158 resultados para strategic communication


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Constatant que la formation des enseignants aux technologies de l'information et de la communication (TIC) pose des problèmes spécifiques, cet article a pour but d'engager une réflexion sur ce thème. Nos réflexions s'appuient sur une expérience de formation réalisée dans 23 écoles professionnelles suisses engagées dans un programme national de soutien à l'utilisation pédagogique des TIC. L'article décrit la manière dont le dispositif de formation prévu a été mis en pratique, les difficultés auxquelles il a donné lieu et les réponses que les acteurs ont élaborées pour faire face à ces difficultés. Nous montrons qu'une analyse du déroulement effectif d'un dispositif de formation et des transformations qu'il subit constitue un élément essentiel pour orienter les futures actions de formation et penser la place des apprenants dans un dispositif de formation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The discipline of Enterprise Architecture Management (EAM) deals with the alignment of business and information systems architectures. While EAM has long been regarded as a discipline for IT managers this book takes a different stance: It explains how top executives can use EAM for leveraging their strategic planning and controlling processes and how EAM can contribute to sustainable competitive advantage. Based on the analysis of best practices from eight leading European companies from various industries the book presents crucial elements of successful EAM. It outlines what executives need to do in terms of governance, processes, methodologies and culture in order to bring their management to the next level. Beyond this, the book points how EAM might develop in the next decade allowing today's managers to prepare for the future of architecture management.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the second edition of the compendium. Since the first edition a number of important initiatives have been launched in the shape of large projects targeting integration of research infrastructure and new technology for toxicity studies and exposure monitoring.The demand for research in the area of human health and environmental safety management of nanotechnologies is present since a decade and identified by several landmark reports and studies. Several guidance documents have been published. It is not the intention of this compendium to report on these as they are widely available.It is also not the intention to publish scientific papers and research results as this task is covered by scientific conferences and the peer reviewed press.The intention of the compendium is to bring together researchers, create synergy in their work, and establish links and communication between them mainly during the actual research phase before publication of results. Towards this purpose we find useful to give emphasis to communication of projects strategic aims, extensive coverage of specific work objectives and of methods used in research, strengthening human capacities and laboratories infrastructure, supporting collaboration for common goals and joint elaboration of future plans, without compromising scientific publication potential or IP Rights.These targets are far from being achieved with the publication in its present shape. We shall continue working, though, and hope with the assistance of the research community to make significant progress. The publication will take the shape of a dynamic, frequently updated, web-based document available free of charge to all interested parties. Researchers in this domain are invited to join the effort, communicating the work being done. [Auteurs]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cet article consiste en une discussion critique de la question de la communication en matière de prise en charge du patient atteint de cancer et de l'enseignement des aptitudes communicationnelles en oncologie. Nous avons d'abord essayé de définir les contours de ce qu'est (ou devrait être) une communication adéquate en oncologie, pour ensuite aborder les concepts sous-tendant les formations à la communication dans ce domaine, le problème des recommandations d'experts et du type dominant d'évaluation se rapportant à ces formations ainsi que les contenus enseignés et ainsi véhiculés.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to investigate the impact of a communication skills training (CST) in oncology on clinicians' linguistic strategies. A verbal communication analysis software (Logiciel d'Analyse de la Communication Verbale) was used to compare simulated patients interviews with oncology clinicians who participated in CST (N = 57) (pre/post with a 6-month interval) with a control group of oncology clinicians who did not (N = 56) (T1/T2 with a 6-month interval). A significant improvement of linguistic strategies related to biomedical, psychological and social issues was observed. Analysis of linguistic aspects of videotaped interviews might become in the future a part of individualised feedback in CST and utilised as a marker for an evaluation of training.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Language processing abnormalities and executive difficulties are hallmark features of schizophrenia. The objective of this study is to assess the blood oxygenation level-dependent (BOLD) response at two different stages of the illness (i.e. comparison between adolescents and adults with schizophrenic symptoms) during a fluency task.Methods: BOLD responses during a covert verbal fluency task were compared between 11 psychotic adolescents with schizophrenic symptoms (mean age 16,9 years) and 14 adults with schizophrenia (mean age 33,4 years). fMRI data were analyzed with standard routine of spm5.Results: First, expected activation's network was found for both groups, separately. Secondly, adolescents showed greater activation in left rolandic opercule (BA 48), left angular (BA 39) and right hippocampus compared to adults. Thirdly, adults demonstrated greater activation in presupplementary motor area (BA 6) and in precentral area (BA 4) compared to adolescents.Conclusions: The adolescents seemed to recruit a verbal network (Broca and Wernicke) and memory abilities to perform a fluency task. In contrast, adults seemed to recruit more executive function abilities to perform a similar task. Despite the evolution of schizophrenia, which is known to have a deleterious influence on the prefrontal cortex development, adult patients seemed to be able to recruit such areas to perform a verbal fluency / executive function task.