To see the other types of publications on this topic, follow the link: Library Security.

Dissertations / Theses on the topic 'Library Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 31 dissertations / theses for your research on the topic 'Library Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Hao. "Oracle ThinkQuest Library Security Issue Clean-up." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-133629.

Full text
Abstract:
As the Internet evolves and security attacks become more sophisticated, security has become one of the most challenging issues for website development and maintenance. Oracle Education Foundation (OEF funded by Oracle Corporation) maintains 7000 websites in ThinkQuest Library. These websites are developed by elementary school students, with PHP, Perl, and MySQL technologies. Because they have insufficient knowledge in website security, their websites may contain security issues and are hard for OEF to maintain. The purpose of this thesis is to seek an efficient and accurate solution to clean up the website security issues in ThinkQuest Library. The thesis consists 3 parts: improvement of Apache web server security configuration; summarizing methodology of manual fixing vulnerabilities and developing a simple script tool for security issue detection and cleaning up. These achievements can prevent illegal operations and attacks on the websites in ThinkQuest web server.
APA, Harvard, Vancouver, ISO, and other styles
2

Sterner, Robert N. "Child support does it provide economic security for single parent families /." Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1992. http://www.kutztown.edu/library/services/remote_access.asp.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krishna, Emir. "Security issues on m-Commerce over 3G/UMTS /." Leeds, 2001. http://www.leeds.ac.uk/library/counter2/compstmsc/20002001/krishna.doc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sehdev, Rajat. "Framework for designing and implementing IS/IT information security /." Leeds, 2001. http://www.leeds.ac.uk/library/counter2/compstmsc/20002001/sehdev.doc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frame, Ethan Andrew. "GPUHElib and DistributedHElib: Distributed Computing Variants of HElib, a Homomorphic Encryption Library." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1407.

Full text
Abstract:
Homomorphic Encryption, an encryption scheme only developed in the last five years, allows for arbitrary operations to be performed on encrypted data. Using this scheme, a user can encrypt data, and send it to an online service. The online service can then perform an operation on the data and generate an encrypted result. This encrypted result is then sent back to the user, who decrypts it. This decryption produces the same data as if the operation performed by the online service had been performed on the unencrypted data. This is revolutionary because it allows for users to rely on online services, even untrusted online services, to perform operations on their data, without the online service gaining any knowledge from their data. A prominent implementation of homomorphic encryption is HElib. While one is able to perform homomorphic encryption with this library, there are problems with it. It, like all other homomorphic encryption libraries, is slow relative to other encryption systems. Thus there is a need to speed it up. Because homomorphic encryption will be deployed on online services, many of them distributed systems, it is natural to modify HElib to utilize some of the tools that are available on them in an attempt to speed up run times. Thus two modified libraries were designed: GPUHElib, which utilizes a GPU, and DistributedHElib, which utilizes a distributed computing design. These designs were then tested against the original library to see if they provided any speed up.
APA, Harvard, Vancouver, ISO, and other styles
6

Griffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.

Full text
Abstract:
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government contractor located in the southeastern region of the United States. Ludwig von Bertalanffy's general systems theory was used as the conceptual framework of this study. The data collection process included interviews with organization security managers (n = 5) and company documents and procedures (n = 13) from the target organization related to mobile device security. Data from the interviews and organizational documents were coded using thematic analysis. Methodological triangulation of the data uncovered 4 major themes: information security policies and procedures, security awareness, technology management tools, and defense-in-depth. The implications for positive social change from this study include the potential to enhance the organizations' security policies, cultivate a better security awareness training program, and improve the organizations data protection strategies. In addition, this study outlines some strategies for preventing data breaches caused by mobile devices while still providing maximum benefit to its external and internal customers.
APA, Harvard, Vancouver, ISO, and other styles
7

Mathias, Henry. "Analyzing Small Businesses' Adoption of Big Data Security Analytics." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.

Full text
Abstract:
Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured as a function of the user's perceived attributes of innovation represented by the independent variables: relative advantage, compatibility, complexity, observability, and trialability. The study included a cross-sectional survey distributed online to a convenience sample of 165 small businesses. Pearson correlations and multiple linear regression were used to statistically understand relationships between variables. There were no significant positive correlations between relative advantage, compatibility, and the dependent variable adoption; however, there were significant negative correlations between complexity, trialability, and the adoption. There was also a significant positive correlation between observability and the adoption. The implications for positive social change include an increase in knowledge, skill sets, and jobs for employees and increased confidentiality, integrity, and availability of systems and data for small businesses. Social benefits include improved decision making for small businesses and increased secure transactions between systems by detecting and eliminating advanced, persistent threats.
APA, Harvard, Vancouver, ISO, and other styles
8

Prakash, Aravind. "Confidential Data Dispersion using Thresholding." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/232.

Full text
Abstract:
With growing trend in "cloud computing" and increase in the data moving into the Internet, the need to store large amounts of data by service providers such as Google, Yahoo and Microsoft has increased over time. Now, more than ever, there is a need to efficiently and securely store large amounts of data. This thesis presents an implementation of a Ramp Scheme that confidentially splits a data file into a configurable number of parts or shares of equal size such that a subset of those shares can recover the data entirely. Furthermore, the implementation supports a threshold for data compromise and data verification to verify that the data parts have not been tampered with. This thesis addresses two key problems faced in large-scale data storage, namely, data availability and confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
9

Soldal, Johannes. "Lämna mig ifred : Digital övervakning och personlig integritet på svenska bibliotek." Thesis, Uppsala universitet, Institutionen för ABM, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-307921.

Full text
Abstract:
Introduction. Libraries have traditionally protected the privacy of their users. It is an ambition that is becoming increasingly difficult, with the introduction of new information technologies in libraries. This thesis consists of an examination of an incipient interest in digital security among Swedish libraries and librarians. It also consists of an examination to what degree Swedish municipality libraries are using social plugins, an information practice with potential privacy concerns, on their websites. Method. Key actors were interviewed to shed light on why issues on privacy and digital security have moved into the foreground. 59 municipality libraries were randomly selected, and their websites surveyed. Analysis. Contextual integrity (CI), a privacy concept developed by Helen Nissenbaum, was used as a theoreti-cal framework. According to the concept, privacy is linked to information norms in a specific context. The con-cept has both a descriptive and a prescriptive aspect. In this thesis I used CI to evaluate libraries’ information practice of using social plugins on their websites. Results. The study showed that one out of three municipality libraries in Sweden are using social plugins on their website. The interest in digital security among Swedish libraries is linked to privacy concerns for groups of people with the need of high digital protection. The interest was sparked by Edward Snowden revelations of mass surveillance and the refugee crisis in 2015. Conclusion. Contextual integrity was used to evaluate libraries’ practice of using social plugins on their web-sites. The evaluation showed that the practice encroaches on information norms normally taken for granted in the library. The use of social plugins should be cancelled. Libraries have a responsibility to secure the privacy of their users, and CI is a useful concept to evaluate different information practices.This is a two years master’s thesis in library and information science.
APA, Harvard, Vancouver, ISO, and other styles
10

Souza, Fernando Antonio Ferreira de. "Gestão da segurança da informação em bibliotecas: elementos para elaboração de uma política de segurança da informação na Biblioteca Central da Universidade Federal da Paraíba." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9680.

Full text
Abstract:
Submitted by Fernando Souza (fernando@biblioteca.ufpb.br) on 2017-10-03T16:52:37Z No. of bitstreams: 1 arquivototal.pdf: 2097465 bytes, checksum: d3bdb832ed8d7ca2faa35f212ab6ca2b (MD5)
Made available in DSpace on 2017-10-03T16:52:37Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 2097465 bytes, checksum: d3bdb832ed8d7ca2faa35f212ab6ca2b (MD5) Previous issue date: 2017-08-02
The information protection has become an extremely critical factor for organizations and Government entities. This involves not only the conventional environment, but also the technological and informational networking infrastructure. This study set out to address the information security as part of a University Library context. Even though a familiar environment with the information management processes, the libraries come suffering with problems related to lack of information on security management. For this purpose, this research studies the elements of information security management that allow the elaboration of a minute of information security policy for the Central Library of the Federal University of Paraíba. As the methodological aspects, is characterized as qualitative, descriptive type. As instrument methodology of data collection, tabulation and analysis, uses the Facilitated Process of risk analysis and assessment (FRAAP), which was supplemented with quiz and analysis of content according to Bardin. The results indicat a group of fifteen threats, among which detected nine physical threats, two logical threats and four threats related to processes. Finally, it was found that the Central Library of UFPB needs to reflect on an action plan directed to information security, to guarantee the confidentiality, integrity and safeguard of the organization's critical management information. With the results, it is expected to contribute with information security in the context of the Central Library of UFPB with the proposed minute information security policy, enabling new contributions to the development of the processes of management of the University Library.
A proteção da informação tornou-se fator de extrema criticidade para as organizações e entidades de governo. Esta envolve não somente o ambiente convencional, mas a infraestrutura tecnológica e de redes informacionais. Este estudo se propôs abordar a Segurança da Informação no âmbito de uma biblioteca universitária. Mesmo sendo um ambiente familiarizado com os processos de gestão da informação, as bibliotecas vêm sofrendo com os problemas relacionados à falta de gestão da segurança da informação. Para tanto, esta pesquisa estuda os elementos de Gestão da Segurança da Informação que permitam a elaboração de uma minuta de Política de Segurança da Informação para a Biblioteca Central da Universidade Federal da Paraíba. Quanto os aspectos metodológicos, se caracteriza como qualitativa, do tipo descritiva. Como instrumento metodológico de coleta de dados, tabulação e análise, utiliza o Processo Facilitado de Análise e Avaliação de Risco (FRAAP), que foi complementado com questionário e a análise de conteúdo conforme Bardin. Os resultados apresentados indicam um grupo de quinze ameaças, dentre as quais se detectou nove ameaças físicas, duas ameaças lógicas e quatro ameaças relacionadas aos processos gerenciais. Por fim, verifica-se que a Biblioteca Central da UFPB necessita refletir sobre um plano de ação direcionado à segurança da informação, para a garantia de confidencialidade, integridade e salvaguarda das informações gerenciais críticas da organização. Com os resultados, espera-se contribuir com a Segurança da Informação no âmbito da Biblioteca Central da UFPB com uma proposta de minuta para Política de Segurança da Informação, permitindo novas contribuições para o desenvolvimento dos processos de gestão da Biblioteca Universitária.
APA, Harvard, Vancouver, ISO, and other styles
11

Oberreiter, Vladimír. "GUI nástroj na měření zranitelností systémů pomocí knihovny OpenSCAP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235526.

Full text
Abstract:
This work describes the SCAP standards (Security Content Automation Protocol) determining the level of computer security and the OpenSCAP library providing a framework to the SCAP standards. It also describes the way of designing and creating security tool using the OpenSCAP library. This tool enables to search for known, potential system vulnerabilities and check the system configuration according to previously set criteria.
APA, Harvard, Vancouver, ISO, and other styles
12

Hazanov, Julia, and Sara Elfström. "Högdalens bibliotek som mötesplats : En studie om trygghet med utgångspunkt i besökares och personals upplevelser." Thesis, KTH, Urbana och regionala studier, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-298535.

Full text
Abstract:
Lack of safety is a problem in many public places in society, including libraries, where disturbances of order and crime are common problems. Perhaps, many people experience the library as a quiet and safe place, without quarrels, vandalism, violence, theft, or harassment, yet all these are recurring problems in libraries. This study is carried out to clarify factors that cause the lack of safety in libraries and to develop measures to counteract these factors. The survey is conducted as a case study of Högdalen library, where the purpose of the study is to understand how the environment at the library affects the safety of the place, based on the visitors' and personnel's safety experiences. In order to get answers to the study's main research question – that is, how visitors and personnel experience the safety at Högdalen library – a questionnaire survey was conducted, answered by 43 library visitors, as well as interviews with four people from the library's personnel. The study also includes an examination and a compilation of statistics from troublesome events that occurred at the library between the years 2017 and 2020 to further – together with the questionnaire survey and interviews – get answers to what problems are most common in the library today. The hope is that the questionnaire survey, the interviews, the statistics, and the study's theoretical and literature basis will provide answers to how crime prevention through environmental design can be used as a reference to improve safety at Högdalen library. The study is delimited and does not include any comparison between Högdalen library and other libraries concerning the safety experience. The results show that visitors and personnel have a positive image of the safety experience at Högdalen library. Most of the questionnaire respondents (83,7 %) have not experienced any situation that has developed the feeling of unsafety, while the personnel, instead, believe that incidents that have been experienced as troublesome have increased their awareness and experiences of how such situations can be handled, and further increased their motivation to strive for a safe environment for all library visitors. Although the above results show a positive safety experience at Högdalen library, a minor number of visitors (16,3 %) experience, or have experienced, the feeling of unsafety in the library's premises. These experiences of unsafety are based on cases linked to disturbances of order, harassment, drugs, or property crimes, but also problems with obstacles, ability to orientate and lines of sight. The personnel also highlight that some troublesome situations – associated with, for example, youth groups and addicts – have contributed to increased stress and a feeling of discomfort, which subsequently has affected their well-being in the workplace. However, it is important to remember that all people experience safety differently, and that a complete elimination of unsafety can thus be difficult to achieve. Nevertheless, it is vital to make every attempt to prevent the existing risks as much as possible.
Otrygghet är ett problem på många offentliga platser i samhället, däribland bibliotek, där både ordningsstörningar och brott är förekommande problem. Förmodligen upplever många människor biblioteket som en lugn och trygg plats, utan bråk, skadegörelser, våld, stöld, eller trakasserier, ändock är alla dessa återkommande problem på bibliotek. Den här studien genomförs med förhoppningen att klara ut orsakerna till otryggande faktorer på bibliotek, och i bästa fall ta fram åtgärder för att motverka dessa faktorer. Undersökningen görs i form av en fallstudie av Högdalens bibliotek, där syftet med studien är att få en ökad förståelse för hur miljön på biblioteket påverkar tryggheten på platsen utifrån besökares och personals trygghetsupplevelser. I syfte att få svar på studiens huvudsakliga forskningsfråga – alltså hur besökare och personal upplever tryggheten på Högdalens bibliotek – görs en enkätundersökning besvarad av 43 biblioteksbesökare, samt intervjuer med fyra personer från bibliotekets personal. Studien innefattar därtill en granskning och sammanställning av statistik från besvärande händelser som inträffat på biblioteket mellan åren 2017 och 2020 för att vidare, tillsammans med enkätundersökningen och intervjuerna, få svar på vilka problem som är mest förekommande på biblioteket idag. Förhoppningen är att enkätundersökningen, intervjuerna, statistiken och studiens teori- och litteraturunderlag ska ge svar på hur brottsprevention genom urban design kan användas som referens för att förbättra tryggheten på Högdalens bibliotek. Studien är avgränsad och innefattar inte någon jämförelse mellan Högdalens bibliotek och andra bibliotek i avseende på trygghetsupplevelsen. Studiens resultat visar att besökare och personal har en positiv bild av trygghetsupplevelsen på Högdalens bibliotek. Majoriteten av enkätrespondenterna (83,7 %) har inte upplevt någon situation som frambringat känslan av otrygghet, medan personalen i stället menar att händelser som upplevts besvärande har ökat deras kunskaper och erfarenheter om hur sådana situationer kan hanteras, samt vidare ökat deras motivation att sträva efter en trygg miljö för alla biblioteks- besökare. Trots att ovannämnda resultat visar en positiv trygghetsupplevelse på Högdalens bibliotek finns det ett mindre antal besökare (16,3 %) som upplever, eller har upplevt, känslan av otrygghet i bibliotekets lokaler. Dessa otrygghetsupplevelser grundar sig på fall kopplat till ordningsstörningar, trakasserier, narkotika eller egendomsbrott, men också problem med hinder, orienteringsmöjligheter och siktlinjer. Personalen belyser också att vissa besvärande situationer – förknippat med exempelvis ungdomsgrupper och missbrukare – har bidragit med ökad stress och en känsla av obehag, vilket fortsättningsvis påverkat deras välbefinnande på arbetsplatsen. Det är dock viktigt att komma ihåg att alla människor upplever trygghet på olika sätt, och att en fullständig eliminering av otrygghet således kan vara svårt att uppnå – men det är trots detta betydelsefullt att i största möjliga grad försöka förebygga de risker som finns.
APA, Harvard, Vancouver, ISO, and other styles
13

Arffmann, Jens. "Værktøjer til sikring af en effektiv strategiimplementering = Tools for securing an effective strategy implementation /." Aarhus : Institut for Økonomi, Aarhus Universitet, 2007. http://mit.econ.au.dk/Library/Specialer/20011066.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Figueiredo, Rob. "Securing group communication in dynamic, disadvantaged networks : implementation of an elliptic-curve pairing-based cryptography library." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/41602.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.
Includes bibliographical references (p. 155-158).
This thesis considers the problem of securing communication among dynamic groups of participants without relying on an online group keying service. As a solution, we offer the design and implementation of the Public Key Group Encryption (PKGE) service. It is a cryptography library, written in C, and designed to be shared among all communications applications on any particular system. PKGE imposes low communication overhead and embraces disconnected operation, making it especially appropriate for deployment in low-bandwidth tactical environments. PKGE provides forward-secure confidentiality and authentication among any subset of users using small communication overhead by bringing together a number of modern cryptographic developments, with the piece de resistance being the elliptic curve-based Collusion-Resistant Broadcast Encryption. The focus of this thesis is primarily the engineering and synthesis of known theoretical schemes; we also present novel extensions to the Boneh-Gentry-Waters encryption scheme. 1. Forward secrecy: Add forward secrecy to the scheme at a cost of T private keys for T security epochs. 2. Optimized session protocols: Sidestep the majority of costs in computation and bandwidth. 3. Cheap over-provisioning of system capacity: Support up to 232 users for resource costs proportional only to the number actually registered. 4. Chosen Ciphertext Attack (CCA) Security: Elevate security from CPA to CCA strength. Using PKGE, we have developed a plugin for Gaim2 as a motivating launch application. The plugin both demonstrates the use of PKGE and enables secure conferencing over the range of Gaim-supported protocols, including Jabber, IRC, AIM, and ICQ. PKGE and its Gaim plugin may be run and further developed under MS Windows, Mac OS X, and Linux operating systems.
by Rob Figueiredo.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
15

Tsai, Tzong-Yiing, and 蔡宗穎. "An Integrated Approach to Network Security Library." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/48717824530929174406.

Full text
Abstract:
碩士
國立交通大學
資訊科學與工程研究所
95
Nowadays, Internet is so popular not only to individuals but also to enterprises. For enterprises, the management and security issues are very important. IDC estimates worldwide security software/services will grow 20% a year ( to 43 billion US dollars in 2008). There are new security problems discovered every day. Meanwhile, hacker grows as the defender grows. Therefore, the security solutions will never be perfect. In this paper, we focus on bandwidth control, application-firewall, and real-time traffic analysis to build a network security management library, NSML, which can acts as a stand alone library to saving the time to develop network security software through its API, and provides architecture to manage and protect the networks in an enterprise. NSML saves the time to develop a network security software and also reduces its complexity. By using our architecture, critical resources in enterprise network are protected and their quality of service are also guaranteed.
APA, Harvard, Vancouver, ISO, and other styles
16

Chou, Shu-lai, and 周澍來. "A Study on Collection Security in University Library:the Usage Evaluation for Library Security Systems." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/01434564872374960137.

Full text
Abstract:
碩士
國立臺灣大學
圖書資訊學研究所
93
The questionnaire and the follow-up interview were used to collect data in this thesis. After analyzing these data, this thesis discussed the findings in three aspects: 1.The current situation of collections security in university libraries. 2.The usage and evaluation of library security systems in university libraries. 3.The applicability of RFID technology in collections security. The following shows suggestions based on the findings of this research: 1.The library should draw up a policy for collection security to build an integrated protection mechanism. 2.The library should establish the criteria to evaluate library security systems by writing a system requirement for proposal. 3.The training programs or courses of schools, organizations, and libraries should cover the issue on “collection security” to build up a fundamental cognition on it for librarians. 4.The libraries ought to keep the continuing interests in the researches and applications of RFID system and technology.
APA, Harvard, Vancouver, ISO, and other styles
17

Huang, Ching-min, and 黃靖閔. "Performance Evaluation of API for Java Security and OpenSSL library JNI." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/01821942867634165733.

Full text
Abstract:
碩士
國立高雄第一科技大學
電腦與通訊工程所
97
Data transfer and message services, trading in a variety of different platforms to communicate. Data and file transfer, its impact on the accuracy and integrity of a number of different decision-making and the meaning of. Different trading platforms, in addition to considering the validity of transmission, the lower the complexity of data conversion and reduce maintenance costs is worth exploring. Even if the use of personal computer system or developed by business needs, as well as the client''s e-commerce Internet applications. In a wide variety of operating conditions, if not managed, will be easily derived from a variety of independent, function similar to the situation. In a different framework, how to reduce the occurrence of information security risks and avoid waste of resources while maintaining the effectiveness of real-time system can be used with the full information environment, information security has become the application architecture.In this paper, a cross-platform Java itself and use anywhere on the merits, combined with Password Authentication OpenSSL features of open source,through the JNI interface to the implementation of cryptography algorithms and designed to provide a library interface.Library document and with reference to the use of Java solution will be able to provide more security in the information layer of choice.In addition to the libraries provided in the performance than the Java implementation of Security API in itself a good addition to the results, which can be extended depending on demand and expansion of library whether in the Windows iii environment through the dynamic link library can be an effective platform to provide different programming language or inter-integration of resources and effective control.
APA, Harvard, Vancouver, ISO, and other styles
18

Tsai, Ming-ling, and 蔡明麟. "Building the Core of Library Service for Junior High and Elementary School in Yunlin County through Security, Cross-Platform and Free Software." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/20536909496716511669.

Full text
Abstract:
碩士
國立雲林科技大學
資訊管理系碩士班
92
Library circulation service and cataloguing are the major duties of teacher-librarians, and the library Online Public Access Catalogue(OPAC)plays an important role for expanding reader service. This research focuses on reducing the workload of teacher- librarians; moreover an intergated system structure which contains all routine of library operation is proposed. In order to process automating catalogue in a short time is suggested here. The system structure of book cataloguing agent mentioned here uses both National Bibliographic Information Network(NBIT)and Wenkiang Bibliographic Information Network(WBIT)as cataloguing data source. The reduction of cataloging efforts is one of our major purposes in this study. The existing servers equipped for junior high or elementary schools in Yunlin County could be applied to store book data and consequently increase utility rate. To reduce the squander of education resource is our another concern. We apply the SSL protocol as an encryption device for both browser and JAVA application. The encryption device serves as the safeguard for protecting reader''s personal information. It is hoped the JAVA language(with cross platform characteristic) and free software(such as php ,openSSL, FreeBSD and so on)adopted in this study would help to construct an effective library system which can take care both concerns regarding finance and security.
APA, Harvard, Vancouver, ISO, and other styles
19

Dias, Maria Carolina Gaspar. "Os meus pais não se importam - Por trás de um click!" Master's thesis, 2019. http://hdl.handle.net/10316/94927.

Full text
Abstract:
Relatório de Estágio do Mestrado em Ciências da Educação apresentado à Faculdade de Psicologia e de Ciências da Educação
O presente relatório visa apresentar o trabalho desenvolvido no decorrer do estágio curricular do Mestrado em Ciências da Educação da Faculdade de Psicologia e de Ciências da Educação da Universidade de Coimbra (FPCEUC). O estágio decorreu em contexto de Biblioteca Escolar (BE) no Agrupamento de Escolas Coimbra Centro (AECC) no ano letivo de 2018-2019.Apresentam-se, de forma particular, as atividades desenvolvidas no contexto do estágio curricular e o desenvolvimento do projeto de estágio “Por trás de um click!”. No que respeita às atividades desenvolvidas no contexto do estágio é dado enfoque ao projetos desenvolvidos durante o ano no âmbito da BE e as atividades realizadas para os alunos, cuja intervenção se baseou na colaboração da preparação e desenvolvimento das atividades. Dado o crescente desenvolvimento das Tecnologias da Informação e Comunicação (TIC) e a utilização cada vez mais precoce do público mais jovem, torna-se importante consciencializa-los para a utilização segura e consciente das novas tecnologias, sobretudo da Internet, permitindo a aquisição e aprofundamento dos conhecimentos na área que possam ser utilizados para o próprio benefício. Com este projeto pretendeu-se abordar diferentes faixas etárias, sendo o público-alvo uma turma do 1º, 2º e 3º ciclo, de forma a entender os diferentes hábitos diários dos jovens na Internet. Este projeto é descrito detalhadamente, bem como fundamentado através da revisão da literatura, e apresentadas as principais reações do público-alvo e uma breve reflexão do trabalho realizado ao longo do ano letivo.
This report aims to present the work developed during the curricular intership of the Master´s Degree in Educational Sciences of the Faculdade de Psicologia e de Ciências da Educação da Universidade de Coimbra (FPCEUC). The intership took place in the context of school library at the Agrupamento de Escolas Coimbra Centro (AECC) in the school year of 2018-2019.It is presented in particular the activities developed in the context at the intership and the development of the internship project "Por trás de um click!". Regarding the activities developed in the context at the intership, focus is given to projects developed during the year under the BE and the activities carried out for students, whose intervention was based on the collaboration of the preparation and development of the activities.As the growing development of Information and Communication Technologies (ICT) and the increasingly early use of younger audiences, it is important to make them aware of the safe and conscious use of new technologies, especially from the Internet, allowing the acquisition and deepening of knowledge in the area that can be used for their own benefit. With this project it was intended to address different age groups, the audience being a class of 1º, 2º and 3º cycle class, to understand the different daily habits of young people on the Internet. This project is described in detail as well as grounded through the literature review, the main reactions of the target audience and a brief reflection on the work done during the school year are presented.
APA, Harvard, Vancouver, ISO, and other styles
20

Retief, Esther. "The role of inventory control in service quality in a South African academic library." Diss., 2005. http://hdl.handle.net/10500/2250.

Full text
Abstract:
Service quality has always been a tacit assumption within the delivery of academic library services, but since the 1990s demands for accountability from different stakeholders, including the clients, made service quality a highly debated and researched focus in academic libraries all over the world. The scope of the study covers a wide-ranging analysis of discourses underpinning service quality and its accompanying performance indicators in academic libraries. Using the academic library of the University of South Africa as an illustrative case study, this study examines the possible impact of inventory control on the service quality of the academic library in three areas, namely access to information resources, retrieval of information resources and positive implications for sound financial management. The study's findings all point to a positive enhancement of service quality in regard to the three areas mentioned.
Information Science
M. Inf.
APA, Harvard, Vancouver, ISO, and other styles
21

Angus, Lynne. Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1006023.

Full text
Abstract:
The use of technology for competitive advantage has become a necessity, not only for corporate organisations, but for higher education institutions (HEIs) as well. Consequently, corporate organisations and HEIs alike must be equipped to protect against the pervasive nature of technology. To do this, they implement controls and undergo audits to ensure these controls are implemented correctly. Although HEIs are a different kind of entity to corporate organisations, HEI information technology (IT) audits are based on the same criteria as those for corporate organisations. The primary aim of this research, therefore, was to develop a set of IT control criteria that are relevant to be tested in IT audits for South African HEIs. The research method used was the Delphi technique. Data was collected, analysed, and used as feedback on which to progress to the next round of data collection. Two lists were obtained: a list of the top IT controls relevant to be tested at any organisation, and a list of the top IT controls relevant to be tested at a South African HEI. Comparison of the two lists shows that although there are some differences in the ranking of criteria used to audit corporate organisations as opposed to HEIs, the final two lists of criteria do not differ significantly. Therefore, it was shown that the same broad IT controls are required to be tested in an IT audit for a South African HEI. However, this research suggests that the risk weighting put on particular IT controls should possibly differ for HEIs, as HEIs face differing IT risks. If further studies can be established which cater for more specific controls, then the combined effect of this study and future ones will be a valuable contribution to knowledge for IT audits in a South African higher education context.
APA, Harvard, Vancouver, ISO, and other styles
22

Clossum, Rhonda Marisa. "Information Privacy: A Quantitative Study of Citizen Awareness, Concern and Information Seeking Behavior Related to the Use of the Social Security Number as a Personal Identifier." 2010. http://trace.tennessee.edu/utk_gradthes/614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Mogiba, Ntombizandile Cynthia. "Utilising radio-frequency identification technologies as knowledge management enablers in academic libraries: a case study of the University of South Africa." Diss., 2018. http://hdl.handle.net/10500/25322.

Full text
Abstract:
The quest to generate, preserve and utilise knowledge is driving firms and organisations towards a knowledge-based approach to managing organisational knowledge assets. Therefore, knowledge management (KM) is becoming increasingly important for organisations such as academic libraries to enhance their competitive edge in performance, to become more effective and to keep the organisation’s knowledge for future use. The importance of KM cannot be overemphasised in terms of how academic libraries can find meaningful and effective ways to manage knowledge resources to improve the services rendered to information users. Pressure is mounting for academic libraries to attain, retain and share knowledge for strategic planning, decision-making and remaining competitive. The adoption of radio-frequency identification (RFID) technologies is one of the preferred approaches to managing organisational knowledge assets; therefore, this was the motivation for undertaking this study in order to understand how these new technologies can change the knowledge management landscape in academic libraries. A qualitative research methodology, informed by the interpretivist research philosophy, was adopted in this study. Data were collected from a sample of 12 participants using non-probability purposive and convenience sampling techniques. The use of purposive and convenience techniques was ideal for this study because the participants were readily available and possessed the relevant data required to address the research questions and research problem of the study. Open-ended questions were designed to form an interview guide, which was the main data collection instrument. Annual reports, system manuals and user manuals were consulted to augment the primary data collected to address the problem at hand. The findings from the study showed that RFID technologies improved efficiency, tracking and tracing, inventory management and assisted with planning. It was revealed that users of RFID technologies required further training and development to fully utilise these systems for the benefit of the organisation. The study was conducted using a small sample of 12 participants; therefore, it was recommended that further studies could be conducted with large sample sizes using different research strategies. It was suggested that further research should be conducted to establish how change programmes have been managed before in other departments or sections and how the staff exodus was managed. An organisation-wide research would be recommended to ascertain the views and opinions of a larger population so that findings can be generalisable.
Information Science
M. Inf. (Information Science)
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Hongwei. "Multilevel adaptive security system." Thesis, 2006. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2006-029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bajracharya, Mandur Bajra. "Cluster-based wireless mobile ad-hoc network security." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gang, Litao. "On the data hiding theory and multimedia content security applications." Thesis, 2002. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2002-018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Yoon, Dae-Gwun. "Analysis of truck delays at container terminal security inspection stations." Thesis, 2007. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2007-059.

Full text
Abstract:
Thesis (Ph.D) -- New Jersey Institute of Technology, Executive Committee for the Interdisciplinary Program in Transportation, 2007.
Includes bibliographical references. Also available via the World Wide Web.
APA, Harvard, Vancouver, ISO, and other styles
28

Ling, Li. "Unified architecture of mobile ad hoc network security (MANS) system." Thesis, 2006. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2006-112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Congzhe. "Ad hoc network security and modeling with stochastic petri nets." Thesis, 2004. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2004-107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Yan, Wei. "Security information management with frame-based attack presentation and first-order reasoning." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Poupart, Clay Andrew. "When will my turn come? the Civil Service purges and the construction of a gay security risk in the Cold War United States, 1945-1955 /." 2005. http://library2.usask.ca/theses/available/etd-09142005-114258/unrestricted/clay_poupart.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography