To see the other types of publications on this topic, follow the link: Threats to environment.

Dissertations / Theses on the topic 'Threats to environment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Threats to environment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Full text
Abstract:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more att
APA, Harvard, Vancouver, ISO, and other styles
2

Black, Brian C., Laura H. Bollock, Sinene Bouabid, et al. "Sea TENTACLE: Track, Engage, & Neutralize Threats - Asymmetric & Conventional - in the Littoral Environment." Thesis, Monterey, California : U.S. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/7275.

Full text
Abstract:
Includes supplementary material.<br>Sea TENTACLE is a proposed afloat platform whose primary mission is to utilize the state-of-the-art technology of unmanned vehicles to monitor and neutralize all subsurface enemy threats in the littorals. This mission can be specified further as anti-submarine warfare, mine warfare and maritime surveillance. The design philosophy of Sea TENTACLE embodies the ideal of providing a multi-mission capable sea frame extending network-centric warfare into the littorals. The design goals of the TSSE team were first to develop a platform to deploy, recover, and mai
APA, Harvard, Vancouver, ISO, and other styles
3

Campos, Ana Paula da Silveira Serra. "Impacte ambiental do Desporto. Estudo de caso : Impacte ambiental de um evento de orientação - Portugal 'O' Meeting' 2001." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2001. http://dited.bn.pt:80/29481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Christiansen, Allen. "Modeling sensors and threats in a three-dimensional real-time simulation of a seaport environment." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/a_christiansen_042309.pdf.

Full text
Abstract:
Thesis (M.S. in computer science)--Washington State University, May 2009.<br>Title from PDF title page (viewed on May 29, 2009). "Department of Electrical Engineering and Computer Science." Includes bibliographical references (p. 56-57).
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Jillian. "Bacterial community composition, TCE degradation, isotopic fractionation and toxicity of a TCE contaminated aquifer." Thesis, Available from the University of Aberdeen Library and Historic Collections Digital Resources, 2009. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=33520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.

Full text
Abstract:
This project is about how free, open-source tools can create reasonable, secure and flexible remote access solutions for smaller companies with a limited budget.  Secure remote access to a working environment is a solution for its time, as last year Covid-19 change the working environment for millions of employers and employees. The importance of secure remote access to a working environment became noticeable as offices closed down and employers started working from home. Still, the need for secure access to the company's infrastructure remains. This is where Virtual Private Networks (VPNs) en
APA, Harvard, Vancouver, ISO, and other styles
7

Andersson, Frida Maria. "Våld och hot om våld inom socialt arbete : - en studie om fem socialarbetares upplevelser och förståelse av våld och hot om våld från brukare." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-18049.

Full text
Abstract:
The aim of this study was to understand how social workers perceive and understand violence and threats of violence from clients, and how it effect their working environment. It seems that the respondents understand the violence and threats of violence from clients as a result of the clients background problems, vulnerability, dependency and from “the reason" that the client is currently in the contact with the organization. How respondents interpret the client´s behaviour based on the above-mentioned factors, seem to determine how the respondents perceive and define the violence and threats o
APA, Harvard, Vancouver, ISO, and other styles
8

Stokes, Shereitte C. IV. "An analysis of the associations between chemical threats in the physical environment and human health outcomes in Soweto,South Africa." DigitalCommons@Robert W. Woodruff Library, Atlanta University Center, 2004. http://digitalcommons.auctr.edu/dissertations/1552.

Full text
Abstract:
The purpose of this study was to investigate the associations between chemical threats in the physical environment and adverse health conditions among the residents of Soweto, South Africa. The chemical threats that were used in the analysis included lead, nitrogen oxides (NOx), sulfur dioxide (S02), and a chemical compound composed of silicon, oxygen, hydrogen, and various metal cations (asbestos). The adverse health outcomes and symptoms included heart attack or angina, stroke, emphysema/bronchitis, asthma, tuberculosis, cancer, less breath, short of breath, wheezing or tightness of chest, w
APA, Harvard, Vancouver, ISO, and other styles
9

Cedlund, Fia. "Hot och våld på jobbet : En studie om arbetsgivarens skyldighet att motverka hot och våld inom vård och omsorg." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78900.

Full text
Abstract:
In Sweden, threats and violence has become a serious psychosocial work environment problem within the workplaces of health and social care. Several studies show the need to pay attention to how the workers psychosocial work environment is affected by the risk of threats and violence. Women are more exposed of threats and violence because the professions were most women work, the threats and violence occur. The purpose of this study is to investigate what legal obligations the employer holds to prevent threats and violence in the working environment and what consequences it can have if the empl
APA, Harvard, Vancouver, ISO, and other styles
10

Berrisch, Georg Matthias. "The application of the concept of "common heritage of humankind" to the protection of the global environment : our response of public international law to global environmental threats." Thesis, McGill University, 1991. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=60445.

Full text
Abstract:
The world faces an environmental crisis which can only be resolved through global co-operation and solidarity. Traditional international environmental law, based on the positivist notion of sovereignty, cannot offer adequate solutions. International environmental law must be based on a global approach founded on the notion of a common concern of humankind. This global approach has to provide a legal framework for the protection of the global environment. But it also must take into account the diverging needs and expectations of the different states. Furthermore, it must be realistic and cannot
APA, Harvard, Vancouver, ISO, and other styles
11

Campos, Ana Paula da Silveira Serra. "Impacte ambiental do Desporto. Estudo de caso : Impacte ambiental de um evento de orientação - Portugal 'O' Meeting' 2001." Master's thesis, Universidade do Porto. Reitoria, 2001. http://hdl.handle.net/10216/9830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Gullberg, Linn, and Hanna Pettersson. "Swedish polar bears on the African savannah – failure or success? : A case study of two Swedish entrepreneurs in Zambia." Thesis, Linnéuniversitetet, Institutionen för organisation och entreprenörskap (OE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-27064.

Full text
Abstract:
The purpose of this thesis is to explore what factors in the Zambian national business environment that influences the international entrepreneur, describe how Swedish entrepreneurs adapt to the uncertainties that may come with the national business environment in Zambia, and explain the opportunities and threats that come with investing in the country. In order for us to reach our purpose of the thesis, a case study of two Swedish firms has been conducted by interviews. The theoretical framework consists of the business environment, international entrepreneurship, the concept of psychic dista
APA, Harvard, Vancouver, ISO, and other styles
13

Melo, Odete Manuela Sequeira de. "Ambiente urbano e espaços verdes-uma perspectiva geográfica sobre a cidade do Porto." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Letras, 2000. http://dited.bn.pt:80/29308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Costa, Flores Casandra, and Flores Valeria Costa. "Det ingår i jobbet : En kvalitativ studie om hot och våld i klientrelationer på Migrationsverket." Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26030.

Full text
Abstract:
Att arbeta med utsatta människor i en statlig verksamhet som tjänsteman kan för de flesta människor verka ofarligt – men hur är det egentligen? Tidigare forskning har visat att det finns ett stort mörkertal när det kommer till klientrelaterat hot och våld och att incidenterna inte tas tillräckligt seriöst. Syftet med denna uppsats är att få en större förståelse för vad de ökade hoten får för konsekvenser för personalen på Migrationsverket. Vi vill belysa och synliggöra spänningsfältet i klientrelationen som leder till att hot och våld mot handläggare ökar. Det teoretiska ramverk som används i
APA, Harvard, Vancouver, ISO, and other styles
15

Nekkanti, Lakshmi Sowjanya. "Impact of coordination challenges on quality of global software development projects." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13323.

Full text
Abstract:
Context. Global software development (GSD) gained huge recognition in today’s business world. Most of the software companies day by day are striving hard to evolve globally where software is developed in the context of different environmental settings that are distanced on various factors like geography, timezone, culture and language. Coordination is the factor that plays one of the prominent roles in such a setting for effective teamwork and project success. Although numerous efforts has been done in this research area, there has been no proper evidence from industry about the impact of thes
APA, Harvard, Vancouver, ISO, and other styles
16

Ivarsson, Caroline, and Tess Hellman. "Hot och våld - En del av jobbet? : En kvalitativ studie om socialtjänstens säkerhetsarbete med hot och våld." Thesis, Karlstads universitet, Institutionen för sociala och psykologiska studier (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71338.

Full text
Abstract:
Titel: ”Hot och våld - en del av jobbet?” - En kvalitativ studie om socialtjänstens säkerhetsarbete med hot och våld. Författare: Tess Hellman och Caroline Ivarsson Syftet med denna studie är att undersöka hur ett urval av socialkontor arbetar med säkerhetsfrågor avseende hot och våld. Studiens frågeställningar är följande: ❖ Vilket säkerhetsarbete har socialkontoren avseende hot och våld? ❖ Hur arbetar socialsekreterare innan, under och efter ett klientmöte som befaras som hotfullt eller otryggt? ❖ Hur upplever socialsekreterare att deras säkerhetsarbete avseende hot och våld fungerar på arb
APA, Harvard, Vancouver, ISO, and other styles
17

Larsson, Frida, and Emelie Widmark. ""Hur ser verkligheten ut?" : Socialarbetare på individ- och familjeomsorgens (IFO) upplevelser av rutiner och riktlinjer kring hot och våld på arbetsplatsen." Thesis, Högskolan i Gävle, Socialt arbete, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-27927.

Full text
Abstract:
The purpose of this study was to examine social workers view on the implementation of routines and guidelines related to workplace violence. How it is prevented and their thoughts about how the routines and guidelines around this subject are working from paper to practice. Violence is a general problem, although it´s more pronounced in organisations with close contact with clients. Laws regarding workplace state that both employers and employees are obligated to see to that the prevention work is fulfilled. The essay aims to find out if this is working in the real life or what the problem coul
APA, Harvard, Vancouver, ISO, and other styles
18

Tomašovičová, Martina. "Strategická analýza podniku." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-12443.

Full text
Abstract:
Subject of this dissertation is "Strategic Analysis of an Enterprise". In theoretical part are evaluated common analytics methods. This method are applied on company GOPAS, a.s. in practical part, aim is to find strong and weak aspects, opportunities, potentials threats, which affect business of the GOPAS company.
APA, Harvard, Vancouver, ISO, and other styles
19

Nagaraj, Rajeev. "Threat modeling of para-virtualized environments." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5192.

Full text
Abstract:
Organizations are looking at various cost effective methods to reduce the overall cost of data storage systems. This measure is taken essentially to reduce the hardware that is currently being used for hosting servers. In recent years, the organizations around the world have looked at various options such as parallel computing and grid computing. However, these techniques have not been implemented in organizations due to their limitations. Virtualization is a new technique that is being adopted by system administrators to overcome the hardware issues within a computer network. Virtualization h
APA, Harvard, Vancouver, ISO, and other styles
20

Heming, Meike. "Workplace violence and its association with sleep disturbances in the Swedish working population." Thesis, Stockholms universitet, Institutionen för folkhälsovetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-182514.

Full text
Abstract:
Aim: The purpose of this study was to investigate associations between workplace violence and sleep disturbances in the Swedish working population, and to estimate potential dose-response relationships. Methods: Data were derived from two waves (2014 and 2016) of the Swedish Longitudinal Occupational Survey of Health (n=9364). Sleep disturbances were measured with four items of the Karolinska Sleep Questionnaire and one question asked whether the participants were exposed to violence or threats of at the workplace in the past six months. Multiple logistic regression analyses were performed. Re
APA, Harvard, Vancouver, ISO, and other styles
21

Wai, Siu-wah, and 衛兆華. "Red tides: a detrimentall threat to the environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31254135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wai, Siu-wah. "Red tides : a detrimentall threat to the environment /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B20038203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lusk, Adam. "Arguing Security: Rhetoric, Media Environment, and Threat Legitimation." Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/65998.

Full text
Abstract:
Political Science<br>Ph.D.<br>In this dissertation, I study the process of gaining public consent about a security threat, or threat legitimation. Threats require legitimation because they are social facts and not objective truths or subjective perceptions. I argue rhetorical resources and strategies affect threat legitimation. Political actors deploy rhetorical resources and strategies in order to generate consent. The rhetorical resources connect together the rhetorical resources to construct a threat narrative used in the public debates. Moreover, I argue that the media environment influenc
APA, Harvard, Vancouver, ISO, and other styles
24

Vidigal, Ana. "Análise espacial e os sistemas de informação geográfica-a oferta de equipamentos urbanos na óptica do ambiente urbano e do desenvolvimento sustentável das cidades." Master's thesis, Instituições portuguesas -- UNL-Universidade Nova de Lisboa -- FCSH-Faculdade de Ciências Sociais e Humanas -- -Departamento de Geografia e Planeamento Regional, 2001. http://dited.bn.pt:80/29423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Babula, Michael William. "Higher motivation in a threat environment : September 11, 2001." Thesis, Goldsmiths College (University of London), 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Nagavarapu, Sriniketh. "Brazilian ethanol : a gift or threat to the environment? /." May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Haverkamp, Kalli. "An Analysis of the New Threat Environment for Satellites." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-71605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Rengifo, Pelaez Cesar David. "Social Leaders under threat: A critical analysis of the Colombian government and its party members discourse regarding threats, violence, and assassinations of Social Leaders." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-445294.

Full text
Abstract:
Social Leaders in Colombia in their efforts to defend their territories and communities have been victims for years of threats, violence, and assassinations by some of the power structures present in the country. After the signing of the peace process Between the FARC and the government of Colombia in 2016, the situation has worsened. Social Leaders are catalysts for sustainable development and guaranteeing their protection is fundamental to the country's sustainable development goals. To analyze the situation the methodology applied was a critical discourse analysis, in which the thesis purse
APA, Harvard, Vancouver, ISO, and other styles
29

Singh, Virdi Amandeep. "AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.

Full text
Abstract:
Attack simulations provide a viable means to test the cyber security of a system. The simulations trace the steps taken by the attacker to compromise sensitive assets within the system. In addition to this, they can also estimate the time taken by the attacker for the same, measuring from the initial step up to the final. One common approach to implement such simulations is the use of attack graph, which trace the various dependencies of every step and their connection to one another in a formal way. To further facilitate attack simulations and to reduce the effort of creating new attack graph
APA, Harvard, Vancouver, ISO, and other styles
30

Geng, Ningyao. "azureLang: Cyber Threat Modelling in Microsoft Azure cloud computing environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284501.

Full text
Abstract:
When assessing network systems, security has always been one of the priorities.Cyber threat modelling is one of the most suitable methods. From a startingpoint to each valuable asset, the simulation can enable the users to explore certainsecurity weaknesses alongside the attack path. In the end, the time to compromiseshows the security level of the whole system.In principle, most cyber threat models can be built and simulated by attack graphswhere each point in the graph can stand for a certain asset in the network system.However, different systems have different infrastructures and implementa
APA, Harvard, Vancouver, ISO, and other styles
31

Muhandiramge, Ranga. "Maritime manoeuvring optimization : path planning in minefield threat environments." University of Western Australia. School of Mathematics and Statistics, 2008. http://theses.library.uwa.edu.au/adt-WU2009.0015.

Full text
Abstract:
The aim of the research project that is the subject of this thesis is to apply mathematical techniques, especially those in the area of operations research, to the problem of maritime minefield transit. We develop several minefield models applicable to different aspects of the minefield problem. These include optimal mine clearance, shortest time traversal and time constrained traversal. We hope the suite of models and tools developed will help make mine field clearance and traversal both safer and more efficient and that exposition of the models will bring a clearer understanding of the mine
APA, Harvard, Vancouver, ISO, and other styles
32

Cooper, Benjamin S. "Interactive Planning and Sensing for Aircraft in Uncertain Environments with Spatiotemporally Evolving Threats." Digital WPI, 2018. https://digitalcommons.wpi.edu/etd-dissertations/513.

Full text
Abstract:
Autonomous aerial, terrestrial, and marine vehicles provide a platform for several applications including cargo transport, information gathering, surveillance, reconnaissance, and search-and-rescue. To enable such applications, two main technical problems are commonly addressed.On the one hand, the motion-planning problem addresses optimal motion to a destination: an application example is the delivery of a package in the shortest time with least fuel. Solutions to this problem often assume that all relevant information about the environment is available, possibly with some uncer
APA, Harvard, Vancouver, ISO, and other styles
33

NYMAN, NICK. "Threat Awareness in Agile Environments : Creating a Developer-Driven Threat Modeling Process for Agile Software Development Teams." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-276440.

Full text
Abstract:
Agile principles for software development are now the industry standard for innovative projects. Agile is often hailed for being flexible, but there is also a commonly held 'truth' that agile principles and software security do not work well together. For this reason it is not uncommon to place all security responsibilities with a separate team, which goes against the agile principles of being team-centered and may affect flexibility or timeframe of a project. Additionally, software security is difficult and requires extensive experience and knowledge, something that varies a lot among softwar
APA, Harvard, Vancouver, ISO, and other styles
34

Holmes, William B. "Exploring Environmental Service Auctions." Digital Archive @ GSU, 2010. http://digitalarchive.gsu.edu/econ_diss/63.

Full text
Abstract:
The chapters of this dissertation explore related aspects of the procurement of conservation services from private landowners. In the first chapter, heuristic laboratory experiments reveal the impact of potential government regulation on strategic forces and efficiency properties in conservation procurement auctions. In the second chapter, data from past procurement auctions are analyzed to discover the existence and magnitude of premiums received by auction participants. The first Chapter, “Procurement Auctions Under Regulatory Threat,” examines how strategic forces and efficiency propertie
APA, Harvard, Vancouver, ISO, and other styles
35

Nobrega, Caroline Correa. "Amazon forest dieback: assessing vulnerabilities and threats." Universidade Federal de Goiás, 2016. http://repositorio.bc.ufg.br/tede/handle/tede/5873.

Full text
Abstract:
Submitted by Erika Demachki (erikademachki@gmail.com) on 2016-08-05T18:37:46Z No. of bitstreams: 2 Tese - Caroline Correa Nobrega - 2016.pdf: 4990749 bytes, checksum: 427c1ea06410c4fb5c6092e4e2cc351d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)<br>Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2016-08-09T12:01:33Z (GMT) No. of bitstreams: 2 Tese - Caroline Correa Nobrega - 2016.pdf: 4990749 bytes, checksum: 427c1ea06410c4fb5c6092e4e2cc351d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)<br>Made available
APA, Harvard, Vancouver, ISO, and other styles
36

Aoudé, Georges Salim. "Threat assessment for safe navigation in environments with uncertainty in predictability." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68401.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, 2011.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 213-224).<br>This thesis develops threat assessment algorithms to improve the safety of the decision making of autonomous and human-operated vehicles navigating in dynamic and uncertain environments, where the source of uncertainty is in the predictability of the nearby vehicles' future trajectories. The first part of the thesis introduces two classes of algorithms to classify drivers behaviors at roads intersec
APA, Harvard, Vancouver, ISO, and other styles
37

Procházková, Ivana. "Rozvoj obchodních aktivit podniku cestovní kancelář Cílka, s.r.o." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222152.

Full text
Abstract:
The Master's thesis characterizes, analyzes and assesses the current situation of the travel agency Cílka, Ltd. The thesis nalysis current position of the company, it deals with inside and outside environment that influences business activities. By the inside and outside analysis of environment there are formulated Opportunities and Threats and below Strengths and Weaknesses. On the basis of findings, the work includes complex solution strategy, development and improvement company position, which should had help establish firm and fix her position on market.
APA, Harvard, Vancouver, ISO, and other styles
38

Kontaxi, Zoe. "The socio-political construction of terrorist threat in post 9/11 Olympic environment." Thesis, University of Kent, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.587569.

Full text
Abstract:
The present research investigates the socio-political factors that have transformed the post 9/11 Olympics into a 'top priority', 'the biggest security challenge since the WW II' or even an 'inevitable' terrorism target. By using a constructivist approach, our research explores the Olympics' vulnerability to terrorism and the reasons for governments' preoccupation with the emergent Olympic security transformation and planning at an international level. The terrorist attacks on America on 11 September, 2001 informed the prevalent discourse of terrorism within the Olympic mega event and propagat
APA, Harvard, Vancouver, ISO, and other styles
39

Disraelly, Deena S. (Deena Sara) 1974. "Public-private partnerships : security and emergency response collaboration in a new threat environment." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34783.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program; and, (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2004.<br>Includes bibliographical references (leaves 218-225).<br>September 11th, 2001 marks the worst terrorist action to occur on United States soil and opens a new period in history in which indiscriminate terrorist acts are possible, if not probable. Many of these possible acts, as well as the actions to prevent and recover, will have an impact on the supply chain and services in
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Wan-kam, and 李韻琴. "The threats of aging private buildings in Hong Kong: assessing social, environmental and physicalexternalities." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B45009351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Wan-kam. "The threats of aging private buildings in Hong Kong : assessing social, environmental and physical externalities /." View the Table of Contents & Abstract, 2008. http://sunzi.lib.hku.hk/hkuto/record/B4098848X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Jahns, Claire M. "The effects of regulatory threats and strategic bargaining on firms' voluntary participation in pollution reduction programs." Oberlin College Honors Theses / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1354889137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Albrecht, Michael E. C. "Air asset to mission assignment for dynamic high-threat environments in real-time." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45155.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This thesis develops pre-processing algorithms and a mixed integer programming model that solves the route selection and asset-to-mission assignment problem in the presence of threat air-defense systems. Our model and algorithms reduce the planning timeline and coordination burden by handling the heavy computational aspects of the planning process. It takes as input current aircraft, target, and threat information and produces asset-to-mission pairing recommendations that accomplish the mission while providing routes and coordination to
APA, Harvard, Vancouver, ISO, and other styles
44

Davis, Samantha Lynn. "Evaluating threats to the rare butterfly, Pieris virginiensis." Wright State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=wright1431882480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Perez-Olivas, Gisela. "The role of the family environment and of threat-related cognitive biases in childhood anxiety." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.444963.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Becker, Lisa. "‘Hambi bleibt!’ - Securitizing the Environment - A case study of discursive threat-construction surrounding the Hambach Forest." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23600.

Full text
Abstract:
Although issues linked to global environmental change and its role within peace, conflict andsecurity have been subject to social and political controversy for years, they are still notsufficiently respected by energy companies, trade unions, national governments andinternational institutions alike. Through applying the tools of a single instrumental case studylinked to the application of discourse analysis I, this study explores the process of securitizationof the environment in the extraordinary case of the resistance and occupation surrounding theHambach Forest, thereby countering the widel
APA, Harvard, Vancouver, ISO, and other styles
47

Shewhart, Lauren Elizabeth. "How specialist and generalist herbivores are responding to invasive plant threats." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1462797971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Leonard, Anne Frances Clare. "Are bacteria in the coastal zone a threat to human health?" Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/22805.

Full text
Abstract:
Faecal pollution regularly contaminates surface waters, introducing microorganisms, including bacteria and bacteria resistant to antibiotics, to coastal waters. People can come into contact with these potentially harmful microbes when they enjoy recreational activities in the sea. Understanding the risk to bathers of acquiring infections from the sea is important for developing effective intervention strategies to protect human health. This thesis consists of four original studies which aim to answer the question ‘are bacteria in the coastal zone a threat to human health’? First, we describe a
APA, Harvard, Vancouver, ISO, and other styles
49

Bernhardt, Wilhelm. "A qualitative conceptual framework for conducting risk- and threat assessment in the South African domestic intelligence environment." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-05052005-162339/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Stinchfield, Michael K., and Jason C. Caldwell. "Improving military change detection skills in a virtual environment the effects of time, threat level, and tutorials." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5494.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The first one hundred days of combat are the most dangerous time for a soldier due to uncertainty and unfamiliarity with his area of operations. Developing a desktop virtual trainer for change detection could reduce the threat to soldiers by improving their ability to detect signals among the cluttered, noisy neighborhoods of the current operational environment. Building upon previous change detection and signal detection work, this thesis explores the use of Army Virtual Battlespace 2 as a prototype-training tool for change detection.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!