295 resultados para confidentiality
Resumo:
The future power grid will effectively utilize renewable energy resources and distributed generation to respond to energy demand while incorporating information technology and communication infrastructure for their optimum operation. This dissertation contributes to the development of real-time techniques, for wide-area monitoring and secure real-time control and operation of hybrid power systems. ^ To handle the increased level of real-time data exchange, this dissertation develops a supervisory control and data acquisition (SCADA) system that is equipped with a state estimation scheme from the real-time data. This system is verified on a specially developed laboratory-based test bed facility, as a hardware and software platform, to emulate the actual scenarios of a real hybrid power system with the highest level of similarities and capabilities to practical utility systems. It includes phasor measurements at hundreds of measurement points on the system. These measurements were obtained from especially developed laboratory based Phasor Measurement Unit (PMU) that is utilized in addition to existing commercially based PMU’s. The developed PMU was used in conjunction with the interconnected system along with the commercial PMU’s. The tested studies included a new technique for detecting the partially islanded micro grids in addition to several real-time techniques for synchronization and parameter identifications of hybrid systems. ^ Moreover, due to numerous integration of renewable energy resources through DC microgrids, this dissertation performs several practical cases for improvement of interoperability of such systems. Moreover, increased number of small and dispersed generating stations and their need to connect fast and properly into the AC grids, urged this work to explore the challenges that arise in synchronization of generators to the grid and through introduction of a Dynamic Brake system to improve the process of connecting distributed generators to the power grid.^ Real time operation and control requires data communication security. A research effort in this dissertation was developed based on Trusted Sensing Base (TSB) process for data communication security. The innovative TSB approach improves the security aspect of the power grid as a cyber-physical system. It is based on available GPS synchronization technology and provides protection against confidentiality attacks in critical power system infrastructures. ^
Resumo:
The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.
Resumo:
This project is about retrieving data in range without allowing the server to read it, when the database is stored in the server. Basically, our goal is to build a database that allows the client to maintain the confidentiality of the data stored, despite all the data is stored in a different location from the client's hard disk. This means that all the information written on the hard disk can be easily read by another person who can do anything with it. Given that, we need to encrypt that data from eavesdroppers or other people. This is because they could sell it or log into accounts and use them for stealing money or identities. In order to achieve this, we need to encrypt the data stored in the hard drive, so that only the possessor of the key can easily read the information stored, while all the others are going to read only encrypted data. Obviously, according to that, all the data management must be done by the client, otherwise any malicious person can easily retrieve it and use it for any malicious intention. All the methods analysed here relies on encrypting data in transit. In the end of this project we analyse 2 theoretical and practical methods for the creation of the above databases and then we tests them with 3 datasets and with 10, 100 and 1000 queries. The scope of this work is to retrieve a trend that can be useful for future works based on this project.
Resumo:
Dissertação apresentada à Escola Superior de Educação de Santarém para a obtenção do grau de mestre em Ciências da educação - Supervisão e orientação pedagógica
Resumo:
INTRODUCTION: Professionalism is a key attribute for health professionals. Yet, it is unknown how much faculty development is directed toward skills and behaviours of faculty professionalism. Faculty professionalism includes boundaries in teacher-student relationships, self-reflection, assuring one's own fitness for duty, and maintaining confidentiality when appropriate. METHODS: For five years, we have incorporated faculty professionalism as a routine agenda item for the monthly Physician Assistant Programme faculty meetings, allowing faculty members to introduce issues they are comfortable sharing or have questions about. We also have case discussions of faculty professionalism within faculty meetings every three months. RESULTS: Faculty professionalism is important in the daily work lives of faculty members and including this as part of routine agendas verifies its importance. A faculty survey showed that a majority look forward to the quarterly faculty professionalism case discussions. These have included attempted influence in the admissions process, student/faculty social boundaries, civic professionalism, students requesting medical advice, and self-disclosure. CONCLUSION: A preventive approach works better than a reactionary approach to faculty missteps in professionalism. Routine discussion of faculty professionalism normalizes the topic and is helpful to both new and experienced faculty members. We recommend incorporation of faculty professionalism as a regular agenda item in faculty meetings.
Resumo:
Inequalities in oral healthcare service provision to people with special health needs have been reported in the Republic of Ireland. These include higher unmet dental treatment needs and longer waiting period to access routine dental treatment than the general population. Aim: The aims of this study were to determine the groups of patients with special needs which pose a challenge to manage in the dental surgery and to examine perceived barriers to the care of these patients. We aimed to determine whether postgraduate training in the management of these patients increases the practitioners’ frequency of treatment and their desire for further training in this area. Methods: A questionnaire was used to survey 326 randomly selected dentists from the Dental Council’s register of dentists. Questionnaire and information sheets explaining the purpose of the survey, confidentiality and anonymity of the responses were posted to the dentists. Results: The results showed that children with intellectual disability posed the biggest challenge for dentists to manage in the dental surgery. Behaviour management issues and the degree of disability were perceived by many dentists as factors that would have high effects on their willingness to treat patients with special needs. Dentists who have postgraduate training in the management of patients with special needs were significantly more willing to treat these patients and to seek additional training in the future. Conclusion: There are links between the training and the willingness of practitioners to undertake dental treatment or patients with special healthcare needs.
Resumo:
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Since, key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution by using MATLAB (analytically) and by simulation (OMNET++ simulator) to show that it has less memory requirement and has good network connectivity and resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.
Resumo:
As one of the most successfully commercialized distributed energy resources, the long-term effects of microturbines (MTs) on the distribution network has not been fully investigated due to the complex thermo-fluid-mechanical energy conversion processes. This is further complicated by the fact that the parameter and internal data of MTs are not always available to the electric utility, due to different ownerships and confidentiality concerns. To address this issue, a general modeling approach for MTs is proposed in this paper, which allows for the long-term simulation of the distribution network with multiple MTs. First, the feasibility of deriving a simplified MT model for long-term dynamic analysis of the distribution network is discussed, based on the physical understanding of dynamic processes that occurred within MTs. Then a three-stage identification method is developed in order to obtain a piecewise MT model and predict electro-mechanical system behaviors with saturation. Next, assisted with the electric power flow calculation tool, a fast simulation methodology is proposed to evaluate the long-term impact of multiple MTs on the distribution network. Finally, the model is verified by using Capstone C30 microturbine experiments, and further applied to the dynamic simulation of a modified IEEE 37-node test feeder with promising results.
Resumo:
Central to reaching peace and settlement in Northern Ireland was a sequence of British–Irish intergovernmental discussions and negotiations, dating from the beginning of the 1980s. British and Irish state cooperation and intervention has remained central to the stability of the settlement reached in 1998. The motives of state actors, however, have been unclear, and the role of the state in the political process has been the subject of some scholarly controversy. This paper looks at the types of evidence that can help to resolve such questions. It focuses on the value of elite interviews, arguing that they can constitute an important and irreplaceable body of evidence when used critically, but it also highlights the risks of excessive reliance on this type of source. It goes on to describe a major research project in University College Dublin whose aim was to record the experiences and interpretations of the actors who engaged in British–Irish negotiations over the last four decades. It discusses the resulting elite interviews and witness seminars and the methodological and ethical difficulties encountered. It describes how these were overcome, and outlines the conditions of confidentiality imposed.
Resumo:
Full Text / Article complet
Resumo:
Introdução: Uma grande parte de todas as consultas de medicina dentária realizadas em Portugal ocorre em prestadores de natureza privada, consequentemente a acessibilidade, principalmente entre os estatutos socioeconomicamente mais desfavorecido é dificultada. As crianças e os jovens são um grupo especial da população que necessita de particular atenção e proteção por parte dos serviços governamentais, investir na sua saúde e no seu bem‐estar garante ganhos de saúde ao longo das suas vidas. Tendo isto em conta, foi criado o Programa Nacional de Promoção de Saúde Oral (PNPSO). Os objetivos principais deste programa consistem na redução da incidência de doenças orais, melhoria dos conhecimentos e comportamentos sobre saúde oral e a promoção da equidade na prestação de cuidados de saúde oral. Desta forma são emitidos cheques-dentista para determinados grupos populacionais, sendo eles crianças e jovens com idade inferior a 16 anos, gravidas a ser seguidas no SNS, beneficiários do complemento solidário para idosos, portadores de Sida/VIH, e consultas no âmbito da prevenção do cancro oral. Participantes e Métodos: Realizou-se um estudo observacional transversal onde a população em análise foi constituída pelos responsáveis dos alunos de 10 e 13 anos abrangidos pelo PNPSO que no ano letivo 2013/2014 frequentaram o Colégio de Vizela e o Instituto Silva Monteiro. A recolha de dados foi feita através de um inquérito realizado por escrito com questões relativas à utilização dos documentos no âmbito do PNPSO. Em ambas as situações esteve presente o consentimento informado e garantiu-se a total confidencialidade dos dados. Os dados recolhidos neste estudo foram submetidos a uma análise estatística recorrendo ao software IBM SPSS Statistics v22. Resultados: Na população analisada quando questionados “O seu educando já tinha tido alguma consulta de medicina dentária?” 88,5% responderam “sim”, desses a maioria referiu que o médico dentista onde essas consultas foram realizadas estava incluído no programa (81,5%). Uma grande parte dos inquiridos referiu a escola como fator que lhes deu a conhecer o programa (sendo que 90,2% incluíram essa opção nas suas respostas). Quando questionados se fizeram tratamentos fora do programa 54,9% responderam que não. Em relação à utilização do(s) cheque(s)-dentista a que tiveram direito, 86,1% dos beneficiários referiu ter utilizado, desses, 67,6% mencionou a conclusão dos tratamentos com as consultas no âmbito do programa. Quando questionados o que os levou a escolher o consultório onde os tratamentos incluídos no PNPSO foram realizados, 57,9% do total de respostas foram para o “conhecimento prévio do médico dentista”. Na opinião de grande parte dos inquiridos (97,5%), o cheque-dentista é um incentivo para cuidados de saúde oral. No futuro, 99,2% dos beneficiários referiram que irão realizar os tratamentos a que tenham direito com o PNPSO. Conclusão: Com este estudo foi possível observar que grande parte dos beneficiários analisados utilizou o(s) cheque(s)-dentista a que tiveram direito. É possível observar que a maioria dos utentes referiram ter beneficiado com o programa, e afirmam que este constitui um meio de promoção e prevenção de doenças orais futuras e um incentivo para os cuidados de saúde oral. O processo de divulgação do PNPSO foi na sua maioria realizado pelas escolas, em que ambas se revelaram competentes a dar a conhecer o programa aos beneficiários.
Resumo:
The +Contigo Project is a longitudinal research project based on a multilevel network intervention aimed at promoting mental health and well-being and preventing suicidal behaviors. Students participate in social skills training sessions on the stigma of mental disorders, adolescence, self-esteem, problem-solving skills, and wellbeing. Problem statement: To identify the qualitative impact of the +Contigo Project. Objectives: To identify the importance of the project for students, the problem situations which it helped to solve, and its impact on an individual level. Research methods: Content analysis (Bardin, 2009) with a posteriori categorical identification. Semi-structured interview guide with 5 questions. A convenience sample of 16 students, from three schools of one school cluster in the Center Region of Portugal, was used. The ethical aspects of parental consent, voluntary participation and data confidentiality were addressed. Findings: Fourteen categories emerged from the data analysis. The answers to Question 4 'How was this project important to you?' were particularly relevant. Students mentioned that it improved their self-esteem by increasing self-confidence and interpersonal skills, and that it increased their reflection and awareness on problems with which they learned how to cope during the sessions. Conclusions: All interviewees considered that the +Contigo project helped them to solve problems, improve their interpersonal skills and cope with the adolescence period. Students improved their self-esteem and self-knowledge, and were able to apply what they had learned in the sessions in their daily lives. We concluded that the project had a positive impact on the students' mental health.
Resumo:
Dissertação apresentada à Escola Superior de Educação de Santarém para a obtenção do grau de mestre em Ciências da educação - Supervisão e orientação pedagógica
Resumo:
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases. Intruders becoming smarter in obfuscating web requests to evade detection combined with increasing volumes of web traffic from the Internet of Things (IoT), cloud-hosted and on-premise business applications have made it evident that the existing approaches of mostly static signature lack the ability to cope with novel signatures. A SQLIA detection and prevention solution can be achieved through exploring an alternative bio-inspired supervised learning approach that uses input of labelled dataset of numerical attributes in classifying true positives and negatives. We present in this paper a Numerical Encoding to Tame SQLIA (NETSQLIA) that implements a proof of concept for scalable numerical encoding of features to a dataset attributes with labelled class obtained from deep web traffic analysis. In the numerical attributes encoding: the model leverages proxy in the interception and decryption of web traffic. The intercepted web requests are then assembled for front-end SQL parsing and pattern matching by applying traditional Non-Deterministic Finite Automaton (NFA). This paper is intended for a technique of numerical attributes extraction of any size primed as an input dataset to an Artificial Neural Network (ANN) and statistical Machine Learning (ML) algorithms implemented using Two-Class Averaged Perceptron (TCAP) and Two-Class Logistic Regression (TCLR) respectively. This methodology then forms the subject of the empirical evaluation of the suitability of this model in the accurate classification of both legitimate web requests and SQLIA payloads.
Resumo:
Dissertação apresentada à Escola Superior de Tecnologia do Instituto Politécnico de Castelo Branco para cumprimento dos requisitos necessários à obtenção do grau de Mestre em Desenvolvimento de Software e Sistemas Interativos, realizada sob a orientação científica Professor Doutor Osvaldo Arede dos Santos, do Instituto Politécnico de Castelo Branco.