757 resultados para profilazione,GDPR,privacy,informativa privacy,trattamento dati personali,dati personali


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dedikaatio: Fredrika Wilhelmina Stjernvall född Charpentier [ruots.].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nowadays, when most of the business are moving forward to sustainability by providing or getting different services from different vendors, Service Level Agreement (SLA) becomes very important for both the business providers/vendors and as well as for users/customers. There are many ways to inform users/customers about various services with its inherent execution functionalities and even non-functional/Quality of Services (QoS) aspects through negotiating, evaluating or monitoring SLAs. However, these traditional SLA actually do not cover eco-efficient green issues or IT ethics issues for sustainability. That is why green SLA (GSLA) should come into play. GSLA is a formal agreement incorporating all the traditional commitments as well as green issues and ethics issues in IT business sectors. GSLA research would survey on different traditional SLA parameters for various services like as network, compute, storage and multimedia in IT business areas. At the same time, this survey could focus on finding the gaps and incorporation of these traditional SLA parameters with green issues for all these mentioned services. This research is mainly points on integration of green parameters in existing SLAs, defining GSLA with new green performance indicators and their measurable units. Finally, a GSLA template could define compiling all the green indicators such as recycling, radio-wave, toxic material usage, obsolescence indication, ICT product life cycles, energy cost etc for sustainable development. Moreover, people’s interaction and IT ethics issues such as security and privacy, user satisfaction, intellectual property right, user reliability, confidentiality etc could also need to add for proposing a new GSLA. However, integration of new and existing performance indicators in the proposed GSLA for sustainable development could be difficult for ICT engineers. Therefore, this research also discovers the management complexity of proposed green SLA through designing a general informational model and analyses of all the relationships, dependencies and effects between various newly identified services under sustainability pillars. However, sustainability could only be achieved through proper implementation of newly proposed GSLA, which largely depends on monitoring the performance of the green indicators. Therefore, this research focuses on monitoring and evaluating phase of GSLA indicators through the interactions with traditional basic SLA indicators, which would help to achieve proper implementation of future GSLA. Finally, this newly proposed GSLA informational model and monitoring aspects could definitely help different service providers/vendors to design their future business strategy in this new transitional sustainable society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phenomena in cyber domain, especially threats to security and privacy, have proven an increasingly heated topic addressed by different writers and scholars at an increasing pace – both nationally and internationally. However little public research has been done on the subject of cyber intelligence. The main research question of the thesis was: To what extent is the applicability of cyber intelligence acquisition methods circumstantial? The study was conducted in sequential a manner, starting with defining the concept of intelligence in cyber domain and identifying its key attributes, followed by identifying the range of intelligence methods in cyber domain, criteria influencing their applicability, and types of operatives utilizing cyber intelligence. The methods and criteria were refined into a hierarchical model. The existing conceptions of cyber intelligence were mapped through an extensive literature study on a wide variety of sources. The established understanding was further developed through 15 semi-structured interviews with experts of different backgrounds, whose wide range of points of view proved to substantially enhance the perspective on the subject. Four of the interviewed experts participated in a relatively extensive survey based on the constructed hierarchical model on cyber intelligence that was formulated in to an AHP hierarchy and executed in the Expert Choice Comparion online application. It was concluded that Intelligence in cyber domain is an endorsing, cross-cutting intelligence discipline that adds value to all aspects of conventional intelligence and furthermore that it bears a substantial amount of characteristic traits – both advantageous and disadvantageous – and furthermore that the applicability of cyber intelligence methods is partly circumstantially limited.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presented the overview of Open Data research area, quantity of evidence and establishes the research evidence based on the Systematic Mapping Study (SMS). There are 621 such publications were identified published between years 2005 and 2014, but only 243 were selected in the review process. This thesis highlights the implications of Open Data principals’ proliferation in the emerging era of the accessibility, reusability and sustainability of data transparency. The findings of mapping study are described in quantitative and qualitative measurement based on the organization affiliation, countries, year of publications, research method, star rating and units of analysis identified. Furthermore, units of analysis were categorized by development lifecycle, linked open data, type of data, technical platforms, organizations, ontology and semantic, adoption and awareness, intermediaries, security and privacy and supply of data which are important component to provide a quality open data applications and services. The results of the mapping study help the organizations (such as academia, government and industries), re-searchers and software developers to understand the existing trend of open data, latest research development and the demand of future research. In addition, the proposed conceptual framework of Open Data research can be adopted and expanded to strengthen and improved current open data applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Leveraging cloud services, companies and organizations can significantly improve their efficiency, as well as building novel business opportunities. Cloud computing offers various advantages to companies while having some risks for them too. Advantages offered by service providers are mostly about efficiency and reliability while risks of cloud computing are mostly about security problems. Problems with security of the cloud still demand significant attention in order to tackle the potential problems. Security problems in the cloud as security problems in any area of computing, can not be fully tackled. However creating novel and new solutions can be used by service providers to mitigate the potential threats to a large extent. Looking at the security problem from a very high perspective, there are two focus directions. Security problems that threaten service user’s security and privacy are at one side. On the other hand, security problems that threaten service provider’s security and privacy are on the other side. Both kinds of threats should mostly be detected and mitigated by service providers. Looking a bit closer to the problem, mitigating security problems that target providers can protect both service provider and the user. However, the focus of research community mostly is to provide solutions to protect cloud users. A significant research effort has been put in protecting cloud tenants against external attacks. However, attacks that are originated from elastic, on-demand and legitimate cloud resources should still be considered seriously. The cloud-based botnet or botcloud is one of the prevalent cases of cloud resource misuses. Unfortunately, some of the cloud’s essential characteristics enable criminals to form reliable and low cost botclouds in a short time. In this paper, we present a system that helps to detect distributed infected Virtual Machines (VMs) acting as elements of botclouds. Based on a set of botnet related system level symptoms, our system groups VMs. Grouping VMs helps to separate infected VMs from others and narrows down the target group under inspection. Our system takes advantages of Virtual Machine Introspection (VMI) and data mining techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inside cyber security threats by system administrators are some of the main concerns of organizations about the security of systems. Since operating systems are controlled and managed by fully trusted administrators, they can negligently or intentionally break the information security and privacy of users and threaten the system integrity. In this thesis, we propose some solutions for enhancing the security of Linux OS by restricting administrators’ access to superuser’s privileges while they can still manage the system. We designed and implemented an interface for administrators in Linux OS called Linux Admins’ User Interface (LAUI) for managing the system in secure ways. LAUI along with other security programs in Linux like sudo protect confidentiality and integrity of users’ data and provide a more secure system against administrators’ mismanagement. In our model, we limit administrators to perform managing tasks in secure manners and also make administrators accountable for their acts. In this thesis we present some scenarios for compromising users’ data and breaking system integrity by system administrators in Linux OS. Then we evaluate how our solutions and methods can secure the system against these administrators’ mismanagement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dignity is seen important in health care context but considered as a controversial and complex concept. In health care context, it is described as being influenced by for example autonomy, respect, communication, privacy and hospital environment. Patient dignity is related to satisfaction with care, reduced stress, better confidence in health services, enhanced patient outcomes and shorter stay in a hospital. Stroke patients may struggle for dignity as being dependent on other people has impact on the patients’ self-image. In all, stroke patients are very specific patient group and considered vulnerable from emotional aspect. Therefore study findings from other patient groups in the area of ethical problems cannot be transferred to the stroke patients. This master’s thesis consists of two parts. The first part is the literature review of patients’ dignity in hospital care. The literature defined dignity and described factors promoting and reducing it. The results were ambiguous and thus a clear understanding was not able to create. That was the basis for the second part of the master’s thesis, the empirical study. This part aimed to develop theoretical construction to explore the realization of stroke patients’ dignity in hospital care. The data of the second part was collected by interviewing 16 stroke patients and analyzed using the constant comparison of Grounded Theory. The result was ‘The Theory of Realization of Stroke Patients’ Dignity in Hospital Care’ which is described not only in this master’s thesis but also as a scientific article. The theory consists of the core category, four generic elements and five specific types on realization. The core category emerged as ‘dignity in a new situation’. After a stroke, dignity is defined in a new way which is influenced by the generic elements: life history, health history, individuality and a stroke. Stroke patient’s dignity is realized through five specific types on realization: person related dignity type, control related dignity type, independence related dignity type, social related dignity type and care related dignity type. The theory points out possible special characteristics of stroke patients’ dignity in control related dignity type and independence related dignity type. Before implementing the theory, the relation between the core category, generic elements and specific types on realization needs to be studied further.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tämän kandidaatintutkielman tarkoituksena on tutkia työtyytyväisyyttä organisaatiomuutoksen näkökulmasta ja organisaatiomuutoksen vaikutuksia työtyytyväisyyteen. Tarkasteltavana case-yrityksenä toimii Autolinjat Oy. Tutkimuksen tavoitteena on löytää tekijöitä, jotka vaikuttavat Autolinjojen työntekijöiden työtyytyväisyyteen. Tämän pohjalta tarkoituksena on tehdä yritykselle työtyytyväisyyden kehittämisehdotuksia. Olen lähestynyt työtyytyväisyyttä teoreettisesti työtyytyväisyyden sisältö- ja prosessi-teorioilla, joihin kuuluvat Maslown tarvehierarkia, Herzbergin kaksifaktoriteoria, Lawlerin odotusarvoteoria ja Locken päämääräteoria. Tässä tutkielmassa käytetään laadullista tutkimusta. Valitsin laadullisen näkökulman tutkimukseen sen vuoksi, että täten saadaan paremmin esille työtekijöiden subjektiivista tunnetta suhteessa työhönsä ja sen ominaispiirteisiin. Tutkimustulokset osoittavat, että organisaatiomuutokseen suhtautuminen on subjektiivista, mikä tarkoittaa sitä, että jokainen yksilö suhtautuu muutokseen eri tavalla. Täten muutos on omiaan ravisuttamaan työn koettuja piirteitä, mikä taas vaikuttaa yksilön turvallisuuden tunteeseen. Joissakin tapauksissa organisaatiomuutos voi olla positiivinen asia, joka ajaa työntekijää kohti parempaa suoritusta, mutta usein organisaatiomuutoksen vaikutukset työtyytyväisyyteen ovat negatiivisia. Muutoksesta selviämiseen auttaa työtyytyväisyyteen vaikuttavien tunteiden selvittäminen, joten vuorovaikutuksen rooli muutostilanteessa on suuri. Kaiken kaikkiaan työtyytyväisyys on moniulotteinen asia, joka näkyy muutostilanteissa monella eri tavalla, johtuen tunnetilan henkilökohtaisuudesta. Muutoksen läpiviemisessä ja siitä selviämisessä on tärkeää tiedostaa lähtökohdat ja se, mihin mennään.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The future of paying in the age of digitalization is a topic that includes varied visions. This master’s thesis explores images of the future of paying in the Single Euro Payment Area (SEPA) up to 2020 and 2025 through the views of experts specialized in paying. This study was commissioned by a credit management company in order to obtain more detailed information about the future of paying. Specifically, this thesis investigates what could be the most used payment methods in the future, what items could work as a medium of exchange in 2020 and how will they evolve towards the year 2025. Changing consumer behavior, trends connected to payment methods, security and private issues of new cashless payment methods were also part of this study. In the empirical part of the study the experts’ ideas about probable and preferable future images of paying were investigated through a two-round Disaggregative Delphi method. The questionnaire included numeric statements and open questions. Three alternative future images were created with the help of cluster analysis: “Unsurprising Future”, “Technology Driven Future” and “The Age of the Customer”. The plausible images had similarities and differences, which were reflected to the previous studies in the literature review. The study’s findings were formed based on the images of futures’ similarities and to the open questions answers that were received from the questionnaire. The main conclusion of the study was that development of technology will unify and diversify SEPA; the trend in 2020 seems to be towards more cashless payment methods but their usage depends on the countries’ financial possibilities and customer preferences. Mobile payments, cards and cash will be the main payment methods but the banks will have competitors from outside the financial sector. Wearable payment methods and NFC technology are seen as widely growing trends but subcutaneous payment devices will likely keep their niche position until 2025. In the meantime, security and private issues are seen to increase because of identity thefts and various frauds. Simultaneously, privacy will lose its meaning to younger consumers who are used to sharing their transaction and personal data with third parties in order to get access to attractive services. Easier access to consumers’ transaction data will probably open the door for hackers and cause new risks in paying processes. There exist many roads to future, and this study was not an attempt to give any complete answers about it even if some plausible assumptions about the future’s course were provided.

1.° Tractatus pacis inter Ludovicum IX. Regem Francorum, et Henricum III. Regem Angliae : anno 1259. — 2.° Tractatus pacis inter Philippum III. Regem Francorum, et Edwardum I. Regem Angliae : anno 1279. — 3.° Tractatus pacis inter eosdem Reges : anno 1286. — 4.° Quarta et ultima pax facta inter Reges : anno 1303. translata de romancio in latinum, de verbo ad verbum. — 5.° Alia concordantia, seu compositio vel pax inter Reges : anno 1303. — 6.° Pronunciatio Bonifacii, Papae, super pacibus : anno pontificatus quarto. — 7.° De remediis Aquitanorum adversùs vexationem curiae Regis Franciae. — 8.° Copia arresti contra Arnaldum de Romynhano, dati anno 1312. — 9.° Variae litterae Philippi Pulchri et Ludovici X. de rebus Anglicis. — 10.° Bulla Clementis, Papae V. approbans donationem Motae et domorum de Pessaco, factam ecclesiae Burdegalensi à nobili viro Gaillardo de Guto, germano suo, anno primo pontificatus. — 11.° Traitté de paix conclu entre les Rois Philippe et Edouard ; sans date. — 12.° Lettres de Charles IV. Roy de France et de Navarre, touchant les excès commis au lieu de Saint-Sacerdos par le Senechal de Gascogne : l'an 1324. — 13.° Traitté entre la France et l'Angleterre : en la même année. — 14.° Judicium latum apud Oleronem, anno 1287. per D. Norwicensem Episcopum, contra D. Joannem de Greilliaco, dudum Senescallum Vasconiae. — 15.° Tractatus matrimonii inter Alienoram filiam Edwardi Regis Angliae, et Alphonsum filium majorem Petri Regis Aragonum. — 16.° Litterae Petri, Regis Aragonum, de matrimonio filii sui Alphonsi cum Alienora, filia primogenita Regis Edwardi. — 17.° Joannis XXII. bulla contra Michaëlem de Cesena, Ministrum generalem ordinis Minorum : VIII. idus Junii, pontificatus anno XII. — 18.° Edwardi, Regis Anglorum, constitutiones variae ad Aquitaniam spectantes et ad Angliam. — 19.° Traitté de paix entre les Rois de France et d'Angleterre, fait en l'an 1325. — 20.° Litterae Agennensium ad Carolum IV. Regem Franciae, pro Rege Angliae, nominatim de facto Sancti-Sacerdotis, scriptae anno 1324. — 21.° Tractatus matrimonii inter Alphonsum, Regem Castellae et Legionis, et Alienoram, filiam Edwardi Regis Angliae ; item alius inter Edwardum, Regis Angliae primogenitum, et Alienoram sororem Regis Castellae : anno 1325. — 22.° Instructions données par le Roy d'Angleterre à ses Ambassadeurs allans en Espagne pour le fait dudit mariage. — 23.° Abusiones quae exercentur in regno Angliae circa beneficia ecclesiastica ; et remedia sine quibus nunquam cessare creduntur. — 24.° Clementis V. bulla de saecularisatione monasterii de sancto Aemiliano, in dioecesi Burdigalensi ; data anno pontificatus quinto. — 25.° Litterae Edwardi II. Regis Angliae, de servanda pace facta cum Carolo IV. Rege Franciae. — 26.° Ejusdem litterae quibus Edmundum, Comitem Cantiae, fratrem suum, constituit Capitaneum in Ducatu Aquitaniae. — 27.° Lettres de Charles IV. Roy de France, contre le Roy d'Angleterre, qui refusoit de luy faire les foy et hommage pour la Duché d'Aquitaine : de l'année 1324. — 28.° Litterae ejusdem Caroli IV. Regis Francorum, de eadem re ; quibus Carolo, Comiti Valesiae, patruo suo, dat potestatem puniendi rebelles Aquitaniae ; datae anno 1324. — 29.° Litterae ejusdem de salvagardia Guillelmi Galteri, Clerici, datae anno 1323. — 30.° Ejusdem litterae pro Margareta de Guouda, tutrice Pontii domini de Castellione, filii sui, datae anno 1323. — 31.° Ejusdem litterae pro Comitissa Fuxi et Vicecomitissa Bearni et Marciani, tutrice Gastonis filii sui ; datae anno 1322. — 32.° Litterae Antonini Pessaigne, Senescalli Ducatus Aquitaniae, quibus Ostencium Jordani, Clericum ac Jurisperitum, constituit suum et Regis Angliae Procuratorem ; datae anno 1318. — 33.° Litterae Almarici domini de Credonio, Senescalli Ducatus Aquitaniae, quibus Roberto de la Vertadausa, Anglico, decem libras Turonensium parvorum singulis annis solvendas concedit vice et nomine Regis Angliae ; datae anno 1322. — 34.° Divers actes entre les Rois de France et d'Angleterre, pour assurer la paix ; faits depuis l'an 1259. jusques en 1323. — 35.° Acta processus habiti in curia Romana inter capitulum ecclesiae Coventrensis et capitulum ecclesiae Lichefeldiensis de electione Episcopi, tempore Joannis XXII. — 36.° Traitté d'alliance et de confederation entre la France et l'Ecosse contre l'Angleterre ; fait en 1325. — 37.° Articuli exhibiti à Procuratore ecclesiae Lichfeldensis. — 38.° Articuli exhibiti à Procuratore ecclesiae Coventrensis. — 39.° Joannis XXII. bulla de unione Episcopatuum Corkagiensis et Clonensis, data Avenione anno pontificatus XI. — 40.° Acta processus apud eumdem Papam agitati super praebenda sancti Stephani in ecclesia Beverlacensi.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Colbertinus

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Gestión del conocimiento

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Desarrollo empresarial y creación de empresa