390 resultados para trace mineral requirements


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A browser is a convenient way to access resources located remotely on computer networks. Security in browsers has become a crucial issue for users who use them for sensitive applications without knowledge ofthe hazards. This research utilises a structure approach to analyse and propose enhancements to browser security. Standard evaluation for computer products is important as it helps users to ensure that the product they use is appropriate for their needs. Security in browsers, therefore, has been evaluated using the Common Criteria. The outcome of this was a security requirements profile which attempts to formalise the security needs of browsers. The information collected during the research was used to produce a prototype model for a secure browser program. Modifications to the Lynx browser were made to demonstrate the proposed enhancements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The removal of arsenate anions from aqueous media, sediments and wasted soils is of environmental significance. The reaction of gypsum with the arsenate anion results in pharmacolite mineral formation, together with related minerals. Raman and infrared spectroscopy have been used to study the mineral pharmacolite Ca(HAsO4)•2H2O. The mineral is characterised by an intense Raman band at 865 cm-1 assigned to the (AsO4)3- symmetric stretching mode. The equivalent infrared band is found at 864 cm-1. The low intensity Raman band at 886 cm-1 provides evidence for (AsO3OH)2-. A series of overlapping bands in the 300 to 450 cm-1 are attributed to ν2 and ν4 bending modes. Prominent Raman bands at around 3187 cm-1 are assigned to water OH stretching vibrations and the two sharp bands at 3425 and 3526 cm-1 to the OH stretching vibrations of (HOAsO3) units.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Raman spectra of bottinoite Ni[Sb(OH)6].6H2O were studied, and related to the molecular structure of the mineral. An intense sharp Raman band at 618 cm-1 is attributed to the SbO symmetric stretching mode. The low intensity band at 735 cm-1 is ascribed to the SbO antisymmetric stretching vibration. Low intensity Raman bands were found at 501, 516 and 578 cm-1. Four Raman bands observed at 1045, 1080, 1111 and 1163 cm-1 are assigned to δ SbOH deformation modes. A complex pattern resulting from the overlapping band of the water and hydroxyl units is observed. Raman bands are observed at 3223, 3228, 3368, 3291, 3458 and 3510 cm-1. The first two Raman bands are assigned to water stretching vibrations. The two higher wavenumber Raman bands observed at 3466 and 3552 cm-1 and two infrared bands at 3434 and 3565 cm-1 are assigned to the stretching vibrations of the hydroxyl units. Observed Raman and infrared bands are connected with O-H…O hydrogen bonds and their lengths 2.72, 2.79, 2.86, 2.88 and 3.0 Å (Raman) and 2.73, 2.83 and 3.07 Å (infrared).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasingly, software is no longer developed as a single system, but rather as a smart combination of so-called software services. Each of these provides an independent, specific and relatively small piece of functionality, which is typically accessible through the Internet from internal or external service providers. To the best of our knowledge, there are no standards or models that describe the sourcing process of these software based services (SBS). We identify the sourcing requirements for SBS and associate the key characteristics of SBS (with the sourcing requirements introduced). Furthermore, we investigate the sourcing of SBS with the related works in the field of classical procurement, business process outsourcing, and information systems sourcing. Based on the analysis, we conclude that the direct adoption of these approaches for SBS is not feasible and new approaches are required for sourcing SBS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasingly, software is no longer developed as a single system, but rather as a smart combination of so-called software services. Each of these provides an independent, specific and relatively small piece of functionality, which is typically accessible through the Internet from internal or external service providers. There are no standards or models that describe the sourcing process of these software based services (SBS). The authors identify the sourcing requirements for SBS and associate the key characteristics of SBS (with the sourcing requirements introduced). Furthermore, this paper investigates the sourcing of SBS with the related works in the field of classical procurement, business process outsourcing, and information systems sourcing. Based on the analysis, the authors conclude that the direct adoption of these approaches for SBS is not feasible and new approaches are required for sourcing SBS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Raman spectra of the uranyl titanate mineral betafite were obtained and related to the mineral structure. A comparison is made with the spectra of uranyl oxyhydroxide hydrates. Observed bands are attributed to the (UO2)2+ stretching and bending vibrations, U-OH bending vibrations, H2O and (OH)- stretching, bending and libration modes. U-O bond lengths in uranyls and O-H…O bond lengths are calculated from the wavenumbers assigned to the stretching vibrations. Raman bands of betafite are comparable with those of the uranyl oxyhydroxides. The mineral betafite is metamict as is evidenced by the intensity of the UO stretching and bending modes being of lower intensity than expected and with bands that are significantly broader.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper describes a number of requirements for enhancing the trust of location acquisition from Satellite Navigation Systems, particularly for those applications where the location is monitored through a remote GNSS receiver. We discuss how the trust of a location acquisition could be propagated to an application through the use of a proposed tamper-­resistant GNSS receiver which quantifies the trust of a location solution from the signaling used (ie. P(Y) code, Galileo SOL, PRS, CS) and provides a cryptographic proof of this to a remote application. The tamper­-resistance state of the receiver is also included in this cryptographic proof.