6 resultados para when lien arises
em WestminsterResearch - UK
Resumo:
Adequate user authentication is a persistent problem, particularly with mobile devices, which tend to be highly personal and at the fringes of an organisation's influence. Yet these devices are being used increasingly in various business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defence for a mobile device that falls into the hands of an unauthorised user. However, motivating users to enable simple password mechanisms and periodically update their authentication information is difficult at best. This paper examines some of the issues relating to the use of biometrics as a viable method of authentication on mobile wireless devices. It is also a critical analysis of some of the techniques currently employed and where appropriate, suggests novel hybrid ways in which they could be improved or modified. Both biometric technology and wireless setting based constraints that determine the feasibility and the performance of the authentication feature are specified. Some well known biometric technologies are briefly reviewed and their feasibility for wireless and mobile use is reviewed. Furthermore, a number of quantitative and qualitative parameters for evaluation are also presented. Biometric technologies are continuously advancing toward commercial implementation in wireless devices. When carefully designed and implemented, the advantage of biometric authentication arises mainly from increased convenience and coexistent improved security.
Resumo:
This article describes findings from research funded by the Metropolitan Police and Crimestoppers which aimed to explore children's online experiences. A non-random, stratified sample of 200 London school children aged 10- 13 participated in focus groups. Preliminary findings are also presented from unpublished ongoing PhD research, which seeks to explore sex offender behaviour online and the policing of the internet (Martellozzo, 2005 ongoing). The findings are discussed in the context of sex offender's use of the internet. This research indicates that children do have some basic knowledge about 'stranger danger' but are not necessarily applying these lessons to cyberspace. The children in this study had sufficient awareness to not give personal details to strangers on the internet, and would not arrange to meet them. However, they made a distinction between 'strangers' and 'virtual friends' and this is an important point. Preliminary findings also highlight the difficulty of policing the internet and serve to illustrate the manner in which the Sexual Offences Act 2003 is applied to internet sexual offending in practice.
Resumo:
Salespeople play a pivotal role in promoting new products. Therefore, managers need to know what control mechanism (i.e., output-based control, behavior-based control, or knowledge-based control) can improve their salespeople's new product sales performance. Furthermore, managers may be able to assist salespeople in performing better by having a strong market orientation. The literature has been inconsistent regarding the effects of sales management control mechanisms and has not yet incorporated market orientation into a sales management control framework. The current study surveyed 315 Taiwanese salespeople from publicly traded electronics companies with the aim of contributing to the sales management literature. The results show that sales management controls can directly affect salespeople's innovativeness, which, in turn, affects new product sales performance. However, sales management controls cannot affect performance directly. Furthermore, market orientation can positively moderate the relationship between salespeople's innovativeness and new product sales performance.