987 resultados para Security token service


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes research investigating expertise and the types of knowledge used by airport security screeners. It applies a multi method approach incorporating eye tracking, concurrent verbal protocol and interviews. Results show that novice and expert security screeners primarily access perceptual knowledge and experience little difficulty during routine situations. During non-routine situations however, experience was found to be a determining factor for effective interactions and problem solving. Experts were found to use strategic knowledge and demonstrated structured use of interface functions integrated into efficient problem solving sequences. Comparatively, novices experienced more knowledge limitations and uncertainty resulting in interaction breakdowns. These breakdowns were characterised by trial and error interaction sequences. This research suggests that the quality of knowledge security screeners have access to has implications on visual and physical interface interactions and their integration into problem solving sequences. Implications and recommendations for the design of interfaces used in the airport security screening context are discussed. The motivations of recommendations are to improve the integration of interactions into problem solving sequences, encourage development of problem scheme knowledge and to support the skills and knowledge of the personnel that interact with security screening systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to their potential to positively influence sales quality and performance and reduce employee turnover in service organizations, HR practices targeting employee commitment have received considerable attention in the HRM literature in recent years. Parallel to this, there has been increasing focus on the nature of commitment, and in particular the existence of multiple commitment foci. In this paper, we examine how HR practices influence professionals' commitment to their organization, to their profession or to both organization and profession, in a qualitative study of three Danish financial investment firms. Our findings suggest that in professional service firms, HR practices encourage high levels of organizational commitment primarily and most often through their influence on professional commitment and that HR practices related to flexible work design are essential in creating balance between an employee's commitment to organization and commitment to their profession. Further, the findings suggest that these same HR practices may foster such high levels of professional commitment that labor turnover will increase when opportunities for pursuing professional goals afforded by work design are restricted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study adopts the premise that innovation capability underpins a service firm's value creation ability and that management style, employee behaviors and marketing underpin its innovation capability. This study examines the role of managers and employees in the creation and delivery of superior value to customers via the firm's innovation capability. To test this premise the current study examines the role of transformational leadership (TFL) as an aspect of the service firm's management style in creating and delivering value to customers through its services. This study adopts a multi-level study, collecting data from managers, employees and customers of service firms in a Southeast-Asian country, Cambodia. The results show that a service firm's innovation capability has a positive effect on the firm's value offering (VO), the VO has a positive relationship with customer perceived value-in use (PVI), and PVI has a positive relationship with firm performance. This study also finds moderating effects of TFL on the relationship between service innovation capability and VO, and of service marketing capability on the relationship between VO and PVI respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose This study seeks to extend the existing literature on value creation by specifically focusing on service brand value creation (SBVC) and the role of brand marketing. Design/methodology/approach The authors first develop a model of SBVC and simultaneously investigate SBVC from the firm perspective (service brand value offering – SBVO) and from the customer perspective (service brand perceive value-in use – SBPVI). Subsequently, they investigate the effects of SBVO on SBPVI and integrate the moderation role of service brand marketing capability (SBMC) on the relationship between SBVO-SBPVI outcomes. SBVO is viewed as the firms' interpretation of and responsiveness to customer requirements via the delivery of superior performance the value offering through the service brand and SBPVI customers' perceived value from the firms' service brand. The contributions of SBVC to customer-based performance outcomes are then investigated. Hypotheses were tested using a sample of the senior managers of service firms in Cambodia and their customers. A survey was used to gather data via a drop-and-collect approach. Findings Results indicated that SBVO is positively related to SBPVI and SBPVI is positively related to customer-based performance. Noticeably, the results revealed that SBMC enhances the positive relationship between the firm SBVO and the customers SBPVI. Originality/value The paper extends the previous literature on value creation to capture SBVC. More significantly, the premise of the theoretical framework provides a breakthrough in the current SBVC literature which has so far neglected to take into account the dyadic approach (firm-customer) in understanding value creation and more specifically SBVC. The model is expanded by looking at the contingency role of SBMC in communicating value to customers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the attractive feature of provable pseudorandomness security assuming the hardness of the RSA inversion problem. However, despite extensive study, the most efficient provably secure RSA-based generators output asymptotically only at most O(logn) bits per multiply modulo an RSA modulus of bitlength n, and hence are too slow to be used in many practical applications. To bring theory closer to practice, we present a simple modification to the proof of security by Fischlin and Schnorr of an RSA-based PRG, which shows that one can obtain an RSA-based PRG which outputs Ω(n) bits per multiply and has provable pseudorandomness security assuming the hardness of a well-studied variant of the RSA inversion problem, where a constant fraction of the plaintext bits are given. Our result gives a positive answer to an open question posed by Gennaro (J. of Cryptology, 2005) regarding finding a PRG beating the rate O(logn) bits per multiply at the cost of a reasonable assumption on RSA inversion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An increasing range of services are now offered via online applications and e-commerce websites. However, problems with online services still occur at times, even for the best service providers due to the technical failures, informational failures, or lack of required website functionalities. Also, the widespread and increasing implementation of web services means that service failures are both more likely to occur, and more likely to have serious consequences. In this paper we first develop a digital service value chain framework based on existing service delivery models adapted for digital services. We then review current literature on service failure prevention, and provide a typology of technolo- gies and approaches that can be used to prevent failures of different types (functional, informational, system), that can occur at different stages in the web service delivery. This makes a contribution to theory by relating specific technologies and technological approaches to the point in the value chain framework where they will have the maximum impact. Our typology can also be used to guide the planning, justification and design of robust, reliable web services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The nature of services and service delivery has been changing rapidly since the 1980’s when many seminal papers in services research were published. Services are increasingly digital, or have a digital component. Further, a large and heterogeneous literature, with competing and overlapping definitions, many of which are dated and inappropriate to contemporary digital services offerings is impeding progress in digital services research. In this conceptual paper, we offer a critical review of some existing conceptualizations of services and digital services. We argue that an inductive approach to understanding cognition about digital services is required to develop a taxonomy of digital services and a new vocabulary. We argue that this is a pre-requisite to theorizing about digital services, including understanding quality drivers, value propositions, and quality determinants for different digital service types. We propose a research approach for reconceptualising digital services and service quality, and outline methodological approaches and outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enacting appropriate behaviors often requires service employees to suppress genuine emotions and/or express other emotions, genuine or contrived. Managing emotions to act in a socially appropriate manner constitutes a form of labor: emotional labor. If labor demands exceed the resources of the employee, burnout arises, with negative consequences for overall psychological well-being and job performance. Similarly, task related activities engender role stress, which can also lead to burnout. Both task related role demands and socio-emotional demands are likely to be omnipresent in interpersonal interactions in service settings. Accordingly, this study sets out to investigate the simultaneous impact of these job demands on burnout in front line service professionals. Based on survey data collected from allied health service workers, the study findings strongly suggest that both socio-emotional demands and task related role demands are significant determinants of workplace stress and that their simultaneous effects on employee burnout can be large.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three proof requirements as essential for a sustainable land registration system. These were proof of identity, proof of ownership, and authority to deal. Our attention in this paper is drawn to the latter two requirements and will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to proof of ownership and authority to deal. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Service mismatches involve the adaptation of structural and behavioural interfaces of services, which in practice incurs long lead times through manual, coding e ort. We propose a framework, complementary to conventional service adaptation, to extract comprehensive and seman- tically normalised service interfaces, useful for interoperability in large business networks and the Internet of Services. The framework supports introspection and analysis of large and overloaded operational signa- tures to derive focal artefacts, namely the underlying business objects of services. A more simpli ed and comprehensive service interface layer is created based on these, and rendered into semantically normalised in- terfaces, given an ontology accrued through the framework from service analysis history. This opens up the prospect of supporting capability comparisons across services, and run-time request backtracking and ad- justment, as consumers discover new features of a service's operations through corresponding features of similar services. This paper provides a rst exposition of the service interface synthesis framework, describing patterns having novel requirements for unilateral service adaptation, and algorithms for interface introspection and business object alignment. A prototype implementation and analysis of web services drawn from com- mercial logistic systems are used to validate the algorithms and identify open challenges and future research directions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background  Models of service provision and professional training differ between countries. This study aims to investigate a specialist intellectual disabilities model and a generic mental health model, specifically comparing psychiatrists’ knowledge and competencies, and service quality and accessibility in meeting the mental health needs of people with intellectual disabilities. Method  Data were collected from consultant and trainee psychiatrists within a specialist intellectual disabilities model (UK) and a generic mental health model (Australia). Results  The sample sizes were 294 (UK) and 205 (Australia). Statistically significant differences were found, with UK participants having positive views about the specialist intellectual disabilities service model they worked within, demonstrating flexible and accessible working practices and service provision, responsive to the range of mental health needs of the population with intellectual disabilities, and providing a wide range of treatments and supports. The UK participants were knowledgeable, well trained and confident in their work. They wanted to work with people with intellectual disabilities. In all of these areas, the converse was found from the Australian generic mental health service model. Conclusions  The specialist intellectual disabilities model of service provision and training has advantages over the generic mental health model.