831 resultados para Management of computing and information systems
Resumo:
La fabrication, la distribution et l'usage de fausses pièces d'identité constituent une menace pour la sécurité autant publique que privée. Ces faux documents représentent en effet un catalyseur pour une multitude de formes de criminalité, des plus anodines aux formes les plus graves et organisées. La dimension, la complexité, la faible visibilité, ainsi que les caractères répétitif et évolutif de la fraude aux documents d'identité appellent des réponses nouvelles qui vont au-delà d'une approche traditionnelle au cas par cas ou de la stratégie du tout technologique dont la perspective historique révèle l'échec. Ces nouvelles réponses passent par un renforcement de la capacité de comprendre les problèmes criminels que posent la fraude aux documents d'identité et les phénomènes qui l'animent. Cette compréhension est tout bonnement nécessaire pour permettre d'imaginer, d'évaluer et de décider les solutions et mesures les plus appropriées. Elle requière de développer les capacités d'analyse et la fonction de renseignement criminel qui fondent en particulier les modèles d'action de sécurité les plus récents, tels que l'intelligence-led policing ou le problem-oriented policing par exemple. Dans ce contexte, le travail doctoral adopte une position originale en postulant que les fausses pièces d'identité se conçoivent utilement comme la trace matérielle ou le vestige résultant de l'activité de fabrication ou d'altération d'un document d'identité menée par les faussaires. Sur la base de ce postulat fondamental, il est avancé que l'exploitation scientifique, méthodique et systématique de ces traces au travers d'un processus de renseignement forensique permet de générer des connaissances phénoménologiques sur les formes de criminalité qui fabriquent, diffusent ou utilisent les fausses pièces d'identité, connaissances qui s'intègrent et se mettent avantageusement au service du renseignement criminel. A l'appui de l'épreuve de cette thèse de départ et de l'étude plus générale du renseignement forensique, le travail doctoral propose des définitions et des modèles. Il décrit des nouvelles méthodes de profilage et initie la constitution d'un catalogue de formes d'analyses. Il recourt également à des expérimentations et des études de cas. Les résultats obtenus démontrent que le traitement systématique de la donnée forensique apporte une contribution utile et pertinente pour le renseignement criminel stratégique, opérationnel et tactique, ou encore la criminologie. Combiné aux informations disponibles par ailleurs, le renseignement forensique produit est susceptible de soutenir l'action de sécurité dans ses dimensions répressive, proactive, préventive et de contrôle. En particulier, les méthodes de profilage des fausses pièces d'identité proposées permettent de révéler des tendances au travers de jeux de données étendus, d'analyser des modus operandi ou d'inférer une communauté ou différence de source. Ces méthodes appuient des moyens de détection et de suivi des séries, des problèmes et des phénomènes criminels qui s'intègrent dans le cadre de la veille opérationnelle. Ils permettent de regrouper par problèmes les cas isolés, de mettre en évidence les formes organisées de criminalité qui méritent le plus d'attention, ou de produire des connaissances robustes et inédites qui offrent une perception plus profonde de la criminalité. Le travail discute également les difficultés associées à la gestion de données et d'informations propres à différents niveaux de généralité, ou les difficultés relatives à l'implémentation du processus de renseignement forensique dans la pratique. Ce travail doctoral porte en premier lieu sur les fausses pièces d'identité et leur traitement par les protagonistes de l'action de sécurité. Au travers d'une démarche inductive, il procède également à une généralisation qui souligne que les observations ci-dessus ne valent pas uniquement pour le traitement systématique des fausses pièces d'identité, mais pour celui de tout type de trace dès lors qu'un profil en est extrait. Il ressort de ces travaux une définition et une compréhension plus transversales de la notion et de la fonction de renseignement forensique. The production, distribution and use of false identity documents constitute a threat to both public and private security. Fraudulent documents are a catalyser for a multitude of crimes, from the most trivial to the most serious and organised forms. The dimension, complexity, low visibility as well as the repetitive and evolving character of the production and use of false identity documents call for new solutions that go beyond the traditional case-by-case approach, or the technology-focused strategy whose failure is revealed by the historic perspective. These new solutions require to strengthen the ability to understand crime phenomena and crime problems posed by false identity documents. Such an understanding is pivotal in order to be able to imagine, evaluate and decide on the most appropriate measures and responses. Therefore, analysis capacities and crime intelligence functions, which found the most recent policing models such as intelligence-led policing or problem-oriented policing for instance, have to be developed. In this context, the doctoral research work adopts an original position by postulating that false identity documents can be usefully perceived as the material remnant resulting from the criminal activity undertook by forgers, namely the manufacture or the modification of identity documents. Based on this fundamental postulate, it is proposed that a scientific, methodical and systematic processing of these traces through a forensic intelligence approach can generate phenomenological knowledge on the forms of crime that produce, distribute and use false identity documents. Such knowledge should integrate and serve advantageously crime intelligence efforts. In support of this original thesis and of a more general study of forensic intelligence, the doctoral work proposes definitions and models. It describes new profiling methods and initiates the construction of a catalogue of analysis forms. It also leverages experimentations and case studies. Results demonstrate that the systematic processing of forensic data usefully and relevantly contributes to strategic, tactical and operational crime intelligence, and also to criminology. Combined with alternative information available, forensic intelligence may support policing in its repressive, proactive, preventive and control activities. In particular, the proposed profiling methods enable to reveal trends among extended datasets, to analyse modus operandi, or to infer that false identity documents have a common or different source. These methods support the detection and follow-up of crime series, crime problems and phenomena and therefore contribute to crime monitoring efforts. They enable to link and regroup by problems cases that were previously viewed as isolated, to highlight organised forms of crime which deserve greatest attention, and to elicit robust and novel knowledge offering a deeper perception of crime. The doctoral research work discusses also difficulties associated with the management of data and information relating to different levels of generality, or difficulties associated with the implementation in practice of the forensic intelligence process. The doctoral work focuses primarily on false identity documents and their treatment by policing stakeholders. However, through an inductive process, it makes a generalisation which underlines that observations do not only apply to false identity documents but to any kind of trace as soon as a profile is extracted. A more transversal definition and understanding of the concept and function of forensic intelligence therefore derives from the doctoral work.
Resumo:
Työssä selvitettiin Puolustusvoimien Teknillisen Tutkimuslaitoksen Elektroniikka- ja informaatiotekniikan verkottumisen nykytila sekä esitettiin vaihtoehtoja teknisen tutkimustoiminnan kehittämiseksi.Lisäksi perehdyttiin verkottumiseen käsitteenä sekä verkottumisen motiiveihin. Verkkojen syntymekanismeihin sekä erilaisten verkkojen ominaisuuksiin perehdyttiin etsittäessä sopivaa verkottumisstrategiaa tai –tapaa puolustusvoimien teknisen tutkimustoiminnan kehittämiseksi. Kolmea verkottumisvaihtoehtoa tutkittiin: hierarkkista tai vertikaalista verkottumista, kumppanuutta sekä strategista verkottumista. Kuvattaessa Puolustusvoimien Teknillisen Tutkimuslaitoksen Elektroniikka- ja informaatiotekniikkaosaston verkottumisen nykytilaa kuvailtiin myös osaston ja eräiden kumppaneiden yhteistyöstä saamaa hyötyä.Lopuksi perehdyttiin verkottumisen yleisiin haasteisiin ja hyötyihin sekä verkonrakentajan rooliin.
Resumo:
Tämän diplomityön tavoitteena oli tutustua kokonaisvaltaisen tuottavan kunnossapidon teoriaan ja soveltaa sitä Abloy Oy Joensuun tehtaalla pilottikohteeksi valittuun koneeseen. Pilottikohteeksi oli valittu uusi Sveitsiläinen Hydromat-monitoimityöstökeskus, jonka kokonaistehokkuutta (OEE) pyrittiin parantamaan kokonaisvaltaisella tuottavalla kunnossapidolla (TPM). Työn kirjallisuusosuudessa tarkastellaan teoriatietoja, jotka liittyvät yleisesti kunnossapitoon ja tarkemmin TPM-toimintaan. Lisäksi käsitellään kunnossapidon mittareita ja tietojärjestelmiä. Työn empiirisessä osassa selvitetään, kuinka TPM-toiminta otettiin käyttöön Hydromat-monitoimityöstökeskuksen osalta. Eniten resursseja käytettiin koneen asetusaikojen lyhentämiseen. Lisäksi koneen käyttäjien itsenäiseen kunnossapitoon siirtyminen kuului työn sisältöön. Työssä on selvitetty myös uuden tuotannon seurantataulun käyttöönotto. Seurantataulusta nähdään useita tuotantotietoja kuten kokonaistehokkuus. Työn merkittävimmät tulokset osoittavat, että asetusajat ovat tällä hekellä hyvin pitkiä tavoitteisiin nähden. Asetusaikojen lyhentyminen halutulle tasolle vaatii koneen käyttäjien pitkän oppimisprosessin sekä optimaaliset toimintaolosuhteet. Lisäksi havaittiin, että uuden toimintamallin esitteleminen ja sen käyttöönotto valmistavassa teollisuudessa on vaativa prosessi.
Resumo:
Organizar racionalmente as informações e sistematizá-las tem sido essencial para o sucesso de diversas empresas. Quando estudamos as instituições destinadas à segurança pública percebemos que o uso de tecnologia e de sistemas de informação são comuns nos exemplos bem sucedidos de combate às práticas criminosas. O Programa Delegacia Legal, inaugurado no Estado do Rio de Janeiro em 1999, acompanha essa tendência e tem como um dos seus pilares a importância ao tratamento da informação. Os policiais que fazem os registros das ocorrências nas delegacias utilizando-se do Sistema de informação (SCO) têm então um papel fundamental porque através desses registros são investigadas as infrações, assim como é alimentado um banco de dados mais completo para ser aliado na elaboração de estatísticas e na aplicação de ações estratégicas. Considerando que esse tipo de registro, utilizando sistemas de informação, alterou a rotina institucional, o presente estudo verifica se existe ou não resistência ao uso do Sistema – SCO, fazendo uma abordagem sobre o sistema de informação, o Programa Delegacia Legal, a cultura organizacional e a opinião dos policiais.
Resumo:
Pós-graduação em Comunicação - FAAC
Resumo:
A integração de sistemas é um tema sempre actual na temática das tecnologias de informação. Desde há muito tempo que as grandes empresas identificaram a necessidade de integrar dados de diferentes sistemas, criando mais valor para os seus negócios. Alguns sectores da indústria estão claramente mais avançados do que outros no que diz respeito à integração de sistemas. Alguns factores, como a concorrência e competitividade mais agressiva em alguns mercados, foram os catalisadores desses avanços tecnológicos. A indústria da saúde não foi, infelizmente, um dos sectores onde se registaram grandes avanços na integração de sistemas. Foi, no entanto, onde se registou uma explosão de normas e protocolos que suportam as diversas disciplinas da medicina, como por ex, a Radiologia. Essas normas e protocolos permitiram dotar a medicina de meios mais rigorosos de produzir diagnósticos e encontrar curas para as mais diversas patologias. Existem muitos produtos que adoptam estas normas. As organizações foram, progressivamente, adquirindo esses produtos mas sem grande preocupação da eventual necessidade da integração. A disciplina da Radiologia é uma das disciplinas onde se verifica, ainda hoje, uma enorme diversidade de equipamentos e sistemas de informação mas onde se encontra desafios consideráveis no que diz respeito à integração. Foram esses desafios que despoletaram o interesse de investigação e cujos resultados se partilham nesta dissertação.
Resumo:
The first part of this paper deals with an extension of Dirac's Theorem to directed graphs. It is related to a result often referred to as the Ghouila-Houri Theorem. Here we show that the requirement of being strongly connected in the hypothesis of the Ghouila-Houri Theorem is redundant. The Second part of the paper shows that a condition on the number of edges for a graph to be hamiltonian implies Ore's condition on the degrees of the vertices.
Resumo:
Policies and actions that come from higher scale structures, such as international bodies and national governments, are not always compatible with the realities and perspectives of smaller scale units including indigenous communities. Yet, it is at this local social-ecological scale that mechanisms and solutions for dealing with unpredictability and change can be increasingly seen emerging from across the world. Although there is a large body of knowledge specifying the conditions necessary to promote local governance of natural resources, there is a parallel need to develop practical methods for operationalizing the evaluation of local social-ecological systems. In this paper, we report on a systemic, participatory, and visual approach for engaging local communities in an exploration of their own social-ecological system. Working with indigenous communities of the North Rupununi, Guyana, this involved using participatory video and photography within a system viability framework to enable local participants to analyze their own situation by defining indicators of successful strategies that were meaningful to them. Participatory multicriteria analysis was then used to arrive at a short list of best practice strategies. We present six best practices and show how they are intimately linked through the themes of indigenous knowledge, local governance and values, and partnerships and networks. We highlight how developing shared narratives of community owned solutions can help communities to plan governance and management of land and resource systems, while reinforcing sustainable practices by discussing and showcasing them within communities, and by engendering a sense of pride in local solutions.
Resumo:
Recent advancements in cloud computing have enabled the proliferation of distributed applications, which require management and control of multiple services. However, without an efficient mechanism for scaling services in response to changing environmental conditions and number of users, application performance might suffer, leading to Service Level Agreement (SLA) violations and inefficient use of hardware resources. We introduce a system for controlling the complexity of scaling applications composed of multiple services using mechanisms based on fulfillment of SLAs. We present how service monitoring information can be used in conjunction with service level objectives, predictions, and correlations between performance indicators for optimizing the allocation of services belonging to distributed applications. We validate our models using experiments and simulations involving a distributed enterprise information system. We show how discovering correlations between application performance indicators can be used as a basis for creating refined service level objectives, which can then be used for scaling the application and improving the overall application's performance under similar conditions.
Resumo:
This thesis discusses the opportunities and challenges of the cloud computing technology in healthcare information systems by reviewing the existing literature on cloud computing and healthcare information system and the impact of cloud computing technology to healthcare industry. The review shows that if problems related to security of data are solved then cloud computing will positively transform the healthcare institutions by giving advantage to the healthcare IT infrastructure as well as improving and giving benefit to healthcare services. Therefore, this thesis will explore the opportunities and challenges that are associated with cloud computing in the context of Finland in order to help the healthcare organizations and stakeholders to determine its direction when it decides to adopt cloud technology on their information systems.
Resumo:
The need to effectively manage the documentation covering the entire production process, from the concept phase right through to market realise, constitutes a key issue in the creation of a successful and highly competitive product. For almost forty years the most commonly used strategies to achieve this have followed Product Lifecycle Management (PLM) guidelines. Translated into information management systems at the end of the '90s, this methodology is now widely used by companies operating all over the world in many different sectors. PLM systems and editor programs are the two principal types of software applications used by companies for their process aotomation. Editor programs allow to store in documents the information related to the production chain, while the PLM system stores and shares this information so that it can be used within the company and made it available to partners. Different software tools, which capture and store documents and information automatically in the PLM system, have been developed in recent years. One of them is the ''DirectPLM'' application, which has been developed by the Italian company ''Focus PLM''. It is designed to ensure interoperability between many editors and the Aras Innovator PLM system. In this dissertation we present ''DirectPLM2'', a new version of the previous software application DirectPLM. It has been designed and developed as prototype during the internship by Focus PLM. Its new implementation separates the abstract logic of business from the real commands implementation, previously strongly dependent on Aras Innovator. Thanks to its new design, Focus PLM can easily develop different versions of DirectPLM2, each one devised for a specific PLM system. In fact, the company can focus the development effort only on a specific set of software components which provides specialized functions interacting with that particular PLM system. This allows shorter Time-To-Market and gives the company a significant competitive advantage.
Resumo:
In this paper we focus on the selection of safeguards in a fuzzy risk analysis and management methodology for information systems (IS). Assets are connected by dependency relationships, and a failure of one asset may affect other assets. After computing impact and risk indicators associated with previously identified threats, we identify and apply safeguards to reduce risks in the IS by minimizing the transmission probabilities of failures throughout the asset network. However, as safeguards have associated costs, the aim is to select the safeguards that minimize costs while keeping the risk within acceptable levels. To do this, we propose a dynamic programming-based method that incorporates simulated annealing to tackle optimizations problems.