Dissertations / Theses on the topic 'Political aspects of Electronic data processing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 dissertations / theses for your research on the topic 'Political aspects of Electronic data processing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Wan, Charn Wing. "The political economy of digital copyright in Hong Kong /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?jsd-slw-b23750893f.pdf.
Full text"Submitted to School of Law in partial fulfillment of the requirements for the degree of Doctor of Juridical Science." Includes bibliographical references (leaves 435-452)
Marks, Steven Adam. "Nurses' attitudes toward computer use for point-of-care charting." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/2006.
Full textDevaney, Mark David. "Plan recognition in a large-scale multi-agent tactical domain." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/9195.
Full textPelletier, Johanne. "A matter of time : digital patina and timeboundedness in new media." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98571.
Full textWilson, Kevin G. 1952. "The social significance of home networking : public surveillance and social management." Thesis, McGill University, 1985. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=72035.
Full textHunter, Marc W. "CRT anti-glare treatments, image quality, and human performance." Diss., Virginia Polytechnic Institute and State University, 1988. http://hdl.handle.net/10919/52323.
Full textPh. D.
Quiñones, Cesar. "Implementation business-to-consumer electronic commerce website using asp.net web programming framework." CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2948.
Full textGottleber, Timothy Theodore. "The Association between Attitudes toward Computers and Understanding of Ethical Issues Affecting Their Use." Thesis, University of North Texas, 1992. https://digital.library.unt.edu/ark:/67531/metadc277720/.
Full textTeesri, Sumuscha. "Implementation business-to-business electronic commerce website using active server pages." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/3023.
Full textFu, Yuk-kam Connie, and 傅玉琴. "The use of web 2.0 social media tools by the HKSAR Government." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46780324.
Full textFung, Man-chee, and 馮敏芝. "Evaluation of the implementation of social media of Hong Kong Government." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46780361.
Full textpublished_or_final_version
Politics and Public Administration
Master
Master of Public Administration
Riley, Will. "We the undersigned." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28102.
Full textCommittee Chair: DiSalvo, Carl; Committee Member: Bogost, Ian; Committee Member: Klein, Hans; Committee Member: Murray, Janet; Committee Member: Pearce, Celia
Yang, Ching-Ling. "Java/XML-based Trading Information Processing System for produce wholesale market." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2711.
Full textWang, Jie. "Moral Judgment and Digital Piracy: Predicting Attitudes, Intention, and Behavior Regarding Digital Piracy Using a Modified Version of the Defining Issues Test." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc822761/.
Full textKativu, Tatenda Kevin. "A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18630.
Full textCastelini, Pricila. "Mulheres ma computação: percepções, memórias e participação de estudantes e egressas." Universidade Tecnológica Federal do Paraná, 2018. http://repositorio.utfpr.edu.br/jspui/handle/1/2944.
Full textPesquisas do Instituto Nacional de Estudos e Pesquisas Educacionais (INEP), Censo da Educação Superior, Teses e Dissertações, apontam que os cursos de graduação na área de Computação são os com menor número de mulheres matriculadas. Assim, para compreender quais os fatores para esta disparidade, foram propostas, nesta pesquisa, três oficinas com estudantes e egressas de cursos da área de computação de uma universidade federal: a primeira foi uma atividade presencial com estudantes da área de Computação para entender as percepções e memórias destas pessoas; a segunda também foi uma atividade presencial com este mesmo intuito, porém, com egressas de Bacharelado em Sistemas de Informação (BSI) e Engenharia de Computação (EC); e a terceira, um espaço virtual para promover a participação e discussão sobre as memórias das egressas. Para essas três oficinas, utilizou-se uma prática de Design Participativo (DP), a Oficina de Futuro. O Design Participativo proporcionou que cada uma das atividades tivesse o desenvolvimento conduzido de forma diferente, pois a proposta de DP permitiu que as práticas fossem organizadas colaborativamente pelos participantes, o que difere dos dados obtidos por questionários, por exemplo. Os resultados destas aproximações trazem as percepções e memórias de estudantes e egressas sobre a participação de mulheres na área de Computação. Estes resultados encaminham que cabe à sociedade e à comunidade acadêmica promover discussões para a implementação de política de cotas para gêneros, promover mudanças, apontando para a igualdade de gênero, no ambiente escolar, no mercado de trabalho e nos papéis sociais.
In researches of National Institute for Educational Studies and Research (NIES), Higher Education Census, Theses and Dissertation, it was observed that undergraduate courses in Computing are those with fewer women enrolled. Accessing such information identifies that quantify data about women participation in Computing area is insufficient. Thus, to comprehend which factors to this disparity has proposed three workshops: first face-to-face workshop with students of Computing area; second also a workshop, however, with recent grads of Bachelor of Information Systems and Computer Engineering; and third a virtual space for collaboration on topics that involve the women participation in Computing, remote mode, in corais.org plataform, three workshops were with students and recent grads from the same Institution – Federal Technological University of Paraná – in Curitiba. The three workshops used Participatory Design (PD) practice - future workshop, however in each of them the development was different, because (PD) allowed that participants organized the approach collaboratively. The results bring perceptions and memories of students and recent grad about women participation in Computing, and these results point out that is up to society and to University, to promote discussions to implementing genre quotas, changes since childhood, at school, and the participation of parents and all the society; it is necessary to point to gender equality; labor market; opportunities; destruction of gender categories and the development of public policy for equity.
"漫長的電子革命: 計算機與紅色中國的技術政治1955-1984 = Machine for a long revolution : computer as the nexus of technology and class politics in China 1955-1984." 2014. http://library.cuhk.edu.hk/record=b6115444.
Full text作為一個技術和文化的雙重物件,電子計算機及其衍生科技(臺式計算機、筆記本電腦、智慧手機、平板電腦等)是理解當代資本主義生產、消費、與勞動關係的指標性科技。然而在社會主義中國的革命現代化進程中,它卻曾經一度拐入了一條另類的發展路徑。中國的信息化(informationalization)或曰計算機化(computerization)過程中的技術路線鬥爭和轉型是如何發生的,這一進程與中國「從毛到鄧」的獨特現代化道路之間是怎樣的關係?時至今日,批判的傳播研究對這段歷史依然所知甚少。本文試圖重訪這個歷史轉折,探查計算機在中國的早期技術政治史。通過追蹤關鍵的歷史事件、人物、思潮、和政策,論文試圖探尋冷戰架構下東西方技術政治之間的交鋒,如何在被計算機仲介的生產與勞動關係中顯影。從這個「閃回」中得到的知識,有助我們將對今日中國信息產業和信息勞動的理解,重新納入中國革命現代性的潮起潮落之中。
This paper traces the political and social history for the installation process of digital technology in China, in order to shed light on the ways in which computer interacted with the transformation of Chinese socialism. Due to geopolitical structure of the Cold War, unlike other East Asian countries, before 1980s China had developed its independent computer industry for more than 30 years. This development was not just under the rubric of techno-nationalism, which mainly helps to fulfill military and national defense aims, but also embedded into proletariat political debates. Maoist China developed a dialectical approach to technology, in which the most powerful productive power is the revolutionary proletariat class per se, not the machine or technology. So the process of socialist technology development, like the process of socialist culture and arts development is also a dialectical process, which must follow mass line to not just develop productive force, but also transform production relations and create socialist subjectivity. Instead, the post-Mao leadership under Deng Xiaoping responded to external Cold War pressures and the profound internal crises of state socialism by a massive market-oriented "reform and open-up" process. It is during the same period that the self-reliant computer industry system was replaced step-by-step by a western-oriented system, signified by the popularity of Alvin Toffler’s The Third Wave. In this context, computer became a machine for labor control and scientific management, no longer a machine for people’s emancipation.
With a focus on technology politics of computer in China during 1955-1984, this study examines how the concept of computer was introduced into the country and conceived by key players at the time, how such discourses led to the production and consumption of computer by different actors, and how this process triggered the transformation of hegemony and practice related to computer-mediated labor relationship, and finally how such a historical formation was conditioned by the post-cold war structure in East Asia, as well as struggles between Maoist socialist legacy and transborder neo-liberalism ethic. This dissertation revisits this transformation, traces its Key Figures and several historical moments, which shows debates and struggles on computer as the articulation of technology and class politics. Reflections from this flashback will rehistorize China’s working-class formation in its electronic industry nowadays into the ebbs and flows of China’s revolutionary modernity.
Detailed summary in vernacular field only.
Detailed summary in vernacular field only.
王洪喆.
Thesis (Ph.D.) Chinese University of Hong Kong, 2014.
Includes bibliographical references (leaves 336-360).
Abstracts also in English.
Wang Hongzhe.
Whittaker, Louise. "An object-oriented approach to the privacy problems posed by digital information and communication technologies." Thesis, 2016. http://hdl.handle.net/10539/21975.
Full textThe advent of digital ICT has raised a range of privacy problems that previously did not occur, owing to the scope and volume of data that can be collected, as well as the processing capacity of the application. These digital privacy problems are arguably not easily addressed within any particular traditional macroethical framework. We may therefore need to find an alternative approach. One such approach is proposed by Luciano Floridi, who has devised “Information Ethics” - a macroethics for the identification, clarification and solution of digital ethical issues. While IE is useful in that it highlights questions of digital agency, it will be demonstrated that it is flawed when applied to problems of privacy posed by digital ICT. IE, however, points us in the right direction: An object-oriented ethics may be able to address the issue of digital agents. In this essay I develop an argument for the moral intentionality of digital agents, based on the concepts of emergent value and indirect intentionality, that can underpin an object-oriented ethical approach to digital privacy for both digital and human agents. Using Nissenbaum’s concept of contextual spheres, I provide normative guidelines for evaluating the competing interests of agent-objects in various digital spheres. A brief evaluation of the approach, by way of an example, shows that the object-oriented LoA that I am proposing can be adopted for digital privacy problems. In such cases, and for the specific purpose of weighing up the competing rights and values of the agents and patients, we can treat all agents (human and non-human) as both intentionality and real. This provides a reading of the case that goes beyond the consequentialist or ownership-based approaches, and arguably gets closer to the heart of the issue. Where the approach is still open, however, is that we still have to justify and balance these interests. There is no simple formula to apply. A need for practical wisdom or Phronesis, in the form of a judicious weighing of moral interests, continues to apply to digital problems posed by ICT.
GR2017
Daya, Jithendra Chotoo. "Privacy policies and practices: an investigation of secondary use of information within South African retail banking institutions." Thesis, 1996. http://hdl.handle.net/10539/21614.
Full textThis paper addresses concerns surrounding information privacy and the secondary use of information in South African corporations. This study also attempts to assess the level of concern that management and information technology practitioners if! South African retail banks have about privacy issues. The research suggests that privacy is a huge concern internationally and may affect South African corporations if they do not follow certain policies and practices. Eleven in-person structured interviews were conducted at four banks. The research proposes a set of guidelines by which South African management and IT practitioners, who are involved with the identification and solution of some of the problems that may be presented by possible privacy legislation, will be able to assess their policies and practices against international practices and policies. The results inform IS managers and executives about appropriate business policies they can implement voluntarily to address public concerns about specific information practices that may be considered a threat to privacy. The findings suggest that the executives are deliberately avoiding confronting the issue of information privacy for as long as possible. The executives are adopting a wait-and-see attitude and will react 011 whatever legislation requires them to do. At the time of the report senior executives at banks were not accepting responsibility for information privacy policies and practices and were leaving this responsibility; to the middle level managers who implement their own practices based on their own needs.
GR2017
Pritchard, Maritha. "The Gautrain : active communication research on the manifestations of the hacker ethic by citizen journalists." Thesis, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001288.
Full textExplores the themes derived from the six tenets of the hacker ethic in blog posts about the Gautrain project over a one-year period. It also describes how citizen journalists express the six tenets of the hacker ethic when blogging about the Gautrain project.
Pitcher, Sandra. "The mass collaboration of digital information : an ethical examination of YouTube and intellectual property rights." Thesis, 2010. http://hdl.handle.net/10413/565.
Full textThesis (M.A.)-University of KwaZulu-Natal, Pietermaritzburg, 2010.
Desai, Akshay A. "Data analysis and creation of epigenetics database." Thesis, 2014. http://hdl.handle.net/1805/4452.
Full textThis thesis is aimed at creating a pipeline for analyzing DNA methylation epigenetics data and creating a data model structured well enough to store the analysis results of the pipeline. In addition to storing the results, the model is also designed to hold information which will help researchers to decipher a meaningful epigenetics sense from the results made available. Current major epigenetics resources such as PubMeth, MethyCancer, MethDB and NCBI’s Epigenomics database fail to provide holistic view of epigenetics. They provide datasets produced from different analysis techniques which raises an important issue of data integration. The resources also fail to include numerous factors defining the epigenetic nature of a gene. Some of the resources are also struggling to keep the data stored in their databases up-to-date. This has diminished their validity and coverage of epigenetics data. In this thesis we have tackled a major branch of epigenetics: DNA methylation. As a case study to prove the effectiveness of our pipeline, we have used stage-wise DNA methylation and expression raw data for Lung adenocarcinoma (LUAD) from TCGA data repository. The pipeline helped us to identify progressive methylation patterns across different stages of LUAD. It also identified some key targets which have a potential for being a drug target. Along with the results from methylation data analysis pipeline we combined data from various online data reserves such as KEGG database, GO database, UCSC database and BioGRID database which helped us to overcome the shortcomings of existing data collections and present a resource as complete solution for studying DNA methylation epigenetics data.
Kalash, Abeer. "Trust modelling through social sciences." Thesis, 2014. http://hdl.handle.net/1805/6454.
Full textIn today's fast paced world, people have become increasingly interested in online communication to facilitate their lives and make it faster. This goes on from simple social interactions to more advanced actions like shopping on the internet. The presence of such activities makes it crucial for people to use their common sense and judgment to process all this information and evaluate what/who they trust and what/whom they do not. This process would have been much easier if the number of people in such networks is really small and manageable. However, there are millions of users who are hooked online every day. This makes the person very overwhelmed with his trusting decision, especially when it comes to interacting with strangers over the internet, and/or buying personal items, especially expensive ones. Therefore, many trust models have been proposed by computer scientists trying to evaluate and manage the trust between users using different techniques and combining many factors. What these computer scientists basically do is coming up with mathematical formulas and models to express trust in online networks and capture its parameters. However, social scientists are the people better trained to deal with concepts related to human behaviors and their cognitive thinking such as trust. Thus, in order for computer scientists to support their ideas and get a better insight about how to direct their research, people like social scientists should contribute. With this in mind, we realized in our group work the importance of such contribution, so we came up with the idea of my research work. In my search, I tried to find how these social scientists think and tackle a dynamic notion like trust, so we can use their findings in order to enhance our work and trust model. Through the chapters, I will discuss an already developed trust model that uses measurement theory in modeling trust. I will refer back to this model and see how other social scientists dealt with some of the issues encountered by the model and its functionality. Some small experiments have been done to show and compare our results with social scientists results for the same matter. One of the most important and controversial points to be discussed from social scientists' point of view is whether trust is transitive or not. Other points to be discussed and supported by social scientists' research include aggregation, reputation, timing effects on trust, reciprocity, and experience effects on trust. Some of these points are classified into trust mapping categories and others are related to trust management or decision making stages. In sum, this work is a multidisciplinary study of trust whose overall goal is to enhance our work and results, as computer scientists.
Yang, Tao. "Brand and usability in content-intensive websites." Thesis, 2014. http://hdl.handle.net/1805/4667.
Full textOur connections to the digital world are invoked by brands, but the intersection of branding and interaction design is still an under-investigated area. Particularly, current websites are designed not only to support essential user tasks, but also to communicate an institution's intended brand values and traits. What we do not yet know, however, is which design factors affect which aspect of a brand. To demystify this issue, three sub-projects were conducted. The first project developed a systematic approach for evaluating the branding effectiveness of content-intensive websites (BREW). BREW gauges users' brand perceptions on four well-known branding constructs: brand as product, brand as organization, user image, and brand as person. It also provides rich guidelines for eBranding researchers in regard to planning and executing a user study and making improvement recommendations based on the study results. The second project offered a standardized perceived usability questionnaire entitled DEEP (design-oriented evaluation of perceived web usability). DEEP captures the perceived website usability on five design-oriented dimensions: content, information architecture, navigation, layout consistency, and visual guidance. While existing questionnaires assess more holistic concepts, such as ease-of-use and learnability, DEEP can more transparently reveal where the problem actually lies. Moreover, DEEP suggests that the two most critical and reliable usability dimensions are interface consistency and visual guidance. Capitalizing on the BREW approach and the findings from DEEP, a controlled experiment (N=261) was conducted by manipulating interface consistency and visual guidance of an anonymized university website to see how these variables may affect the university's image. Unexpectedly, consistency did not significantly predict brand image, while the effect of visual guidance on brand perception showed a remarkable gender difference. When visual guidance was significantly worsened, females became much less satisfied with the university in terms of brand as product (e.g., teaching and research quality) and user image (e.g., students' characteristics). In contrast, males' perceptions of the university's brand image stayed the same in most circumstances. The reason for this gender difference was revealed through a further path analysis and a follow-up interview, which inspired new research directions to unpack even more the nexus between branding and interaction design.