To see the other types of publications on this topic, follow the link: Information policy.

Dissertations / Theses on the topic 'Information policy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Polyrakis, Andreas. "The Meta-Policy information base." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ58776.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blackburn, Keith. "Information, expectations and macroeconomic policy." Thesis, Queen Mary, University of London, 1986. http://qmro.qmul.ac.uk/xmlui/handle/123456789/1455.

Full text
Abstract:
The thesis is motivated by some important recent developments in macroeconomic theory and the theory of macroeconomic policy. A common theme emphasized throughout is the integration of rational expectations into macroeconomic policy evaluation and the sophism of conducting evaluations predicated on alternative expectations hypotheses. The application of rational expectations to optimal control theory inspires a game-theoretic paragigm for the derivation of optimal economic policies. This transform fundamentally the way in which economists should address the control problem. The recent proliferation of research in the area is subject to the first systematic investigation. The necessity for assimilating model uncertainty into the problem of policy evaluation is emphasized. This is made operational with respect to a particulaxly topical issue concerning the optimal choice of monetary instrument. A substantial part of the thesis is devoted to a rigorous exploration of the information structure conditioning expectations. Particular emphasis is on partial ignorance. An intelligent system can exploit statistical filtering techniques to extract the information content of certain economic variables. The thesis illustrates vividly the potentially critical dependence of the laws of motion of the system on the information structure. it calls for a detailed explication of that structure a3 a pre-requisite for any analysis and highlights properties of certain earlier treatments which are symptomatic of their neglect of this. Analytical work is combined with computer simulations of a larger econometric model. Higher order dynamics are the realised 3 consequences of asset accumulati6n and the government budget constraint. The issue of bond-financed deficit instability is subject to extensive testing and the implications of divergent e: cpectations mechanisms elicited.
APA, Harvard, Vancouver, ISO, and other styles
3

Hahn, Volker. "Information asymmetries, transparency, and monetary policy." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=964897687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Horsch, Michael C. "Flexible policy construction by information refinement." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ34552.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheney, David W. "Information technology, science, and public policy." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2959.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.
Title from PDF t.p. (viewed Jan. 17, 2008). Thesis director: Don E. Kash Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Public Policy. Vita: p. 330. Includes bibliographical references (p. 289-329). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Larcinese, Valentino. "Political information, elections and public policy." Thesis, London School of Economics and Political Science (University of London), 2003. http://etheses.lse.ac.uk/431/.

Full text
Abstract:
This thesis contributes to the study of the role of information in elections and public policy formation. Its main focus is on information acquisition and voting behaviour. Chapter 1 discusses the motivation of this research and presents a survey of related literature. Chapter 2 focuses on electoral turnout, Chapter 3 on public policy, and Chapter 4 on mass media. Chapter 2 studies the impact of information on electoral turnout. Since incentives to be informed are correlated with other incentives to participate in public life, a model of information acquisition and turnout is introduced to isolate potential instrumental variables and try to establish a causal relation. Results are tested on the 1997 General Election in Britain. It is shown that information, as well as ideology, matters for turnout. It also contributes to explain the systematic correlation of turnout with variables like education and income. Voters' knowledge of candidates and of other political issues is also substantially influenced by mass media. Chapter 3 presents a model that links the distribution of political knowledge with redistributive policies. It argues that voters can have private incentives to be informed about politics and that such incentives are correlated with income. Therefore redistribution will be systematically lower than what the median voter theorem predicts. Moreover, more inequality does not necessarily lead to an increase in redistribution and constitutional restrictions might have unintended consequences. In Chapter 4 it is argued that instrumentally motivated voters should increase their demand for information when elections are close. In supplying news, mass media should take into account information demand, as well as the value of customers to advertisers and the cost of reaching marginal readers. Information supply should therefore be larger in electoral constituencies where the contest is expected to be closer, the population is on average more valuable for advertisers, and the population density is higher. These conclusions are then tested with good results on data from the 1997 General Election in Britain.
APA, Harvard, Vancouver, ISO, and other styles
7

Beasley, Claire. "Environmental information : issues of access, policy and information resources management." Thesis, City University London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Han, Chun Kwong. "Information technology policies and government information systems : a multiple level perspective." Thesis, University of Cambridge, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.358788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baeriswyl, Romain. "Essays in Monetary Policy under Heterogeneous Information." Diss., lmu, 2007. http://nbn-resolving.de/urn:nbn:de:bvb:19-81758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cisneros-Montemayor, Andrés M. "The value of information for fisheries policy." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51120.

Full text
Abstract:
For policy-makers and managers, knowing what information to collect is just as important as collecting information. I apply economics-based methods, including the value of information approach, to natural resource management in order to identify new optimal policies and priority areas for investment. Explicitly incorporating uncertainty is key to these methods, both in formally acknowledging alternative hypothesis and strategies, and for selecting policies that are most robust to uncertainty about natural and social systems. Given their differences in objectives and current challenges, I develop and apply methods to both developing and developed marine fisheries. In Mexico, for example, I estimate that total fish catch over the last fifty years could be almost twice that reported in official data. This ‘informal’ catch reduces economic benefits from fisheries output, including informal processing and sales that add less value to production. Based on current monitoring investment and informal catch rates, I estimate that this represents an almost US$1 billion annual loss in foregone economic impacts, that could be partially gained by an annual investment of US$100 million to increase formalization of current catch. The benefits of assessing information value are not limited to developing fisheries or “data-poor” contexts. Linking ecosystem models with economic data and frameworks, I estimate that the supporting service value of forage fishes as food for other fished species vastly outweighs their yearly landed value (in the Southern Baja California Peninsula, US$180 million compared to US$62 million). For the California Current, which includes Mexico, the US and Canada, I couple game-theoretic and ecosystem models and find that moving beyond single-species valuation supports arguments for sustainable fishing of forage fishes, and creates incentives for cooperative fishing strategies across a range of climate scenarios. Aside from developing new and broadly applicable methods and frameworks, the overarching finding of this work is that it is always beneficial to formally and openly acknowledge uncertainty and alternative management strategies in natural resource assessments. This allows us to provide robust advice to policy-makers given, and not stymied by, uncertainty.
Science, Faculty of
Resources, Environment and Sustainability (IRES), Institute for
Graduate
APA, Harvard, Vancouver, ISO, and other styles
11

Bulgurcu, Burcu. "The antecedents of information security policy compliance." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/1121.

Full text
Abstract:
Information security is one of the major challenges for organizations that critically depend on information systems to conduct their businesses. Ensuring safety of information and technology resources has become the top priority for many organizations since the consequences of failure can be devastating. Many organizations recognize that their employees, who are often considered as the weakest link in information security, can be a great resource as well to fight against information security-related risks. The key, however, is to ensure that employees comply with information security related rules and regulations of the organization. Therefore, understanding of compliance behavior of an employee is crucial for organizations to effectively leverage their human capital to strengthen their information security. This research aims at identifying antecedences of an employee’s compliance with the information security policy (ISP) of his/her organization. Specifically, we address how employees without any malicious intent choose to comply with requirements of the ISP with regards to protecting the information and technology resources of their organizations. Drawing on the Theory of Planned Behavior, we show an employee’s attitude towards compliance results in his/her intention to comply with the ISP. Of those, Benefit of Compliance and Cost of Non-Compliance are shown to be shaped by positive and negative reinforcing factors; such as, Intrinsic Benefit, Safety of Resources, Rewards and Intrinsic Cost, Vulnerability of Resources, and Sanctions, respectively. We also investigate the role of information security awareness on an employee’s ISP compliance behavior. As expected, we show that information security awareness positively influences attitude towards compliance. We also show that information security awareness positively influences the perception of reinforcing factors and negatively increases perception of the Cost of Compliance. As organizations strive to get their employees to follow their information security rules and regulations, our study sheds light on the role of an employee’s information security awareness and his/her beliefs about the rationality of compliance and non-compliance with the ISP.
APA, Harvard, Vancouver, ISO, and other styles
12

Stephenson, Richard Lawrence. "Information systems and policy processes in planning." Thesis, Oxford Brookes University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.325434.

Full text
Abstract:
This thesis examines the use of information, particularly that of a technical kind, in decisions and policies in land use planning, and reports on empirical analysis on the making of development plan policies by local authority planning departments. The research examines the role of technical information in planning processes and starts by identifying different ideas put forward about the potential contribution of computerised systems to the provision of such information. It is concluded that the literature on decision processes in planning has a number of weaknesses in relation to how the use of information is understood. Research on the use of information in planning has found a complex picture which is at odds with many normative theories of planning. However, an empirically based theory of the use of technical information in planning, including that from computerised sources, is poorly developed. The thesis argues that the idea of a set of policy processes - structuring access, mode of debate and decision criteria in planning decisions - is a powerful analytical tool in understanding planning practice. Using this as a base, a conceptual framework relating these processes to information use is developed from the available literature and the findings from exploratory interviews. Through a set of six case studies oflocal authority planning departments the explanatory power of this framework is assessed. On the basis of this a refined framework is put forward and a final assessment made of it using a detailed analysis of the evolution and adoption of the policies in two development plans, the Wakefield Unitary Development Plan and the Lancashire Structure Plan. The research concludes that the use of technical information is heavily influenced by the regulatory nature of the British planning system, which places a focus on the justification of policies and gives greater importance to technical analysis in some situations than others. In development plan making the semi-judicial arena of the inquiry or examination in public is central. Information from computerised sources can playa distinctive role in planning but this is dependent on how it is incorporated into the policy processes through which decisions are made. Technical information and computerised analysis can play an important role in legitimating planning decision and shaping the evolution ofpolicies, but this can only be understood within a wider context of social and political processes.
APA, Harvard, Vancouver, ISO, and other styles
13

Marie, Claire. "Arctic region policy information sharing : model options." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5190.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
Continued climate change and minimum ice conditions over the past several years is allowing for increased maritime activity in the Arctic, which may lead to potential homeland security/defense missions. In January 2009, the U.S. government acknowledged the probability of these missions with an updated Arctic Region Policy, which highlighted the need to develop capabilities to protect U.S. air, land and sea borders, military/civilian vessels and aircraft, maritime commerce, critical infrastructure and key resources. Successfully supporting these missions will depend on a coherent understanding of all the activities taking place in the Arctic region. Achieving this level of "situational awareness" will only be possible when all equity partners and stakeholders are sharing relevant information. This thesis examined three popular information-sharing models, Alaska Information Analysis Center, Joint Interagency Coordination Group, and the Alaska Partnership for Infrastructure Protection to determine which would work best for a broad array of Arctic partners and stakeholders. The thesis' research and analysis shows that none of the models are sufficient or stand-alone; rather a megacommunity is necessary, consisting of all equity partners interfacing with the stakeholders, managed by leaders that will motivate the community to achieve a high degree of awareness for all Arctic activity.
APA, Harvard, Vancouver, ISO, and other styles
14

Van, Alstyne Marshall W. (Marshall Ware). "Managing information : networks, value, policy, and principles." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Jean Ph D. Massachusetts Institute of Technology. "Preventing information leaks with policy-agnostic programming." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101468.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged student-submitted from PDF version of thesis.
Includes bibliographical references (pages 103-115).
As a solution to the problem of information leaks, I propose a policy-agnostic programming paradigm that enforces security and privacy policies by construction. I present the implementation of this paradigm in a new language, Jeeves, that automatically enforces information flow policies describing how sensitive values may flow through computations. In Jeeves, the programmer specifies expressive information flow policies separately from other functionality and relies on the language runtime to customize program behavior based on the policies. Jeeves allows programmers to implement information flow policies once instead of as repeated checks and filters across the program. To provide strong guarantees about Jeeves programs, I present a formalization of the dynamic semantics of Jeeves, define non-interference and policy compliance properties, and provide proofs that Jeeves enforces these properties. To demonstrate the practical feasibility of policy-agnostic programming, I present Jacqueline, a web framework built on Jeeves that enforces policies in database-backed web applications. I provide a formalization of Jacqueline as an extension of Jeeves to include relational operators and proofs that this preserves the policy compliance guarantees. Jacqueline enforces information flow policies end-to-end and runs using an unmodified Python interpreter and SQL database. I show, through several case studies, that Jacqueline reduces the amount of policy code required while incurring limited overheads
by Jean Yang.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
16

Sarrab, Mohamed Khalefa. "Policy based runtime verification of information flow." Thesis, De Montfort University, 2011. http://hdl.handle.net/2086/4929.

Full text
Abstract:
Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this thesis belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. The methodology of the proposed approach is made up of eight work packages. One addresses the research background and the research project requirements. Six are scientific research work packages. The last work package concentrates on the thesis writing up. There is currently no monitoring mechanism for controlling information flow during runtime that support behaviour configurability and User interaction. Configurability is an important requirement because what is considered to be secure today can be insecure tomorrow. The interaction with users is very important in flexible and reliable security monitoring mechanism because different users may have different security requirements. The interaction with monitoring mechanism enables the user to change program behaviours or modify the way that information flows while the program is executing. One of the motivations for this research is the information flow policy in the hand of the end user. The main objective of this research is to develop a usable security mechanism for controlling information flow within a software application during runtime. Usable security refers to enabling users to manage their systems security without defining elaborate security rules before starting the application. Our aim is to provide usable security that enables users to manage their systems' security without defining elaborate security rules before starting the application. Security will be achieved by an interactive process in which our framework will query the user for security requirements for specific pieces of information that are made available to the software and then continue to enforce these requirements on the application using a novel runtime verification technique for tracing information flow. The main achievement of this research is a usable security mechanism for controlling information flow within a software application during runtime. Security will be achieved by an interactive process to enforce user requirements on the application using runtime verification technique for tracing information flow. The contributions are as following. Runtime Monitoring: The proposed runtime monitoring mechanism ensures that the program execution is contains only legal flows that are defined in the information flow policy or approved by the user. Runtime Management: The behaviour of a program that about to leak confidential information will be altered by the monitor according to the user decision. User interaction control: The achieved user interaction with the monitoring mechanism during runtime enable users to change the program behaviours while the program is executing.
APA, Harvard, Vancouver, ISO, and other styles
17

Baeriswyl, Romain. "Essays in monetary policy under heterogenous information." kostenfrei, 2007. http://edoc.ub.uni-muenchen.de/8175/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Mwai, Paul Macharia. "Information security policy an investigation into rewriting the policy for Loreto College Msongari /." [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Pieters, Minnaar. "Open source software and government policy in South Africa." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/2480.

Full text
Abstract:
Thesis (MA (Information Science. Socio-Informatics))--Stellenbosch University, 2009.
Open-source software is not something new; however, it has come into the spotlight in the last few years, mostly due to hyped initial cost savings of the Linux operating system. Consumers and businesses were made aware of shortcomings in the traditional proprietary software model and this has in turn created a surge in popularity of open-source. The migration to open-source requires efficient research of options available and thorough analysis of the migratory process through all levels of the organization. Initial independent cost analysis has not been conclusive, with unreliable, skewed results and below average performance due to poor implementation. The focus of this study is whether open-source software is a suitable alternative to current proprietary software packages utilized by the government sector.
APA, Harvard, Vancouver, ISO, and other styles
20

Tantram, Dominic A. S. "Mapping the countryside : information for policy and management." Thesis, University of Northampton, 2001. http://nectar.northampton.ac.uk/3001/.

Full text
Abstract:
There is an increasing demand for information for the rational assessment and reporting of the state the environment, to detect change and to assess the effectiveness of policy or management measures. The research investigated the use of information by conservation organisations through case studies in the Statutory Nature Conservation Agencies and the North York Moors National Park. The results highlighted a number of key problems in the organisational use of information and in the content and utility of the data available. These included the lack of an organisational culture of information use, imperfect knowledge and utilisation of available data, the need to meet changing information demands and the requirement to produce comparable local, regional and national habitat stock estimates. Many of the data deficiencies highlighted would appear to be met by the Countryside Survey (CS) initiative. Despite offering potentially suitable data, with a combination of an environmental stratification (the ITE land class system), field survey and remotely sensed data, this source was little used. Thus, the study sought to assess the scope for comparing CS data with other habitat estimates and for improving the accuracy of these data through the use of Geographical Information Systems (GIS). Three main techniques were employed, modified areal weighting, modified areal weighting with control zones and intelligent weighting’ a hybrid approach in which Land Cover Map of Great Britain (LCMGB) data were employed to redistribute Countryside Survey 1990 (CS9O) totals within ITE land classes. The research found that sub-land class estimates from CS9O data could be improved in some circumstances. In most cases, LCMGB provided better estimates of habitat location and quantity than CS9O. In a few cases, the intelligent weighting method improved the interpolation of CS9O estimates. It is suggested that regional habitat estimates may be improved further through greater within-land class differentiation, an increase in within-land class sampling intensity or stratification and the further development of the LCMGB. The problems faced in integrating, analysing and using available geographic data are considered and conclusions presented
APA, Harvard, Vancouver, ISO, and other styles
21

Montado, Estela. "Trade policy : incomplete information, antidumping and political economy." Thesis, London School of Economics and Political Science (University of London), 2006. http://etheses.lse.ac.uk/1934/.

Full text
Abstract:
This thesis focuses on different aspects of trade theory and policy. One of the main objections to the theory of strategic trade policy is that it presumes too much knowledge on the part of governments. The design of an optimal tariff in the presence of incomplete information is analysed in Chapter 2. In a Cournot duopoly model of international competition between a domestic and a foreign firm, it is shown that when the domestic firm and government have incomplete information about the marginal cost of a foreign firm, trade policy can be effectively designed. It is shown that when the foreign firm's output signals costs, there is a unique separating sequential equilibrium. There is a distortion in output due to signalling which is costly in terms of welfare. So, the optimal import tariff when signalling is lower than when the firm does not signal its costs through output. Expected foreign production is lower when signalling, and domestic firm's output and profits are higher. Incomplete information lessens the rent extracting and profit shifting argument for a tariff. An area of conflicting views in trade policy is that of antidumping (AD). In Chapter 3, a descriptive analysis of the use of AD worldwide and in Europe is presented, including an explanation of AD laws and of the implementation of these laws in Europe. An analysis of European antidumping decisions made by the European Commission between 1985 and 2003 is presented in Chapter 4. Using data on legal AD investigations, industry, imports and political influences, the Commission decision-making on dumping and injury is modelled weighing the relative impact of economic and political factors in predicting policy outcomes. Two hypotheses are formulated. The empirical findings confirm that Europe is operating a double track antidumping mechanism. Mainly economic variables are associated with a positive decision on dumping whereas only political variables are positively associated with affirmative decisions on injury. Besides, antidumping laws allow countries to settle antidumping actions either by levying duties or by demanding price undertakings from the foreign exporting (or importing) firms. A price undertaking is an agreement by the foreign exporter to eliminate injury by increasing its price or ceasing exports. However, countries have considerable discretion in allowing price undertakings. An empirical analysis of the acceptance of price undertaking decisions in Europe is presented in Chapter 5. A number of hypotheses are formulated. The econometric analysis indicates that the share of European exports to the country of the defendant; indicators of political pressure as well as the country of origin of certain defendants (non-market economies) are positively associated with the decision to refuse price undertakings. The research hypotheses in chapters 4 and 5 are examined using a legal database containing information about 805 antidumping investigations initiated in Europe published in the Official Journal of the European Communities and associated trade and industrial statistics. An overview of the thesis with a summary of conclusions and contributions is presented in Chapter 1. A summary of the main findings of the thesis is presented in Chapter 6.
APA, Harvard, Vancouver, ISO, and other styles
22

Irani, Arya John. "Utilizing negative policy information to accelerate reinforcement learning." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53481.

Full text
Abstract:
A pilot study by Subramanian et al. on Markov decision problem task decomposition by humans revealed that participants break down tasks into both short-term subgoals with a defined end-condition (such as "go to food") and long-term considerations and invariants with no end-condition (such as "avoid predators"). In the context of Markov decision problems, behaviors having clear start and end conditions are well-modeled by an abstraction known as options, but no abstraction exists in the literature for continuous constraints imposed on the agent's behavior. We propose two representations to fill this gap: the state constraint (a set or predicate identifying states that the agent should avoid) and the state-action constraint (identifying state-action pairs that should not be taken). State-action constraints can be directly utilized by an agent, which must choose an action in each state, while state constraints require an approximation of the MDP’s state transition function to be used; however, it is important to support both representations, as certain constraints may be more easily expressed in terms of one as compared to the other, and users may conceive of rules in either form. Using domains inspired by classic video games, this dissertation demonstrates the thesis that explicitly modeling this negative policy information improves reinforcement learning performance by decreasing the amount of training needed to achieve a given level of performance. In particular, we will show that even the use of negative policy information captured from individuals with no background in artificial intelligence yields improved performance. We also demonstrate that the use of options and constraints together form a powerful combination: an option and constraint can be taken together to construct a constrained option, which terminates in any situation where the original option would violate a constraint. In this way, a naive option defined to perform well in a best-case scenario may still accelerate learning in domains where the best-case scenario is not guaranteed.
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Albert Zhao. "Essays on Platforms: Asymmetric Information, Search, and Policy." Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10937.

Full text
Abstract:
The three essays of this thesis cover two sets of topics: search in auction platforms in the first two papers, and political campaigning in the last. In platform settings, search cost reductions are often regarded as beneficial because they improve match quality. But is this in fact true? And if it is true in an aggregate sense, what are the consequences to individual platform participants? Do individual buyers and sellers win or lose? The first paper develops a novel model of search in platforms and applies it to auction platforms to test the popular hypothesis that lower search costs are always beneficial to sellers. Under certain assumptions, we find that while lower search costs is welfare improving, its distributional consequences are less predictable. In general, lower search costs intesify buyer-side competition. On the one hand, this tends to improve seller revenues due to better matches; on the other hand, this may also thin out markets for certain sellers, since lower search costs make it easier for buyers to search out of certain markets. Generally, some sellers gain and some lose; most surprisingly, however, we find that overall seller revenue can decrease with lower search costs. Our second paper extends the model to endogenize buyer participation - so some buyers may leave the platform completely - and considers optimal platform search policy in such settings. Under stricter assumptions, we find that a platform that taxes the seller side generally benefits from lower search costs; a platform that charges buyers, however, may maximize search costs, since the gains from easier search are unevenly distributed among buyers, and may be inefficiently extracted with a fee. The final essay provides a novel model of political campaigning as argumentation, which brings together two different strands of the campaign spending literature: spending has direct effects on electoral outcomes, but also provide a "signal" of candidate quality. The model parsimoniously resolves many pre-existing campaign spending "paradoxes" while delivering new results on the effects and desirability of spending caps.
Economics
APA, Harvard, Vancouver, ISO, and other styles
24

Serema, Batlang Comma. "Information infrastructure for public policy making in Botswana." Thesis, University College London (University of London), 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.405193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Piracha, Matloob Elahi. "Essays on strategic trade policy under asymmetric information." Thesis, University of Exeter, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.414054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hubert, Paul. "Monetary policy, imperfect information and the expectations channel." Paris, Institut d'études politiques, 2010. http://spire.sciences-po.fr/hdl:/2441/f4rshpf3v1umfa09lat09b1bg.

Full text
Abstract:
Cette thèse explore les implications de l’hypothèse d’information imparfaite pour la politique monétaire. Nous considérons la banque centrale comme le point d’ancrage des anticipations privées non plus grâce à son engagement envers une faible inflation, mais grâce à sa compétence : sa capacité à correctement prévoir les futurs états de l’économie. L’objectif de cette analyse est de montrer que la compétence permet d’influencer les anticipations privées et que cette influence permet de relâcher les contraintes pesant sur la politique monétaire pour atteindre ses objectifs macroéconomiques. Le premier chapitre procède à une revue empirique de la littérature traitant de la performance de prévision de la Réserve Fédérale. Le deuxième chapitre se concentre sur des banques centrales qui publient leurs prévisions en temps réel, afin de mettre en valeur le canal des anticipations de la politique monétaire et la question de la crédibilité via le lien entre performance de prévision et influence des banques centrales. Nous proposons de définir la crédibilité endogène comme la capacité d’influence provenant de meilleures prévisions, en opposition avec la crédibilité exogène pour laquelle les banques centrales n’auraient pas besoin de meilleure prévision pour être influentes. Le troisième chapitre examine les implications théoriques de l’influence endogène pour les décisions de politique monétaire, à travers un modèle Néo-Keynésien avec anticipations non-rationnelles. Enfin, le quatrième chapitre évalue les préférences monétaires de trois banques centrales qui ont adopté le ciblage d’inflation et communiquent leur prévisions en temps réel
This thesis explores the implications of imperfect information for monetary policymaking. It considers the central bank as the coordinator of expectations because of its competence rather than its commitment to a low and stable inflation. By competence, we intend to say the ability to correctly forecast the future state of the economy. The central point has been to show that competence together with communication enables influence, and that central bank influence of private expectations enables to loose monetary policy constraints to reach its macroeconomic objectives. Chapter 1 proceeds to an empirical review of the vast literature dealing with the relative forecasting performance of the Federal Reserve, a central bank which publishes its forecasts with a 5-year lag. Chapter 2 focuses on central banks which publish their forecasts in real-time what allows for emphasizing the expectations channel of monetary policy and the question of credibility through the link between relative forecasting performance and influence of central banks. We propose to define endogenous credibility as the capacity to influence arising from a superior forecasting performance, in opposition to exogenous credibility for which central banks need not a forecasting advantage to be influential. Chapter 3 investigates the theoretical implications of endogenous influence for monetary policymaking through a New-Keynesian economy with non rational expectations. Last, Chapter 4 assesses the monetary policy preferences of three central banks which have adopted the inflation targeting framework and therefore communicate their forecasts in real-time
APA, Harvard, Vancouver, ISO, and other styles
27

Gausi, Hambani Adamson. "Effects of the brittle national information policy framework on information services in Malawi." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1005989.

Full text
Abstract:
The aim of the study was to explore the effects of the absence of an overarching national information policy on information services in Malawi. The objectives of the study were to: find out the effects of the absence of an overarching national information policy on information access in Malawi; establish factors impeding the development of an overarching national information policy in Malawi; find out the extent to which the absence of an overarching policy has affected capacity building in information services in Malawi; and identify the legal and regulatory framework implications of the absence of such a policy in Malawi. The study adopted an exploratory research design. Data were collected using document analysis, observations and in-depth interviews. Eighty-two face-to-face interviews were conducted with policy makers in government, Members of Parliamentary committees on legal and media issues, information scientists, information service providers, academicians, legal experts and information users. Purposive sampling was used to select participants. An interview guide comprising closed and open ended questions was used to interview respondents. Data were analysed using quantitative and qualitative methods. The findings of this study may be used by Government in developing relevant national information policies that would enhance free access and utilisation of information. Furthermore the study is significant in identifying factors that may impede the development of a national information policy. The study revealed that Malawi has a brittle national information policy framework for the provision of information services. Malawi doesn’t have an overarching policy framework for the sector and as a result, there is no policy guidance to drive the development of sectoral policies and supporting legislation. Policy development in Malawi is more reactive to issues than systematic and very slow. Consequently, access to and utilization of information is low; capacity building is low in terms of competencies and infrastructure and; the legal and regulatory framework for information services is weak. The study also revealed that factors impeding the development of an overarching national information policy include: motivation for the development of sectoral information policies; lack of an institutional framework to guide the development of policy; lack of finances and technical capacity; lack of sustained political will; level of economic development; existence of overarching government development plans; international trends; and the diverse nature of the information sector. The general recommendation emanating from the findings of the study is that Malawi needs an overarching national information policy which would articulate and address issues regarding access to information, capacity building in terms of skills and infrastructure, and the legal and regulatory framework. Information is a cross-cutting issue requiring an all-encompassing policy. However, specific recommendations from the findings of this study are that government should expedite the development of policies and enactment of relevant pieces of legislation which are not yet in place to enhance free access and utilisation of information and ICTs; government should speed up the introduction of information literacy in the school curriculum starting from primary school level to university; government should develop a library policy to promote the development of school libraries in both primary and secondary schools, and public libraries in all towns, district assemblies and rural growth centres which should be well resourced including Internet facilities; and government should constantly review and harmonise policies and legislation in the information sector so that they are in line with current trends.
APA, Harvard, Vancouver, ISO, and other styles
28

Smith, Kane. "A Multi-Objective Framework for Information Security Public Policy: The Case of Health Informatics." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5320.

Full text
Abstract:
Detailed holistic patient data is critical for healthcare organizations to better serve their patient populations. This information allows healthcare organizations to create a detailed and holistic record of a patient’s health. However, this large aggregation of personally identifiable patient data raises serious privacy and security concerns amongst patients. For this reason, patient concerns around the privacy and security of information retained by healthcare organizations must be addressed through the development of effective public policy. This research, therefore argues that any decision making process aimed at developing public policy dealing with patient data privacy and security concerns should not only address regulatory concerns, but also patient-centric values. To accomplish this task, multi-objective decision analytic techniques, with Nissenbaum’s (2004) contextual integrity as a normative framework are used. This is done to elicit patient-centric preferences to assist organizations and governmental institutions alike in dealing with their privacy and security concerns around patient data stored by Healthcare Systems.
APA, Harvard, Vancouver, ISO, and other styles
29

Chikuni, Patricia Rudo. "The relationship between policy-making processes and e-learning policy discourses in higher education institutions in South Africa." Doctoral thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/25190.

Full text
Abstract:
This study offered an explanatory critique of the implications of policy-making processes on policy discourses. Its objective was to understand how policy-making processes affect institutional e-learning policy outcomes in Higher Education Institutions (HEIs) in South Africa. The study analysed the conceptualisation and design of institutional e-learning policies in three universities.The case-by-case analysis for this study used a qualitative post-structuralist research methodology associated with case study research. This method provided deep insights and intimate knowledge of the individual cases which formed an important basis for cross-comparisons to be made within and across cases, to draw a relationship between policy-making processes and e-learning policy discourses. Interviews were held with stakeholders who formulated e-learning policies at the three universities. The aim of interviews was to understand how the policies were formulated; to explore the factors impacting policy formulation; the composition of actors; and how policy issues were framed. The methodological and analytical lens of the study was based on the Stakeholder theory and Critical Discourse Analysis (CDA). The Stakeholder theory was used to analyse the policy-making processes, whilst CDA was used to analyse the policies. The analysis focused on the assumptions inherent in the views of policymakers on the nature and role of technology in education. Considering power relations that are implicit in policy-making processes, the study examined the competing discourses found in the policy texts and the different frames used by policy actors in framing the policy problem. The aim was to understand the socio-cultural, political and pedagogical implications of these discourses on teaching and learning with technologies in HEIs. This was achieved by comparing the views of policymakers with the discourses found in e-learning policy texts. The study revealed that institutional policies are the products of complex inter-temporal exchanges among stakeholders who participate in the policy-making process. The features of the resultant policies depend on the interaction, interests and power of agents who are involved in the policy-making process. The interaction of agents is also hampered or facilitated by institutional structures, procedures and processes in place, including the institutional culture. Therefore, the ability of the stakeholders involved in the policy-making process to achieve cooperative outcomes plays a central role. An institution that facilitates interaction among policy-making agents is likely to generate policies that are adaptable to the environment, and that are less subject to changes. Contrary to this, an institution that does not encourage cooperation will produce a policy which results in few changes in practice. Whether the policy-making process facilitates or hinders cooperation will depend on some key features of this process, such as the number of actors involved, the level of involvement in the process, how they engage in dialogue and their ideological beliefs on the role of Information and Communication Technologies (ICTs) in this context.
APA, Harvard, Vancouver, ISO, and other styles
30

Shyian, Yu V. "Theoretical-legal aspects of state’s informational policy." Thesis, Прінт-копі-центр "Вектор", 2020. https://er.nau.edu.ua/handle/NAU/45702.

Full text
Abstract:
Today, Ukraine is making the transition from industrial to information society. Unfortunately, at the present stage no law has been adopted that would define the concept of state information policy of Ukraine. Accordingly, there is no single plan, single state position or strategy for the development of the information industry in the country. At the same time, it belongs to the strategic interests of any country and needs special attention, so today the study of the information policy of the state is relevant.
APA, Harvard, Vancouver, ISO, and other styles
31

Pahlavi, Pierre Cyril Cyrus Teymour. "Mass diplomacy : foreign policy in the global information age." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85196.

Full text
Abstract:
A sophisticated and high tech form of state-to-foreign population diplomacy based on the use of the latest communication technologies has developed rapidly in recent years and has acquired an increasingly important position within a significant number of foreign affairs systems. Pioneered by the heavyweights of the international stage, the phenomenon has spread rapidly to secondary powers and is progressively extending itself to varying degrees to all states around the globe. This thesis grapples with the enigma raised by the brisk re-emergence of this foreign policy concentration by attempting to understand the reasons behind both the quantitative increase in public diplomacy activities and the qualitative evolution of these activities in terms of planning, organisation and implementation. The first argument that this thesis broaches is that the sudden growth of public diplomacy is the result of the shift to a new phase of the information revolution (necessary enabling force) which has been amplified by contingent factors: the explosion of global terrorism (accelerator) and the perception of leaders and foreign policy makers of this new environment (prism). The second argument is that, beyond quantitative growth, the new operational context born of the advent of the global information society provoked a qualitative evolution of the public diplomacy inherited from the Cold War towards what is today mass diplomacy. The result is the appearance of a market driven diplomacy employing persuasive techniques borrowed from the world of public relations and marketing. The new diplomacy is an entrepreneurial diplomacy that limits governmental leadership to a necessary minimum and encourages the participation of private and foreign sub-contractors. It is also a cyber-space diplomacy equipped with new diplomatic instruments such as high-resolution satellite imagery, high-speed networks, digital broadcasting and other marvels of the late twentieth cen
APA, Harvard, Vancouver, ISO, and other styles
32

Chong, Chia Siong Alan. "Foreign policy in global information space : actualising soft power." Thesis, London School of Economics and Political Science (University of London), 2002. http://etheses.lse.ac.uk/1667/.

Full text
Abstract:
The contemporary practice of the internal-external divide in foreign policy is being challenged by globalization's non-territorial logic. This challenge is reformulated as information globalization; a border-crossing trend of social exposure to alternative ideas jointly precipitated by the global reach of information and communication technologies, global capitalism, and post-Cold War geopolitical fluidity. The agents and processes associated with it confound any orderly delineation of 'the foreign'. This can be understood as an ideational threat to the nation-state in terms of generating a public 'global information space' that reopens all borders to political struggle. For the nation-state to survive in this space, a reformulation of foreign policy as discourse is needed. This thesis argues that the ideational, in the form of information, is endowed with power relations in spite of its abstraction, hence creating a tangible enough 'target' for 'offence/defence' by foreign policy. In this regard, information is defined as the socially patterned relationship of events and symbols capable of politically inducing action, identity or community. Thus 'soft power', or the ability to produce outcomes through attraction instead of coercion, becomes a central focus of this examination of informational challenges to statist foreign policy. Two central research questions are posed. Firstly, how can foreign policy defend or project statist political communities using soft power within a global information space. Secondly, does soft power, when exercised in turn by non-state actors, affect foreign policy by undermining statist community within the same global information space. An answer to the first question is to actualise soft power through forms of Leadership, whether from 'Inside-Out' or 'Outside-In', which are derived from domestically proven communitarian discourses worthy of emulation abroad. Alternatively soft power can be exercised by non-state actors to the detriment of state interests trough processes I label the 'Intermestic Correlation of Forces', 'Socialisation' and the 'Demonstration of Ideas'. In this second hypothesis, foreign policy retains relevance by learning to accommodate itself to the demands of external parties with interests in the welfare of domestic political constituencies. Exercising soft power in the sense in a conflation of the international and the domestic (intermestic) spheres. The case studies of Singaporean and Chilean foreign policies respectively provide analytical illustrations of both hypotheses.
APA, Harvard, Vancouver, ISO, and other styles
33

Esposito, Lucia. "Theoretical essays on delay, policy interactions and information disclosure." Thesis, Boston University, 2012. https://hdl.handle.net/2144/31546.

Full text
Abstract:
Thesis (Ph.D.)--Boston University
PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
My dissertation focuses on economic settings where agents have strong incentives to coordinate their choices. Coordination plays a prominent role in bank runs, debt crises, currency attacks, investment crashes, and sociopolitical change. In all these contexts agents may fail to take an action that would be in their collective interest because they are concerned that others will not do so. This study, assuming that the information is dispersed throughout the economy, proposes three models to analyze Delay (Chapter 1), Policy Interactions (Chapter 2) and Information Disclosure (Chapter 3) in such coordination environments. Chapter 1 Leaders and Followers in a Speculative Attack. In this paper, I develop a stylized model of regime change in which agents are heterogeneously informed about the strength of the status quo and have to decide whether to attack it or not. There are two periods and two types of players, leaders and followers. Given some restrictions on the information structure, the equilibrium probability of regime change is univocally determined and it is higher if in the population there are many leaders. Chapter 2 Debt Crisis: Central Bank and Government in a Global Game. In this paper, I study the interaction between monetary and fiscal policy in presence of a speculative attack triggered by a high level of debt. The model explores the consequences of central bank and government choosing a publicly observable policy. Since policy interventions convey information that is relevant for the coordination game, multiple equilibria arise. Chapter 3 Information Disclosure. In this paper, I analyze a model in which an authority has the option to collect and disclose information on financial intermediaries. Anyone who trades with a bank, would find this information valuable and would take it into account when deciding whether to trust the intermediary or not. Since disclosure creates common knowledge, in this model the interaction between the authority and the markets is characterized by multiple equilibria.
2031-01-01
APA, Harvard, Vancouver, ISO, and other styles
34

Jalil, Munir Andrés. "Essays on the effect of information on monetary policy /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3144340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Iris, Ma Mei-wah. "A review of the access to information policy in Hong Kong." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19709717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Erlingsson, Viktor, and Alexander Danielsson. "Email i den moderna organisationen : en empirisk studie av emailvanor i en verksamhet." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8384.

Full text
Abstract:

Syftet med uppsatsen är att undersöka om det finns negativa konsekvenser av att använda sig för mycket av email istället för av andra typer av kommunikation inom organisationen.

Det skickas stora mängder email varje dag inom organisationer, men många organisationer saknar policy för att styra denna kommunikation. Därför genomförs denna undersökning av emailvanor och hur email upplevs på Sörman Information AB.

För att besvara syftet har en kvalitativ datainsamlingsmetod använts. Vi har genomfört tio intervjuer på en av avdelningarna på fallföretaget Sörman Information AB.

Undersökningen har visat att email är den vanligaste kommunikationsvägen för arbetsrelaterad kommunikation mellan anställda på det undersökta företaget.

Slutsatsen blir därmed att email till viss del har negativa konsekvenser för en organisation men de flesta problem går att minimera genom att behandla email på rätt sätt. Som ett hjälpmedel för detta har vi utformat ett utkast till en emailpolicy.


The purpose of this thesis is to investigate the possibility of negative consequences caused by over use of email instead of other means of communication in an organization.

A very large amount of emails are sent every day within organizations. Most organizations lack a proper email policy to govern this communication. Hence this study is conducted to investigate the email habits and the general perception of email use of the employees at Sörman Information AB.

The investigation has shown that email is the most preferred choice of communication regarding work related communication between colleagues within the studied organization. T

hus the conclusion is that email to some degree can cause negative consequences for an organization. However most of these problems can be minimized by correct email use. As a complementing tool for this we have developed a first draft of an email policy.

APA, Harvard, Vancouver, ISO, and other styles
37

Koga, Takashi. "Policy Issues regarding Electronic Government and Web Accessibility in Japan." International Federation of Library Associations and Institutions, 2006. http://hdl.handle.net/10150/106269.

Full text
Abstract:
The Japanese government has been developing infrastructures and services for electronic government since 2001. One of the challenges identified in this regard is to ensure "accessibility" or to enable everyone, including the elderly and those with disabilities, to access the infrastructures and services of an electronic government. In 2004, the JIS (Japan Industrial Standard) X 8341-3 was issued as a Web accessibility standard in Japan. It is expected to function as a basis to ensure the Web accessibility of the electronic government in the central and local governments in Japan. Recently, however, the Ministry of Internal Affairs and Communications found a widespread lack of understanding of and respect toward the JIS X 8341-3 among the local governments in Japan. In December 2005, a study group under this ministry proposed "Operational Models to Improve Accessibility of Public Web sites" in order to supplement the JIS X 8341-3. Thus, this paper reviews the standards and policy initiatives for improving the Web accessibility of the electronic government in Japan and discusses the challenges faced by libraries to ensure the provision of access to government information in terms of Web accessibility and electronic government.
APA, Harvard, Vancouver, ISO, and other styles
38

Ballard, Mavourneen W. "Corporate policy management for a financial organization." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/MBallard2006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

May, Kyle P. "Internet disseminated medical information an investigation of three regulatory policy tools /." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3350.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.
Vita: p. 210. Thesis director: David M. Hart. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Public Policy. Title from PDF t.p. (viewed Jan. 11, 2009). Includes bibliographical references (p. 196-209). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
40

Hellqvist, Fredrik. "Design of business information security policy : A case study on Orebro County Council´s work with information security." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Tang, Gaoyan (Jenny). "Essays in Monetary Policy." Thesis, Harvard University, 2014. http://dissertations.umi.com/gsas.harvard:11476.

Full text
Abstract:
This dissertation presents three chapters addressing issues pertaining to monetary policy, information, and central bank communication. The first chapter studies optimal monetary policy in an environment where policy actions provide a signal of economic fundamentals to imperfectly informed agents. I derive the optimal discretionary policy in closed form and show that, in contrast to the perfect information case, the signaling channel leads the policymaker to be tougher on inflation. The strength of the signaling effect of policy depends on relative uncertainty levels. As the signaling effect strengthens, the optimal policy under discretion approaches that under commitment to a forward-looking linear rule, thereby decreasing the stabilization bias. This contributes to the central bank finding it optimal to withhold its additional information from private agents. Under a general linear policy rule, inflation and output forecasts can respond positively to a positive interest rate surprise when the signaling channel is strong. This positive response is the opposite of what standard perfect information New Keynesian models predict and it matches empirical patterns found by previous studies. Chapter 2 provides new empirical evidence supporting the predictions of the model presented in Chapter 1. More specifically, I find that the responses of inflation forecasts to interest rate surprises is especially positive when there is greater uncertainty regarding the previous forecast. Finally, Chapter 3 examines whether communications by the Federal Open Market Committee might have the ability to influence financial market responses to macroeconomic news. In particular, I am able to relate labor-related word use in FOMC statements and meeting minutes to the amount by which interest rates' response to labor-related news exceeds their response to other news.
Economics
APA, Harvard, Vancouver, ISO, and other styles
42

Lovelock, Peter. "The evolution of China's national information infrastructure (NII) : a policy-making analysis /." Thesis, Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B20715389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Uzuner, Ozlem 1975. "Identifying expression fingerprints using linguistic information." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/30286.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology, Management, and Policy Program, 2005.
Includes bibliographical references (leaves 181-192).
This thesis presents a technology to complement taxation-based policy proposals aimed at addressing the digital copyright problem. The approach presented facilitates identification of intellectual property using expression fingerprints. Copyright law protects expression of content. Recognizing literary works for copyright protection requires identification of the expression of their content. The expression fingerprints described in this thesis use a novel set of linguistic features that capture both the content presented in documents and the manner of expression used in conveying this content. These fingerprints consist of both syntactic and semantic elements of language. Examples of the syntactic elements of expression include structures of embedding and embedded verb phrases. The semantic elements of expression consist of high-level, broad semantic categories. Syntactic and semantic elements of expression enable generation of models that correctly identify books and their paraphrases 82% of the time, providing a significant (approximately 18%) improvement over models that use tfidf-weighted keywords. The performance of models built with these features is also better than models created with standard features used in stylometry (e.g., function words), which yield an accuracy of 62%. In the non-digital world, copyright holders collect revenues by controlling distribution of their works. Current approaches to the digital copyright problem attempt to provide copyright holders with the same kind of control over distribution by employing Digital Rights Management (DRM) systems.
(cont.) However, DRM systems also enable copyright holders to control and limit fair use, to inhibit others' speech, and to collect private information about individual users of digital works. Digital tracking technologies enable alternate solutions to the digital copyright problem; some of these solutions can protect creative incentives of copyright holders in the absence of control over distribution of works. Expression fingerprints facilitate digital tracking even when literary works are DRM- and watermark-free, and even when they are paraphrased. As such, they enable metering popularity of works and make practicable solutions that encourage large-scale dissemination and unrestricted use of digital works and that protect the revenues of copyright holders, for example through taxation-based revenue collection and distribution systems, without imposing limits on distribution.
by Özlem Uzuner.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
44

Laufer, Deanna (Deanna Raquel). "Radio Frequency Identification : regulating information privacy protection." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41767.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2007.
Includes bibliographical references (p. 82-87).
As applications of Radio Frequency Identification (RFID) become more profuse, the technology itself is stirring up some controversy. Due to its potential for amassing large amounts of information about both people and things, and the possibility of using the information for marketing, tracking, or even spying, numerous consumer groups are spearheading efforts to ensure that RFID does not breach their privacy rights. While there are some privacy laws regulating specific aspects of commerce, there are no laws which currently apply to the collection and use of information as it pertains to RFID. This lack of formal regulation allows companies to legally engage in practices which may encroach on consumers' privacy. However, RFID has the potential to optimize supply chain practices as well as provide other benefits to both consumers and businesses. As RFID use becomes more widespread, regulatory strategies should be considered to protect consumers' right to privacy while obtaining the benefits of using the technology. This thesis explores consumer and industry opinion of RFID through a customized survey. Results of the survey found that consumer and industry opinion are similar in many aspects, especially in the concern for protecting privacy and the desire for a regulatory mechanism to enforce those privacy rights. This thesis addresses the question of whether market-based solutions, self-regulation, or government regulation is the best option for addressing consumers' legitimate concerns of privacy while allowing businesses to reap the benefits of using the technology.
(cont.) The regulatory options are compared and then discussed based on the needs of consumers and industry members as determined by the survey. Finally, four recommendations are suggested to provide guidance for ensuring a positive acceptance of RFID while acknowledging the privacy rights of consumers.
by Deanna R. Laufer.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
45

Rogers, David Shaun. "Internal Social Media Policy in the Finance Industry." Thesis, Walden University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10749173.

Full text
Abstract:

Business leaders may see social media as a distraction for their workers; however, blocking access could lead to a reduction in productivity. Using social media technologies with knowledge workers could achieve cost reductions for payroll of 30% to 35%. The purpose of this multiple case study was to explore how business leaders used a social media policy to support employee productivity. The conceptual framework for this study was social exchange theory, which supports the notion that dyad and small group interactions make up most interactions, and such interactions enhance employees’ productivity. The research question was to explore how finance industry leaders are using a social media policy to enhance productivity. The target population for this study was leaders from financial companies in Charlotte, North Carolina, who have experience in using social media policies to increase employee productivity. Data collection included semistructured interviews with 9 technology leaders and company documents at two companies related to the research phenomenon. Yin’s 5-step data analysis approach resulted in 3 themes: employee productivity, communication, and open company culture. Business leaders should consider using a social media policy to engage employees to support productivity, enhance communication both externally and internally, and enrich company culture in a way that is visible to employees. Employee engagement in a social media platform to connect and communicate with people could lead to a happier workplace and encourage employees to volunteer more frequently for social good.

APA, Harvard, Vancouver, ISO, and other styles
46

Chu, Carlson. "Development of broadband information infrastructure in Hong Kong /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19876804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Glenning, Clas. "Insamling - policy, praktik och museer." Thesis, Uppsala University, Department of ALM, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-101921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Giannokostas, Vasileios. "Policy-Driven YARN Launcher." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204461.

Full text
Abstract:
In recent years, there has been a rising demand for IT solutions that are capable to handle vast amount of data. Hadoop became the de facto software framework for distributed storage and distributed processing of huge datasets with a high pace. YARN is the resource management layer for Hadoop ecosystem which decouples the programming model from the resource management mechanism. Although Hadoop and YARN create a powerful ecosystem which provides scalability and flexibility, launching applications with YARN currently requires intimate knowledge of YARN’s inner workings. This thesis focuses on designing and developing support for a human-friendly YARN application launching environmen twhere the system takes responsibility for allocating resources to applications. This novel idea will simplify the launching process of an application and it will give the opportunity to inexperienced users to run applications over Hadoop.
De senaste åren har haft en ökad efterfrågan på IT-lösningar som är kapabla att hantera stora mängd data. Hadoop är ett av de mest använda ramverken för att lagra och behandla stora datamängder distribuerat och i ett högt tempo. YARN är ett resurshanteringslager för Hadoop som skiljer programmeringsmodellen från resurshanteringsmekanismen. Även fast Hadoop och YARN skapar ett kraftfullt system som ger flexibilitet och skalbarhet så krävs det avancerade kunskaper om YARN för att göra detta. Detta examensarbete fokuserar på design och utveckling av en människovänlig YARN applikationsstartsmiljö där systemet tar ansvar för tilldelning av resurser till program. Denna nya idé förenklar starten av program och ger oerfarna användare möjligheten att köra program över Hadoop.
APA, Harvard, Vancouver, ISO, and other styles
49

Maninjwa, Prosecutor Mvikeli. "Managing an information security policy architecture : a technical documentation perspective." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1020757.

Full text
Abstract:
Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However, the organization’s information assets are faced with a number of internal and external threats, aimed at compromising the confidentiality, integrity and/or availability (CIA) of information assets. These threats can be of physical, technical, or operational nature. For an organization to successfully conduct its business operations, information assets should always be protected from these threats. The process of protecting information and its related assets, ensuring the CIA thereof, is referred to as information security. To be effective, information security should be viewed as critical to the overall success of the organization, and therefore be included as one of the organization’s Corporate Governance sub-functions, referred to as Information Security Governance. Information Security Governance is the strategic system for directing and controlling the organization’s information security initiatives. Directing is the process whereby management issues directives, giving a strategic direction for information security within an organization. Controlling is the process of ensuring that management directives are being adhered to within an organization. To be effective, Information Security Governance directing and controlling depend on the organization’s Information Security Policy Architecture. An Information Security Policy Architecture is a hierarchical representation of the various information security policies and related documentation that an organization has used. When directing, management directives should be issued in the form of an Information Security Policy Architecture, and controlling should ensure adherence to the Information Security Policy Architecture. However, this study noted that in both literature and organizational practices, Information Security Policy Architectures are not comprehensively addressed and adequately managed. Therefore, this study argues towards a more comprehensive Information Security Policy Architecture, and the proper management thereof.
APA, Harvard, Vancouver, ISO, and other styles
50

Ullmann, François. "Towards managing intangible policy : proposal for an information technology centre." Thesis, University of Newcastle upon Tyne, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.397353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography