Dissertations / Theses on the topic 'Information policy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Information policy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Polyrakis, Andreas. "The Meta-Policy information base." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ58776.pdf.
Full textBlackburn, Keith. "Information, expectations and macroeconomic policy." Thesis, Queen Mary, University of London, 1986. http://qmro.qmul.ac.uk/xmlui/handle/123456789/1455.
Full textHahn, Volker. "Information asymmetries, transparency, and monetary policy." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=964897687.
Full textHorsch, Michael C. "Flexible policy construction by information refinement." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ34552.pdf.
Full textCheney, David W. "Information technology, science, and public policy." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2959.
Full textTitle from PDF t.p. (viewed Jan. 17, 2008). Thesis director: Don E. Kash Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Public Policy. Vita: p. 330. Includes bibliographical references (p. 289-329). Also available in print.
Larcinese, Valentino. "Political information, elections and public policy." Thesis, London School of Economics and Political Science (University of London), 2003. http://etheses.lse.ac.uk/431/.
Full textBeasley, Claire. "Environmental information : issues of access, policy and information resources management." Thesis, City University London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268953.
Full textHan, Chun Kwong. "Information technology policies and government information systems : a multiple level perspective." Thesis, University of Cambridge, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.358788.
Full textBaeriswyl, Romain. "Essays in Monetary Policy under Heterogeneous Information." Diss., lmu, 2007. http://nbn-resolving.de/urn:nbn:de:bvb:19-81758.
Full textCisneros-Montemayor, Andrés M. "The value of information for fisheries policy." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51120.
Full textScience, Faculty of
Resources, Environment and Sustainability (IRES), Institute for
Graduate
Bulgurcu, Burcu. "The antecedents of information security policy compliance." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/1121.
Full textStephenson, Richard Lawrence. "Information systems and policy processes in planning." Thesis, Oxford Brookes University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.325434.
Full textMarie, Claire. "Arctic region policy information sharing : model options." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5190.
Full textApproved for public release; distribution is unlimited
Continued climate change and minimum ice conditions over the past several years is allowing for increased maritime activity in the Arctic, which may lead to potential homeland security/defense missions. In January 2009, the U.S. government acknowledged the probability of these missions with an updated Arctic Region Policy, which highlighted the need to develop capabilities to protect U.S. air, land and sea borders, military/civilian vessels and aircraft, maritime commerce, critical infrastructure and key resources. Successfully supporting these missions will depend on a coherent understanding of all the activities taking place in the Arctic region. Achieving this level of "situational awareness" will only be possible when all equity partners and stakeholders are sharing relevant information. This thesis examined three popular information-sharing models, Alaska Information Analysis Center, Joint Interagency Coordination Group, and the Alaska Partnership for Infrastructure Protection to determine which would work best for a broad array of Arctic partners and stakeholders. The thesis' research and analysis shows that none of the models are sufficient or stand-alone; rather a megacommunity is necessary, consisting of all equity partners interfacing with the stakeholders, managed by leaders that will motivate the community to achieve a high degree of awareness for all Arctic activity.
Van, Alstyne Marshall W. (Marshall Ware). "Managing information : networks, value, policy, and principles." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9820.
Full textYang, Jean Ph D. Massachusetts Institute of Technology. "Preventing information leaks with policy-agnostic programming." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101468.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged student-submitted from PDF version of thesis.
Includes bibliographical references (pages 103-115).
As a solution to the problem of information leaks, I propose a policy-agnostic programming paradigm that enforces security and privacy policies by construction. I present the implementation of this paradigm in a new language, Jeeves, that automatically enforces information flow policies describing how sensitive values may flow through computations. In Jeeves, the programmer specifies expressive information flow policies separately from other functionality and relies on the language runtime to customize program behavior based on the policies. Jeeves allows programmers to implement information flow policies once instead of as repeated checks and filters across the program. To provide strong guarantees about Jeeves programs, I present a formalization of the dynamic semantics of Jeeves, define non-interference and policy compliance properties, and provide proofs that Jeeves enforces these properties. To demonstrate the practical feasibility of policy-agnostic programming, I present Jacqueline, a web framework built on Jeeves that enforces policies in database-backed web applications. I provide a formalization of Jacqueline as an extension of Jeeves to include relational operators and proofs that this preserves the policy compliance guarantees. Jacqueline enforces information flow policies end-to-end and runs using an unmodified Python interpreter and SQL database. I show, through several case studies, that Jacqueline reduces the amount of policy code required while incurring limited overheads
by Jean Yang.
Ph. D.
Sarrab, Mohamed Khalefa. "Policy based runtime verification of information flow." Thesis, De Montfort University, 2011. http://hdl.handle.net/2086/4929.
Full textBaeriswyl, Romain. "Essays in monetary policy under heterogenous information." kostenfrei, 2007. http://edoc.ub.uni-muenchen.de/8175/.
Full textMwai, Paul Macharia. "Information security policy an investigation into rewriting the policy for Loreto College Msongari /." [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:148.
Full textPieters, Minnaar. "Open source software and government policy in South Africa." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/2480.
Full textOpen-source software is not something new; however, it has come into the spotlight in the last few years, mostly due to hyped initial cost savings of the Linux operating system. Consumers and businesses were made aware of shortcomings in the traditional proprietary software model and this has in turn created a surge in popularity of open-source. The migration to open-source requires efficient research of options available and thorough analysis of the migratory process through all levels of the organization. Initial independent cost analysis has not been conclusive, with unreliable, skewed results and below average performance due to poor implementation. The focus of this study is whether open-source software is a suitable alternative to current proprietary software packages utilized by the government sector.
Tantram, Dominic A. S. "Mapping the countryside : information for policy and management." Thesis, University of Northampton, 2001. http://nectar.northampton.ac.uk/3001/.
Full textMontado, Estela. "Trade policy : incomplete information, antidumping and political economy." Thesis, London School of Economics and Political Science (University of London), 2006. http://etheses.lse.ac.uk/1934/.
Full textIrani, Arya John. "Utilizing negative policy information to accelerate reinforcement learning." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53481.
Full textWang, Albert Zhao. "Essays on Platforms: Asymmetric Information, Search, and Policy." Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10937.
Full textEconomics
Serema, Batlang Comma. "Information infrastructure for public policy making in Botswana." Thesis, University College London (University of London), 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.405193.
Full textPiracha, Matloob Elahi. "Essays on strategic trade policy under asymmetric information." Thesis, University of Exeter, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.414054.
Full textHubert, Paul. "Monetary policy, imperfect information and the expectations channel." Paris, Institut d'études politiques, 2010. http://spire.sciences-po.fr/hdl:/2441/f4rshpf3v1umfa09lat09b1bg.
Full textThis thesis explores the implications of imperfect information for monetary policymaking. It considers the central bank as the coordinator of expectations because of its competence rather than its commitment to a low and stable inflation. By competence, we intend to say the ability to correctly forecast the future state of the economy. The central point has been to show that competence together with communication enables influence, and that central bank influence of private expectations enables to loose monetary policy constraints to reach its macroeconomic objectives. Chapter 1 proceeds to an empirical review of the vast literature dealing with the relative forecasting performance of the Federal Reserve, a central bank which publishes its forecasts with a 5-year lag. Chapter 2 focuses on central banks which publish their forecasts in real-time what allows for emphasizing the expectations channel of monetary policy and the question of credibility through the link between relative forecasting performance and influence of central banks. We propose to define endogenous credibility as the capacity to influence arising from a superior forecasting performance, in opposition to exogenous credibility for which central banks need not a forecasting advantage to be influential. Chapter 3 investigates the theoretical implications of endogenous influence for monetary policymaking through a New-Keynesian economy with non rational expectations. Last, Chapter 4 assesses the monetary policy preferences of three central banks which have adopted the inflation targeting framework and therefore communicate their forecasts in real-time
Gausi, Hambani Adamson. "Effects of the brittle national information policy framework on information services in Malawi." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1005989.
Full textSmith, Kane. "A Multi-Objective Framework for Information Security Public Policy: The Case of Health Informatics." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5320.
Full textChikuni, Patricia Rudo. "The relationship between policy-making processes and e-learning policy discourses in higher education institutions in South Africa." Doctoral thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/25190.
Full textShyian, Yu V. "Theoretical-legal aspects of state’s informational policy." Thesis, Прінт-копі-центр "Вектор", 2020. https://er.nau.edu.ua/handle/NAU/45702.
Full textPahlavi, Pierre Cyril Cyrus Teymour. "Mass diplomacy : foreign policy in the global information age." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85196.
Full textChong, Chia Siong Alan. "Foreign policy in global information space : actualising soft power." Thesis, London School of Economics and Political Science (University of London), 2002. http://etheses.lse.ac.uk/1667/.
Full textEsposito, Lucia. "Theoretical essays on delay, policy interactions and information disclosure." Thesis, Boston University, 2012. https://hdl.handle.net/2144/31546.
Full textPLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
My dissertation focuses on economic settings where agents have strong incentives to coordinate their choices. Coordination plays a prominent role in bank runs, debt crises, currency attacks, investment crashes, and sociopolitical change. In all these contexts agents may fail to take an action that would be in their collective interest because they are concerned that others will not do so. This study, assuming that the information is dispersed throughout the economy, proposes three models to analyze Delay (Chapter 1), Policy Interactions (Chapter 2) and Information Disclosure (Chapter 3) in such coordination environments. Chapter 1 Leaders and Followers in a Speculative Attack. In this paper, I develop a stylized model of regime change in which agents are heterogeneously informed about the strength of the status quo and have to decide whether to attack it or not. There are two periods and two types of players, leaders and followers. Given some restrictions on the information structure, the equilibrium probability of regime change is univocally determined and it is higher if in the population there are many leaders. Chapter 2 Debt Crisis: Central Bank and Government in a Global Game. In this paper, I study the interaction between monetary and fiscal policy in presence of a speculative attack triggered by a high level of debt. The model explores the consequences of central bank and government choosing a publicly observable policy. Since policy interventions convey information that is relevant for the coordination game, multiple equilibria arise. Chapter 3 Information Disclosure. In this paper, I analyze a model in which an authority has the option to collect and disclose information on financial intermediaries. Anyone who trades with a bank, would find this information valuable and would take it into account when deciding whether to trust the intermediary or not. Since disclosure creates common knowledge, in this model the interaction between the authority and the markets is characterized by multiple equilibria.
2031-01-01
Jalil, Munir Andrés. "Essays on the effect of information on monetary policy /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3144340.
Full textIris, Ma Mei-wah. "A review of the access to information policy in Hong Kong." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19709717.
Full textErlingsson, Viktor, and Alexander Danielsson. "Email i den moderna organisationen : en empirisk studie av emailvanor i en verksamhet." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8384.
Full textSyftet med uppsatsen är att undersöka om det finns negativa konsekvenser av att använda sig för mycket av email istället för av andra typer av kommunikation inom organisationen.
Det skickas stora mängder email varje dag inom organisationer, men många organisationer saknar policy för att styra denna kommunikation. Därför genomförs denna undersökning av emailvanor och hur email upplevs på Sörman Information AB.
För att besvara syftet har en kvalitativ datainsamlingsmetod använts. Vi har genomfört tio intervjuer på en av avdelningarna på fallföretaget Sörman Information AB.
Undersökningen har visat att email är den vanligaste kommunikationsvägen för arbetsrelaterad kommunikation mellan anställda på det undersökta företaget.
Slutsatsen blir därmed att email till viss del har negativa konsekvenser för en organisation men de flesta problem går att minimera genom att behandla email på rätt sätt. Som ett hjälpmedel för detta har vi utformat ett utkast till en emailpolicy.
The purpose of this thesis is to investigate the possibility of negative consequences caused by over use of email instead of other means of communication in an organization.
A very large amount of emails are sent every day within organizations. Most organizations lack a proper email policy to govern this communication. Hence this study is conducted to investigate the email habits and the general perception of email use of the employees at Sörman Information AB.
The investigation has shown that email is the most preferred choice of communication regarding work related communication between colleagues within the studied organization. T
hus the conclusion is that email to some degree can cause negative consequences for an organization. However most of these problems can be minimized by correct email use. As a complementing tool for this we have developed a first draft of an email policy.
Koga, Takashi. "Policy Issues regarding Electronic Government and Web Accessibility in Japan." International Federation of Library Associations and Institutions, 2006. http://hdl.handle.net/10150/106269.
Full textBallard, Mavourneen W. "Corporate policy management for a financial organization." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/MBallard2006.pdf.
Full textMay, Kyle P. "Internet disseminated medical information an investigation of three regulatory policy tools /." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3350.
Full textVita: p. 210. Thesis director: David M. Hart. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Public Policy. Title from PDF t.p. (viewed Jan. 11, 2009). Includes bibliographical references (p. 196-209). Also issued in print.
Hellqvist, Fredrik. "Design of business information security policy : A case study on Orebro County Council´s work with information security." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35527.
Full textTang, Gaoyan (Jenny). "Essays in Monetary Policy." Thesis, Harvard University, 2014. http://dissertations.umi.com/gsas.harvard:11476.
Full textEconomics
Lovelock, Peter. "The evolution of China's national information infrastructure (NII) : a policy-making analysis /." Thesis, Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B20715389.
Full textUzuner, Ozlem 1975. "Identifying expression fingerprints using linguistic information." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/30286.
Full textIncludes bibliographical references (leaves 181-192).
This thesis presents a technology to complement taxation-based policy proposals aimed at addressing the digital copyright problem. The approach presented facilitates identification of intellectual property using expression fingerprints. Copyright law protects expression of content. Recognizing literary works for copyright protection requires identification of the expression of their content. The expression fingerprints described in this thesis use a novel set of linguistic features that capture both the content presented in documents and the manner of expression used in conveying this content. These fingerprints consist of both syntactic and semantic elements of language. Examples of the syntactic elements of expression include structures of embedding and embedded verb phrases. The semantic elements of expression consist of high-level, broad semantic categories. Syntactic and semantic elements of expression enable generation of models that correctly identify books and their paraphrases 82% of the time, providing a significant (approximately 18%) improvement over models that use tfidf-weighted keywords. The performance of models built with these features is also better than models created with standard features used in stylometry (e.g., function words), which yield an accuracy of 62%. In the non-digital world, copyright holders collect revenues by controlling distribution of their works. Current approaches to the digital copyright problem attempt to provide copyright holders with the same kind of control over distribution by employing Digital Rights Management (DRM) systems.
(cont.) However, DRM systems also enable copyright holders to control and limit fair use, to inhibit others' speech, and to collect private information about individual users of digital works. Digital tracking technologies enable alternate solutions to the digital copyright problem; some of these solutions can protect creative incentives of copyright holders in the absence of control over distribution of works. Expression fingerprints facilitate digital tracking even when literary works are DRM- and watermark-free, and even when they are paraphrased. As such, they enable metering popularity of works and make practicable solutions that encourage large-scale dissemination and unrestricted use of digital works and that protect the revenues of copyright holders, for example through taxation-based revenue collection and distribution systems, without imposing limits on distribution.
by Özlem Uzuner.
Ph.D.
Laufer, Deanna (Deanna Raquel). "Radio Frequency Identification : regulating information privacy protection." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41767.
Full textIncludes bibliographical references (p. 82-87).
As applications of Radio Frequency Identification (RFID) become more profuse, the technology itself is stirring up some controversy. Due to its potential for amassing large amounts of information about both people and things, and the possibility of using the information for marketing, tracking, or even spying, numerous consumer groups are spearheading efforts to ensure that RFID does not breach their privacy rights. While there are some privacy laws regulating specific aspects of commerce, there are no laws which currently apply to the collection and use of information as it pertains to RFID. This lack of formal regulation allows companies to legally engage in practices which may encroach on consumers' privacy. However, RFID has the potential to optimize supply chain practices as well as provide other benefits to both consumers and businesses. As RFID use becomes more widespread, regulatory strategies should be considered to protect consumers' right to privacy while obtaining the benefits of using the technology. This thesis explores consumer and industry opinion of RFID through a customized survey. Results of the survey found that consumer and industry opinion are similar in many aspects, especially in the concern for protecting privacy and the desire for a regulatory mechanism to enforce those privacy rights. This thesis addresses the question of whether market-based solutions, self-regulation, or government regulation is the best option for addressing consumers' legitimate concerns of privacy while allowing businesses to reap the benefits of using the technology.
(cont.) The regulatory options are compared and then discussed based on the needs of consumers and industry members as determined by the survey. Finally, four recommendations are suggested to provide guidance for ensuring a positive acceptance of RFID while acknowledging the privacy rights of consumers.
by Deanna R. Laufer.
S.M.
Rogers, David Shaun. "Internal Social Media Policy in the Finance Industry." Thesis, Walden University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10749173.
Full textBusiness leaders may see social media as a distraction for their workers; however, blocking access could lead to a reduction in productivity. Using social media technologies with knowledge workers could achieve cost reductions for payroll of 30% to 35%. The purpose of this multiple case study was to explore how business leaders used a social media policy to support employee productivity. The conceptual framework for this study was social exchange theory, which supports the notion that dyad and small group interactions make up most interactions, and such interactions enhance employees’ productivity. The research question was to explore how finance industry leaders are using a social media policy to enhance productivity. The target population for this study was leaders from financial companies in Charlotte, North Carolina, who have experience in using social media policies to increase employee productivity. Data collection included semistructured interviews with 9 technology leaders and company documents at two companies related to the research phenomenon. Yin’s 5-step data analysis approach resulted in 3 themes: employee productivity, communication, and open company culture. Business leaders should consider using a social media policy to engage employees to support productivity, enhance communication both externally and internally, and enrich company culture in a way that is visible to employees. Employee engagement in a social media platform to connect and communicate with people could lead to a happier workplace and encourage employees to volunteer more frequently for social good.
Chu, Carlson. "Development of broadband information infrastructure in Hong Kong /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19876804.
Full textGlenning, Clas. "Insamling - policy, praktik och museer." Thesis, Uppsala University, Department of ALM, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-101921.
Full textGiannokostas, Vasileios. "Policy-Driven YARN Launcher." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204461.
Full textDe senaste åren har haft en ökad efterfrågan på IT-lösningar som är kapabla att hantera stora mängd data. Hadoop är ett av de mest använda ramverken för att lagra och behandla stora datamängder distribuerat och i ett högt tempo. YARN är ett resurshanteringslager för Hadoop som skiljer programmeringsmodellen från resurshanteringsmekanismen. Även fast Hadoop och YARN skapar ett kraftfullt system som ger flexibilitet och skalbarhet så krävs det avancerade kunskaper om YARN för att göra detta. Detta examensarbete fokuserar på design och utveckling av en människovänlig YARN applikationsstartsmiljö där systemet tar ansvar för tilldelning av resurser till program. Denna nya idé förenklar starten av program och ger oerfarna användare möjligheten att köra program över Hadoop.
Maninjwa, Prosecutor Mvikeli. "Managing an information security policy architecture : a technical documentation perspective." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1020757.
Full textUllmann, François. "Towards managing intangible policy : proposal for an information technology centre." Thesis, University of Newcastle upon Tyne, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.397353.
Full text