563 resultados para Web Security
Resumo:
U-Healthcare means that it provides healthcare services "at anytime and anywhere" using wired, wireless and ubiquitous sensor network technologies. As a main field of U-healthcare, Telehealth has been developed as an enhancement of Telemedicine. This system includes two-way interactive web-video communications, sensor technology, and health informatics. With these components, it will assist patients to receive their first initial diagnosis. Futhermore, Telehealth will help doctors diagnose patient's diseases at early stages and recommend treatments to patients. However, this system has a few limitations such as privacy issues, interruption of real-time service and a wrong ordering from remote diagnosis. To deal with those flaws, security procedures such as authorised access should be applied to as an indispensible component in medical environment. As a consequence, Telehealth system with these protection procedures in clinical services will cope with anticipated vulnerabilities of U-Healthcare services and security issues involved.
Informed learning in online environments : supporting the higher education curriculum beyond Web 2.0
Resumo:
As boundaries between physical and online learning spaces become increasingly blurred in higher education, how can students gain full benefit of Web 2.0 social media and mobile technologies for learning? How can we, as information professionals and educators, best support the information literacy learning needs of students who are universally mobile and Google-focused? This chapter presents informed learning (Bruce, 2008) as a pedagogical construct with potential to support learning across the higher education curriculum, for Web 2.0 and beyond. After outlining the principles of informed learning and how they may enrich the higher education curriculum, we explain the role of library and information professionals in promoting informed learning for Web 2.0 and beyond. Then, by way of illustration, we describe recent experience at an American university where librarians simultaneously learned about and applied informed learning principles in reshaping the information literacy program.
Resumo:
In the last decade or so, we have witnessed the growth of web 2.0 technology and social networking platforms, and their rapid rise in popularity as methods of social interaction and communication. Yet, platforms such as Facebook and Twitter are not just online social phenomena, but can impact on the way the law and courts operate. This article highlights the issues that legal practitioners and courts need to be aware of in engaging with this technology, and suggests possible ways forward.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
Building Web 2.0 sites does not necessarily ensure the success of the site. We aim to better understand what improves the success of a site by drawing insight from biologically inspired design patterns. Web 2.0 sites provide a mechanism for human interaction enabling powerful intercommunication between massive volumes of users. Early Web 2.0 site providers that were previously dominant are being succeeded by newer sites providing innovative social interaction mechanisms. Understanding what site traits contribute to this success drives research into Web sites mechanics using models to describe the associated social networking behaviour. Some of these models attempt to show how the volume of users provides a self-organising and self-contextualisation of content. One model describing coordinated environments is called stigmergy, a term originally describing coordinated insect behavior. This paper explores how exploiting stigmergy can provide a valuable mechanism for identifying and analysing online user behavior specifically when considering that user freedom of choice is restricted by the provided web site functionality. This will aid our building better collaborative Web sites improving the collaborative processes.
Resumo:
As online business thrives, a company’s Web presence holds enormous importance as a source of information, entertainment, and customer service for Internet users. Besides being user-friendly, a Web site should offer interesting and enjoyable content to attract online visitors in an ever-changing multimedia environment. Companies that operate globally must know how cultural differences influence the way potential customers perceive their sites. This paper presents a model that highlights the importance of ease of use, enjoyment, content, and brand trust for Web site loyalty. The model is subsequently tested in four countries: Australia, Japan, Mongolia, and the USA. The results show that perceptual differences exist: while ease of use is crucial for Web site loyalty in all four countries, the importance of content, perceived enjoyment, and brand trust varies across different cultures.
Resumo:
LiteSteel beam (LSB) is a new cold-formed steel hollow flange channel section produced using a patented manufacturing process involving simultaneous cold-forming and dual electric resistance welding. The LSBs are commonly used as floor joists and bearers with web openings in residential, industrial and commercial buildings. Their shear strengths are considerably reduced when web openings are included for the purpose of locating building services. Shear tests of LSBs with web openings have shown that there is up to a 60% reduction in the shear capacity due to the inclusion of web openings. Hence there is a need to improve the shear capacity of LSBs with web openings. A cost effective way to eliminate the shear capacity reduction is to attach suitable stiffeners around the web openings. Hence experimental studies were undertaken to investigate the shear behaviour and strength of LSBs with stiffened web openings. In this research, various stiffening methods using plate and LSB stiffeners attached to LSBs using both welding and screw-fastening were attempted. Our test results showed that the stiffening arrangements recommended by past research for cold-formed steel channel beams are not adequate to restore the shear strengths of LSBs with web openings. Therefore new stiffener arrangements were proposed for LSBs with web openings. This paper presents the details of this experimental study and the results including the details of the optimum stiffener details for LiteSteel beams.
Resumo:
Cold-formed steel members are increasingly used as primary structural elements in the building industries around the world due to the availability of thin and high strength steels and advanced cold-forming technologies. Cold-formed steel lipped channel beams (LCB) are commonly used as flexural members such as floor joists and bearers. However, their shear capacities are determined based on conservative design rules. Current practice in flooring systems is to include openings in the web element of floor joists or bearers so that building services can be located within them. However, limited research has been undertaken on the shear behaviour and strength of LCBs with web openings. Hence a detailed experimental study involving 32 shear tests was undertaken to investigate the shear behaviour and strength of LCBs with web openings. Simply supported test specimens of LCBs with an aspect ratio of 1.0 and 1.5 were loaded at mid-span until failure. This paper presents the details of this experimental study and the results of their shear capacities and behavioural characteristics. Experimental results showed that the current design rules in cold-formed steel structures design codes are very conservative for the shear design of LCBs with web openings. Improved design equations have been proposed for the shear strength of LCBs with web openings based on the experimental results from this study.
Resumo:
This LiteSteel beam (LSB) is a new cold-formed steel hollow flange channel section produced using a patented manufacturing process involving simultaneous cold-forming and dual electric resistance welding. The LSBs are commonly used as floor joists and bearers with web openings in buildings. Their shear strengths are considerably reduced when web openings are included for the purpose of locating building services. Shear tests of LSBs with web openings have shown that there is up to 60% reduction in the shear capacity. Hence there is a need to improve the shear capacity of LSBs with web openings. A cost effective way to eliminate the shear capacity reduction is to stiffen the web openings using suitable stiffeners. Hence numerical studies were undertaken to investigate the shear capacity of LSBs with stiffened web openings. In this research, finite element models of LSBs with stiffened web openings in shear were developed to simulate the shear behaviour and strength of LSBs. Various stiffening methods using plate and LSB stiffeners attached to LSBs using both welding and screw-fastening were attempted. The developed models were then validated by comparing their results with experimental results and used in further studies. Both finite element and experimental results showed that the stiffening arrangements recommended by past research for cold-formed steel channel beams are not adequate to restore the shear strengths of LSBs with web openings. Therefore new stiffener arrangements were proposed for LSBs with web openings. This paper presents the details of this research project using numerical studies and the results.
Resumo:
Cold-formed steel members are increasingly used as primary structural elements in buildings due to the availability of thin and high strength steels and advanced cold-forming technologies. Cold-formed lipped channel beams (LCB) are commonly used as flexural members such as floor joists and bearers. Shear behaviour of LCBs with web openings is more complicated and their shear capacities are considerably reduced by the presence of web openings. However, limited research has been undertaken on the shear behaviour and strength of LCBs with web openings. Hence a numerical study was undertaken to investigate the shear behaviour and strength of LCBs with web openings. Finite element models of simply supported LCBs with aspect ratios of 1.0 and 1.5 were considered under a mid-span load. They were then validated by comparing their results with test results and used in a detailed parametric study. Experimental and numerical results showed that the current design rules in cold-formed steel structures design codes are very conservative for the shear design of LCBs with web openings. Improved design equations were therefore proposed for the shear strength of LCBs with web openings. This paper presents the details of this numerical study of LCBs with web openings, and the results.
Resumo:
We investigate existing cloud storage schemes and identify limitations in each one based on the security services that they provide. We then propose a new cloud storage architecture that extends CloudProof of Popa et al. to provide availability assurance. This is accomplished by incorporating a proof of storage protocol. As a result, we obtain the first secure storage cloud computing scheme that furnishes all three properties of availability, fairness and freshness.