998 resultados para database security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As end-user computing becomes more pervasive, an organization's success increasingly depends on the ability of end-users, usually in managerial positions, to extract appropriate data from both internal and external sources. Many of these data sources include or are derived from the organization's accounting information systems. Managerial end-users with different personal characteristics and approaches are likely to compose queries of differing levels of accuracy when searching the data contained within these accounting information systems. This research investigates how cognitive style elements of personality influence managerial end-user performance in database querying tasks. A laboratory experiment was conducted in which participants generated queries to retrieve information from an accounting information system to satisfy typical information requirements. The experiment investigated the influence of personality on the accuracy of queries of varying degrees of complexity. Relying on the Myers–Briggs personality instrument, results show that perceiving individuals (as opposed to judging individuals) who rely on intuition (as opposed to sensing) composed queries more accurately. As expected, query complexity and academic performance also explain the success of data extraction tasks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OTseeker (Occupational Therapy Systematic Evaluation of Evidence) is a new resource for occupational therapists that has been designed with the principle aim of increasing access to research to support clinical decisions. It contains abstracts of systematic reviews and quality ratings of randomized controlled trials (RCTs) relevant to occupational therapy. It is available, free of charge, at www.otseeker.com. This paper describes the OTseeker database and provides an example of how it may support occupational therapy practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the most important advantages of database systems is that the underlying mathematics is rich enough to specify very complex operations with a small number of statements in the database language. This research covers an aspect of biological informatics that is the marriage of information technology and biology, involving the study of real-world phenomena using virtual plants derived from L-systems simulation. L-systems were introduced by Aristid Lindenmayer as a mathematical model of multicellular organisms. Not much consideration has been given to the problem of persistent storage for these simulations. Current procedures for querying data generated by L-systems for scientific experiments, simulations and measurements are also inadequate. To address these problems the research in this paper presents a generic process for data-modeling tools (L-DBM) between L-systems and database systems. This paper shows how L-system productions can be generically and automatically represented in database schemas and how a database can be populated from the L-system strings. This paper further describes the idea of pre-computing recursive structures in the data into derived attributes using compiler generation. A method to allow a correspondence between biologists' terms and compiler-generated terms in a biologist computing environment is supplied. Once the L-DBM gets any specific L-systems productions and its declarations, it can generate the specific schema for both simple correspondence terminology and also complex recursive structure data attributes and relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A proportion of melanoma,prone individuals in both familial and non,familial contexts has been shown to carry inactivating mutations in either CDKN2A or, rarely, CDK4. CDKN2A is a complex locus that encodes two unrelated proteins from alternately spliced transcripts that are read in different frames. The alpha transcript (exons 1a, 2, and 3) produces the p16INK4A cyclin-dependent kinase inhibitor, while the beta transcript (exons 1beta and 2) is translated as p14ARF, a stabilizing factor of p53 levels through binding to MDM2. Mutations in exon 2 can impair both polypeptides and insertions and deletions in exons 1alpha, 1beta, and 2, which can theoretically generate p16INK4A,p14ARF fusion proteins. No online database currently takes into account all the consequences of these genotypes, a situation compounded by some problematic previous annotations of CDKN2A related sequences and descriptions of their mutations. As an initiative of the international Melanoma Genetics Consortium, we have therefore established a database of germline variants observed in all loci implicated in familial melanoma susceptibility. Such a comprehensive, publicly accessible database is an essential foundation for research on melanoma susceptibility and its clinical application. Our database serves two types of data as defined by HUGO. The core dataset includes the nucleotide variants on the genomic and transcript levels, amino acid variants, and citation. The ancillary dataset includes keyword description of events at the transcription and translation levels and epidemiological data. The application that handles users' queries was designed in the model,view. controller architecture and was implemented in Java. The object-relational database schema was deduced using functional dependency analysis. We hereby present our first functional prototype of eMelanoBase. The service is accessible via the URL www.wmi.usyd.e, du.au:8080/melanoma.html.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article is published online with Open Access and distributed under the terms of the Creative Commons Attribution Non-Commercial License.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explores the impact of Turkey's likely entry in the European Union (EU) in terms of the EU's foreign, security and defense policies. It reviews Turkish capabilities, namely its military capabilities, which could provide the EU with valuable defense assets. There are differences related to Turkey's relations with the EU, which have increasingly spilled over into the NATO, hindering the development of cooperation over crisis management operations. The article then delves in the implications of Turkey's strategic geographical location to EU policies. It reviews how far the EU and Turkey may have convergent interests in some of the neighboring regions, especially in the Middle East.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Brazil's security agenda during Lula's administration was not homogeneous through the two mandates: the first tenure (2002-2006) revealed a reactive approach towards security topics, while the second one (2006-2010) was more assertive. More specifically, the shift occurred in terms of both its geographical scope - once it incorporated global issues in a more systematic way -, and instruments through which the security agenda was exercised, given the multilateral initiative of Unasur's CDS

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The conventional approach in the discipline of International Relations is to treat terrorist organizations as "non-state" actors of international relations. However, this approach is problematic due to the fact that most terrorist organizations are backed or exploited by some states. In this article, I take issue with the non-stateness of terrorist organizations and seek to answer the question of why so many states, at times, support terrorist organizations. I argue that in the face of rising threats to national security in an age of devastating wars, modern nation states tend to provide support to foreign terrorist organizations that work against their present and imminent enemies. I elaborate on my argument studying three cases of state support for terrorism: Iranian support for Hamas, Syrian support for the PKK, and American support for the MEK. The analyses suggest that, for many states, terror is nothing but war by other means.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Liberal-Institutionalism and Structural Realism expectations about international organizations are confronted by looking at if and how US-controlled international aid is granted, and particularly if it is related or not to political affinity and to United Nations Security Council (UNSC) non-permanent membership. A preliminary assessment suggests that these relations only hold for the period of the Cold War, and, even then, only when UNSC non-permanent membership is in years in which the Security Council was deemed very important.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The United States has gone further than any country in the "privatization of security". Other countries may find the economic or financial logic in the use of contractors persuasive. The US experience with contracting out security, particularly in Iraq, was problematic, and can serve as a cautionary tale in order that other countries might learn how to avoid the pitfalls.