834 resultados para security, usability, identity management, authentication, authorization


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Seventy-five principals and vice-.wincipals from public elementary and secondary schools in Hamilton, Ontario, Canada participated in this study. Participants provided ,information concerning their thinking styles, motivations, and the physical effects of stress. This information was examined to find out how satisfaction-oriented, and how security-oriented the thinking styles of the participants were. Second, the data were analysed to see how the thinking style orientations related to life style habits and the effects of stress. The satisfaction-oriented thinking styles scored higher than all of the security-oriented thinking styles by a wide margin with a small preference for the satisfaction-people-oriented styles labelled humanistic-helpful, and affiliative as opposed to the satisfaction-task-oriented styles labeled achievement, and self-actualizing. Although all eight of the security-oriented thinking styles scored well below all of the satisfaction-oriented thinking styles on the Life Styles Inventory, the perfectionistic style scored higher than all of the security-oriented styles by an impressive margin. The next highest scores were recorded by a cluster of three passive-defensive people-oriented thinking styles labeled approval, conventional, and dependent. The competitive style scored lower, and the styles labeled avoidance, oppositional, and power scored the lowest of all the defensive-security-oriented styles. These findings suggest that principals and vice-principals see themselves as relaxed, flexible, and satisfied with their ability to adapt to the stress levels they experience in their lives; however, there was some support for medical research findings that suggest that specific security-oriented thinking styles are associated with emotional stresses that contribute to the development of specific lifestyle habits, physical symptoms, and illnesses. Although the number of females in this study provides very limited generalizability, the findings of this study suggest that high achieving females tend to develop satisfaction-growth styles to a higher level than males, and they tend to use security-oriented styles to a lesser degree than males.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Call centres have emerged during a time of rapid technological change and represent a form of ready employment for those seeking to replace or supplement "traditional" forms of employment. Call centre work is considered characteristic of the kinds of service work available in the new economy. This paper examines the experiences and practices of lower level managers in a call centre in southern Ontario. Findings are based on analysis of semi-structured interviews. The findings suggest that lower level managers resolve the contradictory social space they occupy by aligning themselves primarily with more powerful executives, in part because they know this might lead to increased job security. The implications of this trend for building a strong labour movement capable of combating neoliberal discourses regarding the need for work restructuring are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Les usines récupérées par les ouvriers en Argentine sont devenues un mouvement social emblématique symbolisant l'un des aspects de la révolte sociale entourant la crise économique de 2001-2002. Les usines récupérées sont des entreprises abandonnées par leurs propriétaires originaux ou déclarées faillite, laissant derrières elles des salaires et des dettes impayés. Par conséquence, les ouvriers ont commencé à récupérer leurs usines; reprenant la production sans leurs anciens patrons, sous, et au profit de la gestion collective des ouvriers. Le mouvement est remarquable pour sa rémunération égalitaire et sa gestion horizontale. Ce travail examine la continuité des usines récupérées et ceci à travers l'évolution sociale, politique et économique du paysage de l'Argentine. Il évalue également l'impact du mouvement en tant que défi aux modes économiques de production hégémoniques et orientés vers le marché. En supposant que l'avenir du mouvement dépend de deux ensembles de facteurs, le rapport analyse les facteurs internes à travers le prisme de la théorie de mobilisation des ressources, ainsi que les facteurs externes à travers la perspective de la théorie de la structure de l'opportunité politique. Le travail conclut que la situation actuelle se trouve dans une impasse dans laquelle le mouvement a gagné l'acceptation institutionnelle, mais a échoué d'effectuer le changement structurel favorisant ses pratiques et garantissant la sécurité à long terme. Il argumente que le mouvement doit consolider certains aspects combatifs. Il doit consolider sa nouvelle identité en tant que mouvement social et forger des alliances stratégiques et tactiques tout en préservant son autonomie.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

En 2007, le Premier ministre du Québec, monsieur Jean Charest, a établi la Commission de consultation sur les pratiques d’accommodement reliées aux différences culturelles afin de donner suite aux conflits émanant des différences ethniques et culturelles. La commission a pour mandat de dresser le bilan des pratiques d’accommodement au Québec, d’analyser la problématique, de consulter la population et de formuler des recommandations au gouvernement afin d’assurer la conformité des pratiques d’accommodement avec les valeurs de la société québécoise. En premier lieu, ce mémoire démontrera que deux facteurs, dont l’évolution de l’identité de la majorité francophone et l’évolution des pays d’origine des immigrants, ont contribué à un malaise de gestion de la diversité et, par conséquent, ont rendu l’établissement de la commission pertinent. En deuxième lieu, m’appuyant sur une revue de la méthodologie, des conclusions et des recommandations de la commission, ainsi que la réplique du Ministère de l’Immigration et des Communautés culturelles, je vais illustrer que, malgré un mandat pertinent et achevé, la réponse gouvernementale fut inadéquate. Finalement, je démontrerai que les modèles de gestion de diversité soutenus par le rapport de la Commission, la laïcité inclusive et l’interculturalisme, sont des aspects nécessaires de la gestion de la diversité. Cependant, ils en découlent des philosophies politiques de neutralisme et pluralisme dont la force et le compromis en sont les buts. Je crois que le Québec peut être meilleur gestionnaire de sa diversité et peut obtenir de vraies réconciliations en prônant la conversation; une approche patriotique de la gestion de diversité.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

L'étude combine les méthodes qualitative et qualitative à travers l’utilisation du questionnaire et du canevas d’entrevue. Elle s’appuie sur un cadre conceptuel élaboré à partir de revue de littérature et de concepts clefs tels que : le capital social, le capital humain, l’identité personnelle, l’identité professionnelle et la socialisation, Les résultats déterminent le profil d’un céréalier indiquant son attachement aux valeurs professionnelles liées au transfert de ses connaissances, à la modernisation de l’exploitation, à la recherche de l’amélioration du rendement et à l’utilisation d’outils modernes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

La biométrie, appliquée dans un contexte de traitement automatisé des données et de reconnaissance des identités, fait partie de ces technologies nouvelles dont la complexité d’utilisation fait émerger de nouveaux enjeux et où ses effets à long terme sont incalculables. L’envergure des risques suscite des questionnements dont il est essentiel de trouver les réponses. On justifie le recours à cette technologie dans le but d’apporter plus de sécurité, mais, vient-elle vraiment apporter plus de protection dans le contexte actuel? En outre, le régime législatif québécois est-il suffisant pour encadrer tous les risques qu’elle génère? Les technologies biométriques sont flexibles en ce sens qu’elles permettent de saisir une multitude de caractéristiques biométriques et offrent aux utilisateurs plusieurs modalités de fonctionnement. Par exemple, on peut l’utiliser pour l’identification tout comme pour l’authentification. Bien que la différence entre les deux concepts puisse être difficile à saisir, nous verrons qu’ils auront des répercussions différentes sur nos droits et ne comporteront pas les mêmes risques. Par ailleurs, le droit fondamental qui sera le plus touché par l’utilisation de la biométrie sera évidemment le droit à la vie privée. Encore non bien compris, le droit à la vie privée est complexe et son application est difficile dans le contexte des nouvelles technologies. La circulation des données biométriques, la surveillance accrue, le détournement d’usage et l’usurpation d’identité figurent au tableau des risques connus de la biométrie. De plus, nous verrons que son utilisation pourra avoir des conséquences sur d’autres droits fondamentaux, selon la manière dont le système est employé. Les tests de nécessité du projet et de proportionnalité de l’atteinte à nos droits seront les éléments clés pour évaluer la conformité d’un système biométrique. Ensuite, le succès de la technologie dépendra des mesures de sécurité mises en place pour assurer la protection des données biométriques, leur intégrité et leur accès, une fois la légitimité du système établie.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

School of Management Studies, Cochin University of Science and Technology

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Biometrics deals with the physiological and behavioral characteristics of an individual to establish identity. Fingerprint based authentication is the most advanced biometric authentication technology. The minutiae based fingerprint identification method offer reasonable identification rate. The feature minutiae map consists of about 70-100 minutia points and matching accuracy is dropping down while the size of database is growing up. Hence it is inevitable to make the size of the fingerprint feature code to be as smaller as possible so that identification may be much easier. In this research, a novel global singularity based fingerprint representation is proposed. Fingerprint baseline, which is the line between distal and intermediate phalangeal joint line in the fingerprint, is taken as the reference line. A polygon is formed with the singularities and the fingerprint baseline. The feature vectors are the polygonal angle, sides, area, type and the ridge counts in between the singularities. 100% recognition rate is achieved in this method. The method is compared with the conventional minutiae based recognition method in terms of computation time, receiver operator characteristics (ROC) and the feature vector length. Speech is a behavioural biometric modality and can be used for identification of a speaker. In this work, MFCC of text dependant speeches are computed and clustered using k-means algorithm. A backpropagation based Artificial Neural Network is trained to identify the clustered speech code. The performance of the neural network classifier is compared with the VQ based Euclidean minimum classifier. Biometric systems that use a single modality are usually affected by problems like noisy sensor data, non-universality and/or lack of distinctiveness of the biometric trait, unacceptable error rates, and spoof attacks. Multifinger feature level fusion based fingerprint recognition is developed and the performances are measured in terms of the ROC curve. Score level fusion of fingerprint and speech based recognition system is done and 100% accuracy is achieved for a considerable range of matching threshold

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identity of an individual, referred to as biometrics, has gained significant interest in the wake of heightened concerns about security and rapid advancements in networking, communication and mobility. Multimodal biometrics is expected to be ultra-secure and reliable, due to the presence of multiple and independent—verification clues. In this study, a multimodal biometric system utilising audio and facial signatures has been implemented and error analysis has been carried out. A total of one thousand face images and 250 sound tracks of 50 users are used for training the proposed system. To account for the attempts of the unregistered signatures data of 25 new users are tested. The short term spectral features were extracted from the sound data and Vector Quantization was done using K-means algorithm. Face images are identified based on Eigen face approach using Principal Component Analysis. The success rate of multimodal system using speech and face is higher when compared to individual unimodal recognition systems

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In Wireless Sensor Networks (WSN), neglecting the effects of varying channel quality can lead to an unnecessary wastage of precious battery resources and in turn can result in the rapid depletion of sensor energy and the partitioning of the network. Fairness is a critical issue when accessing a shared wireless channel and fair scheduling must be employed to provide the proper flow of information in a WSN. In this paper, we develop a channel adaptive MAC protocol with a traffic-aware dynamic power management algorithm for efficient packet scheduling and queuing in a sensor network, with time varying characteristics of the wireless channel also taken into consideration. The proposed protocol calculates a combined weight value based on the channel state and link quality. Then transmission is allowed only for those nodes with weights greater than a minimum quality threshold and nodes attempting to access the wireless medium with a low weight will be allowed to transmit only when their weight becomes high. This results in many poor quality nodes being deprived of transmission for a considerable amount of time. To avoid the buffer overflow and to achieve fairness for the poor quality nodes, we design a Load prediction algorithm. We also design a traffic aware dynamic power management scheme to minimize the energy consumption by continuously turning off the radio interface of all the unnecessary nodes that are not included in the routing path. By Simulation results, we show that our proposed protocol achieves a higher throughput and fairness besides reducing the delay

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Biometrics is an efficient technology with great possibilities in the area of security system development for official and commercial applications. The biometrics has recently become a significant part of any efficient person authentication solution. The advantage of using biometric traits is that they cannot be stolen, shared or even forgotten. The thesis addresses one of the emerging topics in Authentication System, viz., the implementation of Improved Biometric Authentication System using Multimodal Cue Integration, as the operator assisted identification turns out to be tedious, laborious and time consuming. In order to derive the best performance for the authentication system, an appropriate feature selection criteria has been evolved. It has been seen that the selection of too many features lead to the deterioration in the authentication performance and efficiency. In the work reported in this thesis, various judiciously chosen components of the biometric traits and their feature vectors are used for realizing the newly proposed Biometric Authentication System using Multimodal Cue Integration. The feature vectors so generated from the noisy biometric traits is compared with the feature vectors available in the knowledge base and the most matching pattern is identified for the purpose of user authentication. In an attempt to improve the success rate of the Feature Vector based authentication system, the proposed system has been augmented with the user dependent weighted fusion technique.