4 resultados para Files concerning adoption

em Digital Commons - Michigan Tech


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Indoor air pollution from combustion of solid fuels is the fifth leading contributor to disease burden in low-income countries. This, and potential to reduce environmental impacts, has resulted in emphasis on use of improved stoves. However, many efforts have failed to meet expectations and effective coverage remains limited. A disconnect exists between technologies, delivery methods, and long-term adoption. The purpose of this research is to develop a framework to increase long-term success of improved stove projects. The framework integrates sustainability factors into the project life-cycle. It is represented as a matrix and checklist which encourages consideration of social, economic, and environmental issues in projects. A case study was conducted in which an improved stove project in Honduras was evaluated using the framework. Results indicated areas of strength and weakness in project execution and highlighted potential improvements for future projects. The framework is also useful as a guide during project planning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis attempts to understand why people adopt or reject individual-use renewable energy technologies (IURET). I used factors from Everett Rogers' Diffusion of Innovation Theory to understand how people's perceptions towards the characteristics of a given IURET (such as price, compatibility, complexity, etc.), the characteristics of the individual adopter (such as innovativeness and environmental awareness), and the communication network (inter-personal communications and mass media) can influence adoption. An online questionnaire was sent to 101randomly selected Michigan households (using random digit dialing) to ask people whether or not they had adopted at least one IURET and to assess the above-mentioned factors from Rogers' theory. Data analysis was then conducted in SPSS using Chi-squared and binary logistic regression to determine the relationship between adoption behaviors (the dependent variable) and the factors from Rogers' theory (the independent variables) while controlling for education. The results show that Rogers' factors of price and observability and the control variable of education were all significant in explaining adoption but the other factors of Rogers' theory were not. For example, if individuals perceive the price of IURET to be reasonable or if they observe their neighbors using these technologies, then they are more likely to adopt. These results indicate that, if we want to promote greater adoption of IURET, we should focus our efforts on making the price of IURET more affordable through incentives and other mechanisms. Adopters should also be given some form of reward if they provide free demonstrations of their IURET in use to their neighbors to take advantage of the observability effects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report discusses steps for the integration and adoption of information and communication technologies (ICT) in Uganda schools. Barriers of ICT adoption for teachers were determined through surveys at three schools in Eastern Uganda. Teachers identified lack of familiarity of ICT resources and lack of ICT skills as the two greatest barriers to ICT integration. Administrators and staffs were also interviewed to determine current resources. Through observations, interviews and collected data the report addresses two major ideas, promoting utilization of ICT resources and development of sustainable ICT programs. Promotion of utilization not only relies on overcoming the major barriers listed, but also developing a positive attitude of ICT. Sustainability is an issue reliant on all three groups of the school community; administration, staff and users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.