Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Access Control Methods). Showing records 1 – 12 of 12 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Konopacki, Pierre. Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods.

Degree: Docteur es, Informatique, 2012, Université Paris-Est

Le contrôle d'accès permet de spécifier une partie de la politique de sécurité d'un SI (système d'informations). Une politique de CA (Contrôle d'accès) permet de… (more)

Subjects/Keywords: Méthodes formelles; Contrôle d\'accès; Sécurité; Formal methods; Access control; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Konopacki, P. (2012). Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods. (Doctoral Dissertation). Université Paris-Est. Retrieved from http://www.theses.fr/2012PEST1089

Chicago Manual of Style (16th Edition):

Konopacki, Pierre. “Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods.” 2012. Doctoral Dissertation, Université Paris-Est. Accessed November 28, 2020. http://www.theses.fr/2012PEST1089.

MLA Handbook (7th Edition):

Konopacki, Pierre. “Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods.” 2012. Web. 28 Nov 2020.

Vancouver:

Konopacki P. Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods. [Internet] [Doctoral dissertation]. Université Paris-Est; 2012. [cited 2020 Nov 28]. Available from: http://www.theses.fr/2012PEST1089.

Council of Science Editors:

Konopacki P. Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles : Security policies modeling by using formal methods. [Doctoral Dissertation]. Université Paris-Est; 2012. Available from: http://www.theses.fr/2012PEST1089

2. Giannakopoulos, Theophilos John. Multi-Decision Policy and Policy Combinator Specifications.

Degree: MS, 2012, Worcester Polytechnic Institute

  Margrave is a specification language and analysis tool for access control policies with semantics based in order-sorted logic. The clear logical roots of Margrave's… (more)

Subjects/Keywords: formal methods; access control; policy combinators; policies; specifications; Margrave

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Giannakopoulos, T. J. (2012). Multi-Decision Policy and Policy Combinator Specifications. (Thesis). Worcester Polytechnic Institute. Retrieved from etd-022112-163738 ; https://digitalcommons.wpi.edu/etd-theses/166

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Giannakopoulos, Theophilos John. “Multi-Decision Policy and Policy Combinator Specifications.” 2012. Thesis, Worcester Polytechnic Institute. Accessed November 28, 2020. etd-022112-163738 ; https://digitalcommons.wpi.edu/etd-theses/166.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Giannakopoulos, Theophilos John. “Multi-Decision Policy and Policy Combinator Specifications.” 2012. Web. 28 Nov 2020.

Vancouver:

Giannakopoulos TJ. Multi-Decision Policy and Policy Combinator Specifications. [Internet] [Thesis]. Worcester Polytechnic Institute; 2012. [cited 2020 Nov 28]. Available from: etd-022112-163738 ; https://digitalcommons.wpi.edu/etd-theses/166.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Giannakopoulos TJ. Multi-Decision Policy and Policy Combinator Specifications. [Thesis]. Worcester Polytechnic Institute; 2012. Available from: etd-022112-163738 ; https://digitalcommons.wpi.edu/etd-theses/166

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

3. Morovat, Katanosh. Designing Secure Access Control Model in Cyber Social Networks.

Degree: PhD, 2017, University of Arkansas

  Nowadays, information security in online communication has become an indisputable topic. People prefer pursuing their connection and public relations due to the greater flexibility… (more)

Subjects/Keywords: Access Control Methods; Cybersecurity; Social Network; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morovat, K. (2017). Designing Secure Access Control Model in Cyber Social Networks. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2390

Chicago Manual of Style (16th Edition):

Morovat, Katanosh. “Designing Secure Access Control Model in Cyber Social Networks.” 2017. Doctoral Dissertation, University of Arkansas. Accessed November 28, 2020. https://scholarworks.uark.edu/etd/2390.

MLA Handbook (7th Edition):

Morovat, Katanosh. “Designing Secure Access Control Model in Cyber Social Networks.” 2017. Web. 28 Nov 2020.

Vancouver:

Morovat K. Designing Secure Access Control Model in Cyber Social Networks. [Internet] [Doctoral dissertation]. University of Arkansas; 2017. [cited 2020 Nov 28]. Available from: https://scholarworks.uark.edu/etd/2390.

Council of Science Editors:

Morovat K. Designing Secure Access Control Model in Cyber Social Networks. [Doctoral Dissertation]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2390

4. Huynh, Nghi. Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies.

Degree: Docteur es, Informatique, 2016, Université Paris-Est

Dans le domaine médical, la numérisation des documents et l’utilisation des dossiers patient électroniques (DPE, ou en anglais EHR pour Electronic Health Record) offrent de… (more)

Subjects/Keywords: Méthodes formelles; Vérification; Contrôle d'accès; Dmp; Médical; Formal methods; Verification; Access control; Ehr; Healthcare

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huynh, N. (2016). Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies. (Doctoral Dissertation). Université Paris-Est. Retrieved from http://www.theses.fr/2016PESC1042

Chicago Manual of Style (16th Edition):

Huynh, Nghi. “Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies.” 2016. Doctoral Dissertation, Université Paris-Est. Accessed November 28, 2020. http://www.theses.fr/2016PESC1042.

MLA Handbook (7th Edition):

Huynh, Nghi. “Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies.” 2016. Web. 28 Nov 2020.

Vancouver:

Huynh N. Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies. [Internet] [Doctoral dissertation]. Université Paris-Est; 2016. [cited 2020 Nov 28]. Available from: http://www.theses.fr/2016PESC1042.

Council of Science Editors:

Huynh N. Vérification et validation de politiques de contrôle d'accès dans le domaine médical : Verification and validation of healthcare access control policies. [Doctoral Dissertation]. Université Paris-Est; 2016. Available from: http://www.theses.fr/2016PESC1042


University of Oxford

5. Slaymaker, Mark Arthur. The formalisation and transformation of access control policies.

Degree: PhD, 2011, University of Oxford

 Increasing amounts of data are being collected and stored relating to every aspect of an individual's life, ranging from shopping habits to medical conditions. This… (more)

Subjects/Keywords: 621.382; Computer security; Computing; Software Engineering; Formal Methods; Access Control Modelling; Transformation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Slaymaker, M. A. (2011). The formalisation and transformation of access control policies. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973

Chicago Manual of Style (16th Edition):

Slaymaker, Mark Arthur. “The formalisation and transformation of access control policies.” 2011. Doctoral Dissertation, University of Oxford. Accessed November 28, 2020. http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973.

MLA Handbook (7th Edition):

Slaymaker, Mark Arthur. “The formalisation and transformation of access control policies.” 2011. Web. 28 Nov 2020.

Vancouver:

Slaymaker MA. The formalisation and transformation of access control policies. [Internet] [Doctoral dissertation]. University of Oxford; 2011. [cited 2020 Nov 28]. Available from: http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973.

Council of Science Editors:

Slaymaker MA. The formalisation and transformation of access control policies. [Doctoral Dissertation]. University of Oxford; 2011. Available from: http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542973


Brno University of Technology

6. Frdlík, Tomáš. Řízení přístupu v sítích IP: Access Control in IP Networks.

Degree: 2018, Brno University of Technology

 In this thesis we describe the problematic of QoS security for various services provided through IP network. These applications have high QoS parameter requirements such… (more)

Subjects/Keywords: AC metody; Gaussova metoda; neuronové sítě; metody řízení přístupu; QoS; AC methods; access control methods; Gaussian method; neuronové sítě; QoS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frdlík, T. (2018). Řízení přístupu v sítích IP: Access Control in IP Networks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/84250

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frdlík, Tomáš. “Řízení přístupu v sítích IP: Access Control in IP Networks.” 2018. Thesis, Brno University of Technology. Accessed November 28, 2020. http://hdl.handle.net/11012/84250.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frdlík, Tomáš. “Řízení přístupu v sítích IP: Access Control in IP Networks.” 2018. Web. 28 Nov 2020.

Vancouver:

Frdlík T. Řízení přístupu v sítích IP: Access Control in IP Networks. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Nov 28]. Available from: http://hdl.handle.net/11012/84250.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frdlík T. Řízení přístupu v sítích IP: Access Control in IP Networks. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/84250

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

7. Frdlík, Tomáš. Řízení přístupu v sítích IP: Access Control in IP Networks.

Degree: 2019, Brno University of Technology

 In this thesis we describe the problematic of QoS security for various services provided through IP network. These applications have high QoS parameter requirements such… (more)

Subjects/Keywords: AC metody; Gaussova metoda; neuronové sítě; metody řízení přístupu; QoS; AC methods; access control methods; Gaussian method; neuronové sítě; QoS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frdlík, T. (2019). Řízení přístupu v sítích IP: Access Control in IP Networks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/82394

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frdlík, Tomáš. “Řízení přístupu v sítích IP: Access Control in IP Networks.” 2019. Thesis, Brno University of Technology. Accessed November 28, 2020. http://hdl.handle.net/11012/82394.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frdlík, Tomáš. “Řízení přístupu v sítích IP: Access Control in IP Networks.” 2019. Web. 28 Nov 2020.

Vancouver:

Frdlík T. Řízení přístupu v sítích IP: Access Control in IP Networks. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Nov 28]. Available from: http://hdl.handle.net/11012/82394.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frdlík T. Řízení přístupu v sítích IP: Access Control in IP Networks. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/82394

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Martinoia, Diego. Proving Correctness within an Access Control Evaluation Framework.

Degree: 2013, University of Illinois – Chicago

 This thesis presents the proofs developed to demonstrate correctness of a case study within the Access Control Evaluation Framework (ACEF). ACEF is a theoretical framework… (more)

Subjects/Keywords: Access Control; Formal Methods; Correctness; PVS; Verification

access control, we must add some specificity to the representation. More specifically, the list… …explaining the rest of the theory. 2.1 Access Control Model Definition 1 (Access Control… …Model). An Access Control Model (ACM) M is a tuple S, Q, |= such that: • S… …Model). Access Matrix type A (AMa ) is the simplest type of access control… …graph, adding labelled edges that represent how actions affect the states. 2.2 Access Control… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martinoia, D. (2013). Proving Correctness within an Access Control Evaluation Framework. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/10132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Martinoia, Diego. “Proving Correctness within an Access Control Evaluation Framework.” 2013. Thesis, University of Illinois – Chicago. Accessed November 28, 2020. http://hdl.handle.net/10027/10132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Martinoia, Diego. “Proving Correctness within an Access Control Evaluation Framework.” 2013. Web. 28 Nov 2020.

Vancouver:

Martinoia D. Proving Correctness within an Access Control Evaluation Framework. [Internet] [Thesis]. University of Illinois – Chicago; 2013. [cited 2020 Nov 28]. Available from: http://hdl.handle.net/10027/10132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Martinoia D. Proving Correctness within an Access Control Evaluation Framework. [Thesis]. University of Illinois – Chicago; 2013. Available from: http://hdl.handle.net/10027/10132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université de Sherbrooke

9. Huynh, Nghi. Vérification et validation de politiques de contrôle d'accès dans le domaine médical.

Degree: 2017, Université de Sherbrooke

 Abstract : In healthcare, data digitization and the use of the Electronic Health Records (EHR) offer several benefits, such as the reduction of the space… (more)

Subjects/Keywords: Contrôle d'accès; Méthodes formelles; Sécurité; Protection des données; Vérification; Validation; Politique de sécurité; Access control; Formal methods

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huynh, N. (2017). Vérification et validation de politiques de contrôle d'accès dans le domaine médical. (Doctoral Dissertation). Université de Sherbrooke. Retrieved from http://hdl.handle.net/11143/10155

Chicago Manual of Style (16th Edition):

Huynh, Nghi. “Vérification et validation de politiques de contrôle d'accès dans le domaine médical.” 2017. Doctoral Dissertation, Université de Sherbrooke. Accessed November 28, 2020. http://hdl.handle.net/11143/10155.

MLA Handbook (7th Edition):

Huynh, Nghi. “Vérification et validation de politiques de contrôle d'accès dans le domaine médical.” 2017. Web. 28 Nov 2020.

Vancouver:

Huynh N. Vérification et validation de politiques de contrôle d'accès dans le domaine médical. [Internet] [Doctoral dissertation]. Université de Sherbrooke; 2017. [cited 2020 Nov 28]. Available from: http://hdl.handle.net/11143/10155.

Council of Science Editors:

Huynh N. Vérification et validation de politiques de contrôle d'accès dans le domaine médical. [Doctoral Dissertation]. Université de Sherbrooke; 2017. Available from: http://hdl.handle.net/11143/10155

10. Hilia, Mohamed. Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.

Degree: Docteur es, Informatique, 2013, Université Paris-Est

L'intelligence ambiante est considérée comme l'une des évolutions majeures de l'informatique ubiquitaire. Elle vise la mise en œuvre des environnements ambiants ou des espaces intelligents… (more)

Subjects/Keywords: Web sémantique; Environnement mutli-Domaines; Contol d'accès et d'usage; Architecture orienté services; Méthodes formelle; Composition de services; Semantic Web; Multi-Domains environnement; Access and usage control; Service oriented architecture; Formal methods; Service composition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hilia, M. (2013). Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. (Doctoral Dissertation). Université Paris-Est. Retrieved from http://www.theses.fr/2013PEST1198

Chicago Manual of Style (16th Edition):

Hilia, Mohamed. “Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.” 2013. Doctoral Dissertation, Université Paris-Est. Accessed November 28, 2020. http://www.theses.fr/2013PEST1198.

MLA Handbook (7th Edition):

Hilia, Mohamed. “Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.” 2013. Web. 28 Nov 2020.

Vancouver:

Hilia M. Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. [Internet] [Doctoral dissertation]. Université Paris-Est; 2013. [cited 2020 Nov 28]. Available from: http://www.theses.fr/2013PEST1198.

Council of Science Editors:

Hilia M. Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. [Doctoral Dissertation]. Université Paris-Est; 2013. Available from: http://www.theses.fr/2013PEST1198


ETH Zürich

11. Werthmüller, Tanja. Efficient evaluation of PBel access control policies.

Degree: 2013, ETH Zürich

Subjects/Keywords: SPEZIELLE PROGRAMMIERMETHODEN; ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); SPECIAL PROGRAMMING METHODS; ACCESS CONTROL (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Werthmüller, T. (2013). Efficient evaluation of PBel access control policies. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/153956

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Werthmüller, Tanja. “Efficient evaluation of PBel access control policies.” 2013. Thesis, ETH Zürich. Accessed November 28, 2020. http://hdl.handle.net/20.500.11850/153956.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Werthmüller, Tanja. “Efficient evaluation of PBel access control policies.” 2013. Web. 28 Nov 2020.

Vancouver:

Werthmüller T. Efficient evaluation of PBel access control policies. [Internet] [Thesis]. ETH Zürich; 2013. [cited 2020 Nov 28]. Available from: http://hdl.handle.net/20.500.11850/153956.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Werthmüller T. Efficient evaluation of PBel access control policies. [Thesis]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/153956

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

12. O'Neill, Tara Anne. Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life.

Degree: 2018, Penn State University

 In order to ensure long-term adoption and use of augmentative and alternative communication (AAC) technologies, they must be designed to support children to participate within… (more)

Subjects/Keywords: In order to ensure long-term adoption and use of augmentative and alternative communication (AAC) technologies; they must be designed to support children to participate within everyday activities and routines that are prioritized by families. Nine parents of children with cerebral palsy who used AAC technologies participated in semi-structured interviews to provide their perspectives of how AAC technologies were integrated into the functional contexts of everyday life. Five major themes emerged from the discussions: (a) integrating AAC into life; (b) AAC technologies; (c) child needs and skills; (d) parent responsibilities and priorities; and (e) AAC process and decision-making. Children were able to use AAC technologies within a variety of everyday contexts with various partners; however; challenges included access to AAC within physical and outdoor activities and partners who lacked knowledge regarding operational competencies and effective interaction strategies. In order to integrate AAC technologies into life; parents prioritized technology features including ease of programming; improved physical design (e.g.; lighter; wearable; easy to mount; durable); features to enhance efficiency and ease of access (e.g.; brain-computer interface; sentence prediction); and availably of multiple functions and features (e.g.; facial recognition software; augmented reality; projection capabilities; capability to control wheelchair). AAC manufacturers and mainstream technology developers should work to ensure that technologies are responsive to the supports; limitations; and ideal features identified by parents. Future research should seek input from a larger group of stakeholders and use longitudinal methods to examine perceptions of AAC technologies over time. Keywords: technology design; augmentative and alternative communication; parents; cerebral palsy; service delivery; technology design; family

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

O'Neill, T. A. (2018). Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15513tao5012

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

O'Neill, Tara Anne. “Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life.” 2018. Thesis, Penn State University. Accessed November 28, 2020. https://submit-etda.libraries.psu.edu/catalog/15513tao5012.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

O'Neill, Tara Anne. “Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life.” 2018. Web. 28 Nov 2020.

Vancouver:

O'Neill TA. Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Nov 28]. Available from: https://submit-etda.libraries.psu.edu/catalog/15513tao5012.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

O'Neill TA. Perspectives of Parents of Children with Cerebral Palsy on the Supports, Challenges, and Realities of Integrating AAC into Everyday Life. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15513tao5012

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.