4 resultados para Outlines of Pyrrhonism
em Repository Napier
Resumo:
Levels of analysis perform an important function in framing research and practice in human resource development (HRD). The purpose of this paper is to examine the concept of HRD from the individual, organizational and community/societal levels of analysis. The paper highlights both the distinctiveness and usefulness of each level of analysis, identifies tensions within and between them, and outlines differences in underpinning assumptions, characteristics of HRD provision and delivery of HRD interventions. By adopting this approach, the paper draws attention to variations in meaning, intent, content and practice with implications for developing both the theory and practice of HRD.
Resumo:
Developing learning, teaching and assessment strategies that foster ongoing engagement and provide inspiration to academic staff is a particular challenge. This paper demonstrates how an institutional learning, teaching and assessment strategy was developed and a ‘dynamic’ strategy created in order to achieve the ongoing enhancement of the quality of the student learning experience. The authors use the discussion of the evolution, development and launch of the Strategy and underpinning Resource Bank to reflect on the hopes and intentions behind the approach; firstly the paper will discuss the collaborative and iterative approach taken to the development of an institutional learning, teaching and assessment strategy; and secondly, the development of open access educational resources to underpin the strategy. The paper then outlines staff engagement with the resource bank and positive outcomes which have been identified to date, identifies the next steps in achieving the ambition behind the strategy and outlines the action research and fuller evaluation which will be used to monitor progress and ensure responsive learning at institutional level.
Resumo:
This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology for the declaration of policy field elements, through to the syntax, ontology and functional verification stages. In their works of [1] and [2] the authors concentrated on developing formal definitions of possible anomalies between rules in a network firewall rule set. Their work is considered as the foundation for further works on anomaly detection, including those of Fitzgerald et al. [3], Chen et al. [4], Hu et al. [5], among others. This paper extends this work by applying the methods to information sharing policies, and outlines the evaluation related to these.
Resumo:
Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these services. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). Dis-tributed Denial of Service (DDoS) attacks are typically executed from many sources and can result in large traf-fic flows. During last year 11% of DDoS attacks were over 60 Gbps (Prolexic, 2013a). The DDoS attacks are usually performed from the large botnets, which are networks of remotely controlled computers. There is an increasing effort by governments and companies to shut down the botnets (Dittrich, 2012), which has lead the attackers to look for alternative DDoS attack methods. One of the techniques to which attackers are returning to is DDoS amplification attacks. Amplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Proto-col (TFTP). This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. Mitigation methods to this threat have also been consid-ered and a variety of countermeasures are proposed. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. While it has been reported that the breaching of TFTP would be possible (Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification.