834 resultados para security, usability, identity management, authentication, authorization


Relevância:

100.00% 100.00%

Publicador:

Resumo:

On December 21, 2015, Governor Branstad issued Executive Order 87 (EO87); a cybersecurity initiative for the State of Iowa. The executive order establishes a multi-agency partnership, the EO87 Leadership Team, with the Office of the Chief Information Officer, Iowa National Guard, Department of Public Safety, Iowa Communications Network, and the Iowa Homeland Security and Emergency Management Department. The order directs these agencies to develop a comprehensive cybersecurity strategy which addresses lifeline critical infrastructure, risk assessments, best practices, awareness training, public education and communication, collaboration, K-12 and higher education, data breach notifications, and incident response planning to protect the citizens of Iowa and Iowa businesses. The EO87 Leadership Team, along with several key partners, worked diligently over the last six months to prepare recommendations that will have a direct and sustainable impact on protecting lifeline critical infra-structure, reducing risk to government operations, and creating sustainable partnerships in cybersecurity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A snapshot of water resource trends prepared by the Iowa DNR in collaboration with the Iowa Department of Agriculture and Land Stewardship, the U.S. Geological Survey, and The Iowa Homeland Security and Emergency Management Department.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article investigates how teachers in religious education (RE) think and act as professionals while working with differences in religious and philosophy of life experiences and beliefs in class and trying to do this in respectful and inclusive ways. It analyses data from two research projects that were carried out in lower secondary school in Norway. The main research question is: What is the relationship between teachers’ contextual knowledge and knowledge of the child and how do these two dimensions of professional knowledge interact when religious education teachers try to strike a good balance between inclusion and productive learning in their teaching practice? The data analysed were drawn from three different data sets featuring three Norwegian religious education-teachers. The research was part of the EU-funded "REDCo"-project and the "Religious education and diversity" - project ["ROM"] funded by the Norwegian Research Council. The interviewees emphasized the potential of the religious education subject to contribute to a wider tolerance for difference and to support individual students in their identity management. The analysis shows, however, that considerable contextual awareness - of the classroom and of the local community - is needed to realize this potential. It also shows the importance of interpersonal knowledge between the teacher and each student if contextual awareness is to be effective in terms of inclusion, participation, wellbeing and good learning outcomes for all students.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A snapshot of water resource trends prepared by the Iowa DNR in collaboration with the Iowa Department of Agriculture and Land Stewardship, the U.S. Geological Survey, and The Iowa Homeland Security and Emergency Management Department.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Collecting and analyzing consumer data is essential in today’s data-driven business environment. However, consumers are becoming more aware of the value of the information they can provide to companies, thereby being more reluctant to share it for free. Therefore, companies need to find ways to motivate consumers to disclose personal information. The main research question of the study was formed as “How can companies motivate consumers to disclose personal information?” and it was further divided into two subquestions: 1) What types of benefits motivate consumers to disclose personal information? 2) How does the disclosure context affect the consumers’ information disclosure behavior? The conceptual framework consisted of a classification of extrinsic and intrinsic benefits, and moderating factors, which were recognized on the basis of prior research in the field. The study was conducted by using qualitative research methods. The primary data was collected by interviewing ten representatives from eight companies. The data was analyzed and reported according to predetermined themes. The findings of the study confirm that consumers can be motivated to disclose personal information by offering different types of extrinsic (monetary saving, time saving, self-enhancement, and social adjustment) and intrinsic (novelty, pleasure, and altruism) benefits. However, not all the benefits are equally useful ways to convince the customer to disclose information. Moreover, different factors in the disclosure context can either alleviate or increase the effectiveness of the benefits and the consumers’ motivation to disclose personal information. Such factors include the consumer’s privacy concerns, perceived trust towards the company, the relevancy of the requested information, personalization, website elements (especially security, usability, and aesthetics of a website), and the consumer’s shopping motivation. This study has several contributions. It is essential that companies recognize the most attractive benefits regarding their business and their customers, and that they understand how the disclosure context affects the consumer’s information disclosure behavior. The likelihood of information disclosure can be increased, for example, by offering benefits that meet the consumers’ needs and preferences, improving the relevancy of the asked information, stating the reasons for data collection, creating and maintaining a trustworthy image of the company, and enhancing the quality of the company’s website.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A snapshot of water resource trends prepared by the Iowa DNR in collaboration with the Iowa Department of Agriculture and Land Stewardship, the U.S. Geological Survey, and The Iowa Homeland Security and Emergency Management Department.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A review of water resource trends prepared by the Iowa DNR in collaboration with the Iowa Department of Agriculture and Land Stewardship, the U.S. Geological Survey, and The Iowa Homeland Security and Emergency Management Department.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En el interés de alcanzar la estabilidad y promover el mantenimiento de la paz internacional, la diplomacia preventiva nace como un concepto generador de estrategias encaminadas a actuar antes, durante y después del conflicto. El siguiente documento busca analizar el funcionamiento de los instrumentos de diplomacia preventiva empleados por las Naciones Unidas en la crisis de Kosovo de 1998 y 1999. Esta crisis surgida a raíz del conflicto entre el gobierno serbio y un movimiento disidente, conocido como el Ejército de Liberación Albano-Kosovar, que pretendía darle un perfil más autónomo al territorio y a la población albano-kosovar, reveló una serie de debilidades estructurales que sigue enfrentando este mecanismo en la resolución de conflictos étnicos al interior de los Estados.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this study was to determine the effect of pearl millet intercropped with other cover crops on mineral forms of N and urease activity in soil, nitrate reductase activity in the leaves of the follow-up rice crop, as well as the yield components of this rice crop. The experiment was performed in the year 2012/2013 at two locations of the Brazilian Cerrado.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The objective of this study was to determine the best combination of management options for upland rice production: seed treatment, N management and soil compaction in zero and conventional tillage methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this study was to evaluate the production of biomass and grain cover crops, yield components, and grain yield of rice in Mozambique. The study was conducted in two sites located in the province of Cabo Delgado, in Mozambique.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study aimed to analyse the transaction costs of an association of organic farmers located in Goiania, Goias state, Brazil. We analysed the marketing and organisation relations based on data collected at the Association for the Development of Organic Farming in Goias state (ADAO/GO).

Relevância:

50.00% 50.00%

Publicador:

Resumo:

While mobile technologies can provide great personalized services for mobile users, they also threaten their privacy. Such personalization-privacy paradox are particularly salient for context aware technology based mobile applications where user's behaviors, movement and habits can be associated with a consumer's personal identity. In this thesis, I studied the privacy issues in the mobile context, particularly focus on an adaptive privacy management system design for context-aware mobile devices, and explore the role of personalization and control over user's personal data. This allowed me to make multiple contributions, both theoretical and practical. In the theoretical world, I propose and prototype an adaptive Single-Sign On solution that use user's context information to protect user's private information for smartphone. To validate this solution, I first proved that user's context is a unique user identifier and context awareness technology can increase user's perceived ease of use of the system and service provider's authentication security. I then followed a design science research paradigm and implemented this solution into a mobile application called "Privacy Manager". I evaluated the utility by several focus group interviews, and overall the proposed solution fulfilled the expected function and users expressed their intentions to use this application. To better understand the personalization-privacy paradox, I built on the theoretical foundations of privacy calculus and technology acceptance model to conceptualize the theory of users' mobile privacy management. I also examined the role of personalization and control ability on my model and how these two elements interact with privacy calculus and mobile technology model. In the practical realm, this thesis contributes to the understanding of the tradeoff between the benefit of personalized services and user's privacy concerns it may cause. By pointing out new opportunities to rethink how user's context information can protect private data, it also suggests new elements for privacy related business models.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Käyttäjien tunnistaminen tietojärjestelmissä on ollut yksi tietoturvan kulmakivistä vuosikymmenten ajan. Ajatus käyttäjätunnuksesta ja salasanasta on kaikkein kustannustehokkain ja käytetyin tapa säilyttää luottamus tietojärjestelmän ja käyttäjien välillä. Tietojärjestelmien käyttöönoton alkuaikoina, jolloin yrityksissä oli vain muutamia tietojärjestelmiä ja niitä käyttivät vain pieni ryhmä käyttäjiä, tämä toimintamalli osoittautui toimivaksi. Vuosien mittaan järjestelmien määrä kasvoi ja sen mukana kasvoi salasanojen määrä ja monimuotoisuus. Kukaan ei osannut ennustaa, kuinka paljon salasanoihin liittyviä ongelmia käyttäjät kohtaisivat ja kuinka paljon ne tulisivat ruuhkauttamaan yritysten käyttäjätukea ja minkälaisia tietoturvariskejä salasanat tulisivat aiheuttamaan suurissa yrityksissä. Tässä diplomityössä tarkastelemme salasanojen aiheuttamia ongelmia suuressa, globaalissa yrityksessä. Ongelmia tarkastellaan neljästä eri näkökulmasta; ihmiset, teknologia, tietoturva ja liiketoiminta. Ongelmat osoitetaan esittelemällä tulokset yrityksen työntekijöille tehdystä kyselystä, joka toteutettiin osana tätä diplomityötä. Ratkaisu näihin ongelmiin esitellään keskitetyn salasanojenhallintajärjestelmän muodossa. Järjestelmän eri ominaisuuksia arvioidaan ja kokeilu -tyyppinen toteutus rakennetaan osoittamaan tällaisen järjestelmän toiminnallisuus.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Wireless community networks became popular in uniting people with common interests. This thesis presents authentication and authorization service for a wireless community network using captive portal approach including ability to authenticate clients from associated networks thereby combining multiple communities in a syndicate. The system is designed and implemented to be reliable, scalable and flexible. Moreover, the result includes software management system, which automatically performs software updates at network’s access points. Future development of the system can be concentrated on an improvement of the software management system.