You searched for subject:( security)
.
Showing records 1 – 30 of
16920 total matches.
◁ [1] [2] [3] [4] [5] … [564] ▶
1.
Küpçü, Alptekin.
Efficient Cryptography for the Next Generation Secure
Cloud.
Degree: PhD, Computer Science, 2010, Brown University
URL: https://repository.library.brown.edu/studio/item/bdr:11123/
► Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since…
(more)
▼ Peer-to-peer (P2P) systems, and client-server type
storage and computation outsourcing constitute some of the major
applications that the next generation cloud schemes will address.
Since these applications are just emerging, it is the perfect time
to design them with
security and privacy in mind. Furthermore,
considering the high-churn characteristics of such systems, the
cryptographic protocols employed must be efficient and scalable.
This thesis shows that cryptography can be used to efficiently and
scalably provide
security and privacy for the next generation cloud
systems.We start by describing an efficient and scalable fair
exchange protocol that can be used for exchanging files between
participants of a P2P file sharing system. In this system, there
are two central authorities that we introduce: the arbiter and the
bank. We then try distributing these entities to reduce trust
assumptions and to improve performance. Our work on distributing
the arbiter leads to impossibility results, whereas our work on
distributing the bank leads to a more general cloud computation
result showing how a boss can employ untrusted contractors, and
fine or reward them. We then consider cloud storage scenario, where
the client outsources storage of her files to an untrusted server.
We show how the client can challenge the server to prove that her
file is kept intact, even when the files are dynamic. Next, we
provide an agreement protocol for a dynamic message, where two
parties agree on the latest version of a message that changes over
time. We then apply this agreement protocol to the cloud storage
setting and show how a judge can arbitrate between the client and
the server officially based on the agreed-upon message and the
proof sent by the server. Lastly, we show that all our solutions
are efficient and scalable by presenting results from the
cryptographic library we implemented.
Advisors/Committee Members: Lysyanskaya, Anna (Director), Dodis, Yevgeniy (Reader), Jannotti, John (Reader), Tamassia, Roberto (Reader).
Subjects/Keywords: security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Küpçü, A. (2010). Efficient Cryptography for the Next Generation Secure
Cloud. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:11123/
Chicago Manual of Style (16th Edition):
Küpçü, Alptekin. “Efficient Cryptography for the Next Generation Secure
Cloud.” 2010. Doctoral Dissertation, Brown University. Accessed April 16, 2021.
https://repository.library.brown.edu/studio/item/bdr:11123/.
MLA Handbook (7th Edition):
Küpçü, Alptekin. “Efficient Cryptography for the Next Generation Secure
Cloud.” 2010. Web. 16 Apr 2021.
Vancouver:
Küpçü A. Efficient Cryptography for the Next Generation Secure
Cloud. [Internet] [Doctoral dissertation]. Brown University; 2010. [cited 2021 Apr 16].
Available from: https://repository.library.brown.edu/studio/item/bdr:11123/.
Council of Science Editors:
Küpçü A. Efficient Cryptography for the Next Generation Secure
Cloud. [Doctoral Dissertation]. Brown University; 2010. Available from: https://repository.library.brown.edu/studio/item/bdr:11123/

University of Colorado
2.
Dixon, Bryan Charles.
Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.
Degree: PhD, Computer Science, 2013, University of Colorado
URL: https://scholar.colorado.edu/csci_gradetds/69
► In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored…
(more)
▼ In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored on smartphones. Most current approaches for detecting this malicious code have detrimental impacts on the user in terms of reduced functionality, slower network speeds, or loss of battery life. This work presents a number of approaches that have a minimal impact on the user but offer successful detection of potential malicious code on the smartphone. We do this primarily by focusing on anomalous power use as a method for detecting the presence of malicious code. This work also introduces ways to fine-tune the process by establishing a normal profile of power usage for each user, which increases the rate of malware detection.
Advisors/Committee Members: Shivakant Mishra, Richard Han, Qin Lv, John Black, Eric Keller.
Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from https://scholar.colorado.edu/csci_gradetds/69
Chicago Manual of Style (16th Edition):
Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed April 16, 2021.
https://scholar.colorado.edu/csci_gradetds/69.
MLA Handbook (7th Edition):
Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 16 Apr 2021.
Vancouver:
Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2021 Apr 16].
Available from: https://scholar.colorado.edu/csci_gradetds/69.
Council of Science Editors:
Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: https://scholar.colorado.edu/csci_gradetds/69

George Mason University
3.
Vella, Andre`.
From National Security to Environmental Security: A Historical Overview
.
Degree: 2012, George Mason University
URL: http://hdl.handle.net/1920/7528
► The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow…
(more)
▼ The study attempts to provide a historical approach to the role of the environment in
security studies. Contemporary
security challenges have shown that the narrow definition given to national
security is no longer adequate. Instead, there was the emergence of newer
security conceptual frameworks, such as human
security, to account for transnational
security challenges. In this scenario, the role of the environment in
security changed as well. As a non-military threat, environmental degradation comes with its own challenges. These challenges include overcoming the ambiguous nature of the concepts of human
security or environmental
security and finding ways to scientifically measure these concepts, in order to propel policy and legislative changes to protect environmental
security. In this respect, further debate should revolve around the task of operationalizing environmental
security.
Advisors/Committee Members: Calleya, Stephen C (advisor).
Subjects/Keywords: Environmental Security;
National Security;
Security;
Environment
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vella, A. (2012). From National Security to Environmental Security: A Historical Overview
. (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/7528
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Vella, Andre`. “From National Security to Environmental Security: A Historical Overview
.” 2012. Thesis, George Mason University. Accessed April 16, 2021.
http://hdl.handle.net/1920/7528.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Vella, Andre`. “From National Security to Environmental Security: A Historical Overview
.” 2012. Web. 16 Apr 2021.
Vancouver:
Vella A. From National Security to Environmental Security: A Historical Overview
. [Internet] [Thesis]. George Mason University; 2012. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/1920/7528.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Vella A. From National Security to Environmental Security: A Historical Overview
. [Thesis]. George Mason University; 2012. Available from: http://hdl.handle.net/1920/7528
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Rutgers University
4.
Delos Reyes, John Emmanuel.
Food insecurity, food pantry use and stigma: a study of U.S. citizen and non-citizen university students.
Degree: MS, Social stigma, 2021, Rutgers University
URL: https://rucore.libraries.rutgers.edu/rutgers-lib/65290/
► Food insecurity among students is a concern in many universities across the country. The purpose of this research is to investigate food insecurity, food pantry…
(more)
▼ Food insecurity among students is a concern in many universities across the country. The purpose of this research is to investigate food insecurity, food pantry use, food pantry use stigma, and how these vary among individuals with varying citizenship statuses. A cross-sectional analysis was conducted to analyze the prevalence of food insecurity and food pantry use among U.S. citizen and non-U.S. citizen undergraduate students at Rutgers University-New Brunswick (N=5,063). A novel, 13-item scale to measure the perceptions of an on-campus food pantry was developed, administered to students who had heard of the food pantry and were not highly food secure, and later factor analyzed. The study found that a third (31.5%) of undergraduate students were food insecure and less than one-in-twenty (4.1%) of students aware of the on-campus food pantry reported using it. Three subscales were identified from the factor analysis, including the Food Pantry Use Stigma Subscale, which measures the fear, concern, and embarrassment related to food pantry use. Almost three-in-four students agreed that there is stigma around using the food pantry. Undergraduate non-U.S. citizen students report more food insecurity and use of the on-campus food pantry and reported feeling more food pantry use stigma compared to U.S. citizen students, highlighting that they are a particularly at-risk group of Rutgers-NB students. Implications for future research and policy, as well as recommendations for the Rutgers Student Food Pantry, are discussed.
Advisors/Committee Members: Cuite, Cara L. (chair), Quick, Virginia (co-chair), Hallman, William K. (co-chair), School of Graduate Studies.
Subjects/Keywords: Food security; Food security; Food security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Delos Reyes, J. E. (2021). Food insecurity, food pantry use and stigma: a study of U.S. citizen and non-citizen university students. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/65290/
Chicago Manual of Style (16th Edition):
Delos Reyes, John Emmanuel. “Food insecurity, food pantry use and stigma: a study of U.S. citizen and non-citizen university students.” 2021. Masters Thesis, Rutgers University. Accessed April 16, 2021.
https://rucore.libraries.rutgers.edu/rutgers-lib/65290/.
MLA Handbook (7th Edition):
Delos Reyes, John Emmanuel. “Food insecurity, food pantry use and stigma: a study of U.S. citizen and non-citizen university students.” 2021. Web. 16 Apr 2021.
Vancouver:
Delos Reyes JE. Food insecurity, food pantry use and stigma: a study of U.S. citizen and non-citizen university students. [Internet] [Masters thesis]. Rutgers University; 2021. [cited 2021 Apr 16].
Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/65290/.
Council of Science Editors:
Delos Reyes JE. Food insecurity, food pantry use and stigma: a study of U.S. citizen and non-citizen university students. [Masters Thesis]. Rutgers University; 2021. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/65290/

Penn State University
5.
Ren, Chuangang.
A Study of Selected Issues in Android Security.
Degree: 2016, Penn State University
URL: https://submit-etda.libraries.psu.edu/catalog/b5644r534
► Mobile devices such as smartphones have become an integral part of society today, shaping people’s daily life, changing the landscape of how business operate and…
(more)
▼ Mobile devices such as smartphones have become an integral part of society today, shaping people’s daily life, changing the landscape of how business operate and how industries are powered today. However, the unprecedented popularity of mobile devices introduces a concerning side effect, an dramatically increasing number of
security threats is posing serious risks to the
security of mobile systems and the applications. Notably, one of the most successful mobile systems, Android, has exposed a plethora of vulnerabilities which are actively exploited by a large number of potentially harmful apps (malware, adwares, risk-wares, etc.), most of which are distributed in under-scrutinized third-party Android markets.
Mitigating the
security threats to Android is non-trivial. There has been considerable efforts in securing Android to achieve the following two complimentary goals: (1) Market-scale detection and identification of problematic apps in an efficient manner, and (2) discovery, analysis of the Android system vulnerabilities, and defense measures against the enabled attacks.
In this dissertation, we propose techniques and approaches to solve specific problems in the above two aspects respectively, providing the step stones towards finally achieving these two goals. Specifically, we first present a novel software watermarking scheme, namely Droidmarking, that can efficiently and effectively impede the prevalent software plagiarism (a.k.a app repackaging) problem in the Android markets. Second, we systematically study and propose a new prevalent Android system vulnerability, which, once exploited by an attacker, can lead to serious
security breaches of integrity, confidentiality and availability of the graphic user interface (GUI) on an Android device. Finally, we devise a comprehensive and practical solution to protect the GUI sub-system in Android. The defense is able to defeat all know GUI attacks while preserving the original user experience of Android. We plan to further explore Android system and app
security towards a more secure ecosystem for Android.
Advisors/Committee Members: Sencun Zhu, Dissertation Advisor/Co-Advisor, Peng Liu, Committee Chair/Co-Chair, Sencun Zhu, Committee Member, Wang-Chien Lee, Committee Member, Minghui Zhu, Outside Member.
Subjects/Keywords: Android; Computer Security; Android Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ren, C. (2016). A Study of Selected Issues in Android Security. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/b5644r534
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Thesis, Penn State University. Accessed April 16, 2021.
https://submit-etda.libraries.psu.edu/catalog/b5644r534.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Web. 16 Apr 2021.
Vancouver:
Ren C. A Study of Selected Issues in Android Security. [Internet] [Thesis]. Penn State University; 2016. [cited 2021 Apr 16].
Available from: https://submit-etda.libraries.psu.edu/catalog/b5644r534.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ren C. A Study of Selected Issues in Android Security. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/b5644r534
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Queens University
6.
Hunny, Umme.
Orthogonal Security Defect Classification for Secure Software Development
.
Degree: Computing, 2012, Queens University
URL: http://hdl.handle.net/1974/7625
► Security defects or vulnerabilities are inescapable in software development. Thus, it is always better to address security issues during the software development phases, rather than…
(more)
▼ Security defects or vulnerabilities are inescapable in software development. Thus, it is always better to address security issues during the software development phases, rather than developing patches after the security threats are already in place. In line with this, a number of secure software development approaches have been proposed so far to address the security issues during the development processes. However, most of these approaches lack specific process improvement activities. The practice of taking adequate corrective measures at the earliest possible time by learning from the past mistakes is absent in case of such security-aware iterative software development processes. As one might imagine, software security defect data provide an invaluable source of information for a software development team. This thesis aims at investigating existing security defect classification schemes and providing a structured security-specific defect classification and analysis methodology.
Our methodology which we build on top of the Orthogonal Defect Classification (ODC) scheme, is customized to generate in-process feedback by analyzing security defect data. More specifically, we perform a detailed analysis on the classified security defect data and obtain in-process feedback using which the next version of software can be more secure and reliable. We experiment our methodology on the Mozilla Firefox and Chrome security defect repositories using six consecutive versions and milestones, respectively. We find that the in-process feedback generated by applying this methodology can help take corrective actions as early as possible in iterative secure software development processes. Finally, we study the correlations between software security defect types and the phases of software development life-cycle to understand development improvement by complementing the previous ODC scheme.
Subjects/Keywords: Security defect classification
;
Software security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hunny, U. (2012). Orthogonal Security Defect Classification for Secure Software Development
. (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/7625
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development
.” 2012. Thesis, Queens University. Accessed April 16, 2021.
http://hdl.handle.net/1974/7625.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development
.” 2012. Web. 16 Apr 2021.
Vancouver:
Hunny U. Orthogonal Security Defect Classification for Secure Software Development
. [Internet] [Thesis]. Queens University; 2012. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/1974/7625.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hunny U. Orthogonal Security Defect Classification for Secure Software Development
. [Thesis]. Queens University; 2012. Available from: http://hdl.handle.net/1974/7625
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Johannesburg
7.
Van der Merwe, Isak Pieter.
Rolprofiele vir die bestuur van inligtingsekerheid.
Degree: 2014, University of Johannesburg
URL: http://hdl.handle.net/10210/12066
► M.Com. (Informatics)
The aim of this study is to introduce a model that can be used to manage the security profiles by using a role…
(more)
▼ M.Com. (Informatics)
The aim of this study is to introduce a model that can be used to manage the security profiles by using a role oriented approach. In chapter 1 the addressed problem and the aim of the study, are introduced. In chapter 2 the different approaches used in the management of security profiles and the security profiles in Computer Associates's TOP SECRET and IBM's RACF, are discussed, In chapter 3 the Model for Role Profiles (MoRP) is introduced and discussed. Chapter 4 consists of a consideration of the possible problems of MoRP and an extension of MoRP is discussed.' The extended model is called ExMoRP. Chapter 5 consists of an analysis of the Path Context Model (pCM) for security and the principles of the PCM are added to ExMoRP to enhance security. In chapter 6 ExMoRP, with the principles of the PCM, are applied on a case study: In chapter 7 a methodology for the implementation of ExMoRP in an environment, is introduced. In chapter 8 it is shown how the principles of ExMoRP can be applied in UNIX, In chapter 9 it is shown how the principles of ExMoRP can be applied in Windows NT. In chapter 10 it is shown how the principles of ExMoRP can be applied in ORACLE. Chapter 11 consists of a review of the management of security and the present trends.
Subjects/Keywords: Database security; Computer security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Van der Merwe, I. P. (2014). Rolprofiele vir die bestuur van inligtingsekerheid. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12066
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Thesis, University of Johannesburg. Accessed April 16, 2021.
http://hdl.handle.net/10210/12066.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Web. 16 Apr 2021.
Vancouver:
Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/10210/12066.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12066
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Johannesburg
8.
Tolnai, Annette.
ISAP - an information security awareness portal.
Degree: 2010, University of Johannesburg
URL: http://hdl.handle.net/10210/3283
► M.Sc.
The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a…
(more)
▼ M.Sc.
The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a part of our daily lives, the more we expose ourselves and our personal information on the World Wide Web and hence, the more opportunities arise for fraudsters to get hold of this information. Internet use can be associated with Internet banking, online shopping, online transactions, Internet Relay Chat, newsgroups, search engines, online blogs and e-mail. The source behind online activities carried on over the Internet may be different from what we are led to believe. Communication lines may be intercepted, compromising sensitive information of the user. It is a risk to make digital payments and reveal sensitive information about ourselves to an unknown source. If the risk materializes, it may result in undesired circumstances. Using the Internet securely should be a prerequisite to every user before conducting online transactions and activities over the World Wide Web. Owing to the versatility and ease of the electronic medium, electronic databases and vast amounts of sensitive information are readily accumulated. This is cause for concern regarding the main issues, namely privacy, identity theft and monetary fraud. Major countermeasures to mitigate the main forms of security and Internet-related issues are awareness of these risks and how they may materialize as well as relevant protection mechanisms. A discussion about why the Internet is a popular medium for criminal behaviour, what risks are involved, what can be done about them and some technical as well as non-technical preventative measures are covered in this dissertation. The purpose of this dissertation is to create an overall awareness of Internet banking and the process of Internet transactions. The end result is the development of an information security awareness portal (ISAP) aimed at the general public and potential Internet users who may be subject to identity and credit fraud. The aim of the ISAP is to sensitize users and minimize the growing numbers of individuals who are victimized through online crimes. Individuals using the Internet need to be aware of privacy concerns governing the Internet and how searchers are able to find out almost anything about them. The false sense of security and anonymity we as users think we have when innocently connecting to the World Wide Web outlines threats lurking in the background where we would never imagine. By the time you are finished reading this dissertation, it may put you off transacting and revealing sensitive information about yourself online ever again.
Subjects/Keywords: Computer security; Internet security measures
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Tolnai, A. (2010). ISAP - an information security awareness portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3283
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Thesis, University of Johannesburg. Accessed April 16, 2021.
http://hdl.handle.net/10210/3283.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Web. 16 Apr 2021.
Vancouver:
Tolnai A. ISAP - an information security awareness portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/10210/3283.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tolnai A. ISAP - an information security awareness portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3283
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Liberty University
9.
Bass, Chelsea.
Flying Thru Security.
Degree: 2017, Liberty University
URL: http://digitalcommons.liberty.edu/masters/461
► Due to the Transportation Security Act (TSA), which passed in November 2011, airport security has drastically changed. The new security checkpoint practices have caused security…
(more)
▼ Due to the Transportation Security Act (TSA), which passed in November 2011, airport security has drastically changed. The new security checkpoint practices have caused security lines to be very long; on average, a traveler waits 90 minutes to get through security. Most airline travelers frequently describe feeling anxiety, frustration, stress, and annoyance while in airport security lines. Being overwhelmed with time, pressure to move quickly and the overall security check process are also problematic for them as well as for the TSA officers and airlines. However, these emotionally negative travel experiences can become positive ones with some design element intervention to the Transportation Security Act safety measures.
Subjects/Keywords: Airport Security; Airport Security Solutions
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Bass, C. (2017). Flying Thru Security. (Masters Thesis). Liberty University. Retrieved from http://digitalcommons.liberty.edu/masters/461
Chicago Manual of Style (16th Edition):
Bass, Chelsea. “Flying Thru Security.” 2017. Masters Thesis, Liberty University. Accessed April 16, 2021.
http://digitalcommons.liberty.edu/masters/461.
MLA Handbook (7th Edition):
Bass, Chelsea. “Flying Thru Security.” 2017. Web. 16 Apr 2021.
Vancouver:
Bass C. Flying Thru Security. [Internet] [Masters thesis]. Liberty University; 2017. [cited 2021 Apr 16].
Available from: http://digitalcommons.liberty.edu/masters/461.
Council of Science Editors:
Bass C. Flying Thru Security. [Masters Thesis]. Liberty University; 2017. Available from: http://digitalcommons.liberty.edu/masters/461

University of Ghana
10.
Otoo, C.K.
Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
Degree: 2016, University of Ghana
URL: http://ugspace.ug.edu.gh/handle/123456789/27439
► In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex…
(more)
▼ In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex of the modern security dialogue. In the post-Snowden era, national approaches to cybersecurity seem to be sparking a ‘digital arms race’ rather than fostering more security. Hence, cyberspace presents a dilemma of epic proportions, which challenges the traditional notions of state-centric security within the arena of international relations. The reason for this is the supranational architecture of cyberspace, which makes it difficult for states to unilaterally securitize existing and emergent cyber-threats. This study interrogates the cybersecurity dilemma and explores the utility of the application of the human security concept to cyberspace. The research shows that current national security approaches to the cybersecurity dilemma are inadequate in addressing the technical, political and social challenges predominant in cyberspace. The study concludes that a balance of the national security and human security approaches may provide states with a strong framework for addressing 21st century cyber challenges.
Subjects/Keywords: Cybersecurity;
National Security;
Human Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Otoo, C. K. (2016). Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
(Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/27439
Chicago Manual of Style (16th Edition):
Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
” 2016. Masters Thesis, University of Ghana. Accessed April 16, 2021.
http://ugspace.ug.edu.gh/handle/123456789/27439.
MLA Handbook (7th Edition):
Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
” 2016. Web. 16 Apr 2021.
Vancouver:
Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
[Internet] [Masters thesis]. University of Ghana; 2016. [cited 2021 Apr 16].
Available from: http://ugspace.ug.edu.gh/handle/123456789/27439.
Council of Science Editors:
Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
[Masters Thesis]. University of Ghana; 2016. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439

Halmstad University
11.
Rojas, Jose Enrique Charpentier.
Web application Security.
Degree: Computer and Electrical Engineering (IDE), 2013, Halmstad University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624
► Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and…
(more)
▼ Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and program but also which language and structure they use to code. Not only programmers but Software companies left holes in the software they developed of course without intention.Because is proven that most of the vulnerabilities start in the web application side, as developers we need to follow certain principles, test our code and learn as much as possible about the subject, as a foundation of web application security in order to know how to prevent issues to the most significant treats.The penetration test aimed to help the IT business to discover vulnerabilities in their system ensure their integrity and continue further in the web application security process. The vulnerability research perform in this report is the introduction of a big work that is under continuity for the company.Finally the success of following security standards, process and methodologies applied on this field is considered the best approach to ensure web application security and priceless information you can benefit from.
Subjects/Keywords: Web Application Security; Network Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Rojas, J. E. C. (2013). Web application Security. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Thesis, Halmstad University. Accessed April 16, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Web. 16 Apr 2021.
Vancouver:
Rojas JEC. Web application Security. [Internet] [Thesis]. Halmstad University; 2013. [cited 2021 Apr 16].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Rojas JEC. Web application Security. [Thesis]. Halmstad University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of North Florida
12.
Garrett, Keith.
Vulnerabililty Analysis of Multi-Factor Authentication Protocols.
Degree: 2016, University of North Florida
URL: https://digitalcommons.unf.edu/etd/715
► In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those…
(more)
▼ In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those protocols. In order to test this hypothesis: 1. A generalized algorithm for cryptanalysis was formulated to perform a clogging attack (a formof denial of service) on protocols that use computationally intensive modular exponentiation to guarantee security. 2. This technique was then applied to cryptanalyze four recent password authentication protocols, to determine their susceptibility to the clogging attack. The protocols analyzed in this thesis differ in their usage of factors (smart cards, memory drives, etc.) or their method of communication (encryption, nonces, timestamps, etc.). Their similarity lies in their use of computationally intensivemodular exponentiation as amediumof authentication. It is concluded that the strengths of all the protocols studied in this thesis can be combined tomake each of the protocols secure from the clogging attack. The conclusion is supported by designing countermeasures for each protocol against the clogging attack.
Subjects/Keywords: clogging attack security; Information Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Garrett, K. (2016). Vulnerabililty Analysis of Multi-Factor Authentication Protocols. (Thesis). University of North Florida. Retrieved from https://digitalcommons.unf.edu/etd/715
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Thesis, University of North Florida. Accessed April 16, 2021.
https://digitalcommons.unf.edu/etd/715.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Web. 16 Apr 2021.
Vancouver:
Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Internet] [Thesis]. University of North Florida; 2016. [cited 2021 Apr 16].
Available from: https://digitalcommons.unf.edu/etd/715.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Thesis]. University of North Florida; 2016. Available from: https://digitalcommons.unf.edu/etd/715
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
13.
Peng, Jinghui.
Secure covert communications over streaming media using dynamic steganography.
Degree: PhD, 2020, University of West London
URL: http://repository.uwl.ac.uk/id/eprint/6943/
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261
► Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems…
(more)
▼ Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out. A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance. The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process. A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel. The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms.
Subjects/Keywords: Cyber security; Information security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Peng, J. (2020). Secure covert communications over streaming media using dynamic steganography. (Doctoral Dissertation). University of West London. Retrieved from http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261
Chicago Manual of Style (16th Edition):
Peng, Jinghui. “Secure covert communications over streaming media using dynamic steganography.” 2020. Doctoral Dissertation, University of West London. Accessed April 16, 2021.
http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261.
MLA Handbook (7th Edition):
Peng, Jinghui. “Secure covert communications over streaming media using dynamic steganography.” 2020. Web. 16 Apr 2021.
Vancouver:
Peng J. Secure covert communications over streaming media using dynamic steganography. [Internet] [Doctoral dissertation]. University of West London; 2020. [cited 2021 Apr 16].
Available from: http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261.
Council of Science Editors:
Peng J. Secure covert communications over streaming media using dynamic steganography. [Doctoral Dissertation]. University of West London; 2020. Available from: http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261

University of Cambridge
14.
Nam, Myoung Jin.
Inline and sideline approaches for low-cost memory safety in C.
Degree: PhD, 2020, University of Cambridge
URL: https://doi.org/10.17863/CAM.64624
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.824357
► System languages such as C or C++ are widely used for their high performance, however the allowance of arbitrary pointer arithmetic and type cast introduces…
(more)
▼ System languages such as C or C++ are widely used for their high performance, however the allowance of arbitrary pointer arithmetic and type cast introduces a risk of memory corruptions. These memory errors cause unexpected termination of programs, or even worse, attackers can exploit them to alter the behavior of programs or leak crucial data. Despite advances in memory safety solutions, high and unpredictable overhead remains a major challenge. Accepting that it is extremely difficult to achieve complete memory safety with the performance level suitable for production deployment, researchers attempt to strike a balance between performance, detection coverage, interoperability, precision, and detection timing. Some properties are much more desirable, e.g. the interoperability with pre-compiled libraries. Comparatively less critical properties are sacrificed for performance, for example, tolerating longer detection delay or narrowing down detection coverage by performing approximate or probabilistic checking or detecting only certain errors. Modern solutions compete for performance. The performance matrix of memory safety solutions have two major assessment criteria - run-time and memory overheads. Researchers trade-off and balance performance metrics depending on its purpose or placement. Many of them tolerate the increase in memory use for better speed, since memory safety enforcement is more desirable for troubleshooting or testing during development, where a memory resource is not the main issue. Run-time overhead, considered more critical, is impacted by cache misses, dynamic instructions, DRAM row activations, branch predictions and other factors. This research proposes, implements, and evaluates MIU: Memory Integrity Utilities containing three solutions - MemPatrol, FRAMER and spaceMiu. MIU suggests new techniques for practical deployment of memory safety by exploiting free resources with the following focuses: (1) achieving memory safety with overhead < 1% by using concurrency and trading off prompt detection and coverage; but yet providing eventual detection by a monitor isolation design of an in-register monitor process and the use of AES instructions (2) complete memory safety with near-zero false negatives focusing on eliminating overhead, that hardware support cannot resolve, by using a new tagged-pointer representation utilising the top unused bits of a pointer.
Subjects/Keywords: Cyber security; Software security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Nam, M. J. (2020). Inline and sideline approaches for low-cost memory safety in C. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.64624 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.824357
Chicago Manual of Style (16th Edition):
Nam, Myoung Jin. “Inline and sideline approaches for low-cost memory safety in C.” 2020. Doctoral Dissertation, University of Cambridge. Accessed April 16, 2021.
https://doi.org/10.17863/CAM.64624 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.824357.
MLA Handbook (7th Edition):
Nam, Myoung Jin. “Inline and sideline approaches for low-cost memory safety in C.” 2020. Web. 16 Apr 2021.
Vancouver:
Nam MJ. Inline and sideline approaches for low-cost memory safety in C. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Apr 16].
Available from: https://doi.org/10.17863/CAM.64624 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.824357.
Council of Science Editors:
Nam MJ. Inline and sideline approaches for low-cost memory safety in C. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://doi.org/10.17863/CAM.64624 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.824357

University of Cambridge
15.
Nam, Myoung Jin.
Inline and Sideline Approaches for Low-cost Memory Safety in C.
Degree: PhD, 2020, University of Cambridge
URL: https://www.repository.cam.ac.uk/handle/1810/317508
► System languages such as C or C++ are widely used for their high performance, however the allowance of arbitrary pointer arithmetic and type cast introduces…
(more)
▼ System languages such as C or C++ are widely used for their high performance, however the allowance of arbitrary pointer arithmetic and type cast introduces a risk of memory corruptions. These memory errors cause unexpected termination of programs, or even worse, attackers can exploit them to alter the behavior of programs or leak crucial data. Despite advances in memory safety solutions, high and unpredictable overhead remains a major challenge. Accepting that it is extremely difficult to achieve complete memory safety with the performance level suitable for production deployment, researchers attempt to strike a balance between performance, detection coverage, interoperability, precision, and detection timing. Some properties are much more desirable, e.g. the interoperability with pre-compiled libraries. Comparatively less critical properties are sacrificed for performance, for example, tolerating longer detection delay or narrowing down detection coverage by performing approximate or probabilistic checking or detecting only certain errors. Modern solutions compete for performance. The performance matrix of memory safety solutions have two major assessment criteria – run-time and memory overheads. Researchers trade-off and balance performance metrics depending on its purpose or placement. Many of them tolerate the increase in memory use for better speed, since memory safety enforcement is more desirable for troubleshooting or testing during development, where a memory resource is not the main issue. Run-time overhead, considered more critical, is impacted by cache misses, dynamic instructions, DRAM row activations, branch predictions and other factors. This research proposes, implements, and evaluates MIU: Memory Integrity Utilities containing three solutions – MemPatrol, FRAMER and spaceMiu. MIU suggests new techniques for practical deployment of memory safety by exploiting free resources with the following focuses: (1) achieving memory safety with overhead < 1% by using concurrency and trading off prompt detection and coverage; but yet providing eventual detection by a monitor isolation design of an in-register monitor process and the use of AES instructions (2) complete memory safety with near-zero false negatives focusing on eliminating overhead, that hardware support cannot resolve, by using a new tagged-pointer representation utilising the top unused bits of a pointer.
Subjects/Keywords: Cyber security; Software security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Nam, M. J. (2020). Inline and Sideline Approaches for Low-cost Memory Safety in C. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/317508
Chicago Manual of Style (16th Edition):
Nam, Myoung Jin. “Inline and Sideline Approaches for Low-cost Memory Safety in C.” 2020. Doctoral Dissertation, University of Cambridge. Accessed April 16, 2021.
https://www.repository.cam.ac.uk/handle/1810/317508.
MLA Handbook (7th Edition):
Nam, Myoung Jin. “Inline and Sideline Approaches for Low-cost Memory Safety in C.” 2020. Web. 16 Apr 2021.
Vancouver:
Nam MJ. Inline and Sideline Approaches for Low-cost Memory Safety in C. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Apr 16].
Available from: https://www.repository.cam.ac.uk/handle/1810/317508.
Council of Science Editors:
Nam MJ. Inline and Sideline Approaches for Low-cost Memory Safety in C. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://www.repository.cam.ac.uk/handle/1810/317508

Rochester Institute of Technology
16.
Hirwani, Manish.
Forensic analysis of VMware hard disks.
Degree: 2011, Rochester Institute of Technology
URL: https://scholarworks.rit.edu/theses/624
► With the advancement in virtualization technology, virtual machines (VMs) are becoming a common and an integral part of datacenters. As the popularity and use of…
(more)
▼ With the advancement in virtualization technology, virtual machines (VMs) are becoming a common and an integral part of datacenters. As the popularity and use of VMs increases, incidents involving them are also on the rise. There is substantial research on using VMs and virtual appliances to aid forensic investigation, but research on collecting evidence from VMs following a forensic procedure is lacking.
This thesis studies a forensically sound way to acquire and analyze VM hard disks. It also discusses the development of a tool which assists in forensic analysis of snapshots of virtual hard disks that are used in VMs. This tool analyzes the changes made to a virtual disk by comparing snapshots created at various stages. Comparing the state of the files in the base snapshot which is believed to be clean with the snapshot which is suspected of being tampered with, forensics investigators are able to identify files that have been recently added, deleted, edited, or modified.
Advisors/Committee Members: Pan, Yin.
Subjects/Keywords: Computer security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hirwani, M. (2011). Forensic analysis of VMware hard disks. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/624
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Thesis, Rochester Institute of Technology. Accessed April 16, 2021.
https://scholarworks.rit.edu/theses/624.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Web. 16 Apr 2021.
Vancouver:
Hirwani M. Forensic analysis of VMware hard disks. [Internet] [Thesis]. Rochester Institute of Technology; 2011. [cited 2021 Apr 16].
Available from: https://scholarworks.rit.edu/theses/624.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hirwani M. Forensic analysis of VMware hard disks. [Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/624
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
17.
Ortagus, Megan Leann.
The Internet's Impacts on Power Differentials in Security and Conflict.
Degree: 2014, Johns Hopkins University
URL: http://jhir.library.jhu.edu/handle/1774.2/37255
► Through case studies and empirical statistical research, this thesis tests the theory that information and communications technologies (ICT), specifically the Internet, is a casual factor…
(more)
▼ Through case studies and empirical statistical research, this thesis tests the theory that information and communications technologies (ICT), specifically the Internet, is a casual factor in shifting the global balance of power away from dominant states towards individuals and smaller states. The Internet affords acute advantages to individuals and smaller states, but it has yet to prove decisive against an armed nation state with the will to use violence, particularly in the case of aggressive authoritarian states. This thesis argues that while ICT exposes states to new
security threats and a transference in power may be underway, the current evidence suggests that a dominant nation state’s
security apparatus is still a more potent force, for now. These conclusions were reached through a holistic examination of ICT’s impact on
security through the lenses of state versus state conflict (interstate), citizen-led revolutionary movements (intrastate), and violent
non-state actors against the system (“extrastate”). However, this thesis found no conclusive data to support the notion that the Internet is concurrently revolutionizing interstate, intrastate or extrastate conflict to the point whereby a weaker adversary can achieve a desired political outcome through the unique use of cyber tools. While cyberspace adds a new virtual dimension to conflict, much like airpower added a third dimension to military conflict after World War I, cyber weapons have not yet developed to the point where they can replace weaponry in the physical domains. The Internet has neither fundamentally altered human nature nor the desires and competitions that fuel conflict; it may be transforming the experience of conflict, but not necessarily the outcomes. Thesis Readers: Dr. Ariel Roth and Dr. Lee Drutman
Advisors/Committee Members: Stout, Mark (advisor).
Subjects/Keywords: internet security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ortagus, M. L. (2014). The Internet's Impacts on Power Differentials in Security and Conflict. (Thesis). Johns Hopkins University. Retrieved from http://jhir.library.jhu.edu/handle/1774.2/37255
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ortagus, Megan Leann. “The Internet's Impacts on Power Differentials in Security and Conflict.” 2014. Thesis, Johns Hopkins University. Accessed April 16, 2021.
http://jhir.library.jhu.edu/handle/1774.2/37255.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ortagus, Megan Leann. “The Internet's Impacts on Power Differentials in Security and Conflict.” 2014. Web. 16 Apr 2021.
Vancouver:
Ortagus ML. The Internet's Impacts on Power Differentials in Security and Conflict. [Internet] [Thesis]. Johns Hopkins University; 2014. [cited 2021 Apr 16].
Available from: http://jhir.library.jhu.edu/handle/1774.2/37255.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ortagus ML. The Internet's Impacts on Power Differentials in Security and Conflict. [Thesis]. Johns Hopkins University; 2014. Available from: http://jhir.library.jhu.edu/handle/1774.2/37255
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Oxford
18.
Sluganovic, Ivo.
Security of mixed reality systems : authenticating users, devices, and data.
Degree: PhD, 2018, University of Oxford
URL: http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630
► Mixed reality devices continuously scan their environment in order to naturally blend the virtual objects with the user's real-time view of their physical environment. Given…
(more)
▼ Mixed reality devices continuously scan their environment in order to naturally blend the virtual objects with the user's real-time view of their physical environment. Given the potential of these technologies to profoundly change how individuals interact with their environments, many of the largest technology companies are releasing their mixed reality systems and devoting significant resources towards achieving technological leadership in this field. However, due to the recency of the first commercially available mixed reality devices and their specific interaction channels, existing research has yet to provide practical proposals to achieve many of the core security objectives. Furthermore, given that these devices continuously analyze their environment using multiple front-facing cameras, when designing secure system it becomes necessary to reassess the commonly assumed threat models. In this thesis, we aim to bridge this gap by focusing on secure authentication on mixed reality headsets. Taking into account the stronger assumed adversary models and the interface capabilities of existing mixed reality devices, we propose methods for user and device authentication, as well as show how these devices can be used to secure one's interactions with legacy systems. Considering that mixed reality headsets are starting to support gaze tracking, in this thesis we propose, build a prototype and experimentally evaluate the use of reflexive eye movements as a biometric modality that is well suited as an authentication method on MR headsets. As an added benefit, the reflexiveness and predictability of one's eye movement responses makes it possible to incorporate the biometric measurements into challenge-response protocols. This allows the system to prevent replay attacks, one of the most common attack vectors on biometrics. Furthermore, given the many multi-user applications of mixed reality technologies that rely on direct communication between users' devices, in this thesis we research secure and usable methods to mixed reality headsets. We propose a practical pairing protocol, implement a system prototype using two commercially available mixed reality headsets and evaluate its security and usability. Finally, we show that front-facing cameras of mixed reality headsets can also serve as the means of securing legacy electronic systems. We therefore build and evaluate a prototype of a system that uses a trusted device with video capture and analysis capabilities to authenticate the data that the user inputs when using a potentially compromised local client to communicate with a remote server.
Subjects/Keywords: Computer security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Sluganovic, I. (2018). Security of mixed reality systems : authenticating users, devices, and data. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630
Chicago Manual of Style (16th Edition):
Sluganovic, Ivo. “Security of mixed reality systems : authenticating users, devices, and data.” 2018. Doctoral Dissertation, University of Oxford. Accessed April 16, 2021.
http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630.
MLA Handbook (7th Edition):
Sluganovic, Ivo. “Security of mixed reality systems : authenticating users, devices, and data.” 2018. Web. 16 Apr 2021.
Vancouver:
Sluganovic I. Security of mixed reality systems : authenticating users, devices, and data. [Internet] [Doctoral dissertation]. University of Oxford; 2018. [cited 2021 Apr 16].
Available from: http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630.
Council of Science Editors:
Sluganovic I. Security of mixed reality systems : authenticating users, devices, and data. [Doctoral Dissertation]. University of Oxford; 2018. Available from: http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630
19.
Ramadurai, Vandhana.
Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.
Degree: 2013, Texas Digital Library
URL: http://hdl.handle.net/1969;
http://hdl.handle.net/2249.1/66611
► This dissertation is an ethnographic inquiry into women???s experiences of food insecurity in Rajendranagar, a slum in Bangalore, India. As a critical ethnographer, I undertook…
(more)
▼ This dissertation is an ethnographic inquiry into women???s experiences of food insecurity in Rajendranagar, a slum in Bangalore, India. As a critical ethnographer, I undertook this study with a goal of addressing the problem of malnourishment that plagues India. The number of slums in the developing world is rapidly increasing. With increased migration to urban areas, the poor will live mainly in the slums of the city. However, relatively little is known about how slum residents struggle and cope with food insecurity. The dissertation contributes to the existing body of literature by arguing that responsibilities associated with food simultaneously empowers and disempowers women in cultural contexts. The findings of the dissertation will facilitate the process of female empowerment by understanding the communication processes and meanings that create the conditions which make women vulnerable to food insecurity.
I used the Culturally Sensitive Model of Health Communication to design the study and analyze the data. I employed a variety of qualitative methods such as participant observations, textual analysis, interviews, and photographs to understand the experiences of food insecurity. My exploration resulted in three analytic chapters. I begin this dissertation by sharing the structural support and constraints that affected the food
security of women. There were four types of structural support: infrastructure, healthcare, government food programs, and NGO programs. I then discuss the cultural constraints and support that affect women???s experiences of food insecurity. There were four cultural constraints that disempowered women: preference for boys, gender-based violence, forced child marriages, and the lack of education. Rajendranagar culture was also rich in social capital. To this end, women benefitted from material, informational, and emotional social support through their networks. These types of support empowered women to cope with food insecurity. I also share how an infrastructural development intervention in Rajendranagar affected women???s community relationships and food
security.
Together, these findings illuminate the experiences of hunger among women in an Indian slum. Additionally, I provide insight into how marginalized women in a resource-limited setting enacted their agency to cope with food insecurity.
Advisors/Committee Members: Sharf, Barbara (advisor).
Subjects/Keywords: Food security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ramadurai, V. (2013). Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. (Thesis). Texas Digital Library. Retrieved from http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ramadurai, Vandhana. “Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.” 2013. Thesis, Texas Digital Library. Accessed April 16, 2021.
http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ramadurai, Vandhana. “Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.” 2013. Web. 16 Apr 2021.
Vancouver:
Ramadurai V. Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. [Internet] [Thesis]. Texas Digital Library; 2013. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ramadurai V. Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. [Thesis]. Texas Digital Library; 2013. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Waterloo
20.
Imeson, Frank.
An Attack and a Defence in the Context of Hardware Security.
Degree: 2013, University of Waterloo
URL: http://hdl.handle.net/10012/7596
► The security of digital Integrated Circuits (ICs) is essential to the security of a computer system that comprises them. We present an improved attack on…
(more)
▼ The security of digital Integrated Circuits (ICs) is essential to the security of a computer system that comprises them. We present an improved attack on computer hardware that avoids known defence mechanisms and as such raises awareness for the need of new and improved defence mechanisms. We also present a new defence method for securing computer hardware against modifications from untrusted manufacturing facilities, which is of concern since manufacturing is increasingly outsourced. We improve upon time triggered based backdoors, inserted maliciously in hardware. Prior work has addressed deterministic timer-based triggers — those that are designed to trigger at a specific time with probability 1. We address open questions related to the feasibility of realizing non-deterministic timer-based triggers in hardware — those that are designed with a random component. We show that such timers can be realized in hardware in a manner that is impractical to detect or disable using existing countermeasures of which we are aware. We discuss our design, implementation and analysis of such a timer. We show that the attacker can have surprisingly fine-grained control over the time-window within which the timer triggers. From the attacker’s standpoint our non-deterministic timer has key advantages over traditional timer designs. For example the hardware footprint is smaller which increases the chances of avoiding detection. Also our timer has a much smaller time-window for which a volatile state needs to be maintained which in turn makes the power reset defence mechanisms less effective. Our proposed defence mechanism addresses the threat of a malicious agent at the IC foundry who has information of the circuit and inserts covert, malicious circuitry. The use of 3D IC technology has been suggested as a
possible technique to counter this threat. However, to our knowledge, there is no prior work on how such technology can be used effectively. We propose a way to use 3D IC technology for security in this context. Specifically, we obfuscate the circuit by lifting wires to a trusted tier, which is fabricated separately. We provide a precise notion of security that we call k-security and point out that it has interesting similarities and important differences from k-anonymity. We also give a precise specification of the underlying computational problems and their complexity and discuss a comprehensive empirical assessment with benchmark circuits that highlight the security versus cost trade-offs introduced by 3D IC based circuit obfuscation.
Subjects/Keywords: Security; Hardware
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Imeson, F. (2013). An Attack and a Defence in the Context of Hardware Security. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/7596
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Imeson, Frank. “An Attack and a Defence in the Context of Hardware Security.” 2013. Thesis, University of Waterloo. Accessed April 16, 2021.
http://hdl.handle.net/10012/7596.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Imeson, Frank. “An Attack and a Defence in the Context of Hardware Security.” 2013. Web. 16 Apr 2021.
Vancouver:
Imeson F. An Attack and a Defence in the Context of Hardware Security. [Internet] [Thesis]. University of Waterloo; 2013. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/10012/7596.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Imeson F. An Attack and a Defence in the Context of Hardware Security. [Thesis]. University of Waterloo; 2013. Available from: http://hdl.handle.net/10012/7596
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of KwaZulu-Natal
21.
Kubheka, Bongekile Precious.
Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape.
Degree: 2015, University of KwaZulu-Natal
URL: http://hdl.handle.net/10413/12698
► This study assessed the impact of a homestead food production programme (Siyazondla) in improving household food security by comparing the incomes; food consumption frequencies and…
(more)
▼ This study assessed the impact of a homestead food production programme (Siyazondla) in improving household food
security by comparing the incomes; food consumption frequencies and dietary diversity of selected beneficiaries against a control group of non-beneficiaries. The programme was introduced by the Provincial Government of the Eastern Cape to promote household food production due to high levels of poverty and malnutrition, especially in rural areas of the province. The Department of Agriculture supplied households with farming inputs and technical support to ensure access to sufficient food for the most vulnerable communities.
A list of programme participants was obtained from the coordinators and 41 participating and 25 non-participating households were selected using simple random sampling. Individual interviews and focus group discussions were conducted. Qualitative and quantitative data were collected and analysed using SPSS. The findings showed that the crop types produced in the homestead gardens of respondents included mainly spinach, cabbage, potatoes, beetroot and carrots. Programme beneficiaries grew significantly more vegetables than non-beneficiaries, improving the availability of diverse foods to the participating households and community. The frequency of vegetable consumption was used as a measure of access to food, which had increased significantly for almost all beneficiaries and their households. The generation of income was one of the expected outcomes of the Siyazondla programme. The majority of beneficiaries generated income from selling vegetables while non-beneficiaries did not generate any income from their gardens.
Overall, the study indicated that the Siyazondla programme had potential to improve food
security of households through increased vegetable consumption, dietary diversity and income to purchase other food items. It was recommended that such programme should form part of integrated developmental plans in order to achieve improved results.
Advisors/Committee Members: Veldman, Frederick J. (advisor).
Subjects/Keywords: Food security.
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kubheka, B. P. (2015). Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/12698
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Kubheka, Bongekile Precious. “Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape.” 2015. Thesis, University of KwaZulu-Natal. Accessed April 16, 2021.
http://hdl.handle.net/10413/12698.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Kubheka, Bongekile Precious. “Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape.” 2015. Web. 16 Apr 2021.
Vancouver:
Kubheka BP. Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape. [Internet] [Thesis]. University of KwaZulu-Natal; 2015. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/10413/12698.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Kubheka BP. Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape. [Thesis]. University of KwaZulu-Natal; 2015. Available from: http://hdl.handle.net/10413/12698
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of KwaZulu-Natal
22.
Khoza, Sithandiwe.
Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security.
Degree: 2014, University of KwaZulu-Natal
URL: http://hdl.handle.net/10413/12835
► Eggs have potential to improve the nutritional status of individuals who are at risk of Protein-Energy Malnutrition in rural households of South Africa. However, eggs…
(more)
▼ Eggs have potential to improve the nutritional status of individuals who are at risk of Protein-Energy Malnutrition in rural households of South Africa. However, eggs have a short shelf-life and rural households have limited or no access to modern preservation technologies. Therefore drying eggs into egg powder to increase their shelf-life could be a feasible egg preservation technique for rural households. The aim of this study was to use commercial egg powder as a model to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition
security of rural households of Mkhambathini in KwaZulu-Natal province of South Africa.
A total of 110 household representatives participated in the survey which was conducted to explore the importance of eggs in rural areas of Mkhambathini local Municipality by assessing egg production, utilisation and the perceived value of eggs by rural households. From the survey participants, 20 adult women and 20 youths (16 to 35 years old) voluntarily participated in a series of four focus group discussions to assess their perceptions on egg utilisation. Commercial egg powder was used as a model for indigenous knowledge-processed egg powder to assess the food and nutrition
security potential of egg powder using popular egg based dishes. The consumer acceptability of relish and sandwiches prepared with egg powder was evaluated using a consumer panel of 51 subjects recruited from survey participants. The nutritional composition of relish and sandwich prepared with egg powder was determined by the standard methods of the Association of Official Analytical Chemists (AOAC). Gross energy, protein, fat, fibre, total mineral content (ash) and selected individual minerals were determined. Market research assessing the accessibility of egg powder at a household level of Mkhambathini was conducted. A cost effectiveness analysis of producing egg powder at a household level compared to purchasing egg powder from commercial markets was evaluated. The same focus group discussions were used to assess the perceived benefits of producing egg powder at a household level.
The survey findings indicated that rural households in Mkhambathini were actively engaged in egg production, but poultry diseases and predation negatively affected egg production and productivity. The households had very limited or no access to modern egg storage and preservation technologies. As a result, the households lost a significant proportion of the eggs through spoilage. The rural households of Mkhambathini utilised eggs for food and several socio-cultural practices. The household perceived eggs as an important nutritious food source
as well as a highly valuable agricultural commodity for socio-cultural applications. The survey results indicated that eggs were used to prepare several dishes. Egg relish and sandwiches topped other dishes in terms of consumption. The overall acceptability of egg powder relish and sandwich was high and similar to that of fresh egg relish and sandwich. Thus,…
Advisors/Committee Members: Kolanisi, Unathi. (advisor), Siwela, Muthulisi. (advisor).
Subjects/Keywords: Food security.
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Khoza, S. (2014). Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/12835
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Khoza, Sithandiwe. “Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security.” 2014. Thesis, University of KwaZulu-Natal. Accessed April 16, 2021.
http://hdl.handle.net/10413/12835.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Khoza, Sithandiwe. “Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security.” 2014. Web. 16 Apr 2021.
Vancouver:
Khoza S. Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security. [Internet] [Thesis]. University of KwaZulu-Natal; 2014. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/10413/12835.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Khoza S. Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security. [Thesis]. University of KwaZulu-Natal; 2014. Available from: http://hdl.handle.net/10413/12835
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of KwaZulu-Natal
23.
Murugani, Vongai Gillian.
Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province.
Degree: 2016, University of KwaZulu-Natal
URL: http://hdl.handle.net/10413/13318
► Developing the smallholder agricultural sector has been proposed as a way of developing rural communities. These assertions are partly based on the results of the…
(more)
▼ Developing the smallholder agricultural sector has been proposed as a way of developing rural communities. These assertions are partly based on the results of the Asian Green Revolution. Women’s contribution to agricultural development as workers and farmers is acknowledged, but, what is questioned is the extent to which agriculture will result in their empowerment. Local institutions and social norms have largely resulted in women owning and controlling very few productive assets and this is thought to contribute to their disempowerment. It is argued that unless women are empowered through transformed institutions, they may be further disempowered by any interventions to uplift smallholder farmers.
Empowering women is considered an essential part of sustainable development and agriculture offers the right platform, since it employs almost half of the rural women in the developing world. Although they are the backbone of smallholder agriculture, female smallholder farmers do not always fully benefit from their work, particularly financially. Their limited access to productive resources and their exclusion from formal markets restricts their capacity to contribute more to agriculture and household food
security. Women’s contribution to decision-making has long been used as a proxy measurement for empowerment. For empowerment to take place women must have access to resources and the agency required to transform their resources into livelihoods outcomes. In spite of their aspirations to increase production and access markets, prevailing institutional and social norms may limit female smallholder farmers from achieving their goals. Transformed agricultural, social and market institutions and secure access to productive resources are important to improve women’s productivity and raise the numbers of women participating in formal markets.
This study was grounded in the Sustainable Livelihoods Framework and people-centred approaches to development. Research was conducted in three purposively selected irrigation schemes in Limpopo Province, to assess the current institutions and their effect on smallholder market access, to determine the level of empowerment in the study area and the determinants of market access and finally to measure the effect of women empowerment on household food
security. A mixed methods approach was used in the study and data was collected in August and December 2013, using questionnaires from purposively selected
respondents, observations and focus group discussions. The December survey was conducted using an adapted Women Empowerment in Agriculture Index (WEAI) questionnaire. The quantitative data was analysed using Statistical Package Social Sciences (SPSS) for descriptive statistics and to generate the 5DE index, farmer GPI and modified WEAI. The qualitative data was analysed using content analysis.
The results show that, firstly, the current institutions restrict farmers to subsistence farming as there are few capacity building initiatives in the communities. Secondly, just over half of the…
Advisors/Committee Members: Chitja, Joyce M. (advisor).
Subjects/Keywords: Food security.
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Murugani, V. G. (2016). Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/13318
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Murugani, Vongai Gillian. “Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province.” 2016. Thesis, University of KwaZulu-Natal. Accessed April 16, 2021.
http://hdl.handle.net/10413/13318.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Murugani, Vongai Gillian. “Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province.” 2016. Web. 16 Apr 2021.
Vancouver:
Murugani VG. Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province. [Internet] [Thesis]. University of KwaZulu-Natal; 2016. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/10413/13318.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Murugani VG. Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province. [Thesis]. University of KwaZulu-Natal; 2016. Available from: http://hdl.handle.net/10413/13318
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of KwaZulu-Natal
24.
Shisanya, Stephen Odede.
Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa.
Degree: 2015, University of KwaZulu-Natal
URL: http://hdl.handle.net/10413/12682
► The study examined in specific terms the interaction between household food security and rural farming communities’ perception of climate change in uMzinyathi District Municipality of…
(more)
▼ The study examined in specific terms the interaction between household food
security and rural farming communities’ perception of climate change in uMzinyathi District Municipality of KwaZulu-Natal, South Africa. A survey was conducted among 200 households randomly selected from five wards. Households were randomly selected from villages and only those household members at the age of at least 40 years and participating in agricultural activities were asked to volunteer to participate in the survey. Focus group discussions and key informant interviews were carried out to obtain qualitative data. Data was then analysed using the Statistical Package for the Social Sciences (SPSS). The results show that communities’ perception of climate change matched the quantitative data of climate of the area. The study area is becoming hotter and drier. Over the period 1993 – 2010, average annual temperature had increased by 1.5 °C. Rainfall generally decreased over the period 1981 - 2010 with the years 2004, 2007 and 2010 recording the least rainfall amounts of 368mm, 296mm and 319mm respectively below annual average rainfall of 784mm. Households observed increased frequency (73.0%) of droughts while incidences of floods had decreased over time by 52.0%. Households were evenly distributed across the five vulnerability categories with extreme categories of 18% households being very highly vulnerable and 20% being less vulnerable. The results confirmed that indeed households were experiencing climate change and that they are reacting to this change by adopting differing agricultural and non-agricultural practices. A large proportion (83%) of households anticipate that they will alter their livelihoods systems to respond to climate change with 59% of households indicating that government grants will play an important role in their adaptation to climate change. Households assessed (97%) were found to be severely food insecure while 3% were moderately food insecure. Households were worried about the negative impacts of climate change which included droughts, floods and soil erosion. Households who were found to be vulnerable to climate change recorded high levels of food insecurity. Perceptions of communities to climate change should be considered by policy makers in advancing strategies to mitigate impacts of climate change. Households are not homogenous and experience vulnerability to climate change differently, recommending that blanket interventions for communities should not be used to mitigate climate change but household specific interventions should be considered. Households will effectively adapt to a changing climate by governments putting in place mechanisms that will help finance the adaptation interventions. Capacity of households should be built through extension services so that 11
households are well prepared to effectively undertake appropriate adaptation methods. Rural farmers should be assisted with packages that can help them undertake effective adaptation mechanisms to climate change. Information will play a…
Advisors/Committee Members: Mafongoya, Paramu L. (advisor).
Subjects/Keywords: Food security.
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Shisanya, S. O. (2015). Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/12682
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Shisanya, Stephen Odede. “Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa.” 2015. Thesis, University of KwaZulu-Natal. Accessed April 16, 2021.
http://hdl.handle.net/10413/12682.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Shisanya, Stephen Odede. “Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa.” 2015. Web. 16 Apr 2021.
Vancouver:
Shisanya SO. Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa. [Internet] [Thesis]. University of KwaZulu-Natal; 2015. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/10413/12682.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Shisanya SO. Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa. [Thesis]. University of KwaZulu-Natal; 2015. Available from: http://hdl.handle.net/10413/12682
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Queens University
25.
Das, Saikat.
A Cloud-based Framework for Security Analysis of Browser Extensions
.
Degree: Electrical and Computer Engineering, 2016, Queens University
URL: http://hdl.handle.net/1974/14432
► In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of…
(more)
▼ In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of us. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Browser vendors try to keep safe extensions in their official extension galleries. However, their security control measures are not always effective and adequate. The distribution of unsafe extensions through different social engineering techniques is also a very common practice. Therefore, before installation, users should thoroughly analyze the security of browser extensions.
Extensions are not only available for desktop browsers, but many mobile browsers, for example, Firefox for Android and UC browser for Android, are also furnished with extension features. Mobile devices have various resource constraints in terms of computational capabilities, power, network bandwidth, etc. Hence, conventional extension security analysis techniques cannot be efficiently used by end users to examine mobile browser extension security issues. To overcome the inadequacies of the existing approaches, we propose CLOUBEX, a CLOUd-based security analysis framework for both desktop and mobile Browser EXtensions. This framework uses a client-server architecture model. In this framework, compute-intensive security analysis tasks are generally executed in a high-speed computing server hosted in a cloud environment. CLOUBEX is also enriched with a number of essential features, such as client-side analysis, requirements-driven analysis, high performance, and dynamic decision making.
At present, the Firefox extension ecosystem is most susceptible to different security attacks. Hence, the framework is implemented for the security analysis of the Firefox desktop and Firefox for Android mobile browser extensions. A static taint analysis is used to identify malicious information flows in the Firefox extensions. In CLOUBEX, there are three analysis modes. A dynamic decision making algorithm assists us to select the best option based on some important parameters, such as the processing speed of a client device and network connection speed. Using the best analysis mode, performance and power consumption are improved significantly. In the future, this framework can be leveraged for the security analysis of other desktop and mobile browser extensions, too.
Subjects/Keywords: Software Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Das, S. (2016). A Cloud-based Framework for Security Analysis of Browser Extensions
. (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/14432
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Das, Saikat. “A Cloud-based Framework for Security Analysis of Browser Extensions
.” 2016. Thesis, Queens University. Accessed April 16, 2021.
http://hdl.handle.net/1974/14432.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Das, Saikat. “A Cloud-based Framework for Security Analysis of Browser Extensions
.” 2016. Web. 16 Apr 2021.
Vancouver:
Das S. A Cloud-based Framework for Security Analysis of Browser Extensions
. [Internet] [Thesis]. Queens University; 2016. [cited 2021 Apr 16].
Available from: http://hdl.handle.net/1974/14432.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Das S. A Cloud-based Framework for Security Analysis of Browser Extensions
. [Thesis]. Queens University; 2016. Available from: http://hdl.handle.net/1974/14432
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
26.
Ghosh, Esha.
Integrity and Privacy in the Cloud: Efficient algorithms for
secure and privacy-preserving processing of outsourced data.
Degree: Department of Computer Science, 2018, Brown University
URL: https://repository.library.brown.edu/studio/item/bdr:792909/
► An integral component of the modern computing era is the ability to outsource data and computation to remote Cloud Service Providers or CSPs. The advent…
(more)
▼ An integral component of the modern computing era is
the ability to outsource data and computation to remote Cloud
Service Providers or CSPs. The advent of cloud services, however,
raises important challenges of in terms of integrity and privacy of
data and computation. As soon as users delegate computation to
cloud platforms (such as Microsoft Azure or Amazon AWS), concerns
related to integrity of the results arise. For example, have all
correct inputs been used in the computation? Were all the
computation steps applied in the correct order? Have the results
been delivered untampered? Moreover, in the face of an alarming
number of data breaches and massive surveillance programs around
the globe, the privacy of outsourced data is becoming more
important than ever. This thesis focuses on designing efficient
privacy-preserving and verifiable data processing queries for a
rich class of data structures along with prototype implementation
and experimental validation. In particular, we focus on the
following setting: how can a trusted data owner outsource her data
to an untrusted server, such that the server will not be able to
cheat while answering queries on the stored data. In other words,
we require the server to produce a cryptographic proof for each
answer it produces. Moreover, we require the proofs to be
privacy-preserving, i.e., they should not leak any information
about the data structure or the updates on it besides what can be
inferred from the answers. We also consider another dimension of
privacy for verifiable outsourced data-processing, namely,
encrypting the outsourced data. More concretely, we consider the
setting where the data structure is encrypted before outsourcing
using a customized encryption scheme that allows the server to
compute queries on the encrypted data. Furthermore, the client can
efficiently check if the server has correctly computed the answer.
In this thesis, we focus on range queries, closest point queries,
dictionary queries, set algebraic queries and reachability and
shortest path queries on general graphs.
Advisors/Committee Members: Tamassia, Roberto (Advisor), Lysyanskaya, Anna (Reader), Kamara, Seny (Reader).
Subjects/Keywords: Computer security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ghosh, E. (2018). Integrity and Privacy in the Cloud: Efficient algorithms for
secure and privacy-preserving processing of outsourced data. (Thesis). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:792909/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for
secure and privacy-preserving processing of outsourced data.” 2018. Thesis, Brown University. Accessed April 16, 2021.
https://repository.library.brown.edu/studio/item/bdr:792909/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for
secure and privacy-preserving processing of outsourced data.” 2018. Web. 16 Apr 2021.
Vancouver:
Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for
secure and privacy-preserving processing of outsourced data. [Internet] [Thesis]. Brown University; 2018. [cited 2021 Apr 16].
Available from: https://repository.library.brown.edu/studio/item/bdr:792909/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for
secure and privacy-preserving processing of outsourced data. [Thesis]. Brown University; 2018. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

North Carolina State University
27.
Irwin, Keith.
A System for Managing User Obligations.
Degree: PhD, Computer Science, 2009, North Carolina State University
URL: http://www.lib.ncsu.edu/resolver/1840.16/5170
► As computer systems become a more pervasive part of our societies, actions within those computer systems are becoming increasingly governed by complex policies such as…
(more)
▼ As computer systems become a more pervasive part of our societies, actions within those computer systems are becoming increasingly governed by complex policies such as laws, corporate policies, and legal agreements such as data sharing agreements and privacy policies. These policies impose both requirements about what may or may not be done and about what must be done. Current
security policies may be able to manage restrictions on actions, but they are not sufficient to describe actions which are required. We examine herein the idea of user obligations, which are actions which are required of the users, but which the system cannot directly cause to occur.
We propose a system for the management of user obligations. This system should both ensure that obligations are assigned in a manner such that it will be possible for them to be fulfilled and allow users of a system to know what they are required to do. We present an abstract formal model of such a system. We examine a number of aspects of such a system, principally including the maintenance of an acceptable system state, the assignment of blame when users fail to fulfill their obligations, and providing adequate feedback to users when their actions are rejected. For each of these aspects, we present formal definitions to define the range of acceptable behavior.
We also provide a more specific and concrete model of one possible user obligations management system and develop algorithms for that model. We do this in order to show the practicality of our formal models and properties.
Advisors/Committee Members: S. Purushothaman Iyer, Committee Member (advisor), Munindar P. Singh, Committee Member (advisor), Ting Yu, Committee Chair (advisor), Ping Ning, Committee Member (advisor).
Subjects/Keywords: security; obligations
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Irwin, K. (2009). A System for Managing User Obligations. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5170
Chicago Manual of Style (16th Edition):
Irwin, Keith. “A System for Managing User Obligations.” 2009. Doctoral Dissertation, North Carolina State University. Accessed April 16, 2021.
http://www.lib.ncsu.edu/resolver/1840.16/5170.
MLA Handbook (7th Edition):
Irwin, Keith. “A System for Managing User Obligations.” 2009. Web. 16 Apr 2021.
Vancouver:
Irwin K. A System for Managing User Obligations. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2021 Apr 16].
Available from: http://www.lib.ncsu.edu/resolver/1840.16/5170.
Council of Science Editors:
Irwin K. A System for Managing User Obligations. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5170

Addis Ababa University
28.
ENDASHAW, SHIBRU.
DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR
.
Degree: 2012, Addis Ababa University
URL: http://etd.aau.edu.et/dspace/handle/123456789/3269
► Background: Underlying malnutrition is responsible for half of the deaths occurring among children under five years of age. Studying causes of malnutrition and acting upon,…
(more)
▼ Background: Underlying malnutrition is responsible for half of the deaths occurring
among children under five years of age. Studying causes of malnutrition and acting upon,
therefore, would help in magnificent reduction in mortality in this age group. Despite the
fact that nutrition
security is essential for improvement of child and maternal health little
is known about the problem in the rural Ethiopia.
Objective: To assess nutritional
security and determinants at household level of Shone
district, Hadiya Zone, SNNPR
Method: A cross-sectional community based survey was conducted. Structured
questionnaire and anthropometry measuring equipments were used for the quantitative
survey involving 856 households having at least one 6-59 months old child, and check
list were used to make 2 FGD’s and 3 key informant interviews. Systematic sampling
method was employed for the quantitative survey. WHO Anthro and SPSS 11 were
used for analysis.
Result: The mean household size was 6.6 and the average number of children per
household was 4.2. The majority, 664 (77.8%) mothers were illiterate. Very few mothers,
37 (4.8%) were current family planning method users. Nearly half, 403 (48%) mothers
attended ANC. Night blindness were observed in 128(16%) children and 118(14.1%) had
bito’t spot. Eighty four (10.4%), 366 (42.8%) and 647 (75.6%) children were wasted,
underweight and stunted, respectively. Meanwhile, 38 (4.4%) had MUAC <11cm.
Child’s age, year difference between the last two births, antenatal care during the index
child, hand washing practice before handling food, child excreta disposal and house type
were important predictors of child malnutrition. Nearly all (98.5%) respondents reported
that the food runs out before they get money, and 92% experienced hunger. Majority of
respondents said coping mechanism to food insecurity in the community includes
reducing the amount of food and frequency of eating; putting children in well-to-do
relatives selling labor cheaply, renting land, begging, borrowing money chewing khat
PDF Creator - PDF4Free v2.0 http://www.pdf4free.com
VI
drop out of school and engage in petty trade to support family member and going to
towns in search of work. Dependency syndrome entrenched in the community.
Conclusion: Prevalence of malnutrition, vitamin A deficiency and food insecurity in the
study area was very high compared to regional and national. Revision of approaches of
intervention programs and enhancing concerted efforts of relevant bodies should be
emphasized.
Advisors/Committee Members: FIKRU TESFAYE (MD, MPH, PHD (advisor).
Subjects/Keywords: NUTRITION SECURITY
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
ENDASHAW, S. (2012). DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR
. (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/3269
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
ENDASHAW, SHIBRU. “DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR
.” 2012. Thesis, Addis Ababa University. Accessed April 16, 2021.
http://etd.aau.edu.et/dspace/handle/123456789/3269.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
ENDASHAW, SHIBRU. “DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR
.” 2012. Web. 16 Apr 2021.
Vancouver:
ENDASHAW S. DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR
. [Internet] [Thesis]. Addis Ababa University; 2012. [cited 2021 Apr 16].
Available from: http://etd.aau.edu.et/dspace/handle/123456789/3269.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
ENDASHAW S. DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR
. [Thesis]. Addis Ababa University; 2012. Available from: http://etd.aau.edu.et/dspace/handle/123456789/3269
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Addis Ababa University
29.
SENAIT, AREFAINE.
INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS
.
Degree: 2010, Addis Ababa University
URL: http://etd.aau.edu.et/dspace/handle/123456789/7354
► Ethiopia had been facing the challenges of ensuring food security for decades. The challenge is still with us. As a result, programs aimed at poverty…
(more)
▼ Ethiopia had been facing the challenges of ensuring food
security for decades. The
challenge is still with us. As a result, programs aimed at poverty alleviation, poverty
reduction and food
security have been prepared and implemented by successive regimes.
The significance of the efforts is such that they deserve the best media coverage they
could get – for, the successful implementation of the programs as well as the overall
efforts requires that they should be brought to the attention of stakeholders, especially the
public. And this is the prerogative of the editors, who determine the content of
newspapers. The importance of editors in the press is hard to overemphasize. It is the
editors that decide the content of the newspapers and the stories that get published and
read by the public. Behind the important roles that the media plays – from informing the
public to agenda-setting – there are the editors that do the decisions on what to inform
and what kind of agenda to set for the public. The decisions of the editors, in their turn,
are shaped by several factors, including beliefs, ideologies and values – personal as well
as social. These are among the host of variables that influence the overall perspective of
analysis and content of the whole newspaper and individual stories. This study attempts
to investigate the factors that promote or hinder the editor form offering the necessary
coverage that food
security issues deserve. It specifically tried to look into the attitude
and knowledge of private newspapers editors.
Advisors/Committee Members: DR. GEBREMEDHIN SIMON (advisor).
Subjects/Keywords: Food security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
SENAIT, A. (2010). INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS
. (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/7354
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
SENAIT, AREFAINE. “INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS
.” 2010. Thesis, Addis Ababa University. Accessed April 16, 2021.
http://etd.aau.edu.et/dspace/handle/123456789/7354.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
SENAIT, AREFAINE. “INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS
.” 2010. Web. 16 Apr 2021.
Vancouver:
SENAIT A. INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS
. [Internet] [Thesis]. Addis Ababa University; 2010. [cited 2021 Apr 16].
Available from: http://etd.aau.edu.et/dspace/handle/123456789/7354.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
SENAIT A. INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS
. [Thesis]. Addis Ababa University; 2010. Available from: http://etd.aau.edu.et/dspace/handle/123456789/7354
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Nairobi
30.
Mulievi, Amos M.
Information security policy framework for a manufacturing firm
.
Degree: 2009, University of Nairobi
URL: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667
► Information and the supporting processes, systems, and networks are important business assets. Defining, achieving, maintaining, and improving information security is essential to maintain competitive edge,…
(more)
▼ Information and the supporting processes, systems, and networks are important business assets.
Defining, achieving, maintaining, and improving information security is essential to maintain
competitive edge, cashflow, profitability, legal compliance, and commercial image.
Information Security Policy is necessary to provide management direction and support for
information security in accordance with business requirements and relevant laws and
regulations. Management should set a clear policy direction in line with business objectives and
demonstrate support for, and commitment to, information security through the issue and
maintenance of an information security policy across the organization.
Organizations and their information systems and networks arefaced with security threatsfrom a
wide range of sources, including computer-assisted fraud, espionage, sabotage, vandalism, fire
or.flood. Damages caused by events such as malicious code, computer hacking, and denial of
service attacks have become more common, more ambitious, and increasingly sophisticated.
Information security should protect the interests of those relying on information, and the systems
and communications that deliver the information, from harm resulting infailures of availability,
confidentiality, integrity, authenticity, and non-repudiation.
The objective of this research project was to define and develop an Information Security Policy
Framework that is representative of the Kenyan manufacturing setup. The research involved
~valuation of a number of Information Security models; to design a framework that can be
adapted, customized and extended to address all areas of an organization. ISO/IEC 27002: 2005
Information Security model was used to ensure a more comprehensive security framework that is
representative and complete.
This research project also identified gaps in the existing local and global standards by carrying
out a detailed gap analysis to design a security policy framework that addresses all security
requirements of an organization. It also recommended implementation and maintenance
procedures that will ensure that security policyframeworks are complete, practical and effective.
Subjects/Keywords: Information Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mulievi, A. M. (2009). Information security policy framework for a manufacturing firm
. (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Mulievi, Amos M. “Information security policy framework for a manufacturing firm
.” 2009. Thesis, University of Nairobi. Accessed April 16, 2021.
http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Mulievi, Amos M. “Information security policy framework for a manufacturing firm
.” 2009. Web. 16 Apr 2021.
Vancouver:
Mulievi AM. Information security policy framework for a manufacturing firm
. [Internet] [Thesis]. University of Nairobi; 2009. [cited 2021 Apr 16].
Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Mulievi AM. Information security policy framework for a manufacturing firm
. [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
◁ [1] [2] [3] [4] [5] … [564] ▶
.