854 resultados para Hovi, Jon: Games, threats and treaties
Resumo:
G protein-coupled receptors (GPCRs) play important physiological roles transducing extracellular signals into intracellular responses. Approximately 50% of all marketed drugs target a GPCR. There remains considerable interest in effectively predicting the function of a GPCR from its primary sequence.
Resumo:
For the last several years, mobile devices and platform security threats, including wireless networking technology, have been top security issues. A departure has occurred from automatic anti-virus software based on traditional PC defense: risk management (authentication and encryption), compliance, and disaster recovery following polymorphic viruses and malware as the primary activities within many organizations and government services alike. This chapter covers research in Turkey as a reflection of the current market – e-government started officially in 2008. This situation in an emerging country presents the current situation and resistances encountered while engaging with mobile and e-government interfaces. The authors contend that research is needed to understand more precisely security threats and most of all potential solutions for sustainable future intention to use m-government services. Finally, beyond m-government initiatives' success or failure, the mechanisms related to public administration mobile technical capacity building and security issues are discussed.
Resumo:
Following the end of the Cold War and the ensuing changes to the international landscape, thinking about security has tended to become more discursive and interpretative in nature. What counts as security has increasingly derived from security discourses (that is, 'securitisation') and uncertainty about the multi-faceted future facing various countries and regions. Within this post-Cold War discourse, the Western Mediterranean has emerged as a region fraught with latent and manifest threats in the economic, political, societal and military sectors. Improved access to EU markets for Maghrebi exports; the security of energy supplies to the EU from Algeria and Libya; lack of democracy and the advance of political Islam; the flow of northward migration and worries about law and order in France, Italy and Spain; the growth in military expenditure and weapons proliferation in the Maghreb; all have been central to the securitisation agenda. However, this agenda has often lacked credibility especially when inter-linkages have purportedly been established between economic underdevelopment and political instability, between the advance of political Islam and the threat to energy supplies, or between immigration and the threat to national identity. Such inter-sectoral linkages distract from the credibility of those 'securitisation instances' which correspond to reality; the former linkages have often been exploited by extremist politicians in south-west European countries as well as by regimes in the Maghreb to advance their respective interests. Thus, securitisation may defeat its main purpose; it may generate responses out of keeping with the aims proclaimed at the outset, aims centred on the countering of real threats and the ensuring of greater stability.
Resumo:
The number of interoperable research infrastructures has increased significantly with the growing awareness of the efforts made by the Global Earth Observation System of Systems (GEOSS). One of the Societal Benefit Areas (SBA) that is benefiting most from GEOSS is biodiversity, given the costs of monitoring the environment and managing complex information, from space observations to species records including their genetic characteristics. But GEOSS goes beyond simple data sharing to encourage the publishing and combination of models, an approach which can ease the handling of complex multi-disciplinary questions. It is the purpose of this paper to illustrate these concepts by presenting eHabitat, a basic Web Processing Service (WPS) for computing the likelihood of finding ecosystems with equal properties to those specified by a user. When chained with other services providing data on climate change, eHabitat can be used for ecological forecasting and becomes a useful tool for decision-makers assessing different strategies when selecting new areas to protect. eHabitat can use virtually any kind of thematic data that can be considered as useful when defining ecosystems and their future persistence under different climatic or development scenarios. The paper will present the architecture and illustrate the concepts through case studies which forecast the impact of climate change on protected areas or on the ecological niche of an African bird.
Resumo:
Requirements are sensitive to the context in which the system-to-be must operate. Where such context is well-understood and is static or evolves slowly, existing RE techniques can be made to work well. Increasingly, however, development projects are being challenged to build systems to operate in contexts that are volatile over short periods in ways that are imperfectly understood. Such systems need to be able to adapt to new environmental contexts dynamically, but the contextual uncertainty that demands this self-adaptive ability makes it hard to formulate, validate and manage their requirements. Different contexts may demand different requirements trade-offs. Unanticipated contexts may even lead to entirely new requirements. To help counter this uncertainty, we argue that requirements for self-adaptive systems should be run-time entities that can be reasoned over in order to understand the extent to which they are being satisfied and to support adaptation decisions that can take advantage of the systems' self-adaptive machinery. We take our inspiration from the fact that explicit, abstract representations of software architectures used to be considered design-time-only entities but computational reflection showed that architectural concerns could be represented at run-time too, helping systems to dynamically reconfigure themselves according to changing context. We propose to use analogous mechanisms to achieve requirements reflection. In this paper we discuss the ideas that support requirements reflection as a means to articulate some of the outstanding research challenges.
Resumo:
The aim of this research is to consider the possible effect of an emerging technology platform on the uptake of online shopping: interactive (digital) Television (iTV), which enables viewers to select a variety of viewing options, publicity materials, games, entertainment and more recently shopping. An augmented version of the original TAM is applied to this study. Two new constructs are considered namely access and awareness together with perceived ease of use, perceived usefulness, perceived enjoyment and security. The results show that indeed the augmented TAM can be used as a predictive model for the adoption of iTV as an online shopping platform. It is concluded that access, perceived ease of use, perceived enjoyment and perceived usefulness are significant factors to determine the consumers’behavioural intentions towards the use of digital TV as a new shopping platform. However, awareness and security are considered to be insignificant with no effect on consumers’ behavioural intentions towards the new shopping medium.
Resumo:
Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).
Resumo:
The paper focuses on the rapid development of the digital culture and the challenges it imposes to human creativity. It analyses e-learning, digital entertainment, digital art and the issues of creativity and improvisation. It also presents a classification of the levels in the creative structure including hardware and software tools; product developers; creators and end users. Special attention is paid to the advantages of the new digital culture and the responsibilities of all people who create it or use it. We conclude that more attention should be paid to the threats and to ways of boosting positive creativity in the various fields of application of information and communication technologies.
Resumo:
This chapter introduces Native Language Identification (NLID) and considers the casework applications with regard to authorship analysis of online material. It presents findings from research identifying which linguistic features were the best indicators of native (L1) Persian speakers blogging in English, and analyses how these features cope at distinguishing between native influences from languages that are linguistically and culturally related. The first chapter section outlines the area of Native Language Identification, and demonstrates its potential for application through a discussion of relevant case history. The next section discusses a development of methodology for identifying influence from L1 Persian in an anonymous blog author, and presents findings. The third part discusses the application of these features to casework situations as well as how the features identified can form an easily applicable model and demonstrates the application of this to casework. The research presented in this chapter can be considered a case study for the wider potential application of NLID.
Resumo:
The essay - Managing Strategic Change – by K. Michael Haywood, Associate Professor, School of Hotel and Food Administration, University of Guelph, is initially characterized by Haywood as: “The ability to manage strategic change is critical for hospitality industry executives today. Executives must be capable of creating a vision of the future and implementing its direction. The author gives avenues for that management process.” “The effective management of strategic change is the major challenge confronting hospitality executives,” says Associate Professor Haywood. “Responding to a rapidly changing business environment and constantly evolving competitive threats and opportunities requires executives who can anticipate and plan for change.” According to Professor Haywood, the management of strategic change is a future imperative for hospitality executives. Implementing those changes will be even more difficult. “Survival and growth for many hospitality firms during the next decade will depend on the development of new strategic visions which can provide significant competitive advantages,” he says. “Strategies for managing costs and technology will be central to this task,” Haywood expands the thought. Haywood suggests two primary types of change hospitality executives should be aware of. First, is change that is anticipated, anticipatory change. Second, is the other more crucial type of change, strategic change in the face of crisis, or simply stated, reactive change. Professor Haywood describes the distinction between the two. In describing the approach that should be implemented in responding to an anticipatory change, Haywood says, “If time permits, and change is to be introduced gradually, pilots and trials should be run to assess the impact of the new strategy on the organization. These trials are used to create pockets of commitment throughout the corporation, build comfort levels with the new approach, and neutralize or win over potential opposition.” There are the obvious advantages to using an approach like the one described above, but there are disadvantages as well. Haywood discusses both. In addressing reactive change, Haywood offers that the process is a more - time is of the essence – condition, and that strong leadership and a firm hand on employee control is imperative. “Personal leadership, tough-mindedness, the willingness to ruthlessly abandon the familiar and the past, and the use of informal strategic levers are the hallmarks of sterling executive performance in such periods,” he says. “All these changes involve substantial technical, financial, and human risks,” Haywood wants you to know. “In order to make them, and still remain competitive, hospitality and travel-related corporations require executives capable of creating a vision of the future, able to sell that vision to their employees, and tough-minded enough to implement strategies to make the vision a reality.”
Resumo:
China's emergence as an economic powerhouse has often been portrayed as threatening to America's economic strength and to its very identity as "the global hegemon." The media's alarmist response to an economic competitor is familiar to those who remember US-Japanese relations in the 1980s. In order to better understand the basis of American threat perception, this study explores the independent and interactive impact of three variables (perceptions of the Other's capabilities, perceptions of the Other as a threat versus as an opportunity, and perceptions of the Other's political culture) on attitudes toward two different economic competitors (Japan 1977-1995 and China 1985-2011). Utilizing four methods (historical process tracing, public polling data analysis, social scientific experimentation, and content analysis), this study demonstrates that increases in the Other's economic capabilities have a much smaller impact on attitudes than is commonly believed. It further shows that while perceptions of threat/opportunity played a significant role in shaping attitudinal response toward Japan, perceptions of political culture are the most important factor driving attitudes toward China today. This study contributes to a better understanding of how states react to threats and construct negative images of their economic rivals. It also helps to explain the current Sino-American relationship and enables better predictions as to its potential future course. Finally, these findings contribute to cultural explanations of the democratic peace phenomenon and provide a boundary condition (political culture) for the liberal proposition that opportunity ameliorates conflict in the economic realm.^
Resumo:
In 2009, South American military spending reached a total of $51.8 billion, a fifty percent increased from 2000 expenditures. The five-year moving average of arms transfers to South America was 150 percent higher from 2005 to 2009 than figures for 2000 to 2004.[1] These figures and others have led some observers to conclude that Latin America is engaged in an arms race. Other reasons, however, account for Latin America’s large military expenditure. Among them: Several countries have undertaken long-prolonged modernization efforts, recently made possible by six years of consistent regional growth.[2] A generational shift is at hand. Armed Forces are beginning to shed the stigma and association with past dictatorial regimes.[3] Countries are pursuing specific individual strategies, rather than reacting to purchases made by neighbors. For example, Brazil wants to attain greater control of its Amazon rainforests and offshore territories, Colombia’s spending demonstrates a response to internal threats, and Chile is continuing a modernization process begun in the 1990s.[4] Concerns remain, however: Venezuela continues to demonstrate poor democratic governance and a lack of transparency; neighbor-state relations between Colombia and Venezuela, Peru and Chile, and Bolivia and Paraguay, must all continue to be monitored; and Brazil’s military purchases, although legitimate, will likely result in a large accumulation of equipment.[5] These concerns can be best addressed by strengthening and garnering greater participation in transparent procurement mechanism.[6] The United States can do its part by supporting Latin American efforts to embrace the transparency process. _________________ [1] Bromley, Mark, “An Arms Race in Our Hemisphere? Discussing the Trends and Implications of Military Expenditures in South America,” Brookings Institution Conference, Washington, D.C., June 3rd, 2010, Transcript Pgs. 12,13, and 16 [2] Robledo, Marcos, “The Rearmament Debate: A Chilean Perspective,” Power Point presentation, slide 18, 2010 Western Hemisphere Security Colloquium, Miami, Florida, May 25th-26th, 2010 [3] Yopo, Boris, “¿Carrera Armamentista en la Regiόn?” La Tercera, November 2nd, 2009, http://www.latercera.com/contenido/895_197084_9.shtml, accessed October 8th, 2010 [4] Walser, Ray, “An Arms Race in Our Hemisphere? Discussing the Trends and Implications of Military Expenditures in South America,” Brookings Institution Conference, Washington, D.C., June 3rd, 2010, Transcript Pgs. 49,50,53 and 54 [5] Ibid., Guevara, Iñigo, Pg. 22 [6] Ibid., Bromley, Mark, Pgs. 18 and 19
Resumo:
The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.
Resumo:
Relatório de Estágio apresentado para a obtenção do grau de Mestre em Desporto com especialização em Treino Desportivo
Resumo:
El objetivo de este estudio fue analizar la eficacia de las acciones de ataque de los cuatro primeros clasificados en balonmano masculino de los Juegos Suramericanos 2014 (ODESUR) y comparar con los principales torneos internacionales (JJOO, CM y CE). No se han encontrado antecedentes de estudios en esta competición del circuito olímpico. Se siguieron las pautas establecidas para la metodología observacional. Los resultados mostraron que dentro de los juegos Suramericanos se observaron diferencias entre ganadores y perdedores en el número de finalizaciones con lanzamiento y en la realización de malos pases. No aparecen diferencias significativas en la eficacia de lanzamiento. Estos niveles de eficacia del ataque y lanzamiento fueron inferiores a otras competiciones de alto nivel.