919 resultados para information control


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Medial prefrontal cortical areas have been hypothesized to underlie altered contextual processing in posttraumatic stress disorder (PTSD). We investigated brain signaling of contextual information in this disorder. Eighteen PTSD subjects and 16 healthy trauma-exposed subjects underwent a two-day fear conditioning and extinction paradigm. On day 1, within visual context A, a conditioned stimulus (CS) was followed 60% of the time by an electric shock (conditioning). The conditioned response was then extinguished (extinction learning) in context B. On day 2, recall of the extinction memory was tested in context B. Skin conductance response (SCR) and functional magnetic resonance imaging (fMRI) data were collected during context presentations. There were no SCR group differences in any context presentation. Concerning fMRI data, during late conditioning, when context A signaled danger, PTSD subjects showed dorsal anterior cingulate cortical (dACC) hyperactivation. During early extinction, when context B had not yet fully acquired signal value for safety, PTSD subjects still showed dACC hyperactivation. During late extinction, when context B had come to signal safety, they showed ventromedial prefrontal cortex (vmPFC) hypoactivation. During early extinction recall, when context B signaled safety, they showed both vmPFC hypoactivation and dACC hyperactivation. These findings suggest that PTSD subjects show alterations in the processing of contextual information related to danger and safety. This impairment is manifest even prior to a physiologically-measured, cue-elicited fear response, and characterized by hypoactivation in vmPFC and hyperactivation in dACC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Genomic islands (GEI) comprise a recently recognized large family of potentially mobile DNA elements and play an important role in the rapid differentiation and adaptation of bacteria. Most importantly, GEIs have been implicated in the acquisition of virulence factors, antibiotic resistances or toxic compound metabolism. Despite detailed information on coding capacities of GEIs, little is known about the regulatory decisions in individual cells controlling GEI transfer. Here, we show how self-transfer of ICEclc, a GEI in Pseudomonas knackmussii B13 is controlled by a series of stochastic processes, the result of which is that only a few percent of cells in a population will excise ICEclc and launch transfer. Stochastic processes have been implicated before in producing bistable phenotypic transitions, such as sporulation and competence development, but never before in horizontal gene transfer (HGT). Bistability is instigated during stationary phase at the level of expression of an activator protein InrR that lays encoded on ICEclc, and then faithfully propagated to a bistable expression of the IntB13 integrase, the enzyme responsible for excision and integration of the ICEclc. Our results demonstrate how GEI of a very widespread family are likely to control their transfer rates. Furthermore, they help to explain why HGT is typically confined to few members within a population of cells. The finding that, despite apparent stochasticity, HGT rates can be modulated by external environmental conditions provides an explanation as to why selective conditions can promote DNA exchange.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

OBJECTIVE: To provide information on the effects of alcohol and tobacco on laryngeal cancer and its subsites. METHODS: This was a case-control study conducted between 1992 and 2000 in northern Italy and Switzerland. A total of 527 cases of incident squamous-cell carcinoma of the larynx and 1297 hospital controls frequency-matched with cases on age, sex, and area of residence were included. Odds ratios (ORs) and corresponding 95% confidence intervals (CIs) were estimated using multiple logistic regression. RESULTS: In comparison with never smokers, ORs were 19.8 for current smokers and 7.0 for ex-smokers. The risk increased in relation to the number of cigarettes (OR = 42.9 for > or = 25 cigarettes/day) and for duration of smoking (OR = 37.2 for > or = 40 years). For alcohol, the risk increased in relation to number of drinks (OR = 5.9 for > or = 56 drinks per week). Combined alcohol and tobacco consumption showed a multiplicative (OR = 177) rather than an additive risk. For current smokers and current drinkers the risk was higher for supraglottis (ORs 54.9 and 2.6, respectively) than for glottis (ORs 7.4 and 1.8) and others subsites (ORs 10.9 and 1.9). CONCLUSIONS: Our study shows that both cigarette smoking and alcohol drinking are independent risk factors for laryngeal cancer. Heavy consumption of alcohol and cigarettes determined a multiplicative risk increase, possibly suggesting biological synergy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Diplomityö liittyy Accenturen projektiin, jossa kehitettiin asiakkaalle CMS Web-portaali, jonka tarkoitus on tarjota mekanismi tuote- ja kampanjainformaation luontiin ja hallintaan sekä hallita niihin liittyviä budjettiprosesseja yrityksen Intranetissä. Työn tavoitteena on kuvata CMS-portaalin kehitysprosessia ja koota projektin aikana saadut opit ja parannusehdotukset. Tavoitteena on myös esittää ideoita havaittujen ongelmien ehkäisemiseksi tulevissa projekteissa. Portaalin kehitysprojektinsuurimmat haasteet liittyivät tietojärjestelmien kehitysympäristöihin, portaali- ja sisällönhallintapuolen yhdistämiseen sekä tiimikehitykseen. Kun portaaliprojekti tehdään asiakkaan tiloissa, ei täyttä kontrollia kehitysympäristöistä voi saada. Jos kehitysympäristöjen kanssa on ongelmia, niistä on syytä kommunikoida selkeästi ja ammattimaisesti asiakkaan kehitysympäristöistä vastaavalle taholle. Yhteistyö ja hyvät henkilökohtaiset suhteet asiakkaan kanssaovat tärkeitä. Jos portaalin sisällönhallintatarpeet eivät ole erittäin rajoittuneet, on suositeltavaa käyttää erillistä sisällönhallintaohjelmistoa portaalin sisällön hallitsemiseksi. Pienemmillekin projekteille tämä mahdollistaa paremmat laajennusmahdollisuudet. Portaali- ja sisällönhallintapuolenyhdistäminen kannattaa tehdä ohjelmistojen tarjoajien ohjeiden mukaan ja yleisiä menettelytapoja noudattaen. Yleisillä menettelytavoilla tarkoitetaan portaalinja sisällönhallinnan yhdistämisessä sitä, että portaali vastaanottaa sisältöä sisällönhallintajärjestelmältä, mutta kaikki sisällön muokkaustoimenpiteet tehdään sisällönhallintajärjestelmän käyttöliittymän kautta. Jos mukautettuja menettelytapoja on käytettävä, näiden kehittämiselle on varattava niiden vaatima aika. Tällöin Web-palveluiden käyttöä kannattaa harkita, koska Web-palvelut auttavat ohjelmistojen yhdistämisessä etenkin, kun yhdistäminen tehdään mukautetusti. Kun portaali tehdään käyttäen tiimikehitystyötä, on käytettävä myös versionhallintajärjestelmää, jolla estetään päällekkäisten muutosten mahdollisuus. Kehitysprosessin yhdenmukaistamiseksi on erittäin suositeltavaa tehdä yleinen kehitysohjedokumentti. Lisäksi on huolehdittava siitä, että kaikki kehittäjät noudattavat yleisiä kehitysohjeita, jotta yhdenmukaisuuden mukanaan tuomat edut saavutetaan mahdollisimman hyvin.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tutkimuksen tarkoituksena on kuvata ja ymmärtää kuinka sisäisiä kehityshankkeita voidaan hallita onnistuneesti kun toimitaan nopeasti muuttuvassa ympäristössä. Tutkimus kuvailee etenkin projekteille tärkeitä menestymistekijöitä, kuten suunnittelu, kontrollointi ja päätöksenteko. Tutkimus selvittää yleisimmät ongelma-alueet case-organisaation sisäisten kehityshankkeiden hallinnassa. Tutkimus on luonteeltaan laadullinen tutkimus, jossa tutkimusmenetelmänä on käytetty tapaustutkimusta. Empiirisessa osassa käsittellään case-organisaation sisäisiä informaatioteknologia-hankkeita (IT) ja uusien konseptien kehityshankkeita (NCD). iSisäisten kehityshankkeiden erilaisuuden ymmärtäminen oli tutkimuksen tärkein tulos. Tutkimuksen empiirinen osio osoitti sen, että epävarmuudella on erittäin suuri vaikutus projektihallintaan sekä projektin kontrollointiin. Case-organisaation IT-projektien onnistuminen riippuu organisaatiomuu-toksen onnistumisesta. Asiakkaisiin ja markkinoihin liittyvät epävarmuudet ovat vaikuttavimmat NCD projektien epävarmuuksista. Näillä epävarmuuk-sil­la on vaikutusta projektihallintaan jonka myötä NCD projektit juuttuvat useim­mi­ten noidankehiin tai ne lopetetaan jo aikaisessa vaiheessa.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective information for the groups exposed to the disease and the public in general is the only step that is currently possible in the prevention of AIDS. A certain number of information and support actions have been developed as a consequence of the appearance of AIDS in Switzerland. The AIDS information hot-line at the CHUV is one of these actions with the aim of orienting the information according to demand and examining the utility of this means, we made a prospective evaluation of the calls (between 23 October 1985-inception of the line and 31 March 1986). Out of a total of 535 calls, 317 requests for appointments (tests, consultation) or written documentation, and 218 (41%) were transferred to the doctor; 39% of the calls came from people who were directly concerned (ill, with a positive test, exposed groups), 11% from health professionals, and 47% from the general public. 56% of the calls were concerned with transmission of the disease (sexual, blood, indirect), 22% with the meaning of the detection test, 22% referred to the symptoms of the disease. According to the doctor's estimate, although the standard of knowledge is satisfactory in 55% of the cases, a considerable number of false ideas, that generate irrational fear, still persist. This hot-line thus provides a sympathetic ear and individual support, particularly for the exposed groups, rather than information about the disease. The existence of this action, therefore, appears justified, but must be integrated into a global strategy of information promotion.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this dissertation is to increase the understanding and knowledge of field sales management control systems (i.e. sales managers monitoring, directing, evaluating and rewarding activities) and their potential consequences on salespeople. This topic is important because research conducted in the past has indicated that the choice of control system type can on the other hand have desirable consequences, such as high levels of motivation and performance, and on the other hand leadto harmful unintended consequences, such as opportunistic or unethical behaviors. Despite the fact that marketing and sales management control systems have been under rigorous research for over two decades, it still is at a very early stage of development, and several inconsistencies can be found in the research results. This dissertation argues that these inconsistencies are mainly derived from misspecification of the level of analysis in the past research. These different levels of analysis (i.e. strategic, tactical, and operational levels) involve very different decision-making situations regarding the control and motivation of sales force, which should be taken into consideration when conceptualizing the control. Moreover, the study of salesperson consequences of a field sales management control system is actually a cross-level phenomenon, which means that at least two levels of analysis are simultaneously involved. The results of this dissertation confirm the need to re-conceptualize the field sales management control system concept. It provides empirical evidence for the assertion that control should be conceptualized with more details atthe tactical/operational level of analysis than at the strategic levelof analysis. Moreover, the results show that some controls are more efficiently communicated to field salespeople than others. It is proposed that this difference is due to different purposes of control; some controls aredesigned for influencing salespersons' behavior (aim at motivating) whereas some controls are designed to aid decision-making (aim at providing information). According to the empirical results of this dissertation, the both types of controls have an impact to the sales force, but this impactis not as strong as expected. The results obtained in this dissertation shed some light to the nature of field sales management control systems, and their consequences on salespeopl

Relevância:

30.00% 30.00%

Publicador:

Resumo:

1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

En España, las plagas de los espacios verdes urbanos suponen cada año un notable esfuerzo de control y la aplicación de plaguicidas es la estrategia de control empleada casi exclusivamente, con los subsiguientes riesgos que conlleva para las personas, animales y el medio ambiente. El control integrado es una alternativa pero requiere, para poder ser aplicada, un conocimiento profundo de las especies-plaga implicadas, de su biología, dinámica de poblaciones, daños, metodologías de muestreo y posibles sistemas de control. Esta información es difícil de encontrar en España debido a que existen pocos trabajos publicados sobre plagas de zonas verdes urbanas llevados a cabo de una forma sistematizada y a medio o largo plazo. En el presente artículo se analizan los condicionantes del control integrado de plagas en espacios verdes urbanos y se presenta un ejemplo, a partir de los estudios llevados a cabo en la ciudad de Lleida durante el período 2001-2003, de cómo la información básica necesaria para la implementación de posibles programas de control integrado puede ser obtenida.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This empirical study consists in an investigation of the effects, on the development of Information Problem Solving (IPS) skills, of a long-term embedded, structured and supported instruction in Secondary Education. Forty secondary students of 7th and 8th grades (13–15 years old) participated in the 2-year IPS instruction designed in this study. Twenty of them participated in the IPS instruction, and the remaining twenty were the control group. All the students were pre- and post-tested in their regular classrooms, and their IPS process and performance were logged by means of screen capture software, to warrant their ecological validity. The IPS constituent skills, the web search sub-skills and the answers given by each participant were analyzed. The main findings of our study suggested that experimental students showed a more expert pattern than the control students regarding the constituent skill ‘defining the problem’ and the following two web search sub-skills: ‘search terms’ typed in a search engine, and ‘selected results’ from a SERP. In addition, scores of task performance were statistically better in experimental students than in control group students. The paper contributes to the discussion of how well-designed and well-embedded scaffolds could be designed in instructional programs in order to guarantee the development and efficiency of the students’ IPS skills by using net information better and participating fully in the global knowledge society.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Arkitus on kartongin jatkojalostusmuoto, jonka tehokkuus muodostuu monen tekijän vaikutuksesta. Tämän työn tavoitteena oli parantaa arkitustehokkuutta tutkitussa kahden folioleikkurin arkittamossa tuotannonsuunnittelun ja tuotannonohjauksen kehittämisellä. Kartonkitehtaan sisäisessä jalostusketjussa arkitus on viimeinen vaihe, mikä tekee siitä pitkälti riippuvaisen edeltävistä konevaiheista, eli kartonkikoneista ja PE-päällystyskoneista. Pelkkä arkituksen tuotannonsuunnittelun huomiointi ei siis vielä takaa hyvää lopputulosta arkitustehokkuuden kannalta. Folioarkitustoiminta on hyvin asiakassuuntautunutta. Arkkikoot määräytyvät asiakkaiden omien tarpeiden perusteella, jolloin eri arkkikokojen kokonaismäärä kasvaa huomattavan suureksi. Viime vuosien trendinä on ollut tilauseräkokojen pieneneminen. Näiden tekijöiden yhteisvaikutuksena arkituksen tuotantoprosessille on ominaista erilaisten asetusten aiheuttama katkonaisuus. Lisäksi pelkästään yhden millimetrin muutos arkin leveydessä voi usein vaikuttaa arkitustehokkuuteen hyvinkin merkittävästi. Näistä syistä arkituksen tuotannonsuunnittelun apuvälineeksi tarvitaan tarkkuuteen ja joustavuuteen kykenevää tietojärjestelmää. Tehokkaan tuotannonohjauksen tueksi tarvitaan lisäksi erilaisia leikkuri- ja kartonkilaatukohtaisia raportteja. Työn teoriaosassa käsitellään tarkemmin arkitustoiminnan ominaisuuksia ja sen tehokkuuteen vaikuttavia tekijöitä. Lisäksi käsitellään tuotannonsuunnittelun ja tuotannonohjauksen periaatteita ja toimintoja.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

After incidentally learning about a hidden regularity, participants can either continue to solve the task as instructed or, alternatively, apply a shortcut. Past research suggests that the amount of conflict implied by adopting a shortcut seems to bias the decision for vs. against continuing instruction-coherent task processing. We explored whether this decision might transfer from one incidental learning task to the next. Theories that conceptualize strategy change in incidental learning as a learning-plus-decision phenomenon suggest that high demands to adhere to instruction-coherent task processing in Task 1 will impede shortcut usage in Task 2, whereas low control demands will foster it. We sequentially applied two established incidental learning tasks differing in stimuli, responses and hidden regularity (the alphabet verification task followed by the serial reaction task, SRT). While some participants experienced a complete redundancy in the task material of the alphabet verification task (low demands to adhere to instructions), for others the redundancy was only partial. Thus, shortcut application would have led to errors (high demands to follow instructions). The low control demand condition showed the strongest usage of the fixed and repeating sequence of responses in the SRT. The transfer results are in line with the learning-plus-decision view of strategy change in incidental learning, rather than with resource theories of self-control.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tavoitteena diplomityössä oli kuvata projektiliiketoimintaa harjoittavan yrityksen informaatio- ja materiaalivirrat toimitusprojekteissa. Selvitys haluttiin tehdä tulevia kehitysprojekteja varten. Diplomityö toteutettiin kahessa osassa: laatimalla aiheeseen liittyvä teoriakatsaus ja kartoittamalla todellinen tilanne yrityksen sisällä.Teoriaosassa kuvattiin tarkastelualue ja projektiliiketoiminnan erityispiirteitä sekä käsiteltiin tietojärjestelmiä ja materiaalivirran hallintaan liittyviä asioita. Yrityksen informaatio- ja materiaalivirtojen nykytila kartoitettiin laatimalla vuokaaviot kolmen esimerkkituotteen toimitusprojekteista. Kaaviot laadittiin yrityksen sisäisten dokumenttien ja kvalitatiivisten haastattelujen pohjalta. Kaavioiden sisältöä täydennettiin taulukoimalla kaavioissa esiintyvien dokumettien sisältöä. Työn tuloksena muodostui kuva tiedonkäsittelyn nykytilasta myynti- ja toimitusprojekteissa, pelkistetty visio tulevaisuuden tietojärjestelmien rooleista sekä ehdotuksia tulevia kehitysprojekteja varten.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tässä diplomityössä käsitellään henkilökohtaisen tiedon saannin kontrollointia ja tiedon kuvaamista. Työn käytännön osuudessa suunniteltiin XML –malli henkilökohtaisen tiedon kuvaamiseen. Henkilökohtaisten tietojen käyttäminen mahdollistaa henkilökohtaisen palvelun tarjoamisen ja myös palvelun automatisoinnin käyttäjälle. Henkilökohtaisen tiedon kuvaaminen on hyvin oleellista, jotta palvelut voivat kysellä ja ymmärtää tietoja. Henkilökohtaiseen tietoon vaikuttaa erilaisia tekijöitä, jotka on myös otettava huomioon tietoa kuvattaessa. Henkilökohtaisen tiedon leviäminen eri palveluiden tarjoajille tuo mukanaan myös riskejä. Henkilökohtaisen tiedon joutuminen väärän henkilön käsiin saattaa aiheuttaa vakaviakin ongelmia tiedon omistajalle. Henkilökohtaisen tiedon turvallisen ja luotettavan käytettävyyden kannalta onkin hyvin oleellista, että käyttäjällä on mahdollisuus kontrolloida kenelle hän haluaa luovuttaa mitäkin tietoa.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Lyhyen kantaman radiotekniikoiden hyödyntäminen mahdollistaa uudenlaisten paikallisten palveluiden käytön ja vanhojen palveluiden kehittämisen. Kulunvalvonta on päivittäisenä palveluna valittu työn esimerkkisovellukseksi. Useita tunnistus- ja valtuutustapoja tutkitaan, ja julkisen avaimen infrastruktuuri on esitellään tarkemmin. Langattomat tekniikat Bluetooth, Zigbee, RFID ja IrDA esitellän yleisellä tasolla langattomat tekniikat –luvussa. Bluetooth-tekniikan rakennetta, mukaan lukien sen tietoturva-arkkitehtuuria, tutkitaan tarkemmin. Bluetooth-tekniikkaa käytetään työssä suunnitellun langattoman kulunvalvontajärjestelmän tietojen siirtoon. Kannettava päätelaite toimii käyttäjän henkilökohtaisena luotettuna laitteena, jota voi käyttää avaimena. Käyttäjän tunnistaminen ja valtuuttaminen perustuu julkisen avaimen infrastruktuuriin. Ylläpidon allekirjoittamat varmenteet sisältävät käyttäjän julkisen avaimen lisäksi tietoa hänestä ja hänen oikeuksistaan. Käyttäjän tunnistaminen kulunvalvontapisteissä tehdään julkisen ja salaisen avaimen käyttöön perustuvalla haaste-vastaus-menetelmällä. Lyhyesti, järjestelmässä käytetään Bluetooth-päätelaitteita langattomina avaimina.