title page. Document formatted into pages; contains viii, 112 p. : ill. Vita. Includes abstract. Includes bibliographical references (p. 85-90).
Amaral, Maria Clara Ede. "Relações público-privado na educação de Mato Grosso." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/253936.
Повний текст джерелаTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Educação
Made available in DSpace on 2018-08-24T21:00:43Z (GMT). No. of bitstreams: 1 Amaral_MariaClaraEde_D.pdf: 4551720 bytes, checksum: 20e74f515381a6232cc5b9fb8d8cdfc8 (MD5) Previous issue date: 2014
Resumo: Este estudo tem como objetivo analisar a implementação de duas parcerias público-privado entre a Secretaria de Estado de Educação de Mato Grosso e as seguintes entidades: Fundação CESGRANRIO, no ano de 2006, e o Instituto Ayrton Senna, entre 2007 e 2008. Dentre os referenciais teóricos selecionados para análise, destacam-se autores que tratam da reconfiguração do papel do Estado a partir da década de 1990, da diminuição de sua atuação no campo educacional, de organizações do Terceiro Setor em substituição ao papel do Estado e de parcerias público-privado na área educacional. Além disso, utilizamos os conceitos de neoliberalismo e de Terceira Via, qualidade social e suas relações com a Avaliação em Larga Escala e o IDEB. Trata-se de uma pesquisa de cunho qualitativo, cujos instrumentos de coleta de dados constaram de entrevistas individuais, grupos focais e análise dos dados do SAEB/Prova Brasil e IDEB, utilizando-se para análise e organização dos dados, a partir da triangulação de métodos de coleta, a análise de conteúdo. Este estudo teve como campo de investigação os municípios de Cáceres/MT e Cuiabá/MT e compõe-se de três diferentes instâncias da rede: a) a Secretaria de Estado de Educação - SEDUC; b) os CEFAPROs dos polos de Cáceres e Cuiabá; c) as escolas da rede nos dois municípios sede que estiveram envolvidas nas parcerias. Os resultados apontam as contradições que envolvem a relação público-privado na implementação de políticas públicas, sinalizando para seu aspecto dinâmico e intricado; a falta de transparência na contratação das parcerias; a forte precarização e intensificação do trabalho docente, em especial na parceria com o IAS. Por fim, a análise dos dados da Avaliação Nacional mostrou que não podemos afirmar com convicção que as parcerias por si só elevaram a proficiência e os índices do IDEB
Abstract: This study aims at analyzing the implementation of two public-private partnerships between the Department of Education of the State of Mato Grosso and the following agencies: CESGRANRIO Foundation in 2006 and Ayrton Senna Institute (IAS) in 2007 and 2008. As theoretical references selected to support the analysis, the study has relied on authors that have addressed the reconfiguration of the role of the State from the 1990s, its decreased action in the educational field, the replacement of the State with Third Sector organizations, and public-private partnerships in the educational area. In addition, we have used the concepts of neoliberalism, Third Way, social quality and their relations with the Large-Scale Evaluation and IDEB. This is a qualitative research whose instruments for data collection included individual interviews, focus groups and analysis of data from SAEB/Prova Brasil and IDEB, with the use of content analysis for data analysis and organization with a triangulation of collection methods. The study was carried out in the cities of Caceres/MT and Cuiaba/MT and involved three different network points: a) the State Department of Education - SEDUC; b) CEFAPROS of Caceres and Cuiaba; c) the schools engaged in partnerships in both cities. The results have pointed out contradictions in the public-private relationship along the implementation of public policies, thus signaling their dynamic and intricate features; the lack of transparency in partnership agreements; the strong precarization and intensification of teacher work, particularly in the partnerships with IAS. Finally, the analysis of data from the National Evaluation has shown that it is not possible to firmly state that partnerships alone have increased proficiency and IDEB indexes
Doutorado
Ensino e Práticas Culturais
Doutora em Educação
Gonçalves, Rui Pedro Bispo. "O caso do franchising – Os Ursitos." Master's thesis, Instituto Superior de Economia e Gestão, 2017. http://hdl.handle.net/10400.5/15500.
Повний текст джерелаEste estudo de caso de ensino apresenta uma história real que pode ser demonstrativa do tecido empresarial português, na medida em que se trata de uma empresa de índole familiar e não cotada em mercados de capitais. Retratando uma organização cujo principal objeto era o comércio por grosso de mobiliário infantil e que tinha um capital privado. Esta entidade desenvolvia as suas operações recorrendo a uma cadeia de franchising. Depois de uma fase de grande expansão e na sequência de um aumento substancial das dívidas que as lojas tinham para com a empresa-mãe, a empresa começou a ter graves problemas de liquidez. O que se propõe com este caso de ensino é que os alunos, com avançados conhecimentos de Corporate Finance, sejam capazes de desenvolver uma avaliação de uma empresa privada de caráter familiar. Os dados fornecidos são relativos aos processos, políticas internas e operações da empresa, bem como às demonstrações financeiras.
This case study presents a real story that can be demonstrative of the Portuguese business units insofar as it is a family business and not listed on capital markets. Portraying an organization whose main object was the wholesale trade of children's furniture and which had a private capital. This entity developed its operations using a franchising chain. After a major expansion and following a substantial increase in the debts that the stores had to the Master Franchise, the company began to have serious liquidity problems. What is proposed with this case is that students, with advanced knowledge of Corporate Finance, are able to develop a valuation of a private company with familiar structure. The data provided are related to the company's internal processes, policies and operations, as well as financial statements.
info:eu-repo/semantics/publishedVersion