5 resultados para Breach notification

em Digital Commons at Florida International University


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dropout rates are major issues facing any nation's continued economic and social progress. The seriousness of this issue in the United States is evidenced by the recent legislation of the 2001 No Child Left Behind Act. The purpose of this study was to use the richness of qualitative methodology to analyze inaccuracies in the assignment of withdrawal codes by school administrators in two different disciplinary alternative schools. The primary codes examined were Code 05, any students over the age of 16 who leaves school voluntarily with no intention of returning; Code 15, any PK–12 student who is withdrawn from school due to nonattendance; Code 22, whereabouts unknown; Code 23, no other code can be used to identify the student's reason for leaving school, and Code 26, entering an adult program. ^ The cross-case method was used for this study. The participants were comprised of 19 school personnel and 25 students from two disciplinary alternative schools, designated X and Y, in the Miami-Dade County Public School system, Miami, FL. Data collection procedures included semi-structured interview, observations, field notes, and district documents. With a matrix, these data were analyzed to compare patterns and themes that emerged within both schools. ^ Results indicated that withdrawal codes were assigned inaccurately for two distinct reasons. At School Y, withdrawal codes were inaccurately assigned intentionally to keep the students from returning to a regular school without notification. At School X, withdrawal codes were inaccurately assigned due to lack of ability to properly track students and ascertain the real circumstances for their departure from school. The end result in both cases was that the school systems were not accurately identifying the whereabouts of students. It was recommended that further investigation be conducted to compare the accuracy of reporting dropouts among traditional/regular high schools and disciplinary alternative schools. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examined assignment of withdrawal codes by school administrators in two disciplinary alternative schools. Findings revealed: (a) codes were inaccurately assigned intentionally to keep students from returning to a regular school without notification, and (b) administrators improperly tracked students and failed to ascertain students’ reasons for dropping out.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effective control of production activities in dynamic job shop with predetermined resource allocation for all the jobs entering the system is a unique manufacturing environment, which exists in the manufacturing industry. In this thesis a framework for an Internet based real time shop floor control system for such a dynamic job shop environment is introduced. The system aims to maintain the schedule feasibility of all the jobs entering the manufacturing system under any circumstance. The system is capable of deciding how often the manufacturing activities should be monitored to check for control decisions that need to be taken on the shop floor. The system will provide the decision maker real time notification to enable him to generate feasible alternate solutions in case a disturbance occurs on the shop floor. The control system is also capable of providing the customer with real time access to the status of the jobs on the shop floor. The communication between the controller, the user and the customer is through web based user friendly GUI. The proposed control system architecture and the interface for the communication system have been designed, developed and implemented.