952 resultados para user-driven security adaptation
Resumo:
Laggards are the last users to adopt a product. Prior literature on user-led innovation ignores laggards’ impact on innovation. In this paper, we develop the Lag-User Method, through which laggards can generate new ideas. Through six studies with 62 teams in three countries, we apply the method to different technologies and services and present our findings to executives to get managerial insights. Findings reveal that laggards who generate new ideas (lag-users) have different perceptions of user-friendly products and different unfulfilled needs. They prefer simple products. We propose that by involving lag-users in NPD, firms can improve the effectiveness of NPD.
Resumo:
While the concept of consumer satisfaction is a central topic in modern marketing theory and practice, citizens' satisfaction with public services, and especially water and waste services, is a eld that still remains empirically rather unexplored. The following study aims to contribute to this area by analysing the determinants of user satisfaction in the water, wastewater and waste sector in Portugal, using a unique survey of 1070 consumers undertaken by the Portuguese Water and Waste Regulator ERSAR. I perform an analysis of the relation between overall service satisfaction and attributespeci c service satisfaction with an ordered logit model. I then explore if subjective consumer satisfaction can be re ected by ERSAR's technical performance indicators. The results suggest that overall consumer satisfaction is driven by consumer's satisfaction with speci c service aspects but unrelated to socioeconomic and demographic characteristics. Furthermore, I show that there is no monotonic association between ERSAR's technical performance indicators and consumers' levels of satisfaction.
Resumo:
RESUMO: Este estudo procurou documentar a perspectiva (s) dos utentes de saúde mental e das associações de prestadores de cuidados sobre a prestação, o papel e a contribuição de serviços de saúde mental da comunidade tal como foram percebidos por um número de informadores-chave, incluindo os utentes do serviço mentais e os próprios prestadores de cuidados. O caso específico da Sociedade Saúde Mental do Gana (MEHSOG) foi o foco deste estudo. O modelo foi o de um estudo de caso, utilizando discussões de grupo e entrevistas com informadores-chave como instrumentos de recolha de dados. Estas ferramentas de colheita de dados foram complementadas por observações dos participantes e pela revisão de documentos da MEHSOG e dos vários grupos de apoio da comunidade de auto-ajuda que compõem a associação nacional. O estudo revelou que os utentes dos serviços de saúde mental e seus prestadores de cuidados constituem um importante grupo de partes interessadas na prestação de serviços de saúde mental da comunidade e no desenvolvimento de políticas que tenham em conta as necessidades e os direitos das pessoas com doença mental ou epilepsia. O envolvimento da MEHSOG promove a mobilização de membros e famílias relacionadas com a doença mental de beneficiar de serviços de tratamento bem organizados com um impacto significativo na melhoria da saúde e da participação dos utentes dos serviços e seus prestadores de cuidados primários em processos de tomada de decisão da família e na comunidade processos de desenvolvimento. Os utentes dos serviços por beneficiarem de tratamento, e os prestadores de cuidados primários, por se tornarem mais livres e menos sobrecarregados com a responsabilidade de cuidar, podem passar a envolver-se mais em atividades que melhoramo seu estado, o de suas famílias e das comunidades. A advocacia dos membros da MEHSOG para conseguir que a “Mental Health Bill” se transforme numa Lei foi também um desenvolvimento significativo resultante da participação ativa dos utentes do serviço em chamar a atenção para uma nova e inclusiva legislação de saúde mental para o Gana. Entre os fatores e oportunidades que permitiram aos utentes dos serviços de saúde mental e aos prestadores de cuidados primários de pessoas com doença mental apoiar activamente a prestação de serviços de saúde mental comunitária e o desenvolvimento de políticas conta-se a contribuição da sociedade civil do Gana, particularmente o movimento da deficiência, e os esforços anteriores de ONGs em saúde mental e dos profissionais de saúde mental para ter uma nova lei em saúde mental. Observámos um certo número de desafios e barreiras que actuam de forma a limitar a influência dos utentes dos serviços de saúde mental na provisão da saúde mental comunitária e no desenvolvimento de políticas. Entre elas o estigma social contra a doença mental e pessoas com doença mental ou epilepsia e seus cuidadores primaries é um factor chave. O estigma tem alterado a percepção e as análises do público em geral, especialmente dos profissionais de saúde e das autoridades políticas afetando a priorização dos problemas de saúde mental nas políticas e programas. Outro desafio foi a deficiente infra-estrutura disponível para apoiar serviços de saúde mentais que assegurem aos utentes permanecerem em bom estado de saúde e bem-estar para serem advogados de si próprios. A recomendação do presente estudo é que os movimentos de utentes dos serviços de saúde mental são importantes e que eles precisam de ser apoiados e encorajados a desempenhar o seu papel como pessoas com experiência vivida para contribuir para a organização e prestação de serviços de saúde mental, bem como para a implementação, monitorização e avaliação de políticas e programas. ------------------------------------ ABSTRACT: This study sought to document the perspective(s) of mental health users and care-givers associations in community mental health service provision and their role and contribution as it was perceived by a number of key informants including the mental service users and care-givers themselves. The specific case of the Mental Health Society of Ghana (MEHSOG) was the focus of this study. A case study approach was used to with Focus Group Discussions and Key Informants Interviews being the data collection tools that were used. These data collection tools were complemented by participant observations and review of documents of the MEHSOG and the various community self-help peer support groups that make up the national association. The study revealed that mental health service users and their care-givers constitute an important stakeholder group in community mental health service provision and development of policies that factor in the needs and rights of persons with mental illness or epilepsy. MEHSOG’s involvement in mobilising members and education families to come forward with the relations with mental illness to benefit from treatment services were well made a significant impact in improving the health and participation of service users and their primary carers in family decision-making processes and in community development processes. Service users, on benefiting from treatment, and primary care-givers, on becoming freer and less burdened with the responsibility of care, move on to engage in secure livelihoods activities, which enhanced their status in their families and communities. The advocacy MEHSOG members undertook in getting the mental health Bill become Law was also noted as significant development that was realised as a result of active involvement of service users in calling for a new and inclusive mental health legislation for Ghana. Enabling factors and opportunities that enabled mental health service users and primary care-givers of people with mental illness to actively support community mental health service provision and policy development is with the vibrant civil society presence in Ghana, particularly the disability movement, and earlier efforts by NGOs in mental health in Ghana long-side mental health professionals to have a new law in mental health. A number of challenges were also noted which were found to limit the extent to which mental health service users can be influential in community mental health service provision and policy development. Key among them was the social stigma against mental illness and people with mental illness or epilepsy and their primary carers. Stigma has affected perceptions, analyses of the general public, especially health practitioners and policy authorities that it has affected their prioritisation of mental health issues in policies and programmes. Another challenge was the poor infrastructure available to support enhanced mental health care services that ensure mental health service users remain in a good state of health and wellbeing to advocate for themselves. The recommendation from the study is that mental health service user movements are important and need to be supported and encouraged to play their role as persons with lived experience to inform organisation and provision of mental health services as well as design and implementation, monitoring and evaluation of policies and programes.
Resumo:
In an increasingly globalized society, the crime appears as a reality that crosses borders. Globalization has potentiated the emergence of new forms of crime, which have been the subject of more interventional, particularly in terms of political, judicial and police authorities as well as civil society approaches. The media allow rapid expansion of criminal methodologies, which aggregate to the ease of movement of itinerant criminal groups, increases the opportunities for the continuation of the practice of criminal offenses, threatening, increasingly, the tranquility and safety of populations. Criminal organizations are characterized by their complexity, thus contributing to the difficulty in combat, by police and judicial authorities, forcing rapid adaptation to new political and criminal reality, particularly at the level of institutional cooperation, national and international, as exemplified by the creation of the "European Area of Freedom, Security and Justice" and new agencies in the field of police cooperation. It was intended with this paper to answer the central question: Is it possible to define a concept of Itinerant Crime in the European regulatory framework (Police and Judiciary)? To fulfill this aim, we performed the characterization of the concept of itinerant crime including itinerant criminal group, we analyzed the work that is being done by the authorities, police and judiciary, in order to contain the phenomenon. Finally, we studied type of existing cooperation at European level between the Member States and the authorities with responsibilities in this area. At the end, we conclude that efforts are being made towards the enhancement of operational, police and judicial cooperation, between the competent authorities of the European Union by combating this phenomenon. Define, and also proposed, a unique concept of Itinerant Crime, in order to be included in the legal standards, in order to facilitate research, in particular to better fit the itinerant crime and assist the prosecution of offenders.
Resumo:
A aceleração do ritmo de mudança verificado nas sociedades atuais, tem sido impulsionado pela globalização, fenómeno decorrente da evolução das tecnologias da informação, das telecomunicações, das comunicações e transportes e do desaparecimento de fronteiras. Viver na “aldeia global” ou à escala global como o previu Marshall McLuhan (1964) no livro Understanding Media, é hoje uma realidade inquestionável. As consequências desta transformação foram múltiplas quer do ponto de vista dos benefícios, quer do ponto de vista dos problemas gerados. No plano da segurança, face ao multiculturalismo envolvido e ao aumento crescente do crime transfronteiriço, tornou-se essencial a partilha de informação a nível internacional tendo em vista o seu combate não só olhando a situação dos cidadãos como a defesa dos princípios democráticos. Realça-se que os progressos tecnológicos e as facilidades que criam aos seus utilizadores, neste caso os criminosos, fazem com que as ações por estes praticadas sejam cada vez mais meticulosas, imprevisíveis, sofisticadas e complexas o que impõe uma resposta correspondente e adequada. Por essa razão, as políticas de segurança existentes mostraram-se insuficientes e esgotadas requerendo novas respostas capazes de produzir os efeitos desejáveis para uma efetiva prevenção da criminalidade. Pelas dimensões que tem vindo a tomar, a criminalidade tornou-se uma preocupação que ultrapassou o domínio da segurança interna de cada país para ser encarada a nível internacional ou mesmo mundial. Para o efeito urge concertar processos e procedimentos securitários agregando vontades que convirjam e defendam a unificação dos sistemas dos países a nível mundial. A verificar-se tal intento, daí resultariam significativas melhorias da segurança a todos os níveis (nacional, internacional e mundial). Além disso também resultariam ganhos em termos de tempo, redução de custos, impacto na qualidade dos serviços prestados, na gestão das pessoas e na eficiência das organizações. Realça-se que a democracia ao promover a dignidade do homem densificando os seus direitos, liberdades e garantias, criou indiretamente condições para que fosse gerada instabilidade e o desenvolvimento de comportamentos criminosos. Importa, portanto, face à situação existente e à previsível complexidade do crime no futuro, estudar profundamente a nova realidade neste domínio, para tomar as medidas preventivas tendentes a reporem a estabilidade e a promoverem a paz social. Foi neste contexto que a presente investigação, desenvolvida no âmbito académico, mas também suportado na realidade profissional, pretendeu refletir sobre o estado da segurança global e dar o seu contributo nesta matéria.
Resumo:
The year is 2015 and the startup and tech business ecosphere has never seen more activity. In New York City alone, the tech startup industry is on track to amass $8 billion dollars in total funding – the highest in 7 years (CB Insights, 2015). According to the Kauffman Index of Entrepreneurship (2015), this figure represents just 20% of the total funding in the United States. Thanks to platforms that link entrepreneurs with investors, there are simply more funding opportunities than ever, and funding can be initiated in a variety of ways (angel investors, venture capital firms, crowdfunding). And yet, in spite of all this, according to Forbes Magazine (2015), nine of ten startups will fail. Because of the unpredictable nature of the modern tech industry, it is difficult to pinpoint exactly why 90% of startups fail – but the general consensus amongst top tech executives is that “startups make products that no one wants” (Fortune, 2014). In 2011, author Eric Ries wrote a book called The Lean Startup in attempts to solve this all-too-familiar problem. It was in this book where he developed the framework for The Hypothesis-Driven Entrepreneurship Process, an iterative process that aims at proving a market before actually launching a product. Ries discusses concepts such as the Minimum Variable Product, the smallest set of activities necessary to disprove a hypothesis (or business model characteristic). Ries encourages acting briefly and often: if you are to fail, then fail fast. In today’s fast-moving economy, an entrepreneur cannot afford to waste his own time, nor his customer’s time. The purpose of this thesis is to conduct an in-depth of analysis of Hypothesis-Driven Entrepreneurship Process, in order to test market viability of a reallife startup idea, ShowMeAround. This analysis will follow the scientific Lean Startup approach; for the purpose of developing a functional business model and business plan. The objective is to conclude with an investment-ready startup idea, backed by rigorous entrepreneurial study.
Resumo:
Double Degree
Resumo:
A Internet conta hoje com mais de 3 mil milhões de utilizadores e esse valor não para de aumentar. Desta forma, proporcionar uma experiência online agradável aos seus utilizadores é cada vez mais importante para as empresas. De modo a tirar partido dos benefícios deste crescimento, as empresas devem ser capazes de identificar os seus clientes-alvo dentro do total de utilizadores; e, subsequentemente, personalizar a sua experiência online. Existem diversas formas de estudar o comportamento online dos utilizadores; no entanto, estas não são ideais e existe uma ampla margem para melhoria. A inovação nesta área pode comportar um grande potencial comercial e até ser disruptiva. Com isto em mente, proponho-me a estudar a possível criacão de um sistema de aprendizagem automática (machine learning) que permita prever informa ações demográficas dos utilizadores estritamente com base no seu comportamento online. Tal sistema poderia constituir uma alternativa às atuais opções, que são mais invasivas; mitigando assim preocupações ao nível da proteção de dados pessoais. No primeiro capítulo (Introdução) explico a motivação para o estudo do comportamento dos utilizadores online por parte de empresas, e descrevo as opções disponíveis atualmente. Apresento também a minha proposta e o contexto em que assenta. O capítulo termina com a identicação de limitações que possam existir a priori. O segundo capítulo (Machine Learning) fornece uma introdução sobre machine learning, com o estudo dos algoritmos que vão ser utilizados e explicando como analisar os resultados. O terceiro capítulo (Implementação) explica a implementação do sistema proposto e descreve o sistema que desenvolvi no decorrer deste estudo, e como integra-lo em sistemas já existentes. No quarto capítulo (Análise e manipulação dos dados), mostro os dados compilados e explico como os recolhi e manipulei para testar a hipótese. No quinto capítulo (Análise de dados e discussão) vemos como e que os dados recolhidos foram usados pelos vários algoritmos para descobrir como se correlacionam com dados dos utilizadores e analiso e discuto os resultados observados. Por fim, o sexto e último capítulo apresenta as conclusões. Dependendo dos resultados, mostro como a hipótese poderia ser melhor testada, ou então discuto os próximos passos para tornar o sistema realidade.
Resumo:
As huge amounts of data become available in organizations and society, specific data analytics skills and techniques are needed to explore this data and extract from it useful patterns, tendencies, models or other useful knowledge, which could be used to support the decision-making process, to define new strategies or to understand what is happening in a specific field. Only with a deep understanding of a phenomenon it is possible to fight it. In this paper, a data-driven analytics approach is used for the analysis of the increasing incidence of fatalities by pneumonia in the Portuguese population, characterizing the disease and its incidence in terms of fatalities, knowledge that can be used to define appropriate strategies that can aim to reduce this phenomenon, which has increased more than 65% in a decade.
Resumo:
Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.
Resumo:
Immune systems have been used in the last years to inspire approaches for several computational problems. This paper focus on behavioural biometric authentication algorithms’ accuracy enhancement by using them more than once and with different thresholds in order to first simulate the protection provided by the skin and then look for known outside entities, like lymphocytes do. The paper describes the principles that support the application of this approach to Keystroke Dynamics, an authentication biometric technology that decides on the legitimacy of a user based on his typing pattern captured on he enters the username and/or the password and, as a proof of concept, the accuracy levels of one keystroke dynamics algorithm when applied to five legitimate users of a system both in the traditional and in the immune inspired approaches are calculated and the obtained results are compared.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.
Resumo:
This paper presents a proposal for a management model based on reliability requirements concerning Cloud Computing (CC). The proposal was based on a literature review focused on the problems, challenges and underway studies related to the safety and reliability of Information Systems (IS) in this technological environment. This literature review examined the existing obstacles and challenges from the point of view of respected authors on the subject. The main issues are addressed and structured as a model, called "Trust Model for Cloud Computing environment". This is a proactive proposal that purposes to organize and discuss management solutions for the CC environment, aiming improved reliability of the IS applications operation, for both providers and their customers. On the other hand and central to trust, one of the CC challenges is the development of models for mutual audit management agreements, so that a formal relationship can be established involving the relevant legal responsibilities. To establish and control the appropriate contractual requirements, it is necessary to adopt technologies that can collect the data needed to inform risk decisions, such as access usage, security controls, location and other references related to the use of the service. In this process, the cloud service providers and consumers themselves must have metrics and controls to support cloud-use management in compliance with the SLAs agreed between the parties. The organization of these studies and its dissemination in the market as a conceptual model that is able to establish parameters to regulate a reliable relation between provider and user of IT services in CC environment is an interesting instrument to guide providers, developers and users in order to provide services and secure and reliable applications.
Resumo:
Novel input modalities such as touch, tangibles or gestures try to exploit human's innate skills rather than imposing new learning processes. However, despite the recent boom of different natural interaction paradigms, it hasn't been systematically evaluated how these interfaces influence a user's performance or whether each interface could be more or less appropriate when it comes to: 1) different age groups; and 2) different basic operations, as data selection, insertion or manipulation. This work presents the first step of an exploratory evaluation about whether or not the users' performance is indeed influenced by the different interfaces. The key point is to understand how different interaction paradigms affect specific target-audiences (children, adults and older adults) when dealing with a selection task. 60 participants took part in this study to assess how different interfaces may influence the interaction of specific groups of users with regard to their age. Four input modalities were used to perform a selection task and the methodology was based on usability testing (speed, accuracy and user preference). The study suggests a statistically significant difference between mean selection times for each group of users, and also raises new issues regarding the “old” mouse input versus the “new” input modalities.