866 resultados para (In)security feelings


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Why do states facing high levels of international threat sometimes have militaries that are heavily involved in politics and at other times relatively apolitical, professional militaries? I argue that the answer to this puzzle lies in a state's history of 'acute' international crises rather than its 'chronic' threat environment. Major international crises lead to professionalization and de-politicization of militaries in both the short- and long-term. International crises underscore the need for the military to defend the state and highlight military deficiencies in this regard. Accordingly, major international crises lead to military professionalization and withdrawal from politics in order to increase military effectiveness. This effect persists years, and decades, later due to generational shifts in the officer corps. As the "Crisis Generation" of officers become generals, they bring with them a preference for professionalization and de-politicization. They guide the military towards abstention from politics. I test this theory using a new global dataset on military officers in national governing bodies from 1964-2008 and find strong support for the theory. Major international crises lead to two waves of military withdrawal from government, years apart. Further statistical analysis finds that this effect is most strongly felt in the non-security areas of governing, while in some cases, international crises may lead to militaries increasing their involvement in security policy-making. Further, international crises that end poorly for a state — i.e., defeats or stalemates — are found to drive more rapid waves of military withdrawal from government. The statistical analysis is supported by a case illustration of civil-military relations in the People's Republic of China, which demonstrates that the crisis of the Korean War (1950-53) led to two waves of military professionalization and de-politicization, decades apart. The first occurred immediately after the war. The second wave, occurring in the 1980s, involved wholesale military withdrawal from governing bodies, which was made possible by the ascent of the "Crisis Generation" of officers in the military, who had served as junior officers in the Korean War, decades prior.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission network to satisfy 'reasonable demands for the transmission of electricity' (as stated, for instance, at European Directive 2009/72/EC), the aim is now showing how this approach can be used in conjunction with probabilistic criteria in security analysis. In classical security analysis models of power systems are considered the composite system (generation plus transmission). The state of system components is usually modeled with probabilities and loads (and generation) are modeled by crisp numbers, probability distributions or fuzzy numbers. In the case of CFPF the component’s failure of the transmission network have been investigated. In this framework, probabilistic methods are used for failures modeling of the transmission system components and possibility models are used to deal with 'reasonable demands'. The enhanced version of the CFPF model is applied to an illustrative case.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação para a obtenção do grau de Mestre em Engenharia Electrotécnica Ramo de Energia

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A indústria automóvel necessita aumentar a produtividade de forma sistemática, com vista à redução de custos e incremento da competitividade. A otimização dos produtos e processos é uma constante. O presente trabalho foi solicitado pela empresa FicoCables, do Grupo FICOSA, tendo em vista a otimização do processo de injeção de pequenas peças injetadas em ZAMAK, que constituem o bloqueio na extremidade de cada cabo metálico inserido nos automóveis para abertura da mala, portas, travão de mão, reservatório de combustível, capô, etc. A empresa possui cerca de 52 equipamentos de injeção de ZAMAK, cuja temperatura dos bicos era mantida com base numa chama de gás. Os sucessivos problemas de controlo do sistema ditaram uma mudança estratégica no aquecimento desses bicos, passando a ser usadas resistências elétricas anelares. No entanto, esta mudança veio a apresentar problemas inesperados, os quais se vieram inclusivamente a tornar em problemas de segurança, devido ao desgaste interior prematuro dos bicos, os quais apresentaram esmo problema de rotura. Paralelamente, todos os parâmetros relacionados com este processo de fabrico estavam também estudados de forma algo incipiente, pelo que se tornou necessário compreender e dissecar todas as variáveis relacionadas com o processo e implementar sistemas que impedissem o ajuste não controlado dos parâmetros por parte dos operadores. Também os moldes foram alvo de ações de melhoria, com vista a evitar problemas na zona de contacto do bico com o molde. O processo foi analisado em pormenor, permitindo um controlo muito mais apurado do mesmo. Os resultados fizeram sentir-se de forma imediata, graças ao trabalho desenvolvido neste estudo e à abertura demonstrada pela empresa para implementar todas as soluções propostas. O resultado final traduz-se num incremento significativo da segurança para os operadores, num controlo muito mais apurado de todos os parâmetros envolvidos no processo, numa maior garantia da qualidade nos produtos injetados em ZAMAK e em ganhos financeiros significativos para a empresa.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Portugal, having responsibilities at European level, needs to ensure compliance with European standards, particularly with regard to the European Security Plan for Critical Infrastructures. National critical infrastructures should be a focus of attention with regard to the management of public risks, since these represent "a set of services that are essential to the functioning of the country and the functioning of the forces that ensure national defense." (Soares, 2008) This contribution on national critical infrastructures (CI) has the essential objective of clarifying the development of the strategy adopted by Portugal in pursuit of the security of these fundamental infrastructures. The goal lies not only through producing a descriptive document, but also carry a brief confrontation between the legal framework related to these subjects and the reality in which the Critical Infrastructure Operators and the National Civil Protection Authority (ANPC) operate. It is intended, in this sense, to understand the development of the project for the national security program of critical infrastructures and what effects of its measures on operators. As for the methodology, we followed a methodological strategy, where we combine the literature with data obtained through semi-structured interviews. Portugal, being a geographically peripheral country and having no record of incidents capable of causing major contingencies in key services for the normal development of society, does not have a structured and regulator plan that substantiates the need for operators responsible for CI to invest in security. This same approach is expected at the State level, believing that even though this theme has be widely explored by international institutions, Portugal has not yet tried to give the attention it deserves. Without the existence of an institution and a regulatory system, CI operators can become less available to comply with the legal framework.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

As digital imaging processing techniques become increasingly used in a broad range of consumer applications, the critical need to evaluate algorithm performance has become recognised by developers as an area of vital importance. With digital image processing algorithms now playing a greater role in security and protection applications, it is of crucial importance that we are able to empirically study their performance. Apart from the field of biometrics little emphasis has been put on algorithm performance evaluation until now and where evaluation has taken place, it has been carried out in a somewhat cumbersome and unsystematic fashion, without any standardised approach. This paper presents a comprehensive testing methodology and framework aimed towards automating the evaluation of image processing algorithms. Ultimately, the test framework aims to shorten the algorithm development life cycle by helping to identify algorithm performance problems quickly and more efficiently.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We explore the role of corporate insiders vs. firms as traders of last resort. We develop a simple model of insider trading in which insiders provide price support, as well as liquidity, in security markets. Consistent with the model predictions we find that in the US markets insiders trading activities have a clear impact on return distributions. Furthermore, we provide empirical evidence on insiders transactions and firm transactions affecting returns in a different manner. In particular, while insiders transactions (both purchases and sales) have a strong impact on skewness in the short run and to a lesser extent in short run volatility, company repurchases only have a clear impact on volatility, both in the short and the long run. We provide explanations for this asymmetry.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tänä päivänä tiedon nopea saatavuus ja hyvä hallittavuus ovat liiketoiminnan avainasioita. Tämän takia nykyisiä tietojärjestelmiä pyritään integroimaan. Integraatio asettaa monenlaisia vaatimuksia, jolloin sopivan integraatiomenetelmän ja -teknologian valitsemiseen pitää paneutua huolella. Integraatiototeutuksessa tulisi pyrkiä ns. löyhään sidokseen, jonka avulla voidaan saavuttaa aika-, paikka- ja alustariippumattomuus. Tällöin integraation eri osapuolien väliset oletukset saadaan karsittua minimiin, jonka myötä integraation hallittavuus ja vikasietoisuus paranee. Tässä diplomityössä keskitytään tutkimaan nykyisin teollisuuden käytössä olevien integraatiomenetelmien ja -teknologioiden ominaisuuksia, etuja ja haittoja. Lisäksi työssä tutustutaan Web-palvelutekniikkaan ja toteutetaan asynkroninen tiedonkopiointisovellus ko. teknologian avulla. Web-palvelutekniikka on vielä kehittyvä palvelukeskeinen teknologia, jolla pyritään voittamaan monet aiempia teknologioita vaivanneet ongelmat. Yhtenä teknologian päätavoitteista on luoda löyhä sidos integroitavien osapuolien välille ja mahdollistaa toiminta heterogeenisessa ympäristössä. Teknologiaa vaivaa kuitenkin vielä standardien puute esimerkiksi tietoturva-asioissa sekä päällekkäisten standardien kehitys eri valmistajien toimesta. Jotta teknologia voi yleistyä, on nämä ongelmat pystyttävä ratkaisemaan.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this thesis was to study how certificates could be used to improve security of mobile devices. In the theoretical part the usage of certificates to improve security is explained. In the practical part a concept of certificate handling middleware is introduced and implemented. This is to demonstrate what kind of functionality is needed to provide an improvement over the current situation in security with mobile devices. The certificate handling middleware is a concept that would work better if implemented directly into mobile device's core functionality. Many of the mobile devices have a certificate store to some degree and often it is not used to store other people's certificates. A certificate store combined with address book and added with possibility to add attributes to the people such as group memberships would be sufficient to satisfy the needs of many emerging sharing and social applications.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Since his inauguration, President Barack Obama has emphasized the need for a new cybersecurity policy, pledging to make it a "national security priority". This is a significant change in security discourse after an eight-year war on terror – a term Obama announced to be no longer in use. After several white papers, reports and the release of the so-called 60-day Cybersecurity Review, Obama announced the creation of a "cyber czar" position and a new military cyber command to coordinate American cyber defence and warfare. China, as an alleged cyber rival, has played an important role in the discourse that introduced the need for the new office and the proposals for changes in legislation. Research conducted before this study suggest the dominance of state-centric enemy descriptions paused briefly after 9/11, but returned soon into threat discourse. The focus on China's cyber activities fits this trend. The aim of this study is to analyze the type of modern threat scenarios through a linguistic case study on the reporting on Chinese hackers. The methodology of this threat analysis is based on the systemic functional language theory, and realizes as an analysis of action and being descriptions (verbs) used by the American authorities. The main sources of data include the Cybersecurity Act 2009, Securing Cyberspace for the 44th Presidency, and 2008 Report to Congress of the U.S. - China Economic and Security Review Commission. Contrary to the prevailing and popularized terrorism discourse, the results show the comeback of Cold War rhetoric as well as the establishment of a state-centric threat perception in cyber discourse. Cyber adversaries are referred to with descriptions of capacity, technological superiority and untrustworthiness, whereas the ‘self’ is described as vulnerable and weak. The threat of cyber attacks is compared to physical attacks on critical military and civilian infrastructure. The authorities and the media form a cycle, in which both sides quote each other and foster each other’s distrust and rhetoric. The white papers present China's cyber army as an existential threat. This leads to cyber discourse turning into a school-book example of a securitization process. The need for security demands action descriptions, which makes new rules and regulations acceptable. Cyber discourse has motives and agendas that are separate from real security discourse: the arms race of the 21st century is about unmanned war.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this research was to provide a deeper insight into the consequences of electronic human resource management (e-HRM) for line managers. The consequences are viewed as used information system (IS) potentials pertaining to the moderate voluntaristic category of consequences. Due to the need to contextualize the research and draw on line managers’ personal experiences, a qualitative approach in a case study setting was selected. The empirical part of the research is loosely based on literature on HRM and e-HRM and it was conducted in an industrial private sector company. In this thesis, method triangulation was utilized, as nine semi-structured interviews, conducted in a European setting, created the main method for data collection and analysis. Other complementary data such as HRM documentation and statistics of e-HRM system usage were utilized as background information to help to put the results into context. E-HRM has partly been taken into use in the case study company. Line managers tend to use e-HRM when a particular task requires it, but they are not familiar with all the features and possibilities which e-HRM has to offer. The advantages of e-HRM are in line with the company’s goals. The advantages are e.g. an transparency of data, process consistency, and having an efficient and easy-to-use tool at one’s disposal. However, several unintended, even contradictory, and mainly negative outcomes can also be identified, such as over-complicated processes, in-security in use of the tool, and the lack of co-operation with HR professionals. The use of e-HRM and managers’ perceptions regarding e-HRM affect the way in which managers perceive the consequences of e-HRM on their work. Overall, the consequences of e-HRM are divergent, even contradictory. The managers who considered e-HRM mostly beneficial to their work found that e-HRM affects their work by providing information and increasing efficiency. Those managers who mostly perceived challenges in e-HRM did not think that e-HRM had affected their role or their work. Even though the perceptions regarding e-HRM and its consequences might reflect the strategies, the distribution of work, and the ways of working in all HRM in general and can’t be generalized as such, this research contributed to the field of e-HRM and it provides new perspectives to e-HRM in the case study organization and in the academic field in general.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tällä tutkimuksella oli tavoitteena selvittää kuluttajapalveluita tarjoavien yritysten turvallisuuskulttuurin taso sekä mahdollisuuksia tason kehittämiseksi. Turvallisuuskulttuuria ja miten se kytkeytyy kuluttajaturvallisuuteen, käsiteltiin teorian kautta. Samalla luotiin yleiskatsaus turvallisuusajattelun kehitykseen Suomessa. Turvallisuuskulttuurin taso selvitettiin kyselytutkimuksella kuluttajapalveluita valvoville viranomaisille. Samalla saatiin katsaus myös siihen, millaisia menetelmiä valvonnan käytössä on ollut ja kuinka aktiivisesti esimerkiksi jälkivalvontaa on tehty. Kyselyn perusteella turvallisuuskulttuuri on tasolla, jolla pyritään vain täyttämään lainsäädännön ja viranomaisten antamat vaatimukset. Tason korottamiseksi löytyi mahdollisuuksia niin viranomaisten valvontaa ajatellen kuin myös toiminnanharjoittajille. Tällaisia mahdollisuuksia ovat muun muassa toiminnanharjoittajille yhteisesti järjestettävät koulutustilaisuudet. Toiminnanharjoittajilla kokonaisturvallisuusjohtaminen ja laatuajattelu pitää sisällään usein työturvallisuus-, työterveys- ja ympäristöasioita. Mikäli tätä ajattelua laajentaa asiakasnäkökulmalla, lisäisi se kuluttajaturvallisuutta kokonaisuudessaan. Oman haasteen kuluttajaturvallisuuden kehittymiseen tuo mukanaan valvonnan valtiollistaminen ja etenkin sen käytännön toteuttaminen.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this qualitative study was to investigate the application of Cognitive Coaching as a school-based professional development program to improve instructional thought and decision making as well as to enhance staff perceptions, coUegiality and school culture. This topic emerged from personal and professional issues related to the role ofthe reflective practitioner in improving the quality of education, yet cognizant of the fact that little professional development was available to train teachers to become reflective. This case study, positioned within the interpretive sciences, focused on three teachers and how their experiences with cognitive coaching affected their teaching practices. Their knowledge, understanding and use of the four stages of instructional thought (preactive, interactive, reflective and projective) were tested before and at the end of eight coaching cycles, and again after two months to determine whether they had continued to use the reflective process. They were also assessed on whether their attitude towards peer coaching had changed, whether their feelings about teaching had become more positive and whether their professional dialogue had increased. Three methods of data collection were selected to assess growth: interviews, observations and joumaling. Analysis primarily consisted of coding and organizing data according to emerging themes. Although the professed aim of cognitive coaching was to teach the process in order that the teachers would become self-analytical and self-modifying, this study found that the value of the coaching, after trust had been established in both the coach and the process, was in the dialoguing and the time set aside to do it. Once the coaching stopped providing the time to dialogue, to examine one's meanings and beliefs, so did the critical self-reflection. As a result ofthe cognitive coaching experience though, all participants grew in their feelings of efficacy, craftsmanship, flexibility, consciousness and interdependence. The actual and potential significance ofthis study was discussed according to implications for teacher supervision, professional development, school culture, further areas of research and to my personal growth and development.