999 resultados para Site security
Resumo:
Increase of computational power and emergence of new computer technologies led to popularity of local communications between personal trusted devices. By-turn, it led to emergence of security problems related to user data utilized in such communications. One of the main aspects of the data security assurance is security of software operating on mobile devices. The aim of this work was to analyze security threats to PeerHood, software intended for performing personal communications between mobile devices regardless of underlying network technologies. To reach this goal, risk-based software security testing was performed. The results of the testing showed that the project has several security vulnerabilities. So PeerHood cannot be considered as a secure software. The analysis made in the work is the first step towards the further implementation of PeerHood security mechanisms, as well as taking into account security in the development process of this project.
Resumo:
The ninth annual Suomenlinna seminar, organised by the Department of Strategic and Defence Studies, Finnish National Defence College, was held in May 2006. It brought together a representative group of specialists in security studies for two days of presentations and discussion about the most pressing issues of today – the challenges facing European Union’s crisis management in Africa.
Resumo:
Inhimilliseen turvallisuuteen kriisinhallinnan kautta – oppimisen mahdollisuuksia ja haasteita Kylmän sodan jälkeen aseelliset konfliktit ovat yleensä alkaneet niin sanotuissa hauraissa valtioissa ja köyhissä maissa, ne ovat olleet valtioiden sisäisiä ja niihin on osallistunut ei-valtiollisia aseellisia ryhmittymiä. Usein ne johtavat konfliktikierteeseen, jossa sota ja vakaammat olot vaihtelevat. Koska kuolleisuus konflikteissa voi jäädä alle kansainvälisen määritelmän (1000 kuollutta vuodessa), kutsun tällaisia konflikteja ”uusiksi konflikteiksi”. Kansainvälinen yhteisö on pyrkinyt kehittämään kriisinhallinnan ja rauhanrakentamisen malleja, jotta pysyvä rauhantila saataisiin aikaiseksi. Inhimillinen turvallisuus perustuu näkemykseen, jossa kunnioitetaan jokaisen yksilön ihmisoikeuksia ja jolla on vaikutusta myös kriisinhallinnan ja rauhanrakentamisen toteuttamiseen. Tutkimukseen kuuluu kaksi empiiristä osaa: Delfoi tulevaisuuspaneeliprosessin sekä kriisinhallintahenkilöstön haastattelut. Viisitoista eri alojen kriisinhallinta-asiantuntijaa osallistui paneeliin, joka toteutettiin vuonna 2008. Paneelin tulosten mukaan tulevat konfliktit usein ovat uusien konfliktien kaltaisia. Lisäksi kriisinhallintahenkilöstöltä edellytetään vuorovaikutus- ja kommunikaatiokykyä ja luonnollisesti myös varsinaisia ammatillisia valmiuksia. Tulevaisuuspaneeli korosti vuorovaikutus- ja kommunikaatiotaitoja erityisesti siviilikriisinhallintahenkilöstön kompetensseissa, mutta samat taidot painottuivat sotilaallisen kriisinhallinnan henkilöstön kompetensseissakin. Kriisinhallinnassa tarvitaan myös selvää työnjakoa eri toimijoiden kesken. Kosovossa työskennelleen henkilöstön haastatteluaineisto koostui yhteensä 27 teemahaastattelusta. Haastateltavista 9 oli ammattiupseeria, 10 reservistä rekrytoitua rauhanturvaajaa ja 8 siviilikriisinhallinnassa työskennellyttä henkilöä. Haastattelut toteutettiin helmi- ja kesäkuun välisenä aikana vuonna 2008. Haastattelutuloksissa korostui vuorovaikutus- ja kommunikaatiotaitojen merkitys, sillä monissa käytännön tilanteissa haastateltavat olivat ratkoneet ongelmia yhteistyössä muun kriisinhallintahenkilöstön tai paikallisten asukkaiden kanssa. Kriisinhallinnassa toteutui oppimisprosesseja, jotka usein olivat luonteeltaan myönteisiä ja informaalisia. Tällaisten onnistumisten vaikutus yksilön minäkuvaan oli myönteinen. Tällaisia prosesseja voidaan kuvata ”itseä koskeviksi oivalluksiksi”. Kriisinhallintatehtävissä oppimisella on erityinen merkitys, jos halutaan kehittää toimintoja inhimillisen turvallisuuden edistämiseksi. Siksi on tärkeää, että kriisinhallintakoulutusta ja kriisinhallintatyössä oppimista kehitetään ottamaan huomioon oppimisen eri tasot ja ulottuvuudet sekä niiden merkitys. Informaaliset oppimisen muodot olisi otettava paremmin huomioon kriisinhallintakoulutusta ja kriisinhallintatehtävissä oppimista kehitettäessä. Palautejärjestelmää olisi kehitettävä eri tavoin. Koko kriisinhallintaoperaation on saatava tarvittaessa myös kriittistä palautetta onnistumisista ja epäonnistumisista. Monet kriisinhallinnassa työskennelleet kaipaavat kunnollista palautetta työrupeamastaan. Liian rutiininomaiseksi koettu palaute ei edistä yksilön oppimista. Spontaanisti monet haastatellut pitivät tärkeänä, että kriisinhallinnassa työskennelleillä olisi mahdollisuus debriefing- tyyppiseen kotiinpaluukeskusteluun. Pelkkä tällainen mahdollisuus ilmeisesti voisi olla monelle myönteinen uutinen, vaikka tilaisuutta ei hyödynnettäisikään. Paluu kriisinhallintatehtävistä Suomeen on monelle haasteellisempaa kuin näissä tehtävissä työskentelyn aloittaminen ulkomailla. Tutkimuksen tulokset kannustavat tutkimaan kriisinhallintaa oppimisen näkökulmasta. On myös olennaista, että kriisinhallinnan palautejärjestelmiä kehitetään mahdollisimman hyvin edistämään sekä yksilöllistä että organisatorista oppimista kriisinhallinnassa. Kriisinhallintaoperaatio on oppimisympäristö. Kriisinhallintahenkilöstön kommunikaatio- ja vuorovaikutustaitojen kehittäminen on olennaista tavoiteltaessa kestävää rauhanprosessia, jossa konfliktialueen asukkaatkin ovat mukana.
Resumo:
Avhandlingen är en analys av den roll som mänskliga rättigheter spelar i utvecklingssamarbete i allmänhet och tre matsäkerhetsprojekt i Malawi i synnerhet. Författaren undersöker huruvida mänskliga rättigheter kan bidra till samhälleliga förändringsprocesser. Undersökningen har en diskursiv syn på mänskliga rättigheter; rättigheter ses som sociala konstruktioner skapade av människor, konstruktioner som förändras i takt med att aktörerna ger dem ny mening. Människorättsbaserade utvecklingsstrategier riktar uppmärksamheten mot olika aktörers skyldigheter samt vikten av att mänskliga rättigheter inte kränks genom utvecklingspolitiska beslut. En analys som utgår från mänskliga rättigheter kan leda till att nya frågor lyfts fram: vem har skyldigheter, vem har rättigheter, och varför förverkligas inte dessa? Fokus flyttas till hur politiska, ekonomiska och juridiska strukturer kan förändras så att de främjar mänskliga rättigheter. Författaren använder empiriskt material från Malawi för att visa vilken roll mänskliga rättigheter och så kallade människorättsprinciper spelar inom tre projekt: (1) ett mathjälpsprojekt; (2) ett rättighetsbaserat projekt med fokus på att stärka strategier för livsuppehälle; (3) ett juridiskt projekt inom ramen för vilket man skapat ett lagförslag om rätten till föda. Analysen visar att det rättighetsbaserade projektet strävade efter den mest djupgående samhälleliga förändringen. Människorättsprinciperna ansvarighet och deltagande handlade inte endast om verksamheten inom projektet utan man strävade även efter att stärka dessa principer mellan medborgare och myndigheter. Rättigheter, som ett sätt att tala, tänka och handla, inte som abstrakta juridiska normer, påverkade de lokala aktörernas sätt att kräva bl.a. tjänster av lokala myndigheter. Teoretiskt kan man säga att det rättighetsbaserade projektet representerar ett aktörsperspektiv på mänskliga rättigheter där aktörernas egna uppfattningar om vad de är berättigade till samt krav på myndigheters ansvar formade vilken mening rättigheterna kom att få.
Resumo:
The purpose of this thesis is to examine how services can be developed and how the voice of the customer can be incorporated to the strategic planning of services. Furthermore, the objective is to investigate the methods of customer need analysis and service bundling. The data is collected from secondary and primary sources by reviewing the existing academic literature and by conducting in-depth interviews and surveys. The main findings of this research indicate that the service development in personal security service industry should be conducted through a formalized process and the process should begin with setting the strategic objectives. Moreover, the voice of the customer should be incorporated into all stages of the development process, especially into the front-end of the process. Furthermore, the information on customer needs should be gathered in a manner tailored for the purposes of service development.
Resumo:
The Travel and Tourism field is undergoing changes due to the rapid development of information technology and digital services. Online travel has profoundly changed the way travel and tourism organizations interact with their customers. Mobile technology such as mobile services for pocket devices (e.g. mobile phones) has the potential to take this development even further. Nevertheless, many issues have been highlighted since the early days of mobile services development (e.g. the lack of relevance, ease of use of many services). However, the wide adoption of smartphones and the mobile Internet in many countries as well as the formation of so-called ecosystems between vendors of mobile technology indicate that many of these issues have been overcome. Also when looking at the numbers of downloaded applications related to travel in application stores like Google Play, it seems obvious that mobile travel and tourism services are adopted and used by many individuals. However, as business is expected to start booming in the mobile era, many issues have a tendency to be overlooked. Travelers are generally on the go and thus services that work effectively in mobile settings (e.g. during a trip) are essential. Hence, the individuals’ perceived drivers and barriers to use mobile travel and tourism services in on-site or during trip settings seem particularly valuable to understand; thus this is one primary aim of the thesis. We are, however, also interested in understanding different types of mobile travel service users. Individuals may indeed be very different in their propensity to adopt and use technology based innovations (services). Research is also switching more from investigating issues of mobile service development to understanding individuals’ usage patterns of mobile services. But designing new mobile services may be a complex matter from a service provider perspective. Hence, our secondary aim is to provide insights into drivers and barriers of mobile travel and tourism service development from a holistic business model perspective. To accomplish the research objectives seven different studies have been conducted over a time period from 2002 – 2013. The studies are founded on and contribute to theories within diffusion of innovations, technology acceptance, value creation, user experience and business model development. Several different research methods are utilized: surveys, field and laboratory experiments and action research. The findings suggest that a successful mobile travel and tourism service is a service which supports one or several mobile motives (needs) of individuals such as spontaneous needs, time-critical arrangements, efficiency ambitions, mobility related needs (location features) and entertainment needs. The service could be customized to support travelers’ style of traveling (e.g. organized travel or independent travel) and should be easy to use, especially easy to take into use (access, install and learn) during a trip, without causing security concerns and/or financial risks for the user. In fact, the findings suggest that the most prominent barrier to the use of mobile travel and tourism services during a trip is an individual’s perceived financial cost (entry costs and usage costs). It should, however, be noted that regulations are put in place in the EU regarding data roaming prices between European countries and national telecom operators are starting to see ‘international data subscriptions’ as a sales advantage (e.g. Finnish Sonera provides a data subscription in the Baltic and Nordic region at the same price as in Finland), which will enhance the adoption of mobile travel and tourism services also in international contexts. In order to speed up the adoption rate travel service providers could consider e.g. more local initiatives of free Wi-Fi networks, development of services that can be used, at least to some extent, in an offline mode (do not require costly network access during a trip) and cooperation with telecom operators (e.g. lower usage costs for travelers who use specific mobile services or travel with specific vendors). Furthermore, based on a developed framework for user experience of mobile trip arrangements, the results show that a well-designed mobile site and/or native application, which preferably supports integration with other mobile services, is a must for true mobile presence. In fact, travel service providers who want to build a relationship with their customers need to consider a downloadable native application, but in order to be found through the mobile channel and make contact with potential new customers, a mobile website should be available. Moreover, we have made a first attempt with cluster analysis to identify user categories of mobile services in a travel and tourism context. The following four categories were identified: info-seekers, checkers, bookers and all-rounders. For example “all-rounders”, represented primarily by individuals who use their pocket device for almost any of the investigated mobile travel services, constituted primarily of 23 to 50 year old males with high travel frequency and great online experience. The results also indicate that travel service providers will increasingly become multi-channel providers. To manage multiple online channels, closely integrated and hybrid online platforms for different devices, supporting all steps in a traveler process should be considered. It could be useful for travel service providers to focus more on developing browser-based mobile services (HTML5-solutions) than native applications that work only with specific operating systems and for specific devices. Based on an action research study and utilizing a holistic business model framework called STOF we found that HTML5 as an emerging platform, at least for now, has some limitations regarding the development of the user experience and monetizing the application. In fact, a native application store (e.g. Google Play) may be a key mediator in the adoption of mobile travel and tourism services both from a traveler and a service provider perspective. Moreover, it must be remembered that many device and mobile operating system developers want service providers to specifically create services for their platforms and see native applications as a strategic advantage to sell more devices of a certain kind. The mobile telecom industry has moved into a battle of ecosystems where device makers, developers of operating systems and service developers are to some extent forced to choose their development platforms.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
The formal calibration procedure of a phase fraction meter is based on registering the outputs resulting from imposed phase fractions at known flow regimes. This can be straightforwardly done in laboratory conditions, but is rarely the case in industrial conditions, and particularly for on-site applications. Thus, there is a clear need for less restrictive calibration methods regarding to the prior knowledge of the complete set of inlet conditions. A new procedure is proposed in this work for the on-site construction of the calibration curve from total flown mass values of the homogeneous dispersed phase. The solution is obtained by minimizing a convenient error functional, assembled with data from redundant tests to handle the intrinsic ill-conditioned nature of the problem. Numerical simulations performed for increasing error levels demonstrate that acceptable calibration curves can be reconstructed, even from total mass measured within a precision of up to 2%. Consequently, the method can readily be applied, especially in on-site calibration problems in which classical procedures fail due to the impossibility of having a strict control of all the input/output parameters.
Resumo:
Ion mobility spectrometry (IMS) is a straightforward, low cost method for fast and sensitive determination of organic and inorganic analytes. Originally this portable technique was applied to the determination of gas phase compounds in security and military use. Nowadays, IMS has received increasing attention in environmental and biological analysis, and in food quality determination. This thesis consists of literature review of suitable sample preparation and introduction methods for liquid matrices applicable to IMS from its early development stages to date. Thermal desorption, solid phase microextraction (SPME) and membrane extraction were examined in experimental investigations of hazardous aquatic pollutants and potential pollutants. Also the effect of different natural waters on the extraction efficiency was studied, and the utilised IMS data processing methods are discussed. Parameters such as extraction and desorption temperatures, extraction time, SPME fibre depth, SPME fibre type and salt addition were examined for the studied sample preparation and introduction methods. The observed critical parameters were extracting material and temperature. The extraction methods showed time and cost effectiveness because sampling could be performed in single step procedures and from different natural water matrices within a few minutes. Based on these experimental and theoretical studies, the most suitable method to test in the automated monitoring system is membrane extraction. In future an IMS based early warning system for monitoring water pollutants could ensure the safe supply of drinking water. IMS can also be utilised for monitoring natural waters in cases of environmental leakage or chemical accidents. When combined with sophisticated sample introduction methods, IMS possesses the potential for both on-line and on-site identification of analytes in different water matrices.
Resumo:
This work aimed to evaluate the uptake and translocation of quinclorac in function of application sites (shoot or roots) by Echinochloa crusgalli biotypes resistant and susceptible to this herbicide. The treatments consisted of quinclorac doses (0; 0.5; 1; 2; 4; 16 and 64 ppm), applied on the shoot or roots of seedlings of barnyardgrass biotypes. The experimental units consisted of plastic cups containing 250 cm³ of sand. The treatments were applied 10 days after emergence, when barnyardgrass plants reached a 2- to 3- leaf growth stage. The barnyardgrass biotypes were irrigated with nutritive solution weekly and maintained for 40 days after emergence, when length, fresh and dry matter of shoot and roots were evaluated. Variance analysis was carried out using the F test at 5% probability, and in case of significance, a non-linear regression analysis was also carried out using a three-parameter logistic model. In the susceptible biotype, quinclorac was more absorbed by the roots than by the shoot. Comparing dry mass production of the different plant parts of the susceptible biotype per application site, it was verified that quinclorac action is higher when applied to the plant roots. However, for the resistant biotype, it was not possible to determine the dose causing 50% reduction in dry mass accumulation (GR50) and in the resistance index (RI) between both biotypes, due to its high resistance to quinclorac (128 times the recommended dosage). The results showed that quinclorac resistance by the evaluated biotype is not due to differences in the absorption site, strongly suggesting that the resistance acquired by the biotype may result from alteration in the target site.
Resumo:
Glyphosate is an herbicide that inhibits the enzyme 5-enolpyruvyl-shikimate-3-phosphate synthase (EPSPs) (EC 2.5.1.19). EPSPs is the sixth enzyme of the shikimate pathway, by which plants synthesize the aromatic amino acids phenylalanine, tyrosine, and tryptophan and many compounds used in secondary metabolism pathways. About fifteen years ago it was hypothesized that it was unlikely weeds would evolve resistance to this herbicide because of the limited degree of glyphosate metabolism observed in plants, the low resistance level attained to EPSPs gene overexpression, and because of the lower fitness in plants with an altered EPSPs enzyme. However, today 20 weed species have been described with glyphosate resistant biotypes that are found in all five continents of the world and exploit several different resistant mechanisms. The survival and adaptation of these glyphosate resistant weeds are related toresistance mechanisms that occur in plants selected through the intense selection pressure from repeated and exclusive use of glyphosate as the only control measure. In this paper the physiological, biochemical, and genetic basis of glyphosate resistance mechanisms in weed species are reviewed and a novel and innovative theory that integrates all the mechanisms of non-target site glyphosate resistance in plants is presented.
Resumo:
Eleusine indica (goosegrass) is a diploid grass weed which has developed resistance to ACCase inhibitors during the last ten years due to the intensive and frequent use of sethoxydim to control grass weeds in soybean crops in Brazil. Plant dose-response assays confirmed the resistant behaviour of one biotype obtaining high resistance factor values: 143 (fenoxaprop), 126 (haloxyfop), 84 (sethoxydim) to 58 (fluazifop). ACCase in vitro assays indicated a target site resistance as the main cause of reduced susceptibility to ACCase inhibitors. PCR-generated fragments of the ACCase CT domain of the resistant and sensitive reference biotype were sequenced and compared. A point mutation was detected within the triplet of aspartate at the amino acid position 2078 (referred to EMBL accession no. AJ310767) and resulted in the triplet of glycine. These results constitute the first report on a target site mutation for a Brazilian herbicide resistant grass weed.
Resumo:
Cupuassu (Theobroma grandiflorum (Willd. ex Spreng.) Schumann) is a fruit tree that is attracting attention in Brazil and also in other tropical countries. Its pulp is used to prepare ice-cream, juices, jellies and many other home-made sweets. This species has a very low fecundity, attributed to problems with pollination and self-incompatibility, noted as being restrictive to the agronomic productivity of the species. Controlled pollinations between compatible and incompatible parents were made and flowers were collected at three times: 24, 48 and 72 h after pollinations, during the floral seasons of 1995 and 1998. In flowers collected 24 h after pollination, in both compatible and incompatible crosses, around 70% of ovules showed egg apparatus without evidences of sperm cell delivery; nevertheless some pollen tubes had been observed. Ovaries collected at 48 h showed different behaviors according to the type of cross. In the compatibles, 35% of ovules did not show evidences of gamete fusion. In incompatible crosses this number rose to 50%. Collected ovaries with 72 h, from compatible and incompatible crosses, showed respectively 1.2% and 14.2% of the ovules with the egg apparatus and polar nuclei only. In these ovaries, for the two types of crosses, the presence of sperm nuclei was common and the zygote was still undivided. The incompatibility action is occurring after fertilization, in a late self-incompatibility action.