4 resultados para Security policies

em Universidade Federal do Rio Grande do Norte(UFRN)


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This dissertation shows a comparison between practices related to the body, to identities and to the health of young drug takers of synthetic and manipulated psychoactive substances living in Fortaleza. Through ethnographic accompaniment of parties and two social nets of young people I was able to verify the differences and similarities that make these addicted singular and plural in their notion of ethos and world vision. Notions of being hippie/alternative and being punk are present between these nets. Because their use and circulation are developed in environments usually distinct, it is possible to trace singular aspects between the nets and its actions. In parallel, on the attempt to build a triangulated data, I had information related to youth and drugs in local media and in governmental institutions bound to health mental and city security policies. With this junction of data I present a perspective to questions evolving formal and informal important controls to the conduction of their lives and identities. I present this as a sequel to well developed studies in Brasil about youth in interface to drug use, although still not very explored in the state of Ceará.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The way to deal with information assets means nowadays the main factor not only for the success but also for keeping the companies in the global world. The number of information security incidents has grown for the last years. The establishment of information security policies that search to keep the security requirements of assets in the desired degrees is the major priority for the companies. This dissertation suggests a unified process for elaboration, maintenance and development of information security policies, the Processo Unificado para Políticas de Segurança da Informação - PUPSI. The elaboration of this proposal started with the construction of a structure of knowledge based on documents and official rules, published in the last two decades, about security policies and information security. It's a model based on the examined documents which defines the needed security policies to be established in the organization, its work flow and identifies the sequence of hierarchy among them. It's also made a model of the entities participating in the process. Being the problem treated by the model so complex, which involves all security policies that the company must have. PUPSI has an interative and developing approach. This approach was obtained from the instantiation of the RUP - Rational Unified Process model. RUP is a platform for software development object oriented, of Rational Software (IBM group). Which uses the best practice known by the market. PUPSI got from RUP a structure of process that offers functionality, diffusion capacity and comprehension, performance and agility for the process adjustment, offering yet capacity of adjustment to technological and structural charges of the market and the company

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This dissertation shows a comparison between practices related to the body, to identities and to the health of young drug takers of synthetic and manipulated psychoactive substances living in Fortaleza. Through ethnographic accompaniment of parties and two social nets of young people I was able to verify the differences and similarities that make these addicted singular and plural in their notion of ethos and world vision. Notions of being hippie/alternative and being punk are present between these nets. Because their use and circulation are developed in environments usually distinct, it is possible to trace singular aspects between the nets and its actions. In parallel, on the attempt to build a triangulated data, I had information related to youth and drugs in local media and in governmental institutions bound to health mental and city security policies. With this junction of data I present a perspective to questions evolving formal and informal important controls to the conduction of their lives and identities. I present this as a sequel to well developed studies in Brasil about youth in interface to drug use, although still not very explored in the state of Ceará.