To see the other types of publications on this topic, follow the link: Public housing Security measures.

Dissertations / Theses on the topic 'Public housing Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 47 dissertations / theses for your research on the topic 'Public housing Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Fenley, Vanessa M. "Performance Measures, Marginalized Populations, and Democratic Participation| The Case of Permanent Supportive Housing." Thesis, University of Colorado at Denver, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10681751.

Full text
Abstract:
<p> Democratic participation has been integrated in public administration theory and practice since the mid 20th century. It is a strategy used by public entities to enhance social equity by engaging citizens, including those who are marginalized and lack political efficacy. Most efforts to engage the public focus on program or policy planning rather than developing and interpreting performance measures. Even more limited are efforts to engage marginalized citizens in this work. This dissertation explores how preferences for performance measures differ between public sector representatives at the federal, state, and local levels and the marginalized citizens served by the public program of focus. Permanent supportive housing, or housing designed specifically for individuals moving out of homelessness, serves as a case in point to explore this research question. Research findings indicate that marginalized citizens differ frequently from public sector representatives in regards to both the importance assigned to selected performance measures and to their perceptions of what specific performance measures may indicate. Findings contribute to the literature on performance measurement, democratic participation, and social equity, and have practical applications for public administrators seeking to engage citizens in public processes.</p><p>
APA, Harvard, Vancouver, ISO, and other styles
2

Clevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.

Full text
Abstract:
The RSA data encryption algorithm was developed by Ronald Rivest, Adi Shamir and Leonard Adelman in 1978 and is considered a de facto standard for public-key encryption. This computer science thesis demonstrates the author's ability to engineer a software system based on the RSA algorithm. This adaptation of the RSA encryption process was devised to be used on any type of data file, binary as well as text. In the process of developing this computer system, software tools were constructed that allow the exploration of the components of the RSA encryption algorithm. The RSA algorithm was further interpolated as a method of providing software licensing, that is, a manner in which authorization to execute a particular piece of software can be determined at execution time. This document summarizes the RSA encryption process and describes the tools utilized to construct a computer system based on this algorithm.<br>Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
3

Maass, Sue-Mari. "Tenure security in urban rental housing." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/5405.

Full text
Abstract:
Thesis (LLD (Public Law))--University of Stellenbosch, 2010.<br>Bibliography<br>ABSTRACT ENGLISH: The dissertation considers the tenure rights of urban residential tenants in the post-1994 constitutional dispensation. The 1996 Constitution mandates tenure reform in two instances. Firstly, section 25(6) (read with section 25(9)) mandates the legislature to enact legislation that would provide legally secure tenure rights for a person or community whose tenure of land is insecure as a result of past racially discriminatory laws or practices. This form of tenure reform is race-based. Secondly, section 26(3) mandates the courts to consider all relevant circumstances during eviction proceedings. In terms of this provision the court can refuse to grant the eviction order on the basis of the occupier's socio-economic weakness, which is a more general form of class-related tenure reform. The Constitution also ensures the right to have access to adequate housing, while the legislature must introduce measures that would give effect to this right (sections 26(1) and 26(2)). To determine whether the current landlord-tenant regime in South Africa is able to provide tenants with secure occupation rights and access to rental housing, it is compared to landlord-tenant regimes in pre-1994 South Africa, the United Kingdom, New York State and Germany. The landlord-tenant regimes are considered in light of changing socio-economic circumstances where the state had to assist households during housing shortages. The dissertation assesses the efficiency of landlord-tenant law, combined with regulatory measures that ensure substantive tenure rights and rent restrictions, as a form of tenure that could help alleviate housing shortages and initiate a new landlord-tenant regime for South Africa that would give effect to the Constitution. The dissertation concludes that the current substantive tenure rights of urban residential tenants are largely based on the common law, which is associated with weak tenure security. The landlord-tenant laws, namely the Rental Housing Act 50 of 1999 and the Social Housing Act 16 of 2008, fail to provide urban residential tenants with substantive tenure rights. The legislature has failed to enact a law that gives effect to section 25(6) in the landlord-tenant framework. The legislature did enact the Prevention of Illegal Eviction from and Unlawful Occupation of Land Act 19 of 1998 (PIE) in order to give effect to section 26(3). Recently the courts interpreted PIE to provide marginalized tenants with substantive tenure protection during eviction proceedings. However, to give effect to section 25(6) legislation should grant residential tenants substantive tenure rights that are legally secure prior to eviction. The legislature enacted the Rental Housing Act and the Social Housing Act to give effect to the right to housing (section 26 of the Constitution) in the landlord-tenant framework. These laws fail to promote access to rental housing as a form of tenure that could help alleviate housing shortages.<br>AFRIKAANSE OPSOMMING: Die proefskrif oorweeg die okkupasieregte van stedelike residensiële huurders in die post-1994 konstitusionele bedeling. Die 1996 Grondwet bepaal dat okkupasieregte in twee gevalle hervorm moet word. Eerstens gee artikel 25(6) (gelees met artikel 25(9)) opdrag aan die wetgewer om wetgewing te verorden wat okkupasieregte met verblyfsekerheid aan 'n person of gemeenskap sal verleen indien so 'n person of gemeenskap tans grond okkupeer met okkupasieregte wat onseker is as gevolg van vorige rasgebaseerde wetgewing. Hierdie tipe hervorming is rasgebaseer. Tweedens gee artikel 26(3) opdrag aan die howe om alle relevante faktore te oorweeg as deel van enige uitsettingsprosedure. In terme van hierdie bepaling is die howe gemagtig om 'n uitsettingsbevel te weier op die basis van die okkupeerder se sosio-ekonomiese kwesbaarheid. Hierdie tipe hervorming is 'n meer algemene klasgebaseerde hervorming. Artikel 26(1) (gelees met artikel 26(2)) van die Grondwet bepaal dat elkeen die reg op toegang tot geskikte behuising het, terwyl die staat redelike wetgewende en ander maatreëls moet tref om hierdie reg te verwesenlik. Ten einde te bepaal of die huidige huurbehuisingstelsel in Suid-Afrika voldoende is, met inagneming van die stelsel se vermoë om huurders te voorsien van okkupasieregte met verblyfsekerheid en van toegang tot huurbehuising, word dit vergelyk met die huurbehuisingstelsels in Suid Afrika voor 1994, die Verenigde Koninkryk, New York Staat en Duitsland. Hierdie huurbehuisingstelsels word bespreek met inagneming van veranderinge in die sosio-ekonomiese omstandighede waartydens die staat gedurende behuisingstekorte huishoudings moes ondersteun. Die doeltreffendheid van huurbehuising word beoordeel met verwysing na regulasies wat substantiewe okkupasieregte verseker en beperkings plaas op huurpryse om 'n vorm van verblyfreg daar te stel wat die behuisingstekort kan verminder ten einde 'n nuwe huurbehuisingstelsel vir Suid-Afrika te inisieër wat gevolg aan die Grondwet sal gee. Die proefskrif lei tot die gevolgtrekking dat die huidige substantiewe okkupasieregte van stedelike residensiële huurders grotendeels op die gemenereg gebaseer is. Die gemenereg maak nie voorsiening vir sterk substantiewe okkupasieregte nie. Die huidige huurbehuisingswetgewing, naamlik die Wet op Huurbehuising 50 van 1999 en die Wet op Maatskaplike Behuising 16 van 2008, slaag nie daarin om substantiewe okkupasieregte vir stedelike residensiële huurders te voorsien nie. Die wetgewer het nie daarin geslaag om 'n wet te promulgeer wat in die huurbehuisingsraamwerk aan artikel 25(6) effek gee nie. Die wetgewer het wel die Wet op die Voorkoming van Onwettige Uitsetting en Onregmatige Besetting van Grond 19 van 1998 verorden om effek te gee aan artikel 26(3) van die Grondwet. Hierdie Wet is onlangs so deur die howe geïnterpreteer dat dit kwesbare huurders tydens uitsettingsprosedures met substantiewe okkupasieregte beskerm. Om aan artikel 25(6) te voldoen moet wetgewing egter substantiewe okkupasieregte met verblyfsekerheid aan residensiële huurders verskaf voordat hulle uitgesit word. Die wetgewer het die Wet op Huurbehuising en die Wet op Maatskaplike Behuising verorden ten einde effek aan die reg op behuising (artikel 26 van die Grondwet) in die gebied van huurbehuising te gee. Geeneen van hierdie wette slaag daarin om toegang tot behuising, en veral huurbehuising as 'n vorm van okkupasie, te bevorder ten einde die behuisingtekort te verminder nie.
APA, Harvard, Vancouver, ISO, and other styles
4

Ramirez, Christina M. "Water security and its importance in protecting public health." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

KASPAREK, JASON W. "SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL." University of Cincinnati / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cheung, Lai-sze, and 張麗詩. "Delegation of rights using PKI-based components." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29973053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kanane, Aahd, and Casandra Grundstrom. "ISM: Irrelevant Soporific Measures - Giving Information Security Management back its groove using sociomateriality." Thesis, Umeå universitet, Institutionen för informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-101978.

Full text
Abstract:
Information security management is now a major concern for any organization regardless of its type, size, or activity field. Having an information security system that ensures theavailability, the confidentiality, and the integrity of information is not an option anymorebut a necessity. Information security management identifies difficulties with user behaviourand compliance that is centralized around policies, perceptions, and practices. In order to address how they affect information security management, these three issues are holistically explored using a sociomaterial framework to engage the understanding of human andnonhuman components. A case study of a university in Sweden was conducted and it was found that despite the sophistication of the IT system, human behaviours are a pertinent component of information security management, and not one that can be ignored.
APA, Harvard, Vancouver, ISO, and other styles
8

Fernandez, Irma Becerra. "Encryption-based security for public networks : technique and application." FIU Digital Commons, 1994. http://digitalcommons.fiu.edu/etd/3296.

Full text
Abstract:
This dissertation describes the development of a new system whereby the Public Switch Telephone Network (PSTN), which is not secure, can perform like a private network. Integrated Services Digital Network (ISDN) forms a technical platform for other communication technologies, such as frame relay and Switched Megabit Data Service (SMDS). This is an original and innovative hardware and software design which can be embedded into the ISDN Customer Premises Equipment (CPE) to privatize the public ISDN without the need to upgrade the existing switching equipment. This research incorporates original design and development of the following hardware and software modules to provide real-time encryption and decryption of images and data in the ISDN medium: 1. ISDN Communications Module with customized Caller-ID access. 2. Token Access Control module for secure log-in. 3. A Hybrid Cryptographic Module, public key for key management and authentication, and private key for privacy. This Cryptographic module, the Security Extension Module to the Terminal Adapter (SEMTA), was implemented in software, and then optimized in hardware. This work proves that medical images and legal documents can be transmitted through the PSTN without any security breach, guaranteeing the privacy, confidentiality, and authenticity of the data.
APA, Harvard, Vancouver, ISO, and other styles
9

Hiscock, Rosemary Esther. "The relationship between housing tenure and health : does ontological security play a role?" Thesis, University of Glasgow, 2001. http://theses.gla.ac.uk/6146/.

Full text
Abstract:
Previous research in the UK and elsewhere has found that housing tenure (i.e. whether the dwelling is owned or rented) predicts mortality and morbidity. This thesis aims to explain whether ontological security (a long term tendency to believe things are reliable and secure as opposed to threatening) is more likely to be associated with owner occupation, and therefore whether it helps to explain the observed association with tenure and health. For the purposes of this study ontological security was operationalised as being formed of three components: protection, autonomy and prestige. A scale was devised to measure ontological security arising from the home through these three components. This scale was included in a postal survey that also included questions on health, housing area, psychological and sociodemographic characteristics. The postal survey was sent to a random sample of adults in the West of Scotland and nearly 300 completed questionnaires were returned. I found that ontological security was associated with owner occupation but not independently of features of housing. Ontological security was not independently related to housing tenure itself. Owner occupiers reported more ontological security from their homes because their homes were in better condition, situated in better areas and of higher value than social renters. Ontological security appeared to be related to health particularly through psychological characteristics. Other reasons for the associations between tenure and health were that owners were on average younger and richer than social renters. This study suggests that social meaning per se may not be health damaging, but that social rented homes might put their occupants at greater health risk because they are in poorer condition, located in more poorly resourced and problem ridden areas and of lower status. These features of social renting may also be observed in other countries (e.g. USA).
APA, Harvard, Vancouver, ISO, and other styles
10

Baek, Joonsang 1973. "Construction and formal security analysis of cryptographic schemes in the public key setting." Monash University, School of Network Computing, 2004. http://arrow.monash.edu.au/hdl/1959.1/5243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tuyikeze, Tite. "A model for information security management and regulatory compliance in the South African health sector." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/425.

Full text
Abstract:
Information Security is becoming a part of the core business processes in every organization. Companies are faced with contradictory requirements to ensure open systems and accessible information while maintaining high protection standards. In addition, the contemporary management of Information Security requires a variety of approaches in different areas, ranging from technological to organizational issues and legislation. These approaches are often isolated while Security Management requires an integrated approach. Information Technology promises many benefits to healthcare organizations. It helps to make accurate information more readily available to healthcare providers and workers, researchers and patients and advanced computing and communication technology can improve the quality and lower the costs of healthcare. However, the prospect of storing health information in an electronic form raises concerns about patient privacy and security. Healthcare organizations are required to establish formal Information Security program, for example through the adoption of the ISO 17799 standard, to ensure an appropriate and consistent level of information security for computer-based patient records, both within individual healthcare organizations and throughout the entire healthcare delivery system. However, proper Information Security Management practices, alone, do not necessarily ensure regulatory compliance. South African healthcare organizations must comply with the South African National Health Act (SANHA) and the Electronic Communication Transaction Act (ECTA). It is necessary to consider compliance with the Health Insurance Portability and Accountability Act (HIPAA) to meet healthcare international industry standards. The main purpose of this project is to propose a compliance strategy, which ensures full compliance with regulatory requirements and at the same time assures customers that international industry standards are being used. This is preceded by a comparative analysis of the requirements posed by the ISO 17799 standard and the HIPAA, SANHA and ECTA regulations.
APA, Harvard, Vancouver, ISO, and other styles
12

Guillaume, Fumeaux. "Public Software as a Service a Business-Driven Guidance for Risk Control." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60510.

Full text
Abstract:
Because cloud computing adoption grows day-by-day, it is essential for theexecutives of a company to be able to rely on a risks management guidanceto fully grasp all the aspects concerning cloud computing security.The concerns of the industry, the security standards, the official guidelines,and the European laws about the security when using cloud serviceshave been analyzed. The risks, the measures, and the obligations have beengathered. This paper, with all these information collected, describes how torun a risk management for public SaaS security keeping a business-drivenmindset. While running the risk assessment, the management should look atthe impact a threat may have on company activities, image, and finances. Itwill decide on the measures that should be implemented by the administrationor the IT.Following this guidance should minimize the risk of using public SaaScloud computing and allowing a company to align its security goals with itsbusiness goals.
APA, Harvard, Vancouver, ISO, and other styles
13

Kelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Public key infrastructure (PKI) was created to provide the basic services of confidentiality, authenticity, integrity and non-repudiation for sensitive information that may traverse public (un-trusted) networks. This thesis provides a brief description of the background and functional components of a PKI, and then "builds" a PKI to be used for research at the Naval Postgraduate School (NPS). Deficiencies of this PKI with respect to DoD PKI policy are delineated. The thesis addresses details of software selection, installation, configuration and operation; using Netscape's Certificate Management System as its Certificate Authority application of choice. The functionality of this PKI was validated by testing all major certificate lifecycle events (creation, archival, revocation, validation, etc.) All but two of these tests were successful-key escrow and revocation checking-and thus these two remain to be addressed by further work to make the NPS PKI fully functional.<br>First Lieutenant, United States Air Force<br>Lieutenant Commander, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
14

Gottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.

Full text
Abstract:
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identifying Critical Infrastructure and its interdependencies. The purpose of this research is to highlight the importance of protecting Critical Infrastructure as well as proposing a high level framework aiding in the identification and securing of Critical Infrastructure. To achieve this, key case studies involving Cyber crime and Cyber warfare, as well as the identification of attack vectors and impact on against Critical Infrastructure (as applicable to Critical Infrastructure where possible), were identified and discussed. Furthermore industry related material was researched as to identify key controls that would aid in protecting Critical Infrastructure. The identification of initiatives that countries were pursuing, that would aid in the protection of Critical Infrastructure, were identified and discussed. Research was conducted into the various standards, frameworks and methodologies available to aid in the identification, remediation and ultimately the protection of Critical Infrastructure. A key output of the research was the development of a hybrid approach to identifying Critical Infrastructure, associated vulnerabilities and an approach for remediation with specific metrics (based on the research performed). The conclusion based on the research is that there is often a need and a requirement to identify and protect Critical Infrastructure however this is usually initiated or driven by non-owners of Critical Infrastructure (Governments, governing bodies, standards bodies and security consultants). Furthermore where there are active initiative by owners very often the suggested approaches are very high level in nature with little direct guidance available for very immature environments.
APA, Harvard, Vancouver, ISO, and other styles
15

Fairweather, Patty Allison. "Judicial review state supreme judicial views on balancing civil liberties and public safety/security measures during the global war on terror /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FFairweather.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Defense and Security))--Naval Postgraduate School, March 2009.<br>Thesis Advisor(s): Strindberg, Anders ; Simeral, Robert. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Judicial Review, Balancing Civil Liberties, Global War on Terror, Political Spaces, Strategic. Includes bibliographical references (p. 99-106). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
16

Kwok, Hon-man Sammy, and 郭漢文. "A scalable and secure networking paradigm using identity-based cryptography." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Alakpa, George Edafese U. "Perceptions of military personnel| Analysis of the Department of Defense?s counter bioterrorism measures at the tactical level for the enhacement of civil security, leadership, management, and policy." Thesis, New Jersey City University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3730740.

Full text
Abstract:
<p> The Department of Defense, at the time of this study, had over 38 combat Forward Operating Bases (FOB) with both U.S. military and non-military personnel residing and engaged in the mission. Also in these FOBs, are local nationals of the countries, who are employed to perform certain duties in these FOBs after having had certain security and medical background checks. However, while on military mission in Afghanistan and other Middle Eastern countries between 2009 and 2011, this researcher, observed and detected more than once, local nationals (LNs), Afghans, with certain infectious skin conditions working in the DIFACs (dining facilities) at major FOBs, serving food to soldiers inside the base. These LNs reside outside the FOB facility and gain entrance into the FOB daily, passing through already set security parameters put in place by the Department of Defense (DoD). There are Tactics, Techniques, and Procedures (TTP) to prevent or mitigate Person-borne Improvised Explosive Device (PBIED), Vehicle-borne Improvised Explosive Device (VBIED), and to also respond to, or recover from, Chemical, Biological, Radioactive, and Nuclear (CBRN) attacks on FOBs. Researcher is unaware of any TTP specific for HB-BA terrorist, capable of detecting, deterring or destroying a terrorist with bioagents breaching a combat post ECP; nor the training of soldiers of how to conduct a search on a bio-agent (BA) &ndash; or even what a bio-agent would look like if they found one. The purpose of this research was to determine whether there are current military counter bioterrorism measures in place to combat a human-borne with a bioagent (HB-BA) terrorist attempting to breach a combat FOB at the ECP, and how effective they are. </p><p> To accomplish this, a survey tool had to be developed and employed to determine the perceptions about the effectiveness of current ECP TTPs in detecting, deterring preventing, and mitigating a HBBA terrorist at the ECP, from military personnel. A survey tool (questionnaire) was developed, validated, and subjected to a reliability testing using Cronbach&rsquo;s Alpha on a mix-method cross sectional survey, a pretest. Results showed a Cronbach&rsquo;s Alpha of 0.82 and 0.89 for the survey&rsquo;s two constructs. Also, 92.3% of respondents had recently been in combat deployment. All of them claimed that bioterrorism is very possible, but 61.5% believe it is either very possible or possible for a terrorist with a bioagent (BA) to successfully breach a FOB ECP. Only 3.8% felt that it would be impossible to breach the FOB ECP with a bioagent. Similarly, only 28% of respondents surveyed believe that current ECP TTPs are effective against a BA, 48% believe that current CBRN TTPs are either not effective, or somewhat effective, against BA at the ECP. In conclusion, the preliminary study, indicated that combat FOBs are vulnerable to breach by human-borne with BA terrorist at the ECP, as there exists no currently effective ECP TTP that could detect, deter or destroy a terrorist with a biological agent at a combat FOB ECP.</p>
APA, Harvard, Vancouver, ISO, and other styles
18

Macdonell, James Patrick. "MiniCA: A web-based certificate authority." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3256.

Full text
Abstract:
The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to public-key encryption technologies. The audience for whom the software project is intended includes, technical staff requiring certificates for use in SSL applications (i.e. a secure web-site) at California State University, San Bernardino.
APA, Harvard, Vancouver, ISO, and other styles
19

Willey, James R. "The presence and perceived impact of video surveillance technology in Indiana public schools as reported by building principals." Muncie, Ind. : Ball State University, 2008. http://cardinalscholar.bsu.edu/750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Woods, Natalie Anne. "The Portland Public School Police: Formative Years - 1937 to 1953." PDXScholar, 1995. https://pdxscholar.library.pdx.edu/open_access_etds/5222.

Full text
Abstract:
This thesis traces the historical evolution of one of the early responses to youth crime and violence -- public school police. In addition, this thesis addresses the lack of information about the creation and implementation of a public school police force, specifically the Portland Public School Police and School District No. 1, during its formative years, 1937 to 1953. Finally, the thesis intends to address two principal questions: A) Why did the Portland Board of Education find it necessary to create their own police agency? While one opinion suggests that there was a real need for school police due to the escalating crime raking place within the school district, the other opinion suggests that the school police were created mostly for underlying political reasons rather than general public safety. B) What were the principal functions of the School Police? The initial function of the Portland Public School Police was to protect school property and reduce the monetary loss incurred by the school district. However, after 1941, when large number; of immigrants came to Portland with their school-age children, the Portland Public School Police expanded their function from property protection and reduction of monetary loss to include crime repression and protection.
APA, Harvard, Vancouver, ISO, and other styles
21

McConnell, James Robert. "Essex under Cromwell: Security and Local Governance in the Interregnum." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/686.

Full text
Abstract:
In 1655, Lord Protector Oliver Cromwell's Council of State commissioned a group of army officers for the purpose of "securing the peace of the commonwealth." Under the authority of the Instrument of Government, a written constitution not sanctioned by Parliament, the Council sent army major-generals into the counties to raise new horse militias and to support them financially with a tax on Royalists which the army officers would also collect. In counties such as Essex--the focus of this study--the major-generals were assisted in their work by small groups of commissioners, mostly local men "well-affected" to the Interregnum government. In addition to their militia and tax duties, the men were instructed to see to the implementation and furtherance of a variety of central government policies. Barely a year after its inception, a bill sanctioning the scheme was voted down in January 1657 by a Parliament unconvinced that the work done by the major-generals was in the best interests of the nation. This thesis examines the development and inception of the major-generals initiative by the Council of State, the work the major-generals and their commissioners engaged in, and the nature and cause of the reaction to their efforts in the shires. In the years and centuries following the Stuart Restoration, the major-generals were frequently portrayed as agents of Cromwellian tyranny, and more recently scholars have argued that the officers were primarily concerned with the promulgation of a godly reformation. This study looks at the aims and work of the major-generals largely through an analysis of state papers and Essex administrative records, and it concludes that the Council and officers were preoccupied more with threats to order and stability than with morals. Additionally, by examining the court records and work of the justices of the peace in Essex, this study shows that in regard to improving order the major-generals' work was unremarkable for its efficacy and but little different than previous law- and statute-enforcement activity traditionally carried out by local administrators. Based on this assessment of the major-generals' efforts to improve order as both limited and completely un-revolutionary, this thesis argues that the strongly negative reaction to the major-generals by the parliamentary class was due more to the officers' and government's encroachment on gentry power and local privilege than either the abrogation of the liberties of the people or any modest efforts to foist godliness on the shires. Religion was a major issue during the English Civil Wars, but the demise of one of the Interregnum government's most ambitious attempts to improve security in the localities was rooted not in sectarian distempers but rather in the gentry's preoccupation with keeping central government from meddling in local matters or taxing anyone in their class without parliamentary approval.
APA, Harvard, Vancouver, ISO, and other styles
22

Eklund, Linda. "Kvinnors upplevda otrygghet i Örebro kommun." Thesis, Örebro University, School of Law, Psychology and Social Work, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-11320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

McCord, Eric Steven. "The relationship between place management and physical environment in apartment crime." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2686.

Full text
Abstract:
The focus of this research is crime in multi-unit rental structures, Specifically, apartment complexes. It seeks to identify management policies and environmental attributes that are associated with lower crime and police calls for service rates.
APA, Harvard, Vancouver, ISO, and other styles
24

Stocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.

Full text
Abstract:
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices.
APA, Harvard, Vancouver, ISO, and other styles
25

Waddell, Jane Therese. "The Village Market| New Columbia Goes Shopping for Food Justice." Thesis, Portland State University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10192781.

Full text
Abstract:
<p> The Village Market is a nonprofit Healthy Corner Store that has been open since May of 2011 in the mixed-use, mixed-income New Columbia housing development in Portland, Oregon&rsquo;s Portsmouth neighborhood. The venture began as a &ldquo;community-led&rdquo; effort in partnership with Janus Youth Programs and Home Forward. The project was conceived after a private enterprise in the small grocery space designed into the development failed, leaving the neighborhood without easy access to healthy foods. This dissertation is a case study of the development process, the operation of the market, and the degree to which it addresses food justice and health equity concerns, among others, of residents. It is a case study of the Healthy Corner Store movement that uses food regime theory and political economy perspectives to critically examine the translation of Healthy Corner Store movement theory into practice, highlighting the perspectives of New Columbia residents on the endeavor. It explores the transition of the store from a community-led project to a management-led social enterprise, and the impacts of that approach on local autonomy, food justice, health equity as well as its successes and shortcomings. The store&rsquo;s situation in a mixed-income community meant that it had a particularly diverse set of expectations to navigate, and the changes to the store over time reflect Village Market&rsquo;s growing understanding of the implications of that situation but also a limited capacity to accommodate residents&rsquo; differing tastes and the price sensitivity that many of them exhibit in their shopping habits.</p>
APA, Harvard, Vancouver, ISO, and other styles
26

Huour, Aranya. "Components of Food Insecurity on a University Campus." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/876.

Full text
Abstract:
Many college students across the nation are going hungry and struggling with food insecurity, as their access to food is becoming more challenging to attain. The purpose of this study is to explore the experiences of college students and components that lead them to becoming food insecure. Studies indicate that food insecurity is a critical issue in a college students’ life, but there is not an established approach to adequately help the students address this issue. The data will be collected through self-administered surveys and participant ratings will be reviewed for any common themes and correlations. Results from this study will provide significant material to assist social workers in addressing food insecurity with a systematic approach and influence further research. This study will also present findings to universities to secure supplementary resources and services to prevent food insecurity on campus.
APA, Harvard, Vancouver, ISO, and other styles
27

Funk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.

Full text
Abstract:
Thesis (LLM)--Stellenbosch University, 2004<br>ENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global communication and the accompanying legal problems. This is followed by an examination of the different functions Internet providers have. A survey of some of the important crimes affecting the Internet and also some Internet-specific offences put the more general issue of liability in a more specific context. Traditional and new forms of crimes are discussed. This section is followed by an analysis of Internet provider liability under German criminal law and Germany's Teleservices Act. From an international criminal law perspective some international instruments, like the Cybercrime Convention of the Council of Europe, is discussed. National legislation, especially in the context of the European Union, must always be put in the proper regional and international context. The thesis concludes with some thoughts on alternative, or perhaps complementary, methods to fight illegal and criminal conduct on the Internet. This is done not as a critique of the responses to Internet crime, but rather to strengthen the many hands trying to reduce Internet crime.<br>AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers. Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA. Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur 'n ondersoek na die verskillende funksies van Internet verskaffers. 'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek. Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die relevante regionale en internasionale konteks geplaas. Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle rolspelers in die stryd teen Internet misdaad se hande te sterk.
APA, Harvard, Vancouver, ISO, and other styles
28

Ward, Shannon-Jane. "The consumer-perceived risk associated with the intention to purchase online." Thesis, Link to the online version, 2008. http://hdl.handle.net/10019/1891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Tono, Cineiva Campoli Paulino. "Análise dos riscos e efeitos nocivos do uso da internet: contribuições para uma política pública de proteção da criança e do adolescente na era digital." Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1987.

Full text
Abstract:
O uso da internet e jogos eletrônicos online, em desarmonia com as demais atividades humanas, independentemente do dispositivo tecnológico para acesso, pode se tornar um vício e produzir efeitos nocivos em vários aspectos da vida dos usuários, potencializados quando os usuários são crianças e adolescentes, pessoas em fase especial de desenvolvimento biopsicossocial. O foco da investigação em pauta foi a análise dos riscos e danos do vício em internet, pressupondo a proteção integral das crianças e dos adolescentes nos aspectos de educação, saúde e segurança. Para tanto, buscou-se referências teóricas em artigos científicos no âmbito mundial, evidências empíricas em pesquisas de campo com adolescentes e no Programa de Pais de Dependentes de Internet do Ambulatório de Transtorno de Impulso do Instituto de Psiquiatria da Universidade de São Paulo. Como as crianças e os adolescentes são sujeitos de direito, com prioridade absoluta de proteção, sentiu-se a necessidade de haver uma intervenção e, para isso, foram propostos conteúdos e metodologias de planejamento de políticas de prevenção a esses riscos e danos, elaborados de forma interinstitucional e interdisciplinar. O método científico utilizado foi o de pesquisa-ação política, socialmente crítica e intervencionista. Para fundamentação teórica, buscaram-se subsídios na análise crítica do determinismo tecnológico e dos riscos envolvidos com a concepção e uso das tecnologias de Feenberg (1991), Giddens (1991), Marcuse (1999), Lima Filho (2005), Setzer (2002), Armstrong e Casement (2001), Smith (2009), entre outros. O trabalho de pesquisa utilizou documentos de base legal, com amparo na Declaração Universal dos Direitos Humanos (1948), na Constituição da República Federativa do Brasil (1988) e no Estatuto da Criança e do Adolescente (1990), os quais priorizam, em termos absolutos, as crianças e os adolescentes na formulação e na gestão de políticas públicas para todas as esferas de execução. Nas fases de observação, diagnose e primeiros registros, a pesquisa partiu da preocupação sobre a fala dos adolescentes de duas escolas públicas de Curitiba, em 2009, quando o problema dessa tese foi delineado riscos e efeitos nocivos da adição à internet e em jogos eletrônicos online. Para a fase de intervenção da pesquisa foi elaborado um plano de ação com foco no eixo de “Tecnologia e Dignidade Humana”, desenvolvido durante as onze audiências públicas no Estado do Paraná, coordenadas pela autora, articuladas ao Projeto UFPR Unindo Talentos com apoio da CAPES, contemplando conteúdos estruturantes para elaboração de uma política pública de prevenção ao vício na internet e, sobretudo, da internet gaming disorder, distúrbio mental previsto pela Associação Americana de Psiquiatria na quinta edição do Diagnostical and Statistical Manual of Disorder (DSM V), de maio de 2013. Desse trabalho resultaram contribuições à elaboração do eixo “Tecnologia e Dignidade Humana” da primeira edição do Plano Estadual de Educação em Direitos Humanos do Paraná (PEEDH/PR).<br>The use of internet and on-line video games, in harmony with other human activities, irrespective of the technological device to access, can be addictive and cause adverse effects in various aspects of life of users, potentiated when the users are children and adolescents people in particular phase of biopsychosocial development. The focus of research on the agenda was the analysis of the risks and vice damage, assuming the full protection of children and adolescents in the aspects of education, health and security. Therefore, we sought theoretical references in scientific papers at the global level, empirical evidence on field research with adolescents, and internet Dependent Parent Program Dependence Center for the Impulse Disorder Clinic at the Institute of Psychiatry, University of São Paulo. As children and adolescents are subjects of rights, with priority protection, felt the need for an intervention, and for this have been proposed content and planning methodologies prevention policies to such risks and damage, prepared in inter-institutional and interdisciplinary way. The scientific method used was the policy action research, socially critical and interventionist. For theoretical foundation sought to subsidies in the critical analysis of technological determinism and the risks involved with the design and use of technologies Feenberg (1991), Giddens (1991), Marcuse (1999), Lima Filho (2004, 2005), Andrade (2004) Setzer (2002, 2009), Armstrong and Casement (2001), Smith (2009), among others. The research used a legal basis documents, with support in the Universal Declaration of Human Rights (1948), the Constitution of the Federative Republic of Brazil (1988) and the Statute of Children and Adolescents (1990), who prioritize in terms absolute, children and adolescents in the design and management of public policies for all enforcement spheres. In phases of observation, diagnosis and first records research came from concern about the speech of adolescents from two public schools in Curitiba, in 2009, when the problem of this thesis was designed, the risks and harmful effects of adding internet and electronic games on-line. For the research intervention phase was prepared an action plan in inter-institutional focused on the “Technology and Human Dignity” axis developed in the eleven public hearings in the State of Paraná, coordinated by the author, contemplating structuring content for development of policy public prevention addiction on the Internet, and especially the internet gaming disorder, mental disorder provided by the American Psychiatric Association in the fifth edition of Diagnostical and Statistical Manual of Disorder (DSM V), May 2013. This work resulted in important contributions to the development axis “Technology and Human Dignity” of the first edition of the State Plan for Education in Human Rights of Paraná (PEEDH / PR).
APA, Harvard, Vancouver, ISO, and other styles
30

Flemström, Ulrica. "En kartläggning av otrygga offentliga rum : en kvalitativ fallstudie i del av Bro, Upplands-Bro kommun (Stockholms län)." Thesis, Blekinge Tekniska Högskola, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21654.

Full text
Abstract:
Bro is an urban area located in Upplands-Bro municipality, Stockholm County. In 2020, the Stockholm Police conducted a security survey for all municipalities included in the Stockholm police region. The results of the survey for Upplands-Bro municipality show that many residents feel insecure about the risk of being exposed to crime. The residents experience that the feeling of insecurity is at its highest in Bro. The thesis is limited to investigating this in nine public spaces in central Bro. The purpose is to investigate whether previously crime-prone public spaces in built-up environments can evoke experiences of insecurity in people, despite their unawareness that they are old crime scenes. If people experience insecurity, the thesis aims to investigate which crime prevention measures can be applied in the design of public spaces to increase their security experiences there. In the essay, the student is named as the "investigator". The approach to the thesis applies several different methods. A safety survey is the thesis' main method, while a safety walk (method combination) is the secondary one. Initially, site analyzes are used as feasibility studies to carry out several site visits in the nine public spaces. (1) The first site visit is made to get to know the existing conditions of the sites and to create an overall picture. At the same time, the places are photographed in daylight. (2) Site visit no. 2 is made to photograph the sites in the evening darkness. (3) During the third site visit, the investigator conducts a safety walk, where a focus group of eight members (excluding the investigator) consisting of residents in Bro, is invited for interviews in the field. The intention with this is to take part in their experiences if the places feel unsafe and if there is a need for crime prevention measures to achieve increased security. (4) Site visit no. 4 is made to study in detail the spatial properties of the sites on the basis that the focus group has identified “insecurity problems” that are most in need of crime prevention measures for increased security. The crime prevention measures in the thesis include: (1) increased care of the outdoor environment, cutting shrubs and trees, (2) repairing broken materials, repainting, (3) removal of damage, graffiti and debris, (4) increased lighting, (5) to open up the site, remove dark spaces/hiding places, (6) increase the view of the site from buildings or through direct human supervision, (7) to add electrical safety systems such as camera surveillance/alarm/gate code or fences around the site. A safety survey is conducted with the intention of reaching out to all residents in the urban area of Bro. The survey mainly asks questions about: (1) how they experience security at the nine sites and (2) whether the sites need to be changed for increased security there, which creates a need for crime prevention measures. The questionnaire is sent out in collaboration with Upplands-Bro municipality's Street / Park / Traffic department and 247 locals answer the questionnaire. However, the response rate does not correspond to all of Bros' urban residents, which the investigator is aware of. To include all residents, the investigator has not requested biological sex or age in all methods. Thus, the investigator has disregarded what a possible distribution of answers between women and men or different age groups can look like. The answers from the safety walk and the survey are analyzed through qualitative content analysis. The method results are made visible in the form of photographs and diagrams with accompanying descriptive text about the results with the highest percentage that are perceived to be most prominent. The results are then visualized in an insecurity map, a form of heat map. The insecurity map is compared with the crime scene map to see if there is a connection between “unsafe places” and “previous crime scenes” in a combined map. In the analysis, the survey results are interpreted through the thesis' theoretical perspective and validated against the outcome of the safety walk. Based on the analysis, the investigator reads out what crime prevention measures residents point out to achieve increased security in the "unsafe places". Then the results are discussed and how they fulfill the purpose of the essay and answer the problem formulation and the questions. Finally, conclusions and recommendations for future studies are presented.
APA, Harvard, Vancouver, ISO, and other styles
31

SHIH, CHUN CHENG, and 施純誠. "The Study On Public Housing Layout With Special Reference To Community Security." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/94725179871299720159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Babu, Kishore N. "Social security measures in public sector: Aa study of selected industries in Visakhapatnam." Thesis, 1994. http://hdl.handle.net/2009/4169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Heydenrych, Mark. "An adaptive multi-agent architecture for critical information infrastructure protection." Thesis, 2014. http://hdl.handle.net/10210/12370.

Full text
Abstract:
M.Sc. (Information Technology)<br>The purpose of the research presented in this dissertation is to explore the uses of an adaptive multi-agent system for critical information infrastructure protection (CIIP). As the name suggests, CIIP is the process of protecting the information system which are connected to the infrastructure essential to the continued running of a country or organisation. CIIP is challenging due largely to the diversity of these infrastructures. The dissertation examines a number of artificial intelligence techniques that can be applied to CIIP; these techniques range from multi-agent systems to swarm optimisation. The task of protection is broken into three distinct areas: preventing unauthorised communication from outside the system; identifying anomalous actions on computers within the system; and ensuring that communication within the system is not modified externally. A multi-agent learning model, MALAMANTEAU, is proposed as a way to address the problem of CIIP. Due to various problems facing CIIP, multi-agent systems present good opportunities for solving these many problems in a single model. Agents within the MALAMANTEAU model will use diverse artificial and computational intelligence techniques in order to provide an adaptable approach to protecting critical networks. The research presented in the dissertation shows how computational intelligence can be employed alongside multi-agent systems in order to provide powerful protection for critical networks without exposing further security risks.
APA, Harvard, Vancouver, ISO, and other styles
34

Ndlovu, Fundokuhle P. "Implications of housing design and layout systems for crime prevention in housing residential neighbourhoods in the metropolitan areas of Durban." Thesis, 2001. http://hdl.handle.net/10413/2126.

Full text
Abstract:
It is believed that housing designs and layout systems for crime prevention have either positive or negative implications on the actual prevention of crime. Therefore this research explores the exact implications that housing designs and layout systems have in relation to crime especially in neighborhoods of Durban. In this regard, the concepts, assumptions surrounding work on the field, including defensible space principles, crime prevention through environmental design and the housing design principles are thoroughly discussed. Various principles especially defensible space principles are emphasized in this study: Surveillance, territoriality, access control, image and milieu. Hence other supporting paradimes like housing design principles including housing structures, support activities and gated communities are highly elaborated. These analytical criteria were used to examine two neighboring residential areas characterized by different planning and design systems in the area of Woodlands in terms safety. The assessment is mainly a comparison of the gated residential neighbourhood and the non-gated residential neighbourhood. Procedurally the evaluation entails analyzing both areas in terms of layout and housing design, observing both areas in terms of behavior and reaction of residents within their areas and analyzing the views and perceptions of people living in both areas. The findings indicate that in comparing the two areas in terms of safety the gated residential neighbourhoods displays high level of safety as compared to the non-gated community. Overall housing design and layout systems for crime prevention have positive implications on crime reduction in residential areas. However different recommendations are made in an attempt to improve crime free housing designs in offering both real and perceived safety.<br>Thesis (M.T.R.P.)-University of Natal, 2001.
APA, Harvard, Vancouver, ISO, and other styles
35

"A client puzzle based public-key authentication and key establishment protocol." 2002. http://library.cuhk.edu.hk/record=b5891267.

Full text
Abstract:
Fung Chun-Kan.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2002.<br>Includes bibliographical references (leaves 105-114).<br>Abstracts in English and Chinese.<br>Abstract --- p.i<br>Acknowledgements --- p.iv<br>List of Figures --- p.viii<br>List of Tables --- p.x<br>Chapter 1 --- Introduction --- p.1<br>Chapter 1.1 --- Motivations and Objectives --- p.1<br>Chapter 1.2 --- Authentication Protocol --- p.3<br>Chapter 1.3 --- Security Technologies --- p.5<br>Chapter 1.3.1 --- Cryptography --- p.5<br>Chapter 1.3.2 --- Digital Certificate --- p.7<br>Chapter 1.3.3 --- One-way Hash Function --- p.8<br>Chapter 1.3.4 --- Digital Signature --- p.9<br>Chapter 1.4 --- Thesis Organization --- p.9<br>Chapter 2 --- Related Work --- p.11<br>Chapter 2.1 --- Introduction --- p.11<br>Chapter 2.2 --- Authentication and Key Establishment Protocols --- p.11<br>Chapter 2.3 --- Denial-of-Service Attack Handling Methods --- p.15<br>Chapter 2.4 --- Attacks on Authentication and Key Establishment Protocol --- p.18<br>Chapter 2.4.1 --- Denial-of-Service Attack --- p.19<br>Chapter 2.4.2 --- Replay Attack --- p.19<br>Chapter 2.4.3 --- Man-in-the middle Attack --- p.21<br>Chapter 2.4.4 --- Chosen-text Attack --- p.22<br>Chapter 2.4.5 --- Interleaving Attack --- p.23<br>Chapter 2.4.6 --- Reflection Attack --- p.25<br>Chapter 2.5 --- Summary --- p.27<br>Chapter 3 --- A DoS-resistant Authentication and Key Establishment Protocol --- p.29<br>Chapter 3.1 --- Introduction --- p.29<br>Chapter 3.2 --- Protocol Notations --- p.30<br>Chapter 3.3 --- Protocol Descriptions --- p.30<br>Chapter 3.4 --- An Improved Client Puzzle Protocol --- p.37<br>Chapter 3.4.1 --- Review of Juels-Brainard Protocol --- p.37<br>Chapter 3.4.2 --- Weaknesses of Juels-Brainard Protocol and Proposed Improvements --- p.39<br>Chapter 3.4.3 --- Improved Client Puzzle Protocol --- p.42<br>Chapter 3.5 --- Authentication Framework --- p.43<br>Chapter 3.5.1 --- Client Architecture --- p.44<br>Chapter 3.5.2 --- Server Architecture --- p.47<br>Chapter 3.6 --- Implementations --- p.49<br>Chapter 3.6.1 --- Software and Programming Tools --- p.49<br>Chapter 3.6.2 --- The Message Formats --- p.50<br>Chapter 3.5.3 --- Browser Interface --- p.51<br>Chapter 3.6.4 --- Calculation of the Difficulty Level --- p.53<br>Chapter 3.6.5 --- "(C, t) Non-Existence Verification" --- p.56<br>Chapter 3.7 --- Summary --- p.57<br>Chapter 4 --- Security Analysis and Formal Proof --- p.58<br>Chapter 4.1 --- Introduction --- p.58<br>Chapter 4.2 --- Security Analysis --- p.59<br>Chapter 4.2.1 --- Denial-of-Service Attacks --- p.59<br>Chapter 4.2.2 --- Replay Attacks.........; --- p.60<br>Chapter 4.2.3 --- Chosen-text Attacks --- p.60<br>Chapter 4.2.4 --- Interleaving Attacks --- p.61<br>Chapter 4.2.5 --- Others --- p.62<br>Chapter 4.3 --- Formal Proof Methods --- p.62<br>Chapter 4.3.1 --- General-purpose Specification Languages and Verification Tools --- p.62<br>Chapter 4.3.2 --- Expert System Approach --- p.63<br>Chapter 4.3.3 --- Modal Logic Approach --- p.64<br>Chapter 4.3.4 --- Algebraic Term-Rewriting Approach --- p.66<br>Chapter 4.4 --- Formal Proof of the Proposed Protocol --- p.66<br>Chapter 4.4.1 --- Notations --- p.67<br>Chapter 4.4.2 --- The Proof --- p.68<br>Chapter 4.5 --- Summary --- p.73<br>Chapter 5 --- Experimental Results and Analysis --- p.75<br>Chapter 5.1 --- Introduction --- p.75<br>Chapter 5.2 --- Experimental Environment --- p.75<br>Chapter 5.3 --- Experiments --- p.77<br>Chapter 5.3.1 --- Computational Performance of the Puzzle Solving Operation at different Difficulty Levels --- p.77<br>Chapter 5.3.2 --- Computational Performance of the Puzzle Generation and Puzzle Solution Verification --- p.79<br>Chapter 5.3.3 --- Computational Performance of the Protocol Cryptographic Operations --- p.82<br>Chapter 5.3.4 --- Computational Performance of the Overall Protocol Session --- p.84<br>Chapter 5.3.5 --- Impact on the Server Load without Client Puzzles --- p.85<br>Chapter 5.3.6 --- Impact on the Server Load with Client Puzzles --- p.88<br>Chapter 5.3.7 --- Impact on the Server Response Time from the Puzzles --- p.97<br>Chapter 5.4 --- Summary --- p.100<br>Chapter 6 --- Conclusion and Future Work --- p.101<br>Chapter 6.1 --- Concluding Remarks --- p.101<br>Chapter 6.2 --- Contributions --- p.103<br>Chapter 6.3 --- Future Work --- p.104<br>Bibliography --- p.105
APA, Harvard, Vancouver, ISO, and other styles
36

Wei, Lu Chun, and 魯君威. "A Study of the Relationship of Night Security and Exterior Lighting for the Public Housing of Taipei City." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/90980794766044925672.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>工程技術研究所<br>84<br>1972年,位於密蘇里州聖路易市的黑人國宅社區,因其驚人的犯罪量而被 迫炸毀。該事件不但是對現代建築主義的諷刺,亦引發學者們對建築安全 維護課題的探討。1972年Oscar Newman在Defensible Space一書中,即探 討高層建築與犯罪率的相互關係。近年來,台灣地區人口、經濟快速成長 ,集合住宅需求大量提升。在地窄人稠的都會環境中,良好的治安及意外 傷害之防範均為人民安居樂業之重要因素。根據民國八十三年內政統計年 報顯示,夜間發生之犯罪事件或災害損失均較日間發生者來的大。而優良 的照明環境,可對人的精神狀態和心理感受,產生積極的影響。因此,為 保障人身安全與防制犯罪,應有效的利用夜間照明。本研究藉由視覺順應 、眩光現象、輝度對比等視覺原理及犯罪心理,探討國宅社區內夜間照明 在防範意外、防制犯罪等安全課題上之運用。經由調查國內大型國宅社區 之犯罪發生地點及夜間照明環境現況,提出以建築規劃設計、照明設備安 置、及管理維護三方面來維護夜間安全之設計手法及改進作法,為國內建 築設計人員及房產管理人員,在實質工作上的參考。 In 1972, a public housing project for American Negro in San Louis, Missouri, was demolished by blast because of it''s surprisingly large amount of crime. It was the irony of modern architectural movement. However it also brought forth an investigation of building security for scholar in architecture. Oscar Newman, for instance, discussed in his book "Defensible Space" the interrelationship between high-rise buildings and criminal rates. Recently, the rapid growth of population and economy in Taiwan area has resulted in great demand of public housings. In a crowded urban area, people always wish to live and work in peace and content, which is affected by the condition of public security and the prevention of unexpected loss. According to a statistical result of the Ministry of the Interior, crimes and accidents which occur at night have caused larger loss than those during the day. A good luminous environment has positive influence on human''s mentality and psychology, and thus the exterior lighting at night should be used effectively for safety and crime control. This research explores the application of night lighting emphasized on accident and crime control by utilizing the principles of sight, such as vision adaptation, glare and contrast ratio, as well as criminal psychology. It also surveys the criminal situation in public housings and the situation of using night lighting. Finally, a design criteria is made for the maintenance and improvement of building security at night by means of architectural design, equipment installation, and maintenance, so as to provide a more practical reference for architectural designers and the managers of real estate in Taiwan.
APA, Harvard, Vancouver, ISO, and other styles
37

Rodda, Paul Trevor-John. "SCRIPSIT : a model for establishing trustable privacies in online public spaces." Thesis, 2004. http://hdl.handle.net/10413/4130.

Full text
Abstract:
This dissertation proposes a model supporting the creation of trustable privacies in public online spaces, with the model demonstrating the potential for supporting trustable data handling in the qualitative domain. Privacy and trust, from the pivotal perspective of the individual were identified as crucial intangibles in the qualitative research and personal trust domains. That both privacy and trust depend heavily upon credible mechanisms for privacy became clear during the literature review and interview processes. Privacy, in its many forms, is a concept requiring greatly varying degrees of anonymity, confidentiality and control (Rotenberg, 2001; Lessig, 1998) and this was position was validated by literature and by qualitative comments by academic interviewees. Facilitation of secondary users including academics, public and private organisations, communities, casual information browsers is a goal of this research. This goal of facilitation is supported by the model proposed, and is discussed in Chapter 6, where future work is discussed. The core requirement to address confidentiality, ethics, privacy, ownership and control of data (Corti, 2000) is satisfied by the model as proposed and discussed. Expected outcomes of this research project are summarised as: • Proposed model for the creation of trustable privacies in public spaces. [Primary outcome] • Promotion of collaboration amongst domains and disciplines through improved universal access to archived data [Secondary outcome] • Identification of application domains outside of the initially identified domain set [Secondary outcome]. Self-Contained ReposItory ProcesSIng Template (SCRIPSIT) describes a model supporting a decentralised, trustable set of structures and mechanisms. SCRIPSIT has its eponymous origin in the Latin word scripsit, meaning "he or she wrote".<br>Thesis (M.A.)-University of KwaZulu-Natal, Durban, 2004.
APA, Harvard, Vancouver, ISO, and other styles
38

Chuma, Kabelo Given. "Security of electronic personal health information in a public hospital in South Africa." Diss., 2020. http://hdl.handle.net/10500/27239.

Full text
Abstract:
The adoption of digital health technologies has dramatically changed the healthcare sector landscape and thus generates new opportunities to collect, capture, store, access and retrieve electronic personal health information (ePHI). With the introduction of digital health technologies and the digitisation of health data, an increasing number of hospitals and peripheral health facilities across the globe are transitioning from a paper-based environment to an electronic or paper-light environment. However, the growing use of digital health technologies within healthcare facilities has caused ePHI to be exposed to a variety of threats such as cyber security threats, human-related threats, technological threats and environmental threats. These threats have the potential to cause harm to hospital systems and severely compromise the integrity and confidentiality of ePHI. Because of the growing number of security threats, many hospitals, both private and public, are struggling to secure ePHI due to a lack of robust data security plans, systems and security control measures. The purpose of this study was to explore the security of electronic personal health information in a public hospital in South Africa. The study was underpinned by the interpretivism paradigm with qualitative data collected through semi-structured interviews with purposively selected IT technicians, network controllers’, administrative clerks and records management clerks, and triangulated with document and system analysis. Audio-recorded interviews were transcribed verbatim. Data was coded and analysed using ATLAS.ti, version 8 software, to generate themes and codes within the data, from which findings were derived. The key results revealed that the public hospital is witnessing a deluge of sophisticated cyber threats such as worm viruses, Trojan horses and shortcut viruses. This is compounded by technological threats such as power and system failure, network connection failure, obsolete computers and operating systems, and outdated hospital systems. However, defensive security measures such as data encryption, windows firewall, antivirus software and security audit log system exist in the public hospital for securing and protecting ePHI against threats and breaches. The study recommended the need to implement Intrusion Protection System (IPS), and constantly update the Windows firewall and antivirus program to protect hospital computers and networks against newly released viruses and other malicious codes. In addition to the use of password and username to control access to ePHI in the public hospital, the study recommends that the hospital should put in place authentication mechanisms such as biometric system and Radio Frequency Identification (RFID) system restrict access to ePHI, as well as to upgrade hospital computers and the Patient Administration and Billing (PAAB) System. In the absence of security policy, there is a need for the hospital to put in place a clear written security policy aimed at protecting ePHI. The study concluded that healthcare organisations should upgrade the security of their information systems to protect ePHI stored in databases against unauthorised access, malicious codes and other cyber-attacks.<br>Information Science<br>M. Inf. (Information Security)
APA, Harvard, Vancouver, ISO, and other styles
39

Ling, Jie. "Smart card fault attacks on public key and elliptic curve cryptography." Thesis, 2014. http://hdl.handle.net/1805/5967.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>Blömmer, Otto, and Seifert presented a fault attack on elliptic curve scalar multiplication called the Sign Change Attack, which causes a fault that changes the sign of the accumulation point. As the use of a sign bit for an extended integer is highly unlikely, this appears to be a highly selective manipulation of the key stream. In this thesis we describe two plausible fault attacks on a smart card implementation of elliptic curve cryptography. King and Wang designed a new attack called counter fault attack by attacking the scalar multiple of discrete-log cryptosystem. They then successfully generalize this approach to a family of attacks. By implementing King and Wang's scheme on RSA, we successfully attacked RSA keys for a variety of sizes. Further, we generalized the attack model to an attack on any implementation that uses NAF and wNAF key.
APA, Harvard, Vancouver, ISO, and other styles
40

Kleynhans, Stefan Anton. "The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship." 2000. http://hdl.handle.net/10500/17100.

Full text
Abstract:
The Internet has had and will continue to have a major impact in the way in which banking business is conducted. This dissertation primarily considers the allocation of risks associated with Internet banking and in doing so considers the role of trade usage in Internet banking. The question of what the Internet is and more specifically what constitutes Internet banking is addressed. In order to have an understanding of the allocation of risks in Internet banking a good understanding of the traditional bank-customer relationship is necessary. The contractual basis for this relationship is discussed. The duties of the bank and the customer are discussed. In this regard the duty of a bank to act in terms of its customers mandate, the banks duty of confidentiality and the customers duty to exercise reasonable care are considered. The concept of a customer is briefly discussed. As trade usage plays a significant role in the contract between the bank and its customer, attention is given to the requirement for the recognition of a trade usage generally and more particularly in South Africa. The effect of Internet banking on the traditional bank-customer relationship is considered. The fact that a bank is still required to act in terms of its customer's mandate but is unable to identify is examined. As most Internet banking contracts impose an obligation on the customer to take security precautions and also limit the liability of banks, consideration is finally given to the possibility that the practices of banks in regard to Internet banking may have acquired the status of trade usage in this particular sphere of banking.<br>LL.M. (Banking Law)
APA, Harvard, Vancouver, ISO, and other styles
41

Kulhánek, Stanislav. "Správa státních hmotných rezerv - role a působnost ve veřejném sektoru." Master's thesis, 2013. http://www.nusl.cz/ntk/nusl-324193.

Full text
Abstract:
Diploma thesis abstract Diploma thesis "The Administration of State Material Reserves - Roles and Competences in the Public Sector" deals with this central government body in structure of the Czech public administration and security system. The first part of diploma thesis describes responsibility of the Administration of State Material Reserves and its transformation in regard of legal and security threats changes. This central government body is responsible for economic measures in crisis situations, state material reserves and oil security. Activities of the Administration of State Material Reserves are financed from public sources and diploma thesis deals with role of this government body in budget process. The Administration of State Material Reserves is compared with analogous institution in Slovakia and Poland. The second, analytical part deals with management conceptions, plans and methodologies of the Administration of State Material Reserves. In diploma thesis is evaluated Act No. 97/1993 on competence of the Administration of State Material Reserves. The influence of main actors is analysed too. Diploma thesis compares budget indicators of the Administration of State Material Reserves with selected relevant state budget chapters: the Ministry of Defence, the Ministry of the Interior and the State...
APA, Harvard, Vancouver, ISO, and other styles
42

Chetty, Vanisha Gonasagaree. "The combating of unauthorised electrical connections in Kwazulu-Natal, South Africa." Diss., 2018. http://hdl.handle.net/10500/25009.

Full text
Abstract:
Text in English, with English, Afrikaans and Zulu summaries<br>This study was conducted owing to the protracted problem and challenges that unauthorised electrical connections pose to electricity utilities. This study sought to contribute to the combating of unauthorised electrical connections in KwaZulu-Natal, South Africa, which has never before been studied in this manner. Considerable revenue is stolen from utilities because of unauthorised electrical connections, by-passing of electrical meters and tampering with electricity networks. This contributes to public safety risks, fatalities, property damage and overloading of electrical networks. This in turn causes transformer and electricity network overload and power supply failure, prolonged unplanned power cuts, loss of jobs, food security risk, serious poor economic development, damaged electrical infrastructure, loss of revenue, electricity disruptions, electric shock, and the burning of dwellings. This leads to the interruption of supply to legal and compliant customers, all with disastrous effects. It is therefore difficult to manage the supply and demand of electricity under these circumstances, more especially in this period when South Africa faces a tight electricity supply. In this dissertation, the international and national perspectives reveal the nature and extent of unauthorised electrical connections. It was explored how unauthorised electrical connections are presently being combated and what specific security measures may be implemented to enhance the combating of unauthorised electrical connections. A case study design was used to investigate in greater detail the opinions, views, perceptions and experiences of the targeted interviewees using interviewing, site observation and case docket analysis. This design guided the use of specific sample groups, procedures and techniques used for data collection and analysis. The design and development of the different data collection instruments and the piloting of the instruments were implemented to ensure validity, reliability, accuracy and trustworthiness of the collected information. The study produced findings to assist electricity utilities to better manage this phenomenon. Recommendations were formulated to assist stakeholders to improve their roles in the combating of unauthorised electrical connections.<br>Hierdie studie is uitgevoer na aanleiding van die uitgerekte probleem en uitdagings van onwettige elektrisiteitsverbindings vir elektrisiteitsvoorsieners. Hierdie studie poog om by te dra om onwettige elektrisiteitsverbindings in KwaZulu-Natal, Suid-Afrika te beveg; dit is nog nooit tevore op hierdie wyse ondersoek nie. Beduidende inkomste word van diensmaatskappye gesteel as gevolg van onwettige elektrisiteitsverbindings, die wat elektriese meters omseil en met elektrisiteitsnetwerke peuter. Dit dra tot openbare veiligheidsrisiko's, fataliteite, skade aan eiendom, en oorlading van elektrisiteitsnetwerke by. Dit lei weer tot oorlading van transformators en elektrisiteitsnetwerke, gebrek aan kragvoorsiening, verlengde onbeplande kragonderbrekings, werksverlies, voedselsekuriteitrisiko, ernstige swak ekonomiese ontwikkeling, skade aan elektrisiteitinfrastruktuur, verlies aan inkomste, elektriese skok, en huise wat afbrand. Dit lei tot die onderbreking van voorsiening aan wetlike en inskiklike klante met rampspoedige gevolge. Dit is dus moeilik om voorsiening en vraag na elektrisiteit in hierdie omstandighede te bestuur, veral in hierdie tyd wat Suid-Afrika drukkende elektrisiteitvoorsiening beleef. In hierdie verhandeling onthul die internasionale en nasionale perspektiewe die aard en mate van onwettige elektrisiteitsverbindings. Dit was ondersoek hoe onwettige elektrisiteitsverbindings tans beveg word en watter spesifieke veiligheidsmaatreëls geïmplementeer kan word om die bevegting van onwettige elektrisiteitsverbindings te bevorder. Die gevallestudie-ontwerp is gebruik om die onderhoudgewers se menings, sienings, perspektiewe en ervarings in meer besonderhede te ondersoek deur onderhoude, waarnemings en saakdossierontledings te gebruik. Die ontwerp het die gebruik van spesifieke steekproefgroepe, prosedures en tegnieke wat vir dataversamelings en -ontleding gebruik is, gerig Die ontwerp en ontwikkeling van die verskillende dataversamelinginstrumente en die bestuur van die instrumente is geïmplementeer om geldigheid, betroubaarheid, akkuraatheid en geloofwaardigheid van die versamelde inligting te verseker. Die studie se bevindings help elektrisiteitsdienste om hierdie verskynsel beter te bestuur. Aanbevelings is geformuleer om belanghebbers te help om hul rolle te bevorder in die stryd om onwettige elektrisiteitsverbindings te beveg.<br>Ucwaningo lwenziwa ngenxa yokubona inkinga egxilile neqhubekela phambili kanye nezinselele ezibangelwa ukuzixhumela ama-connection kagesi (i-elektrisithi) maqondana nezinkampani zikagesi. Ucwaningo belufuna ukufaka esivivaneni kudaba lokuvimbela ukuzixhumela kogesi ngendlela engekho emthethweni eKwaZulu-Natali, eNingizimu Afrika, yona okungakaze kwenziwe ucwaningo ngayo ngale ndlela. Kunengeniso eliningi lemali entshontshwa ngale ndlela kwizinkampani noma izinhlangano zikagesi ngoba kunokuzixhomela ugesi okungekho emthethweni, ukungasetshenziswa kwamamitha ogesi, kanye nokuphazamisa ama-network kagesi. Lokhu kubangela izingozi nokungavikeleki kubantu bonke, ukulimala, ukulinyazwa nokonakala kwempahla noma iprophathi kanye nokuthi ama-network kagesi agxisheleke nokucindezeleka ngokweqile. Kanti futhi lokhu kubanga ukuthi ama-transformer kanye nama-network kagesi acindezeleke ngokweqile nokwenza ukuthi isaplayi kagesi ihluleke nokufeyila, lokhu okubangela ukuthi kube nama-power cuts noma ukucishwa kukagesi okungahleliwe, ukulahleka kwemisebenzi, ingozi yokuphazamiseka kokuvikeleka kokudla, ukuthi ukuthuthuka komnotho kuphazamiseke kakhulu, ukulahleka kwengeniso lemali, ukuphazamiseka kokuphakelwa kukagesi, ukulinyazwa kwabantu ngokubanjwa ugesi, kanye nokusha kwemizi eshiswa ugesi. Lokhu kuholela ekutheni kuphazamiseke isaplayi kagesi kumakhastama akhokha kahle nenza izinto ngokulandela umthetho, lokhu okubanga imiphumela yezinhlekelele ezimbi. Ngakho-ke kuba nzima ukubhekana kanye nezinto zesaplayi kanye nokudingeka kukagesi ngaphansi kwalezi simo, ikakhulukazi lapho iNingizimu Afrika ibhekene nokuncipha noma izinga eliphansi lesaplayi kagesi. Kule dissertation isimo sikazwelonke kanye nesamazwe omhlaba, siveze inhlobo kanye nezinga lokuxhunyelwa kukagesi okungekho emthethweni. Kubuye kwabheka nokuthi ukuxhunyelwa kukagesi okungekho emthethweni kubhekwana kanye nokuvinjelwa kanjani, nokuthi yiziphi izindlela eziqondene ezisetshenziswayo zokuvikeleka ezingasetshenziswa ukuthuthukisa izinqubo zokuvimbela ukuxhunyelwa kukagesi nama-connection angekho emthethweni angavinjelwa kanjani . Kusetshenziswe idizayini ye-case study ukuphenyisisa ngokujulile imininingwane, imibono, izinqubo zokubheka isimo kanye nezipiliyoni zalabo obekuqondiswe kubo ama-interview ngesikhathi kwenziwa ama-interview, ukuyobheka ngamehlo esimo ezindaweni, kanye nokuhlaziya amadokhethi amacala ngokwenzekayo. Le dizayini yiyona eholele ekusetshenzisweni kwamasampuli amaqembu athize, izinqubo noma amaprosija athize kanye namathekniki athize asetshenzisiwe ekuqoqeni kwe-data kanye nohlaziyo lwayo. Idizayini nokwenziwa kwama-instrumenti okuqoqwa kwe-data ehlukene, kanye nokwenza ama-instrumenti okulinga noma e-piloting, kusetshenzisiwe ukuqinisekisa i-validity, ukuthembeka (reliability), ukuqondana ncamashi kwama-instrumenti (accuracy) kanye nokuqiniseka okubizwa ngokuthi yi-trustworthiness yolwazi noma i-infomeshini eqoqiwe. Ucwaningo, lukhiphe imiphumela yokusiza izinkampani noma izinhlangano zikagesi ekuphatheni kangcono le nkinga noma ifenominoni (phenomenon) yenkinga. Kwenziwe izincomo zokusiza ababambe iqhaza (stakeholders) ukuthuthukisa indima yabo ekulwiseni ukuxhunyelwa kanye nama-connection kagesi angekho emthethweni.<br>Criminology and Security Science<br>M. Tech. (Security Management)
APA, Harvard, Vancouver, ISO, and other styles
43

Milubi, Tebogo Theophilus. "An investigation into levels of service provided by private security officers at government printing works in Tshwane." Diss., 2020. http://hdl.handle.net/10500/27616.

Full text
Abstract:
Effective and satisfactory security service is critical to private security officers (PSOs) working in the private, state-owned and public sectors as it plays a pivotal role in improving organisational productivity and helps to promote good working relationships. When PSOs project poor attitudes, clients are seriously affected by such negative behaviour and the level of service rendered will eventually deteriorate. This study sought to understand and explore the factors that contributed to unsatisfactory services rendered by PSOs at GPW in Tshwane. The researcher utilised a nonexperimental quantitative research approach and a self-administered questionnaire survey was used to collect data. Data collected was analysed and interpreted using quantitative methods and procedures. The findings emanating from the research revealed that the levels of service rendered by PSOs at GPW in Tshwane was ineffective and unsatisfactory and various factors contributed to ineffective service delivery. Several recommendations are proposed to improve the level of service rendered by PSOs.<br>Criminology and Security Science<br>M. Tech. (Security Management)
APA, Harvard, Vancouver, ISO, and other styles
44

Rangwala, Mohammed M. "Secure Digital Provenance: Challenges and a New Design." Thesis, 2014. http://hdl.handle.net/1805/6051.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>Derived from the field of art curation, digital provenance is an unforgeable record of a digital object's chain of successive custody and sequence of operations performed on the object. It plays an important role in accessing the trustworthiness of the object, verifying its reliability and conducting audit trails of its lineage. Digital provenance forms an immutable directed acyclic graph (DAG) structure. Since history of an object cannot be changed, once a provenance chain has been created it must be protected in order to guarantee its reliability. Provenance can face attacks against the integrity of records and the confidentiality of user information, making security an important trait required for digital provenance. The digital object and its associated provenance can have different security requirements, and this makes the security of provenance different from that of traditional data. Research on digital provenance has primarily focused on provenance generation, storage and management frameworks in different fields. Security of digital provenance has also gained attention in recent years, particularly as more and more data is migrated in cloud environments which are distributed and are not under the complete control of data owners. However, there still lacks a viable secure digital provenance scheme which can provide comprehensive security for digital provenance, particularly for generic and dynamic ones. In this work, we address two important aspects of secure digital provenance that have not been investigated thoroughly in existing works: 1) capturing the DAG structure of provenance and 2) supporting dynamic information sharing. We propose a scheme that uses signature-based mutual agreements between successive users to clearly delineate the transition of responsibility of the digital object as it is passed along the chain of users. In addition to preserving the properties of confidentiality, immutability and availability for a digital provenance chain, it supports the representation of DAG structures of provenance. Our scheme supports dynamic information sharing scenarios where the sequence of users who have custody of the document is not predetermined. Security analysis and empirical results indicate that our scheme improves the security of the typical secure provenance schemes with comparable performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Ford, Jonathan W. "Google in China : examining hegemonic identification strategies in organizational rhetoric." Thesis, 2013. http://hdl.handle.net/1805/3621.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>The author employs Hoffman and Ford’s method for analyzing organizational rhetoric to examine the discourse of Google, Inc. Employing a hybrid method, built on rhetorical criticism which incorporates elements of organizational communication theory, the analysis examines identity rhetoric present in Google’s discourse regarding its operations in China. Using this approach, the author leverages the method to critically examine hegemonic aspects of the discourse in order to examine how Google constructs its Western consumer based audience regarding online privacy and free speech.
APA, Harvard, Vancouver, ISO, and other styles
46

Sibanyoni, July Johannes. "Food safety and quality assurance measures of the National School Nutrition Programme in Mpumalanga Province, South Africa." Thesis, 2017. http://hdl.handle.net/10500/23238.

Full text
Abstract:
Foodborne diseases are a major challenge to school feeding programmes because inadequate food safety knowledge and skills of staff can result in unsafe food handling practices and cross-contamination, thus causing foodborne disease outbreaks. The aim of this study was to investigate the food safety and quality assurance measures of the National School Nutrition Programme (NSNP) in Mpumalanga Province, South Africa. The research design was cross-sectional quantitative in nature. A total of 300 NSNP food service managers/coordinators and 440 food handlers were selected to participate in the study. Data collection was by means of a selfadministered structured questionnaire and 192 food contact surface swap samples from 32 primary and secondary public schools.The majority of schools offering NSNP meals were located in informal settlements and most were found to lack basic resources such as electricity and potable tap water in their kitchens. 93% of food handlers did not know about Hazard Analysis Critical Control Point (HACCP). The NSNP food service managers in some schools, especially in schools located in rural settlements, were found to have little knowledge or awareness of HACCP. No school was found to have implemented the HACCP, and only a few staff had received food safety training. Inadequate food safety knowledge was worst in schools located in informal settlements due to a lack of training. Up to 60% of food handlers did not know the correct procedure for washing a cutting board after it had been used. In addition, just over 95% of the food handlers did not know how to sanitise utensils and cutting surfaces after cutting up raw meat. The lack of hygiene was confirmed by the presence of Listeria monocytogenes, Staphylococcus aureus, E.coli 015:H7, Salmonella and Shigella species on food contact surfaces. A total of 22 different bacteria genera were identified. It is essential to monitor NSNP kitchen hygiene practice to ensure the minimal contamination of food products and newly recruited food handlers should be trained on food handling practice and principles to ensure the safety of prepared food for school children.<br>Health Studies<br>D. Phil. (Consumer Science)
APA, Harvard, Vancouver, ISO, and other styles
47

Mthembu, Joel. "An analysis of the nature, extent and causes of smuggling at selected correctional centres in Gauteng." Diss., 2016. http://hdl.handle.net/10500/21511.

Full text
Abstract:
Text in English<br>This research is aimed at analysing the nature, extent and cause of smuggling at selected Correctional Centres in Gauteng with the aim to provide appropriate strategies to combat smuggling. Smuggling is seen as a chain of command that reflects predisposition of an organised crime. Smuggling in correctional centres is an ongoing concern. Unauthorised items that are smuggled into the correctional centres have an adverse effect into the lives of people and death is an ultimate price. The Department of Correctional Services is also experiencing a severe shortage of officials due to The Seven Days Establishment and the Occupation Specific Dispensation (OSD) policies of Centre- Based and Non-Centre- Based staff. The study shows an increase of smuggling of items such as dangerous weapons, dagga, cellular phones and sim card over a three-year period at the three Correctional Centres. Various recommendations are made to combat smuggling in correctional centres including going back to the basics of proper searching of visitors, offenders, cells and staff when entering the facilities.<br>Corrections Management<br>M.Tech. (Correctional Services Management)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!