870 resultados para Electronic commerce - Security measures


Relevância:

30.00% 30.00%

Publicador:

Resumo:

"A United States Department of Commerce publication."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"August 1970"--Cover.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"July 1996."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Edaphic factors affect the quality of onions (Allium cepa). Two experiments were carried out in the field and glasshouse to investigate the effects of N (field: 0, 120 kg ha(-1); glasshouse: 0, 108 kg ha(-1)), S (field: 0, 20 kg ha(-1); glasshouse: 0, 4.35 kg ha(-1)) and soil type (clay, sandy loam) on onion quality. A conducting polymer sensor electronic nose (E-nose) was used to classify onion headspace volatiles. Relative changes in the E-nose sensor resistance ratio (%dR/R) were reduced following N and S fertilisation. A 2D Principal Component Analysis (PCA) of the E-nose data sets accounted for c. 100% of the variations in onion headspace volatiles in both experiments. For the field experiment, E-nose data set clusters for headspace volatiles for no N-added onions overlapped (D-2 = 1.0) irrespective of S treatment. Headspace volatiles of N-fertilised onions for the glasshouse sandy loam also overlapped (D-2 = 1.1) irrespective of S treatment as compared with distinct separations among clusters for the clay soil. N fertilisation significantly (P < 0.01) reduced onion bulb pyruvic acid concentration (flavour) in both experiments. S fertilisation increased pyruvic acid concentration significantly (P < 0.01) in the glasshouse experiment, especially for the clay soil, but had no effect on pyruvic acid concentration in the field. N and S fertilisation significantly (P < 0.01) increased lachrymatory potency (pungency), but reduced total soluble solids (TSS) content in the field experiment. In the glasshouse experiment, N and S had no effect on TSS. TSS content was increased on the clay by 1.2-fold as compared with the sandy loam. Onion tissue N:water-soluble SO42- ratios of between five and eight were associated with greater %dR/R and pyruvic acid concentration values. N did not affect inner bulb tissue microbial load. In contrast, S fertilisation reduced inner bulb tissue microbial load by 80% in the field experiment and between 27% (sandy loam) and 92% (clay) in the glasshouse experiment. Overall, onion bulb quality discriminated by the E-nose responded to N, S and soil type treatments, and reflected their interactions. However, the conventional analytical and sensory measures of onion quality did not correlate with %dR/R.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Communications devices for government or military applications must keep data secure, even when their electronic components fail. Combining information flow and risk analyses could make fault-mode evaluations for such devices more efficient and cost-effective.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite reports that adopted persons are destined for poor psychological and relational adjustment, this conclusion remains controversial. Previous research on this topic has been inconclusive, and has failed to provide a complex assessment of the predictors of adjustment. For instance, whether attachment security plays a key role in later relationship outcomes remains unresolved. This paper presents the results of a longitudinal study of adults who were adopted as infants, and a comparison sample of adults who grew up with both biological parents. Two research questions were addressed: differences in attachment security between the two samples, and the predictive relations between initial attachment scales and relationship variables (e.g., risk in intimacy, loneliness) assessed at follow-up. Attachment profiles at Time 1 indicated less security in the adopted sample than the comparison sample, and these differences were maintained at follow-up. However, adoptees who had not searched for birth relatives did not differ from the comparison sample. Although sample (adopted / comparison) was an important predictor of some relationship variables, it became less influential when attachment measures were included. Discussion focused on the complex factors that influence attachment security, and the need for in-depth study of the relational experiences of adopted people.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fieldwork placements are an integral part of many professional tertiary programmes. At The University of Queensland, Occupational Therapy students undertake block fieldwork affiliations off campus at a wide range of sites as part of their studies. Students’ fieldwork performance has traditionally been assessed using a hard copy format of the Student Placement Evaluation Form (SPEF), which is posted to the university on completion by the clinical supervisor. This project aimed to develop an electronic version of the UQ Occupational Therapy Student Placement Evaluation Form (SPEF), to allow the assessment to be completed and returned in an on line format. Practitioners had become very comfortable with using the existing print based form so in order to encourage and assist users to extend beyond their comfort zones, numerous steps were taken to ease the learning process including incorporating the existing page layout, consistent colour coding, considerable user instruction, testing and software enhancement cycles. Additionally, the e-version of the SPEF aimed to provide a range of benefits such as on screen assistance in the form of instructions, roll overs and feedback to supervisors, increased accuracy, faster completion, cost savings to the School, up to date design, improved security and confidential and anonymous storage of fieldwork results for potential future research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The application of any e-Solution promises significant returns. In particular, using internet technologies both within enterprises and across the supply (value) chain provides real opportunity, not only for operational improvement but also for innovative strategic positioning. However, significant questions obscure potential investment; how any value will actually be created and, importantly, how this value will be shared across the value chain is not clear. This paper will describe a programme of research that is developing an enterprise simulator that will provide a more fundamental understanding of the impact of e-Solutions across operational supply chains, in terms of both standard operational and financial measures of performance. An efficient supply chain reduces total costs of operations by sharing accurate real-time information and coordinating inter-organizational business processes. This form of electronic link between organizations is known as business-to-business (B2B) e-Business. The financial measures go beyond simple cost calculations to real bottom-line performance by modelling the financial transactions that business processes generate. The paper will show how this enterprise simulator allows for a complete supply chain to be modelled in this way across four key applications: control system design, virtual enterprises, pan-supply-chain performance metrics and supporting e-Supply-chain design methodology.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Danish companies are especially prevalent in China where they have found opportunities to exploit their niche position in a number of specialised product areas. As a result, their operations are often well advanced in terms of the levels of technology transferred and the extent of transfer. Transferring technology brings with it risks as well as benefits. Its absorption and dissemination can, in the longer term, bring about new competitors unless measures are taken to prevent leakage of know-how or the technology supplier can stay ahead of the technological race. This paper draws on data from three Danish case companies that are transferring technology to China. The cases are examined within a framework that allows the identification of the companies’ motivations for transfer against their awareness of the techno-economic security issues. In this way it is possible to highlight the strategic and operational approaches that can be taken to obviate the risks involved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We have recently proposed the framework of independent blind source separation as an advantageous approach to steganography. Amongst the several characteristics noted was a sensitivity to message reconstruction due to small perturbations in the sources. This characteristic is not common in most other approaches to steganography. In this paper we discuss how this sensitivity relates the joint diagonalisation inside the independent component approach, and reliance on exact knowledge of secret information, and how it can be used as an additional and inherent security mechanism against malicious attack to discovery of the hidden messages. The paper therefore provides an enhanced mechanism that can be used for e-document forensic analysis and can be applied to different dimensionality digital data media. In this paper we use a low dimensional example of biomedical time series as might occur in the electronic patient health record, where protection of the private patient information is paramount.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

E-business adoption rates in the agri-food sector are rather low, despite the fact that technical barriers have been mostly overcome during the last years and a large number of sophisticated offers are available. However, concerns about trust seem to impede the development of electronic relationships in the agri-food chains as trust is of particular importance in any exchange of agri-food products along the value chain. Drawing on existing research, characteristics and dimensions of trust are initially identified both in traditional and in electronic B2B relationships and a typology of trust is proposed. The aim of the paper is to provide an overview of the implementation and use of trust elements that e-commerce offers dedicated to agri-food sector. This assessment will show the current situation and discuss gaps for further improvement with the objective to facilitate the uptake of e-commerce in agri-food chains. © 2009 Elsevier B.V. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Kimutatható-e az e-kereskedelem hatása a vállalati teljesítményre a recesszióval küzdő magyar kiskereskedelmi piacon? A hagyományos bolti értékesítés vagy on-line kereskedelem vezet hazánkban jobb pénzügyi teljesítményhez? Ezekre a kérdésekre a magyar IKT (infokommunikációs technológiai) kiskereskedők 187 elemű mintáján igyekeznek a szerzők választ keresni, az adatgyűjtést újszerű módon részben automatizált webpókokra bízva, következtetéseiket pedig elsősorban klaszterelemzési technikákra építve. Megállapítják, hogy bár a legjobb bolti kereskedők többnyire valamivel nagyobb és stabilabb profitrátákkal jellemezhetők a válság éveiben is, a piac megtartása és növelése terén már egyértelműen az e-kereskedők jeleskedtek. Eredményeik szerint az e-kereskedelem hozzásegítheti a kiskereskedőket a munkaerő-hatékonyság növeléséhez is, ám ha gyors rendelkezésre állással vagy alacsony árakkal csábítják vevőiket, akkor a profittöbblet egy részét felőrölheti a magasabb készlettartási igény vagy az árverseny. _____ The study examines whether e-commerce has a significant impact on corporate performance on the Hungarian retail market struggling with the effects of economic downturn. Is it brick-and-mortal retail or e-commerce that leads to a better financial performance? Using the innovative data gathering tools of automotive web crawlers the authors seek answers to these questions on a sample of 187 Hungarian ICT retailers. Based on cluster analysis they conclude that while the best traditional retailers have somewhat higher and more stable profitability ratios even during the years of recession, e-tailers are more successful in retaining and increasing their market share. E-commerce is also associated with higher human resource productivity, but the possible profit surplus originating from this advantage could be jeopardized in the long run as new electronic traders typically attract their customers by shorter service time or lower prices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.