To see the other types of publications on this topic, follow the link: Cyber cash.

Dissertations / Theses on the topic 'Cyber cash'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cyber cash.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gazula, Mohan B. (Mohan Buvana). "Cyber warfare conflict analysis and case studies." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112518.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, 2017.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 96-100).<br>"The supreme art of war is to subdue the enemy without fighting." - Sun Tsu from "The Art of War" Believed to have lived between 770 and 476 B.C In the age of code wars, have our lives changed for the better? Are we any safer than the bloody wars or the cold wars from the past? Is there any more guarantee now in a cyber age than in a kinetic age inv
APA, Harvard, Vancouver, ISO, and other styles
2

Falangi, Francesca. "La Cyber Security e il caso dell'azienda Beta." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.

Find full text
Abstract:
L'elaborato si compone di due macro sezioni: la prima è un approfondimento sulla sicurezza informatica che comprende nozioni tecniche e storiche, un’analisi generale dei maggiori attacchi cyber avvenuti negli ultimi anni e i principali riferimenti normativi e Standard internazionali; la seconda è costituita dal progetto aziendale in cui ho avuto l’opportunità di partecipare. In particolare si illustra il piano di gestione del Cyber Risk creato dal team Kpmg, al fine di aiutare l’azienda analizzata a prevenire ed identificare i gap della sicurezza informatica, relativi a diversi contesti del
APA, Harvard, Vancouver, ISO, and other styles
3

Rizzon, Luca. "Cyber-Physical Systems: two case studies in design methodologies." Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/368113.

Full text
Abstract:
To analyze embedded systems, engineers use tools that can simulate the performance of software components executed on hardware architectures. When the embedded system functionality is strongly correlated to physical quantities, as in the case of Cyber-Physical System (CPS), we need to model physical processes to determine the overall behavior of the system. Unfortunately, embedded systems simulators are not generally suitable to evaluate physical processes, and in the same way physical model simulators hardly capture the functionality of computing systems. In this work, we present a methodolog
APA, Harvard, Vancouver, ISO, and other styles
4

Rizzon, Luca. "Cyber-Physical Systems: two case studies in design methodologies." Doctoral thesis, University of Trento, 2016. http://eprints-phd.biblio.unitn.it/1786/1/thesis.pdf.

Full text
Abstract:
To analyze embedded systems, engineers use tools that can simulate the performance of software components executed on hardware architectures. When the embedded system functionality is strongly correlated to physical quantities, as in the case of Cyber-Physical System (CPS), we need to model physical processes to determine the overall behavior of the system. Unfortunately, embedded systems simulators are not generally suitable to evaluate physical processes, and in the same way physical model simulators hardly capture the functionality of computing systems. In this work, we present a methodolog
APA, Harvard, Vancouver, ISO, and other styles
5

Holm, Linnéa. "Cyber attacks & coercion in the digital era. : A qualitative case analysis of the North Korean cyber attack on Sony Pictures." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323583.

Full text
Abstract:
The 2014 cyber attack on Sony Pictures Entertainment is an example of a disruptive event where a nation state utilized cyber tools in order to coerce a target into changing their course of action. Cyber attacks, something that might be perceived as a looming futuristic threat, became reality for Sony and its employees under the course of a few months in late 2014. The coercer’s attempt to change the behavior of the company eventually failed and North Korea who was attributed as coercer was imposed with new sanctions. This paper takes on the task of evaluating the Sony case against both the tra
APA, Harvard, Vancouver, ISO, and other styles
6

Beyer, Dawn Marie. "Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/90.

Full text
Abstract:
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve operational capability and cyber security. The CPM enables a corporation to (a) characterize cyber threats; (b) determine the level of preparedness necessary to ensure mission success; (c) facilitate strategic planning for cyber security (CS); and (d) est
APA, Harvard, Vancouver, ISO, and other styles
7

Bose, Sayak. "Cyber-physical modeling, analysis, and optimization - a shipboard smartgrid reconfiguration case study." Diss., Kansas State University, 2012. http://hdl.handle.net/2097/15104.

Full text
Abstract:
Doctor of Philosophy<br>Department of Electrical and Computer Engineering<br>Balasubramaniam Natarajan<br>Caterina Scoglio<br>Many physical and engineered systems (e.g., smart grid, transportation and biomedical systems) are increasingly being monitored and controlled over a communication network. These systems where sensing, communication, computation and real time control are closely integrated are referred to as cyber physical systems (CPS). Cyber physical systems present a plethora of challenges related to their design, analysis, optimization and control. In this dissertation, we present s
APA, Harvard, Vancouver, ISO, and other styles
8

Leal, de Melo Daltia Marcio. "Gerando acompanhamento rítmico automático para violão : estudo de caso do Cyber-João." Universidade Federal de Pernambuco, 2004. https://repositorio.ufpe.br/handle/123456789/2535.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:59:04Z (GMT). No. of bitstreams: 2 arquivo4827_1.pdf: 1875080 bytes, checksum: 09ee6a6168bda66551c83bd5e401ac9c (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2004<br>Apesar de seu potencial uso em programas de acompanhamento e composição musicais, a geração automática de ritmo não tem sido muito discutida na literatura de computação musical. Essa tarefa é bastante difícil de modelar devido ao pouco conhecimento formal sobre essa dimensão musical: os músicos explicam suas escolhas rítmicas em
APA, Harvard, Vancouver, ISO, and other styles
9

Todeschini, Davide <1990&gt. "HOW THE IOT CHANGES COMPANIES’ BUSINESS MODEL: THE PIRELLI CYBER FLEET CASE." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/9170.

Full text
Abstract:
This thesis investigates and studies how the Internet of Things (IoT) impacts companies adopting such technology and, specifically, how it changes their business models. The study examines the innovation that the IoT-related Pirelli Cyber Fleet brings in the Road Freight Transport industry to practically demonstrate how a business model changes with the adoption of the IoT. The topic was chosen to stress the paramount role of the IoT as an opportunity for companies to innovate and increase efficiency, as currently very few businesses understand the key role of the IoT.
APA, Harvard, Vancouver, ISO, and other styles
10

Chuang, Cheng-Cheng. "A case study of web-based learning project - \"cyber museum of Chinese Art\" /." The Ohio State University, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=osu1486400446372986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Qingpeng. "Analyzing Cyber-Enabled Social Movement Organizations: A Case Study with Crowd-Powered Search." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265358.

Full text
Abstract:
The advances in social media and social computing technologies have dramatically changed the way through which people interact, organize, and collaborate. The use of social media also makes the large-scale data revealing human behavior accessible to researchers and practitioners. The analysis and modeling of social networks formed from relatively stable online communities have been extensively studied. The research on the structural and dynamical patterns of large-scale crowds motivated by accomplishing common goals, named the cyber movement organizations (CMO) or cyber-enabled social movement
APA, Harvard, Vancouver, ISO, and other styles
12

Enocson, Julia, and Linnéa Söderholm. "Prevention of Cyber Security Incidents within the Public Sector : A qualitative case study of two public organizations and their way towards a sustainable cyber climate." Thesis, Linköpings universitet, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-149300.

Full text
Abstract:
Title: Prevention of Cyber Security Incidents within the Public Sector - A qualitative case study of two public organizations and their way towards a sustainable cyber climate Authors: Julia Enocson and Linnéa Söderholm Supervisor: Ida Lindgren Keywords: Cyber Security, Incident, Prevention, Public Sector, IT Security, Information Security Background: In today’s digital environment it has become crucial for organizations to protect themselves against cyber security attacks and incidents. Emerging technologies pose security risks and the number of cyber security incidents are increasing. Within
APA, Harvard, Vancouver, ISO, and other styles
13

Swart, Ignatius Petrus. "Pro-active visualization of cyber security on a National Level : a South African case study." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017940.

Full text
Abstract:
The need for increased national cyber security situational awareness is evident from the growing number of published national cyber security strategies. Governments are progressively seen as responsible for cyber security, but at the same time increasingly constrained by legal, privacy and resource considerations. Infrastructure and services that form part of the national cyber domain are often not under the control of government, necessitating the need for information sharing between governments and commercial partners. While sharing of security information is necessary, it typically requires
APA, Harvard, Vancouver, ISO, and other styles
14

Choudhari, Ashish. "Adaptive Scheduling in a Distributed Cyber-Physical System: A case study on Future Power Grids." OpenSIUC, 2015. https://opensiuc.lib.siu.edu/dissertations/1118.

Full text
Abstract:
Cyber-physical systems (CPS) are systems that are composed of physical and computational components. CPS components are typically interconnected through a communication network that allows components to interact and take automated actions that are beneficial for the overall CPS. Future Power-Grid is one of the major example of Cyber-physical systems. Traditionally, Power-Grids use a centralized approach to manage the energy produced at power sources or large power plants. Due to the advancement and availability of renewable energy sources such as wind farms and solar systems, there are more nu
APA, Harvard, Vancouver, ISO, and other styles
15

Shoemake, James J. "Former Students' and Their Learning Coaches' Perceptions of Their Cyber-Charter School Experiences| A Case Study." Thesis, Indiana University of Pennsylvania, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10787137.

Full text
Abstract:
<p> This qualitative case study examined the perceptions of former students who are economically disadvantaged from a poor, rural district in central Pennsylvania who left their traditional school to enroll in one of the three biggest cyber-charter schools in the state. Through extensive interviews with the students and their learning coaches, the study attempted to see the experience through the eyes of those who lived it. Particular emphasis was placed on supports students and their learning coaches received from their schools and teachers and in their homes. Also, the researcher attempted t
APA, Harvard, Vancouver, ISO, and other styles
16

Saldaña, Paola Renata. "The Scales and Shapes of Queer Women's Geographies: Mapping Private, Public and Cyber Spaces in Portland, OR." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2213.

Full text
Abstract:
Queer women's relationship to space has been under-theorized due to the difficulties in identifying particular spatial patterns that can describe their presence in urban settings. Most of the research that has focused on queer space has mentioned the difficulty of mapping queer women. The purpose of this research is to identify the ways in which the scarcity of queer women-specific space in Portland, Oregon, has affected the development of a women's community based on a queer identity, the role of intersecting identities such as race and gender identity in these communities and spaces, as well
APA, Harvard, Vancouver, ISO, and other styles
17

Boger, Christina. "The Wrong Amazon Is Burning : A qualitative case study of a protest movement against the Cyber Valley in Tübingen." Thesis, Malmö universitet, Malmö högskola, Institutionen för globala politiska studier (GPS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-18566.

Full text
Abstract:
This thesis investigates the resistance of actors of civil society against perceived militarism, by means of a qualitative case study. As the title suggests, the establishment of a “Cyber Valley” in Tübingen, has not only been met with approval by local citizens. This thesis examines a protest movement against the Cyber Valley – a cooperative research project for technological advancements in Artificial Intelligence and Machine Learning. The research reveals that this protest movement was not reliant on a firm organizational structure but was led by an open alliance of individuals, called the
APA, Harvard, Vancouver, ISO, and other styles
18

Chindipha, Stones Dalitso. "Gaining cyber security insight through an analysis of open source intelligence data: an East African case study." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/60618.

Full text
Abstract:
With each passing year the number of Internet users and connected devices grows, and this is particularly so in Africa, This growth brings with it an increase in the prevalence cyber-attacks. Looking at the current state of affairs, cybersecurity incidents are more likely to increase in African countries mainly due to the increased prevalence and affordability of broadband connectivity which is coupled with lack of online security awareness. The adoption of mobile banking has aggravated the situation making the continent more attractive to hackers who bank on the malpractices of users. Using O
APA, Harvard, Vancouver, ISO, and other styles
19

Rabbani, Talvia. "Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187664.

Full text
Abstract:
In this Master Thesis, several common applications used with MySQL and Linux server are modelled using the Enterprise Architecture Analysis Tool (EAAT) and the Cyber Security Modelling Language (CySeMoL), both developed by the Department of Industrial Information and Control System (ICS) at KTH. The objective of this study is to use the CySeMoL tool to evaluate the feasibility and correctness of the tool by simulating some particular type of attacks on a real life Linux server. A few common applications with MySQL on a Linux server and two Linux operating system services are modelled and expla
APA, Harvard, Vancouver, ISO, and other styles
20

MacEwan, Neil Finlay. "Responsibilisation, rules and rule-following concerning cyber security : findings from small business case studies in the UK." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/417156/.

Full text
Abstract:
This thesis is the result of an investigation into the challenges that lie within the governance of small business employees' behaviour towards cyber security. That investigation comprised three stages. The first was an exploration of the political context in which the matter of cyber security sits within the UK. This sought to determine whether cyber security is a policy area where the State continues to push responsibility away from itself and onto non-State actors, as a means of extending and enhancing the governance of situations and environments which have a tendency to produce criminal b
APA, Harvard, Vancouver, ISO, and other styles
21

Ryttare, Emma. "Change Management: A Key in Achieving Successful Cyber Security : A Multiple Case Study of Organizations in Sweden." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74788.

Full text
Abstract:
Purpose – The purpose of this study is to enhance the understanding of how organizations can improve their cyber security with change management. To fulfill the purpose, the following research questions were developed: RQ1: What are the key factors for effective change management in the context of cyber security? and RQ2: How can organizations manage these factors to improve cyber security? Method – A qualitative research method with an inductive approach was chosen. The empirical data collection was performed as a multiple case study with 16 semi-structured interviews with respondents from si
APA, Harvard, Vancouver, ISO, and other styles
22

Gripenstedt, Daniel, and Joakim Öberg. "A security analysis in a life science environment : a case study." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299357.

Full text
Abstract:
The cyber-threat against life-science is much larger today than just a couple of years back. Companies within the field have valuable information from example R&amp; Din pharmaceuticals, biotech, personal data of vulnerable patients or medical devices and that is something attackers are very much aware of. Lab equipment have generally been disconnected from the internet to protect their data even more but the benefits a company would gain in diagnostics and support could outweigh it. In this paper a fictional environment with lab instruments, control units and databases is set up based on a re
APA, Harvard, Vancouver, ISO, and other styles
23

Adelola, Tiwalade. "Developing a framework for e-commerce privacy and data protection in developing nations : a case study of Nigeria." Thesis, Loughborough University, 2017. https://dspace.lboro.ac.uk/2134/27440.

Full text
Abstract:
The emergence of e-commerce has brought about many benefits to a country s economy and individuals, but the openness of the Internet has given rise to misuse of personal data and Internet security issues. Therefore, various countries have developed and implemented cyber-security awareness measures to counter this. However, there is currently a definite lack in this regard in Nigeria, as there are currently, little government-led and sponsored Internet security awareness initiatives. In addition, a security illiterate person will not know of the need to search for these awareness programmes onl
APA, Harvard, Vancouver, ISO, and other styles
24

Denoix, Sebastian. "Psychodynamique du joueur vidéo excessif, étude de la relation à l'objet cyber-narcissique." Thesis, Strasbourg, 2016. http://www.theses.fr/2016STRAG001/document.

Full text
Abstract:
Dans ce travail de thèse l´auteur explore le lien entre virtualité et réalité pour montrer l´enjeu des identifications possibles, dans un jeu vidéo, pour un adolescent avec son avatar. Cette identification serait, d´après l´auteur, un facteur important dans le développement de certaines psychopathologies. L´auteur présente notamment le phénomène de la relation à l´objet cyber-narcissique, un mécanisme à l´œuvre dans la pratique excessive de jeu vidéo. Le travail est structuré en trois parties : une première partie théorique d´orientation psychanalytique, une deuxième partie empirique basée sur
APA, Harvard, Vancouver, ISO, and other styles
25

Souza, Cristiane Naiara Araújo de. "Processo de elaboração da notícia no Ciberjornalismo: estudo de caso do portal d24am." Universidade Federal do Amazonas, 2013. http://tede.ufam.edu.br/handle/tede/2762.

Full text
Abstract:
Made available in DSpace on 2015-04-11T13:57:05Z (GMT). No. of bitstreams: 1 cristiane.pdf: 3164331 bytes, checksum: 7898e5a4d4000f6f70a9d1bb95742f74 (MD5) Previous issue date: 2013-07-30<br>Cyberjournalism in the Amazonas is the central theme of this work, from which we conducted a case study of the news portal d24am, in order to observe the product, processes and challenges faced by Rede Diário de Comunicação (RDC) for cyber news elaborate. Defends the production process as a definer of cyber news, starting from the initial stage of the agenda, calculation, writing, composing, editing s
APA, Harvard, Vancouver, ISO, and other styles
26

Scherr, Daniel Leslie. "Cybersecurity Policy Development at the State Level: A Case Study of Middle Tennessee." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7426.

Full text
Abstract:
Cybersecurity is a growing threat not only to nations, critical infrastructure, and major entities, but also to smaller organizations and individuals. The growing number of successful attacks on all manner of U.S. targets highlights the need for effective and comprehensive policy from the local to federal level, though most research focuses on federal policy issues, not state issues. The purpose of this study was to examine the effectiveness of the decision-making process within the current cybersecurity policy environment in a southern state of the United States. Sabatier's advocacy coalition
APA, Harvard, Vancouver, ISO, and other styles
27

Cabanes, Quentin. "New hardware platform-based deep learning co-design methodology for CPS prototyping : Objects recognition in autonomous vehicle case-study." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG042.

Full text
Abstract:
Les Systèmes Cyber-Physiques (SCP) sont un sujet de recherche mature qui interagissent avec l'intelligence artificielle (IA) et les systèmes embarqués (SE). Un SCP peut être défini comme un SE en réseau qui peut analyser un environnement physique, via des capteurs, et prendre des décisions à partir de son état actuel pour l'affecter vers un résultat souhaité, via des actionneurs. Ces SCP nécessitent des algorithmes puissants associés à des architectures matérielles robustes. D'une part, l'Apprentissage en Profondeur (AP) est proposé comme algorithme principal. D'autre part, les méthodologies d
APA, Harvard, Vancouver, ISO, and other styles
28

Innocenti, Federica. "Analisi e riprogettazione del processo di ict risk management: un caso applicativo in Telecom Italia." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6708/.

Full text
Abstract:
Questo lavoro di tesi muove da tematiche relative alla sicurezza IT e risulta dagli otto mesi di lavoro all’interno della funzione Technical Security di Telecom Italia Information Technology. Il compito primario di questa unità di business è ridurre il rischio informatico dei sistemi di Telecom Italia per mezzo dell’attuazione del processo di ICT Risk Management, che coinvolge l’intera organizzazione ed è stato oggetto di una riprogettazione nel corso del 2012. Per estendere tale processo a tutti i sistemi informatici, nello specifico a quelli caratterizzati da non conformità, all’inizio del 2
APA, Harvard, Vancouver, ISO, and other styles
29

Toledo, Penélope Thaís da Cunha. "Contra-hegemonia e mídias sociais: um estudo de caso da campanha “Primavera Carioca”." Niterói, 2017. https://app.uff.br/riuff/handle/1/3831.

Full text
Abstract:
Submitted by Programa de Pós-Graduação em Mídia e Cotidiano (ppgmc@vm.uff.br) on 2017-05-02T18:42:04Z No. of bitstreams: 1 Dissertacao com contribuicoes banca (VALE ESTA).pdf: 1920113 bytes, checksum: 09c452b7101921e5d536ae3327b1de9a (MD5)<br>Approved for entry into archive by Josimara Dias Brumatti (bcgdigital@ndc.uff.br) on 2017-06-12T16:05:47Z (GMT) No. of bitstreams: 1 Dissertacao com contribuicoes banca (VALE ESTA).pdf: 1920113 bytes, checksum: 09c452b7101921e5d536ae3327b1de9a (MD5)<br>Made available in DSpace on 2017-06-12T16:05:47Z (GMT). No. of bitstreams: 1 Dissertacao com contrib
APA, Harvard, Vancouver, ISO, and other styles
30

Persson, Björn. "Contextualizing Industry 4.0 in the Pulp and Paper industry : A case study at Stora Enso." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-68523.

Full text
Abstract:
Leading industrial nations invest to try to increase advanced manufacturing and innovation to catch up in a free-market world. One common vision for these investments has been Industry 4.0. In short can this topic be described as the internet moving into the industry. The concept is relatively new and has become one of the most discussed topics during the last couple of years in many manufacturing conferences. However, the industry is so far lacking a clear definition of the concept, and much of the focus is on laboratory experiments rather than industrial applications. The research that has b
APA, Harvard, Vancouver, ISO, and other styles
31

Vitale, Francesco. "Run-time Anomaly Detection with Process Mining: Methodology and Railway System Compliance Case-Study." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105324.

Full text
Abstract:
Detecting anomalies in computer-based systems, including Cyber-Physical Systems (CPS), has attracted a large interest recently. Behavioral anomalies represent deviations from what is regarded as the nominal expected behavior of the system. Both Process science and Data science can yield satisfactory results in detecting behavioral anomalies. Within Process Mining, Conformance Checking addresses data retrieval and the connection of data to behavioral models with the aim to detect behavioral anomalies. Nowadays, computer-based systems are increasingly complex and require appropriate validation,
APA, Harvard, Vancouver, ISO, and other styles
32

Novaes, Bruna Alves. "A umbanda e seu novo espaço: o terreiro virtual – um estudo de caso." Universidade Federal de Juiz de Fora (UFJF), 2017. https://repositorio.ufjf.br/jspui/handle/ufjf/5704.

Full text
Abstract:
Submitted by Renata Lopes (renatasil82@gmail.com) on 2017-09-05T12:24:30Z No. of bitstreams: 1 brunaalvesnovaes.pdf: 5820284 bytes, checksum: b06e84755b8dca21ea1c200ed40ce304 (MD5)<br>Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2017-09-06T11:26:08Z (GMT) No. of bitstreams: 1 brunaalvesnovaes.pdf: 5820284 bytes, checksum: b06e84755b8dca21ea1c200ed40ce304 (MD5)<br>Made available in DSpace on 2017-09-06T11:26:08Z (GMT). No. of bitstreams: 1 brunaalvesnovaes.pdf: 5820284 bytes, checksum: b06e84755b8dca21ea1c200ed40ce304 (MD5) Previous issue date: 2017-03
APA, Harvard, Vancouver, ISO, and other styles
33

Andrade, Melissa Maria de Freitas. "Negritude em rede: discursos de identidade, conhecimento e militância - um estudo de caso da comunidade Negros do Orkut (2004-2011)." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/48/48134/tde-04102012-135144/.

Full text
Abstract:
Mediante o estudo das atividades relacionadas à comunidade NEGROS presente no Orkut desde 2004 e que, atualmente, reúne 36.000 membros -, este trabalho busca contribuir para identificar o papel das redes sociais no que diz respeito à construção de conhecimentos e ao desenvolvimento de iniciativas destinadas a combater o racismo no Brasil. As novas tecnologias ampliaram significativamente os veículos de comunicação e de informação existentes e permitiram que as redes sociais ganhassem grande expressão nos últimos anos, de maneira que não é possível ignorar o potencial formativo desses meios. P
APA, Harvard, Vancouver, ISO, and other styles
34

Boem, Francesca. "Distributed Methods for Estimation and Fault Diagnosis: the case of Large-scale Networked Systems." Doctoral thesis, Università degli studi di Trieste, 2013. http://hdl.handle.net/10077/8534.

Full text
Abstract:
2011/2012<br>L’obiettivo di questa tesi è il monitoraggio di sistemi complessi a larga-scala. L’importanza di questo argomento è dovuto alla rinnovata enfasi data alle problematiche riguardanti la sicurezza e l’affidabilità dei sistemi, diventate requisiti fondamentali nella progettazione. Infatti, la crescente complessità dei moderni sistemi, dove le relazioni fra i diversi componenti, con il mondo esterno e con il fattore umano sono sempre più importanti, implica una crescente attenzione ai rischi e ai costi dovuti ai guasti e lo sviluppo di approcci nuovi per il controllo e il monitoraggio
APA, Harvard, Vancouver, ISO, and other styles
35

Cárdenas, Torres Miriam del Carmen. "Prácticas cibertransnacionales de ciudadanía a través de Internet. El caso de San Martin de Bolaños, Jalisco, México." Doctoral thesis, Universitat Oberta de Catalunya, 2016. http://hdl.handle.net/10803/360335.

Full text
Abstract:
Esta tesis ha investigado un caso particular de comunicación colectiva y transnacional surgida a partir de una página web creada por un migrante residente en Estados Unidos, originario de San Martín de Bolaños, Jalisco, México. Es un estudio cualitativo, en profundidad y longitudinal. Su punto de arranque remonta al año 2003, cuando estas tecnologías aún eran muy incipientes en su pueblo, y termina en 2012. Las principales aportaciones de la tesis se dividen en dos grandes ejes temáticos. Por un lado, se demuestra la creación de una comunidad virtual transnacional que formó una sociedad parale
APA, Harvard, Vancouver, ISO, and other styles
36

Reyhan, Dilnur. "Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAG003.

Full text
Abstract:
Cette thèse s’intéresse aux rôles des TIC dans la constitution de la diaspora ouïghoure. L’approche sociologique choisie a permis d’aborder cette question sous l’angle politique et communicationnelle mais aussi historique et géographique et de prendre en compte tant les aspects idéologiques, sociaux qu’institutionnels et organisationnels. Les communautés ouïghoures à l’étranger commencent à être visibles et créent des organisations officielles représentant leur cause. La première partie met en évidence un réseau complexe constitué des communautés ouïghoures institutionalisées qui sont en inter
APA, Harvard, Vancouver, ISO, and other styles
37

BLOMKVIST, YLVA, and LOENBOM LEO ULLEMAR. "Improving supply chain visibility within logistics by implementing a Digital Twin : A case study at Scania Logistics." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279054.

Full text
Abstract:
As organisations adapt to the rigorous demands set by global markets, the supply chains that constitute their logistics networks become increasingly complex. This often has a detrimental effect on the supply chain visibility within the organisation, which may in turn have a negative impact on the core business of the organisation. This paper aims to determine how organisations can benefit in terms of improving their logistical supply chain visibility by implementing a Digital Twin — an all-encompassing virtual representation of the physical assets that constitute the logistics system. Furtherm
APA, Harvard, Vancouver, ISO, and other styles
38

Nessle, Åsbrink Marcus. "A case study of how Industry 4.0 will impact on a manual assembly process in an existing production system : Interpretation, enablers and benefits." Thesis, KTH, Industriell produktion, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-288514.

Full text
Abstract:
The term Industry 4.0, sometimes referred to as a buzzword, is today on everyone’s tongue and the benefits undeniably seem to be promising and have potential to revolutionize the manufacturing industry. But what does it really mean? From a high-level business perspective, the concept of Industry 4.0 most often demonstrates operational efficiency and promising business models but studies show that many companies either lack understanding for the concept and how it should be implemented or are dissatisfied with progress of already implemented solutions. Further, there is a perception that it is
APA, Harvard, Vancouver, ISO, and other styles
39

Kemmer, Tara A. "Hacking for peace: the case for cyber coercion." Thesis, 2021. https://hdl.handle.net/2144/43020.

Full text
Abstract:
Are cyber capabilities a useful method for coercive diplomacy? If so, what conditions favor successful cyber coercion to produce a desired victim response? This research explores how cyber coercion can be used as a tool of statecraft to change an adversary’s behavior and examines two cases over three temporal values. Examining the two cases of North Korea versus Sony and Russia versus Estonia illustrates practical lessons about the constraints and abilities of the employment of cyber coercion as well as how victim responses operate on a spectrum and can change over time. In examining Georg
APA, Harvard, Vancouver, ISO, and other styles
40

Chang, Joseph, and 張毓智. "On Line Behavior Of Using Cyber Coffee : A Case Study For The User Of Cyber Coffee in Kaohsiung." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/82829729373339369386.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊管理學系研究所<br>90<br>Abstract Most of people were introduced that cyber coffee shop equivalent to electrical game shop, and electrical game shop was regard as gambling place. Therefore , cyber coffee shop was misinterpreted to gambling place before. Meanwhile , people who merely know the addiction of cyber coffee shop , but do not try to know the reason why people have such addiction. The young people like to stay at cyber coffee shop where has not only hi-end facility but also good partnership can be found there. Especially , for some people who can escape from parent’s or othe
APA, Harvard, Vancouver, ISO, and other styles
41

Wu, Jhao-Cyuan, and 吳櫂銓. "Social Surveillance in Cyber Communities: the Case of Taiwan Facebook." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/8g6gh6.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>公共行政與政策學系<br>103<br>Abstract: The theme of this research is to study the impact of Internet communities on the empirical world. Taking Facebook as an example, this study applied surveillance society theories to analyze the relationship between Internet communities and the users. Research findings were based on the analyses of Internet communities and its cohesion effect in Facebook's communication. Regardless of the real or virtual interaction, the Facebook can further shape the public opinion. This study reached the following findings: First, the Internet community has the
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Chung-Hua, and 王俊華. "A Case Study of Business Strategies for Cyber Café''s future." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/5v4cbz.

Full text
Abstract:
碩士<br>國立中山大學<br>高階經營碩士班<br>95<br>Due to the fuzzy policy, the industry of cyber café in Taiwan has significantly presented to an atrophied situation since 2004. The industry rises and falls a slope which presents a dissimilarity result to that in the neighborhood nations, such as China, Japan or Korea. What is exactly the struggle in this industry in Taiwan? How to transform it? The thesis searches for the overall environment, the battle for Taiwan’s cyber café, and the transformation strategy for the operators in the cyber café. This research adopted case study method in order to submit an en
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Chien-Hung, and 陳建宏. "The Research of Applying Case-Base Reasoning to Cyber Crime Investigation." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/95671511270277464380.

Full text
Abstract:
碩士<br>華梵大學<br>資訊管理學系碩士班<br>97<br>The development of information technology on one hand improves human life; on the other hand it causes tremendous issues of information security events. The problems behind the occurrence of information security events are difficult to identify as they span a wide scope, as a result, the damage and loss are huge. Even if there is high-tech facility or system audit table to analyze each item; or in other cases, problems are solved by personal experience; a systematic knowledge management and sharing system is not in place to provide the rapid and efficient inqui
APA, Harvard, Vancouver, ISO, and other styles
44

Chi, Hung-Wei, and 祁宏偉. "The Research of Applying Case-Base Reasoning to Cyber Crime Investigation." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/26677884641728976648.

Full text
Abstract:
碩士<br>華梵大學<br>資訊管理學系碩士班<br>96<br>The development of information technologies have digitalized and enhanced people's experience in using computers. This contribution, however, also further develops cyber crime which has indeed created a new threat to the security of the society. Although the current internet forensics do have decent technology support, the process of eliminating these cyber threats still heavily rely on the user's knowledge and experience with them. In other words, it still lacks a user-friendly sharing interface to effectively provide users with solutions to cyber crime. This
APA, Harvard, Vancouver, ISO, and other styles
45

Yao, Yung-Chang, and 姚永錩. "An Exploration of Critical Success Factors of the implementation of Cyber University – A Case Study from "National Sun Yat-Sen Cyber University"." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/09326336428913859828.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊管理學系研究所<br>91<br>In the recent era, the popularity of Internet and multimedia has displayed technical progress, which has enabled E-learning environment to be even more perfect than before. E-learning has two-way interaction and the characteristic of unlimited time and space, which has become an important tool for initiating learning for life in the modern society. Among which Cyber University has become an example of E-learning applications. Because our national law has not allowed setting up a purely virtual university, therefore, the Cyber University of our research is po
APA, Harvard, Vancouver, ISO, and other styles
46

JEN, WANG SHU, and 王淑真. "A Case Study of KINGNET Female Leader in Taiwan Cyber Community Industry." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/b429s9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

CHOU, YI-CHEN, and 周依蓁. "Textual Analysis on Facebook: Cyber-Bullying on the Entertainer Selina's Divorce Case." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/rp2gx3.

Full text
Abstract:
碩士<br>輔仁大學<br>大眾傳播學研究所碩士班<br>105<br>The fast-moving of the information technology has changed people’s communication behavior, which transforming from face-to-face dialogue to online textual communication and social media began to play a leading role on interpersonal relationship. In Taiwan, Facebook is by no means one of the favorite social media, for which allows general public to share loved articles or express opinions via Facebook to extend virtual interpersonal relationship. However, lacking nonverbal cues and internet anonymity, cyber-bullying via Facebook has gradually increased. The p
APA, Harvard, Vancouver, ISO, and other styles
48

Tseng, Wei-wei, and 曾瑋瑋. "The Research on Event marketing – Chunghwa Telecom HiNet Cyber Game As A Case." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/5q86as.

Full text
Abstract:
碩士<br>東吳大學<br>企業管理學系<br>100<br>Event marketing is one of the famous tools of integrated marketing, and also a best reference resources for enterprises and marketing sales. The definition of Evening marketing is “Enterprises invest money in order to increase Brand awareness, Enterprises image, Selling Products and Integrate enterprise resources. Enterprises execute proposal and topic activities to attract consumers attention and media report, and thus achieve enterprise marketing purposes.” The purpose of this study analyzed how the Chunghwa Telecom uses event marketing 「HiNet Cyber Game」succes
APA, Harvard, Vancouver, ISO, and other styles
49

Jian, Miao-Ju, and 簡妙如. "Cyber-bullying – A Case Study of Junior High School Students in Kaohsiung, Taiwan." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/23753747688683768069.

Full text
Abstract:
碩士<br>國立高雄師範大學<br>資訊教育研究所<br>100<br>Cyber-bullying – A Case Study of Junior High School Students in Kaohsiung, Taiwan ABSTRACT With the ubiquity of the lightweight notebook and the extensive internet service provided by the 3.5G domestic telecommunication industry, the concept of accessing and surfing the internet anytime and anywhere has become practicable. In the meantime, the functions of mobile phones of taking pictures and recording sound and images have also become indispensable. With this network and communication revolution, many parents and teachers are concerned about whether teenage
APA, Harvard, Vancouver, ISO, and other styles
50

Yang, Hui-Mei, and 楊蕙鎂. "A Study of Acceptance for Information City Policy─Case Study of Taipei Cyber City." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/43563295631283923602.

Full text
Abstract:
碩士<br>立德管理學院<br>地區發展管理研究所<br>95<br>The rise of technology development has led to globalization of digital informatics. From ever growing informatics town to computer network, we observe changes in people’s living standard and structure. In seeing how hi-tech could benefit our lives, the Taipei city government plans to turn Taipei into an “Cyber City “. By doing so, the government hopes to enhance social benefits and welfare, to become an international competitor without time and continental limitations. However, to be successful, we need to know whether the present situation could satisfy the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!