74 resultados para privacy policies


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The paper presents organisational semiotics (OS) as an approach for identifying organisational readiness factors for internal use of social media within information intensive organisations (IIO). The paper examines OS methods, such as organisational morphology, containment analysis and collateral analysis to reveal factors of readiness within an organisation. These models also help to identify the essential patterns of activities needed for social media use within an organisation, which can provide a basis for future analysis. The findings confirmed many of the factors, previously identified in literature, while also revealing new factors using OS methods. The factors for organisational readiness for internal use of social media include resources, organisational climate, processes, motivational readiness, benefit and organisational control factors. Organisational control factors revealed are security/privacy, policies, communication procedures, accountability and fallback.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Break-even analyses of the costs and benefits of six alternative bovine tuberculosis (bTB) control strategies were undertaken. The results show that some strategies, such as zoning, would require relatively small reductions in bTB incidence as a result to be cost effective, whilst for others, such as proactive badger removal, the costs would require a substantial and relatively rapid reduction in bTB incidence to be worthwhile.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper outlines EU policy on bioenergy, including biofuels, in the context of its policy initiatives to promote renewable energy to combat greenhouse gas emissions and climate change. The EU's Member States are responsible for implementing EU policy: thus, the UK's Renewables Obligation on electricity suppliers and its Renewable Transport Fuel Obligation and road-fuel tax rebates are examined. It is unlikely that EU policy is in conflict with the WTO Agreement on Agriculture or that on Subsidies and Countervailing Measures, but its provisions on environmental sustainability criteria could be problematic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many systems might have a long time dormant period, during which the systems are not operated. For example, most building services products are installed while a building is constructed, but they are not operated until the building is commissioned. Warranty terms for such products may cover the time starting from their installation times to the end of their warranty periods. Prior to the commissioning of the building, the building services products are protected by warranty although they are not operating. Developing optimal burn-in policies for such products is important when warranty cost is analysed. This paper considers two burn-in policies, which incur different burn-in costs, and have different burn-in effects on the products. A special case about the relationship between the failure rates of the products at the dormant state and at the operating state is presented. Numerical examples compare the mean total warranty costs of these two burn-in policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Constructing a building is a long process which can take several years. Most building services products are installed while a building is constructed, but they are not operated until the building is commissioned. The warranty term for the building service systems may cover the time starting from their installation to the end of the warranty period. Prior to the commissioning of the building, the building services systems are protected by warranty although they are not operated. The bum in time for such systems is important when warranty costs is analyzed. In this paper, warranty cost models for products with burn in periods are presented. Two burn in policies are developed to optimize the total mean warranty cost. A special case on the relationship between the failure rates of the product at the dormant state and at the I operating state is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the reliability literature, maintenance time is usually ignored during the optimization of maintenance policies. In some scenarios, costs due to system failures may vary with time, and the ignorance of maintenance time will lead to unrealistic results. This paper develops maintenance policies for such situations where the system under study operates iteratively at two successive states: up or down. The costs due to system failure at the up state consist of both business losses & maintenance costs, whereas those at the down state only include maintenance costs. We consider three models: Model A, B, and C: Model A makes only corrective maintenance (CM). Model B performs imperfect preventive maintenance (PM) sequentially, and CM. Model C executes PM periodically, and CM; this PM can restore the system as good as the state just after the latest CM. The CM in this paper is imperfect repair. Finally, the impact of these maintenance policies is illustrated through numerical examples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in building automation, healthcare and agriculture. In the EU project Hydra1 highlevel security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios especially in the user domains of building automation, healthcare, and agriculture. This paper gives a short introduction to the Hydra project, its user domains and its approach to ensure security by design. Based on the results of a focus group analysis of the building automation domain typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta Model. How concepts such as context security, semantic security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of a technical building automation scenario.