834 resultados para security, usability, identity management, authentication, authorization


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasing prominence of the psychological ownership (PO) construct in management studies raises questions about how PO manifests at the level of the individual. In this article, we unpack the mechanism by which individuals use PO to express aspects of their identity and explore how PO manifestations can display congruence as well as incongruence between layers of self. As a conceptual foundation, we develop a dynamic model of individual identity that differentiates between four layers of self, namely, the “core self,” “learned self,” “lived self,” and “perceived self.” We then bring identity and PO literatures together to suggest a framework of PO manifestation and expression viewed through the lens of the four presented layers of self. In exploring our framework, we develop a number of propositions that lay the foundation for future empirical and conceptual work and discuss implications for theory and practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to explore and understand the process of successful introduction of total quality management (TQM) in Poland and the way in which it impacted on identity of Polish managers. Design/methodology/approach – The study is based on a combination of ethnographic research and repertory grid interviews. Findings – The process of TQM introduction and implementation is examined through the application of translation as a model incorporating cultural and socio-economical dimensions in addition to individual and organizational levels that shaped the development of TQM in Poland. It then draws on the idea of fantasy as theorized in Lacanian psychoanalysis in order to incorporate the unconscious element of translation process which is missing from Latour’s theorization and which forms an important aspect of adoption of new technology and the emergence of a new post-transition generation of managers in Poland. The paper argues that a complex combination of contextual factors, amongst them the notion of fantasy shaped the process of translation of TQM to Poland, the identity formation of Polish managers and to the emergence of a new post-transition generation of managers in Poland. Originality/value – This paper contributes to the literature on the post-command transition by illustrating this process through the fantasy of total quality management explored in a specific socio-cultural and geographical context and by combining the idea of Latour’s translation with Lacanian fantasy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper explores the identities projected in advertisements directed towards HIV positive individuals and people with AIDS. Fifty such advertisements were collected from three popular American magazines for gay men over a period of seven months. Analysis of the ads reveals a paradoxical presentation of people with HIV/AIDS, which offers simultaneous conflicting images of hope and fear, power and weakness, innocence and guilt. An interactive sociolinguistic model through which this contradictory discourse might be understood is presented, drawing on Goffman’s insights on stigma management and the presentation of the self in social interaction. Advertisements directed towards people with HIV/AIDS, it is suggested, present a contradictory discourse in which the advertisers are positioned as ‘the wise’, offering to mediate the conflicting identities of the stigmatized. The identity values enacted in this contradictory discourse are further measured against American conceptions of communication and the self as observed by Carbaugh and others. The possible consequences of these positionings on the roles made available to people with HIV/AIDS in the wider social context are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Alfred Chandler, the celebrated business historian, provided detailed descriptions of the reasons for failed human commitments and the managerial tools needed to prevent/remediate such failings in the context of large business firms. Chandler's historical narrative identifies three distinct “faces” of bounded reliability—opportunism, benevolent preference reversal, and identity-based discordance—as the main drivers of commitment failure. Adopting bounded reliability (BRel) as a micro-foundation in management studies will raise the quality and relevance of scholarly recommendations to improve managerial decision making and action, because analysis of BRel challenges closely mirrors the real-world problems facing practicing managers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Insect pollination underpins apple production but the extent to which different pollinator guilds supply this service, particularly across different apple varieties, is unknown. Such information is essential if appropriate orchard management practices are to be targeted and proportional to the potential benefits pollinator species may provide. Here we use a novel combination of pollinator effectiveness assays (floral visit effectiveness), orchard field surveys (flower visitation rate) and pollinator dependence manipulations (pollinator exclusion experiments) to quantify the supply of pollination services provided by four different pollinator guilds to the production of four commercial varieties of apple. We show that not all pollinators are equally effective at pollinating apples, with hoverflies being less effective than solitary bees and bumblebees, and the relative abundance of different pollinator guilds visiting apple flowers of different varieties varies significantly. Based on this, the taxa specific economic benefits to UK apple production have been established. The contribution of insect pollinators to the economic output in all varieties was estimated to be £92.1M across the UK, with contributions varying widely across taxa: solitary bees (£51.4M), honeybees (£21.4M), bumblebees (£18.6M) and hoverflies (£0.7M). This research highlights the differences in the economic benefits of four insect pollinator guilds to four major apple varieties in the UK. This information is essential to underpin appropriate investment in pollination services management and provides a model that can be used in other entomolophilous crops to improve our understanding of crop pollination ecology.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The narrative of the United States is of a "nation of immigrants" in which the language shift patterns of earlier ethnolinguistic groups have tended towards linguistic assimilation through English. In recent years, however, changes in the demographic landscape and language maintenance by non-English speaking immigrants, particularly Hispanics, have been perceived as threats and have led to calls for an official English language policy.This thesis aims to contribute to the study of language policy making from a societal security perspective as expressed in attitudes regarding language and identity originating in the daily interaction between language groups. The focus is on the role of language and American identity in relation to immigration. The study takes an interdisciplinary approach combining language policy studies, security theory, and critical discourse analysis. The material consists of articles collected from four newspapers, namely USA Today, The New York Times, Los Angeles Times, and San Francisco Chronicle between April 2006 and December 2007.Two discourse types are evident from the analysis namely Loyalty and Efficiency. The former is mainly marked by concerns of national identity and contains speech acts of security related to language shift, choice and English for unity. Immigrants are represented as dehumanised, and harmful. Immigration is given as sovereignty-related, racial, and as war. The discourse type of Efficiency is mainly instrumental and contains speech acts of security related to cost, provision of services, health and safety, and social mobility. Immigrants are further represented as a labour resource. These discourse types reflect how the construction of the linguistic 'we' is expected to be maintained. Loyalty is triggered by arguments that the collective identity is threatened and is itself used in reproducing the collective 'we' through hegemonic expressions of monolingualism in the public space and semi-public space. The denigration of immigrants is used as a tool for enhancing societal security through solidarity and as a possible justification for the denial of minority rights. Also, although language acquisition patterns still follow the historical trend of language shift, factors indicating cultural separateness such as the appearance of speech communities or the use of minority languages in the public space and semi-public space have led to manifestations of intolerance. Examples of discrimination and prejudice towards minority groups indicate that the perception of worth of a shared language differs from the actual worth of dominant language acquisition for integration purposes. The study further indicates that the efficient working of the free market by using minority languages to sell services or buy labour is perceived as conflicting with nation-building notions since it may create separately functioning sub-communities with a new cultural capital recognised as legitimate competence. The discourse types mainly represent securitising moves constructing existential threats. The perception of threat and ideas of national belonging are primarily based on a zero-sum notion favouring monolingualism. Further, the identity of the immigrant individual is seen as dynamic and adaptable to assimilationist measures whereas the identity of the state and its members are perceived as static. Also, the study shows that debates concerning language status are linked to extra-linguistic matters. To conclude, policy makers in the US need to consider the relationship between four factors, namely societal security based on collective identity, individual/human security, human rights, and a changing linguistic demography, for proposed language intervention measures to be successful.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Existing registry technologies such as UDDI can be enhanced to support capabilities for semantic reasoning and inquiry, which subsequently increases its usability range. The Grimoires registry was developed to provide such support through the use of metadata attachments to registry entities. The use of such attachments provides a way for allowing service operators to specify security assertions pertaining to registry entities owned by them. These assertions may however have to be reconciled with existing registry policies. A security architecture based on the XACML standard and deployed in the OMII framework is outlined to demonstrate how this goal is achieved in the registry.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New business and technology platforms are required to sustainably manage urban water resources [1,2]. However, any proposed solutions must be cognisant of security, privacy and other factors that may inhibit adoption and hence impact. The FP7 WISDOM project (funded by the European Commission - GA 619795) aims to achieve a step change in water and energy savings via the integration of innovative Information and Communication Technologies (ICT) frameworks to optimize water distribution networks and to enable change in consumer behavior through innovative demand management and adaptive pricing schemes [1,2,3]. The WISDOM concept centres on the integration of water distribution, sensor monitoring and communication systems coupled with semantic modelling (using ontologies, potentially connected to BIM, to serve as intelligent linkages throughout the entire framework) and control capabilities to provide for near real-time management of urban water resources. Fundamental to this framework are the needs and operational requirements of users and stakeholders at domestic, corporate and city levels and this requires the interoperability of a number of demand and operational models, fed with data from diverse sources such as sensor networks and crowsourced information. This has implications regarding the provenance and trustworthiness of such data and how it can be used in not only the understanding of system and user behaviours, but more importantly in the real-time control of such systems. Adaptive and intelligent analytics will be used to produce decision support systems that will drive the ability to increase the variability of both supply and consumption [3]. This in turn paves the way for adaptive pricing incentives and a greater understanding of the water-energy nexus. This integration is complex and uncertain yet being typical of a cyber-physical system, and its relevance transcends the water resource management domain. The WISDOM framework will be modeled and simulated with initial testing at an experimental facility in France (AQUASIM – a full-scale test-bed facility to study sustainable water management), then deployed and evaluated in in two pilots in Cardiff (UK) and La Spezia (Italy). These demonstrators will evaluate the integrated concept providing insight for wider adoption.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta dissertação teve como objetivo compreender de que maneira a cultura organizacional da polícia militar influencia o modelo de gestão da instituição. O cotidiano institucional da policia militar é repleto de situações que servem de objeto de argüição sobre o processo de construção da identidade do policial militar como resultante de um comportamento normativo e disciplinar que consolida conceitos historicamente enraizados, os quais se repassam de geração a geração. O modo de agir do policial militar configura uma cultura institucional que reforça a crise de segurança instalada na sociedade. Frente a tal realidade, a gestão institucional passa a ser um importante objeto de investigação capaz de contribuir com mudanças no trabalho policial militar, pois ainda persiste no modus operandi da segurança pública uma ação tipicamente ligada ao controle da violência mediante o uso da violência. Presumivelmente, esse papel seria exercido através do cumprimento da doutrina que atualmente é ensinada nas academias militares. No entanto, essas formulações são usadas como anteparo e reforço de valores militares rígidos, configurando a cultura organizacional da instituição, de maneira que tais preceitos e as práticas que as acompanham são as referências principais do discurso teórico e dos argumentos ideológicos da Polícia Militar. Os resultados obtidos mostraram que as bases doutrinárias, transplantadas do exército brasileiro e que originaram as policias militares, persistem até os dias atuais nessa instituição e resultou na absorção da doutrina militar expressa no pensamento, símbolos, modus operandi e estrutura, o que a mantém sob controle rígido, atendendo às expectativas do Estado em detrimento do povo ou da própria policia; a cultura organizacional da polícia militar permanece quase inalterada desde suas origens, o que a coloca em dissonância com a realidade contemporânea; o modelo de gestão que a polícia militar utilizar foi construído a partir da base ideológica de suas origens, centrado na hierarquia e na disciplina, e que tem no cumprimento do regulamento o foco central da gestão; e que o modelo de gestão praticado pela polícia militar impede o cumprimento de sua missão institucional e social porque seu foco está deslocado, ou seja, ao invés de focar a solução dos problemas de segurança e defesa dos direitos da sociedade visa ao cumprimento linear, puro e simples do regulamento militar (Esse trecho está muito confuso!! Não consigo entender o que você quis dizer). A conclusão é que a cultura organizacional das polícias militares determina o modelo de gestão contemporâneo da instituição focado na militarização. É um modelo que privilegia a hierarquia e a disciplina (e ao apego ao regulamento), em detrimento do capital intelectual e da participação de seus membros e da sociedade na identificação e solUção dos seus objetivos e metas. Como resultado, a polícia militar se distanciou da solução de sua missão institucional e social, o que levou a sociedade a se ressentir de proteção e defesa de seus direitos.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The study presents the results and recommendations deriving from the application of two supply chain management analysis models as proposed by the Supply Chain Council (SCOR, version 10.0) and by Lambert (1997, Framework for Supply Chain Management) on the logistics of cash transfers in Brazil. Cash transfers consist of the transportation of notes to and from each node of the complex network formed by the bank branches, ATMs, armored transportation providers, the government custodian, Brazilian Central Bank and financial institutions. Although the logistic to sustain these operations is so wide-ranged (country-size), complex and subject to a lot of financial regulations and security procedures, it has been detected that it was probably not fully integrated. Through the use of a primary and a secondary data research and analysis, using the above mentioned models, the study ends up with propositions to strongly improve the operations efficiency