166 resultados para model-based security management
Resumo:
Service-oriented architectures and Web services mature and have become more widely accepted and used by industry. This growing adoption increased the demands for new ways of using Web service technology. Users start re-combining and mediating other providers’ services in ways that have not been anticipated by their original provider. Within organisations and cross-organisational communities, discoverable services are organised in repositories providing convenient access to adaptable end-to-end business processes. This idea is captured in the term Service Ecosystem. This paper addresses the question of how quality management can be performed in such service ecosystems. Service quality management is a key challenge when services are composed of a dynamic set of heterogeneous sub-services from different service providers. This paper contributes to this important area by developing a reference model of quality management in service ecosystems. We illustrate the application of the reference model in an exploratory case study. With this case study, we show how the reference model helps to derive requirements for the implementation and support of quality management in an exemplary service ecosystem in public administration.
Resumo:
Importance Active video games may offer an effective strategy to increase physical activity in overweight and obese children. However, the specific effects of active gaming when delivered within the context of a pediatric weight management program are unknown. Objective To evaluate the effects of active video gaming on physical activity and weight loss in children participating in an evidence-based weight management program delivered in the community. Design, Setting, and Participants Group-randomized clinical trial conducted during a 16-week period in YMCAs and schools located in Massachusetts, Rhode Island, and Texas. Seventy-five overweight or obese children (41 girls [55%], 34 whites [45%], 20 Hispanics [27%], and 17 blacks [23%]) enrolled in a community-based pediatric weight management program. Mean (SD) age of the participants was 10.0 (1.7) years; body mass index (BMI) z score, 2.15 (0.40); and percentage overweight from the median BMI for age and sex, 64.3% (19.9%). Interventions All participants received a comprehensive family-based pediatric weight management program (JOIN for ME). Participants in the program and active gaming group received hardware consisting of a game console and motion capture device and 1 active game at their second treatment session and a second game in week 9 of the program. Participants in the program-only group were given the hardware and 2 games at the completion of the 16-week program. Main Outcomes and Measures Objectively measured daily moderate-to-vigorous and vigorous physical activity, percentage overweight, and BMI z score. Results Participants in the program and active gaming group exhibited significant increases in moderate-to-vigorous (mean [SD], 7.4 [2.7] min/d) and vigorous (2.8 [0.9] min/d) physical activity at week 16 (P < .05). In the program-only group, a decline or no change was observed in the moderate-to-vigorous (mean [SD] net difference, 8.0 [3.8] min/d; P = .04) and vigorous (3.1 [1.3] min/d; P = .02) physical activity. Participants in both groups exhibited significant reductions in percentage overweight and BMI z scores at week 16. However, the program and active gaming group exhibited significantly greater reductions in percentage overweight (mean [SD], −10.9% [1.6%] vs −5.5% [1.5%]; P = .02) and BMI z score (−0.25 [0.03] vs −0.11 [0.03]; P < .001). Conclusions and Relevance Incorporating active video gaming into an evidence-based pediatric weight management program has positive effects on physical activity and relative weight.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
Introduction: Diabetes has traditionally been managed as a single chronic disease state, but it exists with co-morbidities such as depression and metabolic syndrome. Treatment is multifaceted, requiring both primary and secondary care, however, the delivery of diabetes care is often fragmented. Integrated chronic disease management is a growing model of interest, and is underpinned by the chronic care model (CCM), devised as a guide for primary care management of patients with chronic conditions. The model identifies six key elements for effective care, and has shown promise in improving the management of diabetes. Aim: To find empirical evidence of integrated care interventions targeted at co-morbidities including diabetes, across primary/secondary care. Method: A systematic review of peer reviewed literature from PubMed, CINAHL, Embase, Cochrane Library and Joanna Briggs was performed. Studies were reviewed according to inclusion criteria- studies published in English, between 2004-2014, empirical studies, studies with evidence of primary/secondary implementation, and those dealing with chronic co-morbid disease states. Results: 51 studies met the inclusion criteria. Included studies were mostly from the US (38), with five from Australia, UK (2), Canada (2), Netherlands (1), Norway (1), Ireland (1), and one multi-country study. It was found that all interventions adopted at least one (average 3-4) of the chronic care model, with the majority implementing delivery system redesign activities within the primary care practice/s. We found evidence of interventions which significantly reduced emergency department and hospital admissions, improved processes of care, patient health outcomes such as HbA1c, improved patient satisfaction, and reduced costs. Conclusion/Implications for practice: Diabetes exists as a co-morbid disease, requiring both primary and secondary care. We found that integrated care interventions adopting elements of the chronic care model positively impacted on patient outcomes, service utilisation, as well as costs. This review has highlighted that it may not be necessary to adopt all CCM elements to improve clinical outcomes, patient satisfaction and costs.
Resumo:
The reliable response to weak biological signals requires that they be amplified with fidelity. In E. coli, the flagellar motors that control swimming can switch direction in response to very small changes in the concentration of the signaling protein CheY-P, but how this works is not well understood. A recently proposed allosteric model based on cooperative conformational spread in a ring of identical protomers seems promising as it is able to qualitatively reproduce switching, locked state behavior and Hill coefficient values measured for the rotary motor. In this paper we undertook a comprehensive simulation study to analyze the behavior of this model in detail and made predictions on three experimentally observable quantities: switch time distribution, locked state interval distribution, Hill coefficient of the switch response. We parameterized the model using experimental measurements, finding excellent agreement with published data on motor behavior. Analysis of the simulated switching dynamics revealed a mechanism for chemotactic ultrasensitivity, in which cooperativity is indispensable for realizing both coherent switching and effective amplification. These results showed how cells can combine elements of analog and digital control to produce switches that are simultaneously sensitive and reliable. © 2012 Ma et al.
Resumo:
This study presents the results of the first large scale survey of Australian builders’ beliefs about prefabrication, drawing on 454 surveys completed by representatives of building companies in Queensland and Western Australia. Previous literature has identified a number of broad themes affecting the uptake of prefabrication. The current study builds on this work by using a structured theoretical model based on the Theory of Planned Behaviour (TPB) and the Technology Acceptance Model (TAM), to further explore the specific factors influencing builders’ intentions to increase their use of prefabrication. Information was gathered concerning the characteristics of respondents in addition to three aims. The aims were: (1) To identify the relative importance of a number of key factors which may affect builders’ use of prefabrication, (2) To compare the characteristics of builders using various levels of prefabrication (including none), and; (3) To determine if a model based on the TPB, TAM, and other control variables can explain builders’ intentions to adopt prefabrication on their housing projects.
Resumo:
This thesis introduces a method of applying Bayesian Networks to combine information from a range of data sources for effective decision support systems. It develops a set of techniques in development, validation, visualisation, and application of Complex Systems models, with a working demonstration in an Australian airport environment. The methods presented here have provided a modelling approach that produces highly flexible, informative and applicable interpretations of a system's behaviour under uncertain conditions. These end-to-end techniques are applied to the development of model based dashboards to support operators and decision makers in the multi-stakeholder airport environment. They provide highly flexible and informative interpretations and confidence in these interpretations of a system's behaviour under uncertain conditions.
Resumo:
Introduced predators can have pronounced effects on naïve prey species; thus, predator control is often essential for conservation of threatened native species. Complete eradication of the predator, although desirable, may be elusive in budget-limited situations, whereas predator suppression is more feasible and may still achieve conservation goals. We used a stochastic predator-prey model based on a Lotka-Volterra system to investigate the cost-effectiveness of predator control to achieve prey conservation. We compared five control strategies: immediate eradication, removal of a constant number of predators (fixed-number control), removal of a constant proportion of predators (fixed-rate control), removal of predators that exceed a predetermined threshold (upper-trigger harvest), and removal of predators whenever their population falls below a lower predetermined threshold (lower-trigger harvest). We looked at the performance of these strategies when managers could always remove the full number of predators targeted by each strategy, subject to budget availability. Under this assumption immediate eradication reduced the threat to the prey population the most. We then examined the effect of reduced management success in meeting removal targets, assuming removal is more difficult at low predator densities. In this case there was a pronounced reduction in performance of the immediate eradication, fixed-number, and lower-trigger strategies. Although immediate eradication still yielded the highest expected minimum prey population size, upper-trigger harvest yielded the lowest probability of prey extinction and the greatest return on investment (as measured by improvement in expected minimum population size per amount spent). Upper-trigger harvest was relatively successful because it operated when predator density was highest, which is when predator removal targets can be more easily met and the effect of predators on the prey is most damaging. This suggests that controlling predators only when they are most abundant is the "best" strategy when financial resources are limited and eradication is unlikely. © 2008 Society for Conservation Biology.
Resumo:
Background Internationally the stroke unit is recognised as the evidence-based model for patient management, although clarity about the effective components of stroke units is lacking. Whilst skilled nursing care has been proposed as one component, the theoretical and empirical basis for stroke nursing is limited. We attempted to explore the organisational context of stroke unit nursing, to determine those features that staff perceived to be important in facilitating high quality care. Design A case study approach was used, that included interviews with nurses and members of the multidisciplinary teams in two Canadian acute stroke units. A total of 20 interviews were completed, transcribed and analysed thematically using the Framework Approach. Trustworthiness was established through the review of themes and their interpretation by members of the stroke units. Findings Nine themes that comprised an organisational context that supported the delivery of high quality nursing care in acute stroke units were identified, and provide a framework for organisational development. The study highlighted the importance of an overarching service model to guide the organisation of care and the development of specialist and advanced nursing roles. Whilst multidisciplinary working appears to be a key component of stroke unit nursing, various organisational challenges to its successful implementation were highlighted. In particular the consequence of differences in the therapeutic approach of nurses and therapy staff needs to be explored in greater depth. Successful teamwork appears to depend on opportunities for the development of relationships between team members as much as the use of formal communication systems and structures. A co-ordinated approach to education and training, clinical leadership, a commitment to research, and opportunities for role and practice development also appear to be key organisational features of stroke unit nursing. Recommendations for the development of stroke nursing leadership and future research into teamwork in stroke settings are made.
Resumo:
This paper presents an unmanned aircraft system (UAS) that uses a probabilistic model for autonomous front-on environmental sensing or photography of a target. The system is based on low-cost and readily-available sensor systems in dynamic environments and with the general intent of improving the capabilities of dynamic waypoint-based navigation systems for a low-cost UAS. The behavioural dynamics of target movement for the design of a Kalman filter and Markov model-based prediction algorithm are included. Geometrical concepts and the Haversine formula are applied to the maximum likelihood case in order to make a prediction regarding a future state of a target, thus delivering a new waypoint for autonomous navigation. The results of the application to aerial filming with low-cost UAS are presented, achieving the desired goal of maintained front-on perspective without significant constraint to the route or pace of target movement.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.
Resumo:
We propose a conceptual model based on person–environment interaction, job performance, and motivational theories to structure a multilevel review of the employee green behavior (EGB) literature and agenda for future research. We differentiate between required EGB prescribed by the organization and voluntary EGB performed at the employees’ discretion. The review investigates institutional-, organizational-, leader-, team-, and employee-level antecedents and outcomes of EGB and factors that mediate and moderate these relationships. We offer suggestions to facilitate the development of the field, and call for future research to adopt a multilevel perspective and to investigate the outcomes of EGB.
Resumo:
We develop a conceptual model, based on person-environment fit theory, which explains how employee age affects occupational strain and well-being. We begin by explaining how age directly affects different dimensions of objective and subjective P-E fit. Next, we illustrate how age can moderate the relationship between objective P-E fit and subjective P-E fit. Third, we discuss how age can moderate the relationships between P-E fit, on one hand, and occupational strain and well-being on the other. Fourth, we explain how age can impact occupational strain and well-being directly independent of P-E fit. The chapter concludes with implications for future research and practice.