984 resultados para PRIVATE SECURITY


Relevância:

30.00% 30.00%

Publicador:

Resumo:

End users urgently request using mobile devices at their workplace. They know these devices from their private life and appreciate functionality and usability, and want to benefit from these advantages at work as well. Limitations and restrictions would not be accepted by them. On the contrary, companies are obliged to employ substantial organizational and technical measures to ensure data security and compliance when allowing to use mobile devices at the workplace. So far, only individual arrangements have been presented addressing single issues in ensuring data security and compliance. However, companies need to follow a comprehensive set of measures addressing all relevant aspects of data security and compliance in order to play it safe. Thus, in this paper at first technical architectures for using mobile devices in enterprise IT are reviewed. Thereafter a set of compliance rules is presented and, as major contribution, technical measures are explained that enable a company to integrate mobile devices into enterprise IT while still complying with these rules comprehensively. Depending on the company context, one or more of the technical architectures have to be chosen impacting the specific technical measures for compliance as elaborated in this paper. Altogether this paper, for the first time, correlates technical architectures for using mobile devices at the workplace with technical measures to assure data security and compliance according to a comprehensive set of rules.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Changes to homelessness legislation in post-devolution Scotland have resulted in an expansion of rights for homeless households seeking formal assistance from local authorities. These changes have led to Scotland’s homelessness arrangements being considered among the most progressive in Europe. In recent years, however, the Scottish Government has increasingly promoted homelessness prevention and Housing Options approaches as a means by which homelessness might be avoided or resolved without recourse to statutory rights. As part of that, they have promoted greater use of the private rented sector (PRS) as a key housing option, with the potential to meet the needs of homeless households. The arguments made to support use of the PRS have much in common with arguments for privatisation in other areas of social policy, notably greater choice for the individual promoting better welfare outcomes, and competition among providers encouraging improvements in quality of service provision. Critics have argued that such benefits may not be realised and that, on the contrary, privatisation may lead to exclusion or act to worsen households’ outcomes. This thesis considers the extent to which the PRS has been utilised in Scotland to accommodate homeless households, and the consequences of this for their welfare. The thesis uses a combination of quantitative and qualitative methods. To examine trends in the use of the PRS, it presents quantitative analysis of the data on the operation of the statutory system and Housing Options arrangements, and of data from a survey of local authority homelessness strategy officers. To examine the consequences of this for homeless households, the thesis uses qualitative research involving face-to-face interviews with 35 homeless households across three local authority areas. This research considers the extent to which households’ experiences of homelessness, housing need and the PRS reflect the arguments presented in the literature, and how settled accommodation has impacted on households’ ability to participate fully in society. The research found an increasing but still limited role for the PRS in resolving statutory homelessness in Scotland, with indications that the PRS is being increasingly used as part of the Housing Options approach and as a means of resolving homelessness outside the statutory system. The PRS is being utilised to varying degrees across different local authority areas, and a variety of methods are being used to do so. While local authorities saw clear advantages to making greater use of the sector, a number of significant barriers including affordability, available stock and landlord preferences - made this difficult in practice. Research with previously homeless households in the PRS similarly found broadly positive experiences and views of the sector, particularly with regard to enabling households to access good quality accommodation in desirable areas of their choosing, with many households highlighting improvements relating to social inclusion and participation. Nevertheless, concerns around the security of tenure offered by the sector, repairs, service standards and unequal power relations between landlord and tenant persisted. As such, homeless households frequently expressed their decision to enter the sector in terms of a trade-off between choice and security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security defects are common in large software systems because of their size and complexity. Although efficient development processes, testing, and maintenance policies are applied to software systems, there are still a large number of vulnerabilities that can remain, despite these measures. Some vulnerabilities stay in a system from one release to the next one because they cannot be easily reproduced through testing. These vulnerabilities endanger the security of the systems. We propose vulnerability classification and prediction frameworks based on vulnerability reproducibility. The frameworks are effective to identify the types and locations of vulnerabilities in the earlier stage, and improve the security of software in the next versions (referred to as releases). We expand an existing concept of software bug classification to vulnerability classification (easily reproducible and hard to reproduce) to develop a classification framework for differentiating between these vulnerabilities based on code fixes and textual reports. We then investigate the potential correlations between the vulnerability categories and the classical software metrics and some other runtime environmental factors of reproducibility to develop a vulnerability prediction framework. The classification and prediction frameworks help developers adopt corresponding mitigation or elimination actions and develop appropriate test cases. Also, the vulnerability prediction framework is of great help for security experts focus their effort on the top-ranked vulnerability-prone files. As a result, the frameworks decrease the number of attacks that exploit security vulnerabilities in the next versions of the software. To build the classification and prediction frameworks, different machine learning techniques (C4.5 Decision Tree, Random Forest, Logistic Regression, and Naive Bayes) are employed. The effectiveness of the proposed frameworks is assessed based on collected software security defects of Mozilla Firefox.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The demands of mitigation and adaptation policies are important to understanding a country’s climate change preparation by providing microfinance in the agricultural sector. This could be seen as a strategy to fight against the challenges of future food security. In 2014, Indonesia established climate change adaptation policies. This legislation aims to pave the way for making actions on climate change adaptation mainstream in national and local development planning. Public and private finance have supported the implementation of the climate actions. However, most funding is still used for mitigation. Adaptation finance needs support, especially in agriculture. This research paper studies opportunities for microfinance to play a role together with existing resources in supporting climate change adaptation in Indonesia. The data was acquired and analysed through a literature review, analysis of case studies and interviews with stakeholders in the climate change-related financial sector. The central findings regarding the opportunity for microfinance to contribute to the existing schemes in Indonesian climate change adaptation finance for agriculture are worthy of the result. This study found that adaptation finance is mostly used for indirect activities. Meanwhile, local communities, and farmers in particular, need directly targeted measures to adapt to climate change. An alternative approach is providing microfinance, insurance and capacity development for farmers to produce high quality agricultural products. This would contribute to optimizing the agri-food value chain, which supports socio-economic development of stakeholders, especially farmers. Hence, microfinance appears to be one potential solution to support direct climate change adaptation actions for the agricultural sector. However, this may not be strong enough to finance the entire needs for agricultural climate actions. Adaptation is contextual, so it has to be grounded in the needs of local communities. Microfinance needs public sectors support as well as other resources from the private sector. In the case of rapid response to disasters, which often destroy the agricultural sector, microfinance should be advantageous in supporting adaptation. However, in reality, it does not work, as it is prevented by regulations. So, this can be an area the public sector can support as a risk-taker as well as by providing initial funds and resources for scaling up efforts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Industry 4.0 refers to the 4th industrial revolution and at its bases, we can see the digitalization and the automation of the assembly line. The whole production process has improved and evolved thanks to the advances made in networking, and AI studies, which include of course machine learning, cloud computing, IoT, and other technologies that are finally being implemented into the industrial scenario. All these technologies have in common a need for faster, more secure, robust, and reliable communication. One of the many solutions for these demands is the use of mobile communication technologies in the industrial environment, but which technology is better suited for these demands? Of course, the answer isn’t as simple as it seems. The 4th industrial revolution has a never seen incomparable potential with respect to the previous ones, every factory, enterprise, or company have different network demands, and even in each of these infrastructures, the demands may diversify by sector, or by application. For example, in the health care industry, there may be e a need for increased bandwidth for the analysis of high-definition videos or, faster speeds in order to have analytics occur in real-time, and again another application might be higher security and reliability to protect patients’ data. As seen above, choosing the right technology for the right environment and application, considers many things, and the ones just stated are but a speck of dust with respect to the overall picture. In this thesis, we will investigate a comparison between the use of two of the available technologies in use for the industrial environment: Wi-Fi 6 and 5G Private Networks in the specific case of a steel factory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Certain areas of the city of Sao Paulo, as many others around the world, including in Lisbon, Barcelona and Buenos Aires, have been going through a process of requalification, in special the ones commonly known as old and/or traditional city. Regarding Sao Paulo, some exceptional actions have been taken downtown with investments in rehabilitation/requalification of areas that concentrated the historical, urbanistic and cultural heritages, such as Praca da S and its cathedral, as well as the revaluation/rehabilitation projects of other squares like Praca da Republica, other areas as the previously called Cracolandia (due to high consumption/deal of crack), known today as Nova Luz, besides propositions to reevaluate areas already modified, such as Vale do Anhangabau. In all propositions to modify sites, it is firstly underlined its deterioration, litter and the presence of low-income populations (passer-bys, street vendors or residents), generally stigmatized as ""potential suspects"", emphasizing danger and lack of security in those places. This belief, which has become consensual, results in that: public as well as private companies promote the rehabilitation of the areas basing their reasoning in the necessity of adding value to the existing urban heritage, although, as it will be discussed in this paper, part of this heritage might be destroyed in this very process, under the allegation that upon completion, the action would allow the social, cultural and economical revaluation/requalification of the area. This paper is intended to provide a contribution to this discussion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Approval of the Clean Development Mechanism, provided for in the Kyoto Protocol, enables countries with afforested land to trade in carbon emissions reduction certificates related to carbon dioxide equivalent quantities (CO(2-e)) stored within a certain forest area. Potential CO(2-e) above base line sequestration was determined for two forest sites on commercial eucalyptus plantations in northern Brazil (Bahia). Compensation values for silvicultural regimes involving rotation lengths greater than economically optimal were computed using the Faustmann formula. Mean values obtained were US$8.16 (MgCO(2-e))(-1) and US $7.19 (MgCO(2-e))(-1) for average and high site indexes, respectively. Results show that carbon supply is more cost-efficient in highly productive sites. Annuities of US$18.8 Mg C(-1) and US$35.1 Mg C(-1) and yearly payments of US$4.4 m(-3) and US$8.2 m(-3) due for each marginal cubic meter produced were computed for high and average sites, respectively. The estimated value of the tonne of carbon defines minimum values to be paid to forest owners, in order to induce a change in silvicultural management regimes. A reduction of carbon supply could be expected as a result of an increase in wood prices, although it would not respond in a regular manner. For both sites, price elasticity of supply was found to be inelastic and increased as rotation length moved further away from economically optimal: 0.24 and 0.27 for age 11 years in average- and high-productivity sites, respectively. This would be due to biomass production potential as a limiting factor; beyond a certain threshold value. an increase in price does not sustain a proportional change in carbon storage supply. The environmental service valuation model proposed might be adequate for assessing potential supply in plantation forestry, from a private landowner perspective, with an economic opportunity cost. The model is not applicable to low commercial value forest plantations. (C) 2009 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This pilot project at Cotton Tree, Maroochydore, on two adjacent, linear parcels of land has one of the properties privately owned while the other is owned by the public housing authority. Both owners commissioned Lindsay and Kerry Clare to design housing for their separate needs which enabled the two projects to be governed by a single planning and design strategy. This entailed the realignment of the dividing boundary to form two approximately square blocks which made possible the retention of an important stand of mature paperbark trees and gave each block a more useful street frontage. The scheme provides seven two-bedroom units and one single-bedroom unit as the private component, with six single-bedroom units, three two-bedroom units and two three-bedroom units forming the public housing. The dwellings are deployed as an interlaced mat of freestanding blocks, car courts, courtyard gardens, patios and decks. The key distinction between the public and private parts of the scheme is the pooling of the car parking spaces in the public housing to create a shared courtyard. The housing climbs to three storeys on its southern edge and falls to a single storey on the north-western corner. This enables all units and the principal private outdoor spaces to have a northern orientation. The interiors of both the public and private units are skilfully arranged to take full advantage of views, light and breeze.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This pilot project at Cotton Tree, Maroochydore, on two adjacent, linear parcels of land has one of the properties privately owned while the other is owned by the public housing authority. Both owners commissioned Lindsay and Kerry Clare to design housing for their separate needs which enabled the two projects to be governed by a single planning and design strategy. This entailed the realignment of the dividing boundary to form two approximately square blocks which made possible the retention of an important stand of mature paperbark trees and gave each block a more useful street frontage. The scheme provides seven two-bedroom units and one single-bedroom unit as the private component, with six single-bedroom units, three two-bedroom units and two three-bedroom units forming the public housing. The dwellings are deployed as an interlaced mat of freestanding blocks, car courts, courtyard gardens, patios and decks. The key distinction between the public and private parts of the scheme is the pooling of the car parking spaces in the public housing to create a shared courtyard. The housing climbs to three storeys on its southern edge and falls to a single storey on the north-western corner. This enables all units and the principal private outdoor spaces to have a northern orientation. The interiors of both the public and private units are skilfully arranged to take full advantage of views, light and breeze.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case