820 resultados para information security management assessment


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objetivo: Evaluar la percepción que tienen los trabajadores acerca del sistema de seguridad y salud en el trabajo en la población asistencial y administrativa en un Hospital de III nivel de atención., Bogotá-Colombia. Materiales y métodos: Estudio de corte transversal en población de trabajadores asistenciales y administrativos. Se aplicó el “Cuestionario Nórdico Sobre Seguridad en el Trabajo NOSACQ 50 Spanish” validado. La muestra fue probabilística estratificada aleatoria, en 308 trabajadores (230 asistenciales y 78 administrativos). Resultados: El promedio de edad fue 39.5± 12 años, con mayor frecuencia de género femenino (74.68%), estado civil soltero (38.96%) y nivel educativo técnico (34.40%). La percepción que tienen los trabajadores acerca del sistema de seguridad y salud en el trabajo fue independiente de su tipo de actividad laboral administrativa y asistencial (p>0.05), la mayor percepción en ambos grupos fue la confianza de los trabajadores en la eficacia del sistema de seguridad (2.71 y 2.77), y las de menor percepción presentaron el empoderamiento de seguridad de gestión (2.35 y 2.46) y la seguridad como prioridad de los empleados y rechazo del riesgo (2.35 y 2.40). Conclusiones: Los trabajadores del Hospital tienen un nivel adecuado de buena percepción acerca de los aspectos de seguridad y salud en el trabajo donde se evidenció que la fortaleza es la confianza de los trabajadores en la eficacia del sistema y la debilidad del sistema se encuentra en la falta de empoderamiento y rechazo al riesgo.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The European Union sees the introduction of the ePassport as a step towards rendering passports more secure against forgery while facilitating more reliable border controls. In this paper we take an interdisciplinary approach to the key security and privacy issues arising from the use of ePassports. We further anallyse how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – Construction sector competitiveness has been a subject of interest for many years. Research too often focuses on the means of overcoming the “barriers to change” as if such barriers were static entities. There has been little attempt to understand the dynamic inter-relationship between the differing factors which impinge upon construction sector competitiveness. The purpose of this paper is to outline the benefits of taking a systems approach to construction competitiveness research. Design/methodology/approach – The system dynamics (SD) modelling methodology is described. This can provide practitioners with “microworlds” within which they can explore the dynamic effects of different policy decisions. The data underpinning the use of SD was provided by interviews and case study research which allowed an understanding of the context within which practitioners operate. Findings – The over-riding conclusion is that the SD methodology has been shown to be capable of providing a means to assess the forces which shape the sustained competitiveness of construction firms. As such, it takes the assessment of strategic policy analysis in the construction sector onto a higher plane. The need to collect data and make retrospective assessments of competitiveness and strategic performance at the statistical level is not now the only modus operandi available. Originality/value – The paper describes a novel research methodology which points towards an alternative research agenda for construction competitiveness research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

More over, the information has become the main asset of the institutions. Being thus, the Information Security (IS) is getting attention as one of the activities of extreme importance in the corporations. Guarantee the confidentiality, integrity, availability, no deny and legality becomes something very important for the day-by-day of the businesses. An analysis of the risk, passing through the assessment of the threats and vulnerabilities, is mandatory to let grow the activities of the institutions. Digital Certification came into IS to guarantee the Not Deny (ND) because it makes the unquestioned identification of the person that makes the action. Therefore, Information Security can be defined as a knowledge field focused in the protection of the information assets against: unauthorized access, improper modifications, not availability, deny of authorship and illegality.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O estudo objetivou verificar até que ponto foi atendido o critério proposto por Kotter para a implantação de uma cultura de segurança da informação na Petrobras. A Petrobras, durante muitos anos, foi uma empresa estatal de petróleo com atuação nacional. Assim como diversas outras empresas, com o advento do processo de internacionalização, mais atores com interesses por informações valiosas começaram a interagir com a empresa. Verificava-se a necessidade de conduzir um processo de gestão da mudança para implantar uma cultura de segurança da informação. O modelo definido por Kotter possui oito etapas que, se seguidas, podem garantir uma mudança bem-sucedida. Para atingir o objetivo do estudo, utilizou-se pesquisa bibliográfica, pesquisa documental em arquivos e documentos da Petrobras e pesquisa de campo. O período analisado foi de 2002 a 2009. A avaliação do processo indicou que algumas falhas foram encontradas nas etapas definidas por Kotter. Pode-se citar: complacência alta; senso de urgência atribuído somente no primeiro momento; visão de longo prazo não foi amplamente declarada; o porquê da mudança, ao longo do tempo, não ficou explícito; estrutura organizacional de segurança da informação nas áreas ainda é deficiente; não houve total alinhamento dos sistemas de gestão da empresa; existência de estruturas e sistemas que dificultam a avaliação das ações e reconhecimento dos envolvidos no processo de mudança cultural e pouca preocupação em comemorar as conquistas de curto prazo.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The information technology - IT- benefits have been more perceived during the last decades. Both IT and business managers are dealing with subjects like governance, IT-Business alignment, information security and others on their top priorities. Talking about governance, specifically, managers are facing it with a technical approach, that gives emphasis on protection against invasions, antivirus systems, access controls and others technical issues. The IT risk management, commonly, is faced under this approach, that means, has its importance reduced and delegated to IT Departments. On the last two decades, a new IT risk management perspective raised, bringing an holistic view of IT risk to the organization. According to this new perspective, the strategies formulation process should take into account the IT risks. With the growing of IT dependence on most of organizations, the necessity of a better comprehension about the subject becomes more clear. This work shows a study in three public organizations of the Pernambuco State that investigates how those organizations manage their IT risks. Structured interviews were made with IT managers, and later, analyzed and compared with conceptual categories found in the literature. The results shows that the IT risks culture and IT governance are weakly understood and implemented on those organizations, where there are not such an IT risk methodology formally defined, neither executed. In addition, most of practices suggested in the literature were found, even without an alignment with an IT risks management process

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The general objective of this work was to develop a monitoring and management model for aquatic plants that could be used in reservoir cascades in Brazil, using the reservoirs of AES-Tiete as a study case. The investigations were carried out at the reservoirs of Barra-Bonita, Bariri, Ibitinga, Promissao, and Nova-Avanhandava, located in the Tiete River Basin; Agua Vermelha, located in the Grande River Basin; Caconde, Limoeiro, and Euclides da Cunha, which are part of the Pardo River Basin; and the Mogi-Guacu reservoir, which belongs to the Mogi-Guacu River basin. The main products of this work were: development of techniques using satellite-generated images for monitoring and planning aquatic plant control; planning and construction of a boat to move floating plant masses and an airboat equipped with a DGPS navigation and application flow control system. Results allowed to conclude that the occurrence of all types of aquatic plants is directly associated with sedimentation process and, consequently, with nutrient and light availability. Reservoirs placed at the beginning of cascades are more subject to sedimentation and occurrence of marginal, floating and emerged plants, and are the priority when it comes to controlling these plants, since they provide a supply of weeds for the other reservoirs. Reservoirs placed downstream show smaller amounts of water-suspended solids, with greater transmission of light and occurrence of submerged plants.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present study aimed to estimate the prevalence of elderly using potentially inappropriate medications (PIM) and with occurrence of potentially hazardous drug interactions (PHDI), to identify the risk factors for the prescription of PIM and to evaluate the impact of pharmaceutical intervention (PI) for the prescription of safer therapeutic alternatives. Therefore, a cross-sectional study was performed in a long-term care facility in São Paulo State, between December/2010 and January/2011. The medical records of the patients >= 60 years old who took any drugs were consulted to assess the pharmacotherapeutic safety of the medical prescriptions, in order to identify PIM and PHDI, according to the Beers (2003) and World Health Organization criteria, respectively. PI consisted of a guidance letter to the physician responsible for the institution, with the suggestions of safer equivalent therapeutics. Approximately 88% of the elderly took at least one drug, and for 30% of them the PIM had been prescribed. Most of the PIM identified (53.4%) act on the central nervous system. Among the 13 different DI detected, 6 are considered PHDI. Polypharmacy was detected as a risk factor for PIM prescription. After the PI there was no change in medical prescriptions of patients who had been prescribed PIM or PHDI. The data suggests that PI performed by letter, as the only interventional, method was ineffective. To contribute it a wide dissemination of PIM and PHDI among prescriber professionals is necessary for the selection of safer treatment for elderly. Additionally, a pharmacist should be part of the health care team in order to help promote rational use of medicines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The lack of proposals to evaluate the greening of business incubators or even of elementary discussions about the relations between incubators and the environment becomes apparent when researching this topic in the most prestigious scientific sources. To address this gap, this article reviews the literature on green management and smaller enterprises, business incubator performance and the greening of business incubators. This conceptual big-picture was used to identify variables relevant to the construction of a framework for assessing business incubators green performance. This framework was applied to six business incubators in Brazil. The results show the appropriated applicability of this framework. Furthermore, the empirical research led to the formulation of environmental maturity levels in order to classify business incubators performance. This paper seeks to offer a starting point for discussion and a proposal regarding the role of business incubators in a more sustainable society. © 2011 Elsevier Ltd. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The technologies are rapidly developing, but some of them present in the computers, as for instance their processing capacity, are reaching their physical limits. It is up to quantum computation offer solutions to these limitations and issues that may arise. In the field of information security, encryption is of paramount importance, being then the development of quantum methods instead of the classics, given the computational power offered by quantum computing. In the quantum world, the physical states are interrelated, thus occurring phenomenon called entanglement. This study presents both a theoretical essay on the merits of quantum mechanics, computing, information, cryptography and quantum entropy, and some simulations, implementing in C language the effects of entropy of entanglement of photons in a data transmission, using Von Neumann entropy and Tsallis entropy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The concept of epidemiological intelligence, as a construction of information societies, goes beyond monitoring a list of diseases and the ability to elicit rapid responses. The concept should consider the complexity of the definition of epidemiology in the identification of this object of study without being limited to a set of actions in a single government sector. The activities of epidemiological intelligence include risk assessment, strategies for prevention and protection, subsystems of information, crisis management rooms, geographical analysis, etc. This concept contributes to the understanding of policies in health, in multisectorial and geopolitical dimensions, as regards the organization of services around public health emergencies, primary healthcare, as well as disasters. The activities of epidemiological intelligence should not be restricted to scientific research, but the researchers must beware of threats to public health. Lalonde's model enabled consideration of epidemiological intelligence as a way to restructure policies and share resources by creating communities of intelligence, whose purpose is primarily to deal with public health emergencies and disasters.