963 resultados para cyber security, securitization, information technology, U.S CYBERCOM


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study aims to analyze and compare micro-firms’ organizational culture related to organizational performance. A case study methodology was used based on four firms, competitors among themselves in the Information Technology business, focusing on the years between 2008-2013. Findings pointed out many similarities to larger firms, but some specificities of micro-firms were found and propositions were defined: clan culture predominance is related to best performing micro-firms; the configuration of several culture types seemed to be the most suitable for obtaining good organizational results, provided that they do not focus only on hierarchy and market types of culture; the market culture predominance perception by employees is associated with low job satisfaction; and, after a certain time in business, micro-firms, as do larger companies, seek to standardize and control processes. Recognizing that organizational culture is considered important to firms’ results, this study sheds some light on that important factor for micro-firms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This work project focuses on developing new approaches which enhance Portuguese exports towards a defined German industry sector within the information technology and electronics fields. Firstly and foremost, information was collected and a set of expert and top managers’ interviews were performed in order to acknowledge the demand of the German market while identifying compatible Portuguese supply capabilities. Among the main findings, Industry 4.0 presents itself as a valuable opportunity in the German market for Portuguese medium sized companies in the embedded systems area of expertise for machinery and equipment companies. In order to achieve the purpose of the work project, an embedded systems platform targeting machinery and equipment companies was suggested as well as it was developed several recommendations on how to implement it. An alternative approach for this platform was also considered within the German market namely the eHealth sector having the purpose of enhancing the current healthcare service provision.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Equity research report

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Department of Applied Economics,Cochin University of Science and Technology

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The summary from Goodson’s group on their recent work on heat transfer issues in the microelectronics and data storage industries illustrate the critical role of heat transfer for some areas of information technology. In this article, we build on their work and discuss some directions worthy of further research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This resource is an informational resource that attempts to inform the general public about security and privacy with using the internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Resource and flyer produced for INFO2009 12/13. An animation on public-key encryption related to cybercrime and cybersecurity. Target audience is undergraduates, but the resource does not assume prior knowledge of the topics, or any in-depth knowledge of IT.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El programa BTEC es un programa de estudios que permite obtener una cualificación profesional o laboral. Este recurso está preparado para ayudar al alumno en el curso BTEC First, nivel 2, sector profesional tecnología de la información y se divide en diez unidades: la comunicación en la industria de las TI;trabajar en la industria de las TI; sistemas informáticos; personalización del software; creación de una red informática; sistemas de base de datos; desarrollo de sitios web; gráficos por ordenador y desarrollo de los juegos de ordenador. Incluye actividades de evaluación en cada unidad que cubren todos los criterios de ésta para ofrecer a los estudiantes la oportunidad de practicar sus tareas y profundizar en el conocimiento y la comprensión de la materia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Libro dirigido a profesores en formación o en activo en el área de las tecnologías de la información, con material de apoyo para el desarrollo de los programas de estudio en la materia, tanto para alumnos de secundaria, como para formación de adultos o entornos universitarios. El objetivo del libro es ayudar al profesor a equilibrar la compresión de los alumnos del papel de las nuevas tecnologías en la sociedad, y el desarrollo de las habilidades necesarias para diseñar y realizar diferentes proyectos tecnológicos con éxito, a través de casos de estudio, actividades para la mejora de la comunicación, el trabajo en equipo y la solución de problemas, y estrategias de evaluación.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Monográfico con el título: 'Formación y desarrollo profesional del docente en medios y NTICs'. Resumen basado en el de la publicación