952 resultados para security development
Resumo:
The Travel and Tourism field is undergoing changes due to the rapid development of information technology and digital services. Online travel has profoundly changed the way travel and tourism organizations interact with their customers. Mobile technology such as mobile services for pocket devices (e.g. mobile phones) has the potential to take this development even further. Nevertheless, many issues have been highlighted since the early days of mobile services development (e.g. the lack of relevance, ease of use of many services). However, the wide adoption of smartphones and the mobile Internet in many countries as well as the formation of so-called ecosystems between vendors of mobile technology indicate that many of these issues have been overcome. Also when looking at the numbers of downloaded applications related to travel in application stores like Google Play, it seems obvious that mobile travel and tourism services are adopted and used by many individuals. However, as business is expected to start booming in the mobile era, many issues have a tendency to be overlooked. Travelers are generally on the go and thus services that work effectively in mobile settings (e.g. during a trip) are essential. Hence, the individuals’ perceived drivers and barriers to use mobile travel and tourism services in on-site or during trip settings seem particularly valuable to understand; thus this is one primary aim of the thesis. We are, however, also interested in understanding different types of mobile travel service users. Individuals may indeed be very different in their propensity to adopt and use technology based innovations (services). Research is also switching more from investigating issues of mobile service development to understanding individuals’ usage patterns of mobile services. But designing new mobile services may be a complex matter from a service provider perspective. Hence, our secondary aim is to provide insights into drivers and barriers of mobile travel and tourism service development from a holistic business model perspective. To accomplish the research objectives seven different studies have been conducted over a time period from 2002 – 2013. The studies are founded on and contribute to theories within diffusion of innovations, technology acceptance, value creation, user experience and business model development. Several different research methods are utilized: surveys, field and laboratory experiments and action research. The findings suggest that a successful mobile travel and tourism service is a service which supports one or several mobile motives (needs) of individuals such as spontaneous needs, time-critical arrangements, efficiency ambitions, mobility related needs (location features) and entertainment needs. The service could be customized to support travelers’ style of traveling (e.g. organized travel or independent travel) and should be easy to use, especially easy to take into use (access, install and learn) during a trip, without causing security concerns and/or financial risks for the user. In fact, the findings suggest that the most prominent barrier to the use of mobile travel and tourism services during a trip is an individual’s perceived financial cost (entry costs and usage costs). It should, however, be noted that regulations are put in place in the EU regarding data roaming prices between European countries and national telecom operators are starting to see ‘international data subscriptions’ as a sales advantage (e.g. Finnish Sonera provides a data subscription in the Baltic and Nordic region at the same price as in Finland), which will enhance the adoption of mobile travel and tourism services also in international contexts. In order to speed up the adoption rate travel service providers could consider e.g. more local initiatives of free Wi-Fi networks, development of services that can be used, at least to some extent, in an offline mode (do not require costly network access during a trip) and cooperation with telecom operators (e.g. lower usage costs for travelers who use specific mobile services or travel with specific vendors). Furthermore, based on a developed framework for user experience of mobile trip arrangements, the results show that a well-designed mobile site and/or native application, which preferably supports integration with other mobile services, is a must for true mobile presence. In fact, travel service providers who want to build a relationship with their customers need to consider a downloadable native application, but in order to be found through the mobile channel and make contact with potential new customers, a mobile website should be available. Moreover, we have made a first attempt with cluster analysis to identify user categories of mobile services in a travel and tourism context. The following four categories were identified: info-seekers, checkers, bookers and all-rounders. For example “all-rounders”, represented primarily by individuals who use their pocket device for almost any of the investigated mobile travel services, constituted primarily of 23 to 50 year old males with high travel frequency and great online experience. The results also indicate that travel service providers will increasingly become multi-channel providers. To manage multiple online channels, closely integrated and hybrid online platforms for different devices, supporting all steps in a traveler process should be considered. It could be useful for travel service providers to focus more on developing browser-based mobile services (HTML5-solutions) than native applications that work only with specific operating systems and for specific devices. Based on an action research study and utilizing a holistic business model framework called STOF we found that HTML5 as an emerging platform, at least for now, has some limitations regarding the development of the user experience and monetizing the application. In fact, a native application store (e.g. Google Play) may be a key mediator in the adoption of mobile travel and tourism services both from a traveler and a service provider perspective. Moreover, it must be remembered that many device and mobile operating system developers want service providers to specifically create services for their platforms and see native applications as a strategic advantage to sell more devices of a certain kind. The mobile telecom industry has moved into a battle of ecosystems where device makers, developers of operating systems and service developers are to some extent forced to choose their development platforms.
Resumo:
The Finnish electricity distribution sector, rural areas in particular, is facing major challenges because of the economic regulation, tightening supply security requirements and the ageing network asset. Therefore, the target in the distribution network planning and asset management is to develop and renovate the networks to meet these challenges in compliance with the regulations in an economically feasible way. Concerning supply security, the new Finnish Electricity Market Act limits the maximum duration of electricity supply interruptions to six hours in urban areas and 36 hours in rural areas. This has a significant impact on distribution network planning, especially in rural areas where the distribution networks typically require extensive modifications and renovations to meet the supply security requirements. This doctoral thesis introduces a methodology to analyse electricity distribution system development. The methodology is based on and combines elements of reliability analysis, asset management and economic regulation. The analysis results can be applied, for instance, to evaluate the development of distribution reliability and to consider actions to meet the tightening regulatory requirements. Thus, the methodology produces information for strategic decision-making so that DSOs can respond to challenges arising in the electricity distribution sector. The key contributions of the thesis are a network renovation concept for rural areas, an analysis to assess supply security, and an evaluation of the effects of economic regulation on the strategic network planning. In addition, the thesis demonstrates how the reliability aspect affects the placement of automation devices and how the reserve power can be arranged in a rural area network.
Resumo:
Meeting the needs of both present and future generations forms the foundation of sustainable development. Concern about food demand is increasing alongside the continuously growing population. In the pursuit of food security preventing food waste is one solution avoiding the negative environmental impacts that result from producing food unnecessarily. Packages offer one answer to preventing food waste, as they 1) preserve and protect food, 2) introduce the user to the correct way to handle and use the food and package and 3) allow the user to consume the food in its entirety. This thesis aims to enhance the sustainability of food packages by giving special emphasis to preventing food waste. The focus of this thesis is to assist the packaging designer in being able to take into account the requirements for the sustainability of food packages and to be able to integrate these requirements into the product development process. In addition, life cycle methods that can be used as a tool in the packaging design process or in assessing the sustainability of finished food-packaging combinations are evaluated. The methods of life cycle costing (LCC) and life cycle working environment (LCWE) are briefly discussed. The method of life cycle assessment (LCA) is examined more thoroughly through the lens of the literature review of food-package LCA case studies published in the 21st century in three relevant journals. Based on this review and on experiences learned from conducting LCAs, recommendations are given as to how the LCA practitioner should conduct a food packaging study to make most of the results. Two case studies are presented in this thesis. The first case study relates the results of a life cycle assessment conducted for three food items (cold cut (ham), sliced dark bread (rye) and Soygurt drink) and the alternative packaging options of each. Results of this study show that the packaging constitutes only 1–12 % of the total environmental impacts of the food-packaging combination. The greatest effect is derived from the food itself and the wasted food. Even just a small percentage of wasted food causes more environmental impacts than does the packaging. The second case study presents the results of LCC and LCWE analysis done for fruit and vegetable transport packages. In this thesis, the specific results of the study itself are not the focus, but rather the study methods and scope are analysed based on how these complement the sustainability assessment of food packages. This thesis presents reasons why prevention of food waste should be more thoroughly taken into account in food packaging design. In addition, the task of the packaging designer is facilitated by the requirements of sustainable food packaging, by the methods and step-by-step guidance on how to integrate sustainability issues into the design process, and by the recommendations on how to assess the sustainability of food packages. The intention of this thesis is to express the issues that are important in the field of the food packaging industry. Having recognised and implemented these issues, businesses can better manage the risks that could follow from neglecting these sustainability aspects.
Resumo:
Biofuels for transport are a renewable source of energy that were once heralded as a solution to multiple problems associated with poor urban air quality, the overproduction of agricultural commodities, the energy security of the European Union (EU) and climate change. It was only after the Union had implemented an incentivizing framework of legal and political instruments for the production, trade and consumption of biofuels that the problems of weakening food security, environmental degradation and increasing greenhouse gases through land-use changes began to unfold. In other words, the difference between political aims for why biofuels are promoted and their consequences has grown – which is also recognized by the EU policy-makers. Therefore, the global networks of producing, trading and consuming biofuels may face a complete restructure if the European Commission accomplishes its pursuit to sideline crop-based biofuels after 2020. My aim with this dissertation is not only to trace the manifold evolutions of the instruments used by the Union to govern biofuels but also to reveal how this evolution has influenced the dynamics of biofuel development. Therefore, I study the ways the EU’s legal and political instruments of steering biofuels are coconstitutive with the globalized spaces of biofuel development. My analytical strategy can be outlined through three concepts. I use the term ‘assemblage’ to approach the operations of the loose entity of actors and non-human elements that are the constituents of multi-scalar and -sectorial biofuel development. ‘Topology’ refers to the spatiality of this European biofuel assemblage and its parts whose evolving relations are treated as the active constituents of space, instead of simply being located in space. I apply the concept of ‘nomosphere’ to characterize the framework of policies, laws and other instruments that the EU applies and construes while attempting to govern biofuels. Even though both the materials and methods vary in the independent articles, these three concepts characterize my analytical strategy that allows me to study law, policy and space associated with each other. The results of my examinations underscore the importance of the instruments of governance of the EU constituting and stabilizing the spaces of producing and, on the other hand, how topological ruptures in biofuel development have enforced the need to reform policies. This analysis maps the vast scope of actors that are influenced by the mechanism of EU biofuel governance and, what is more, shows how they are actively engaging in the Union’s institutional policy formulation. By examining the consequences of fast biofuel development that are spatially dislocated from the established spaces of producing, trading and consuming biofuels such as indirect land use changes, I unfold the processes not tackled by the instruments of the EU. Indeed, it is these spatially dislocated processes that have pushed the Commission construing a new type of governing biofuels: transferring the instruments of climate change mitigation to land-use policies. Although efficient in mitigating these dislocated consequences, these instruments have also created peculiar ontological scaffolding for governing biofuels. According to this mode of governance, the spatiality of biofuel development appears to be already determined and the agency that could dampen the negative consequences originating from land-use practices is treated as irrelevant.
Resumo:
Finnish Defence Studies is published under the auspices of the War College, and the contributions reflect the fields of research and teaching of the College. Finnish Defence Studies will occasionally feature documentation on Finnish Security Policy. Views expressed are those of the authors and do not necessarily imply endorsement by the War College.
Resumo:
The vast majority of our contemporary society owns a mobile phone, which has resulted in a dramatic rise in the amount of networked computers in recent years. Security issues in the computers have followed the same trend and nearly everyone is now affected by such issues. How could the situation be improved? For software engineers, an obvious answer is to build computer software with security in mind. A problem with building software with security is how to define secure software or how to measure security. This thesis divides the problem into three research questions. First, how can we measure the security of software? Second, what types of tools are available for measuring security? And finally, what do these tools reveal about the security of software? Measuring tools of these kind are commonly called metrics. This thesis is focused on the perspective of software engineers in the software design phase. Focus on the design phase means that code level semantics or programming language specifics are not discussed in this work. Organizational policy, management issues or software development process are also out of the scope. The first two research problems were studied using a literature review while the third was studied using a case study research. The target of the case study was a Java based email server called Apache James, which had details from its changelog and security issues available and the source code was accessible. The research revealed that there is a consensus in the terminology on software security. Security verification activities are commonly divided into evaluation and assurance. The focus of this work was in assurance, which means to verify one’s own work. There are 34 metrics available for security measurements, of which five are evaluation metrics and 29 are assurance metrics. We found, however, that the general quality of these metrics was not good. Only three metrics in the design category passed the inspection criteria and could be used in the case study. The metrics claim to give quantitative information on the security of the software, but in practice they were limited to evaluating different versions of the same software. Apart from being relative, the metrics were unable to detect security issues or point out problems in the design. Furthermore, interpreting the metrics’ results was difficult. In conclusion, the general state of the software security metrics leaves a lot to be desired. The metrics studied had both theoretical and practical issues, and are not suitable for daily engineering workflows. The metrics studied provided a basis for further research, since they pointed out areas where the security metrics were necessary to improve whether verification of security from the design was desired.
Resumo:
During the 1980's and for much of the 1990's, many countries in the Asia Pacific were renowned for their economic development and prosperity. The Asian tigers were a source of great interest for many economists and international investors. The 1997 Asian financial crisis, however, dramatically altered the growth and the performance of these economies. The crisis sent several ofAsia's best performing economies on a downward spiral from which many have yet to fully recover. The crisis exposed the financial and the political weaknesses ofmany countries in the region. Moreover, the crisis severely affected the wellbeing and the security ofmany ofthe region's citizens. This text will examine the economic crisis in greater detail and explore current debates in the study of international relations theory. More specifically, this paper will examine recent challenges posed to traditional international relations theory and address alternative approaches to this field of study. This paper will examine Critical theory and its role in shifting the referent object of security from the state to the individual. In this context, this paper will also assess Critical theory's role in enabling such issues as gender and human security to find a place on the agendas of international relations scholars and foreign policy makers. The central focus ofthis study will be the financial crisis and its impact on human security in the Southeast Asia. Furthermore, this paper will assess the recovery efforts ofthe domestic governments, international organizations and various Canadian sponsored initiatives in the context ofhuman security.
Resumo:
Failed and fragile states that result from intrastate war pose severe threats to the security of both the international system and individual states alike. In the post-Cold War era, the international community has come to recognize the reality of these threats and the difficulty involved in ending violence and building sustainable peace in failed and fragile states. This work focuses upon the development of a comprehensive strategy for sustainable peace-building by incorporating the tenets of the human security doctrine into the peace-building process. Through the use of case studies of The Former Yugoslav Republic of Macedonia and East Timor, the development and refinement of the doctrine of human security will occur, as well as, an understanding of how and where human security fits into the sustainable peace-building equation. The end result of the analysis is the development of a hierarchical pyramid formation that brings together human security and peace-building into one framework that ultimately creates the foundation and structure of sustainable peace-building. With the development of a sustainable peace-building structure based upon the human security doctrine, the role of Canada in the support of sustainable peace-building is analyzed in relation to the form and level of involvement that Canada undertakes and contributes to in the implementation and support of sustainable peace-building initiatives. Following from this, recommendations are provided regarding what role(s) Canada should undertake in the sustainable peace-building process that take into consideration the present and likely future capabilities of Canada to be involved in various aspects of the peace-building process. ii This paper outlines the need for a peace-building strategy that is designed to be sustainable in order that failed and fragile states resulting from intrastate conflict do not regress or collapse back into a condition of civil war, and subsequently designs such a strategy. The linking of peace-building and human security creates the required framework from which sustainable peace-building is derived. Creating sustainable peace is necessary in order to increase the likelihood that both present and future generations existing in failed and fragile states will be spared from the scourge of intrastate war.
Resumo:
Please consult the paper edition of this thesis to read. It is available on the 5th Floor of the Library at Call Number: Z 9999 P65 D53 2007
Resumo:
Dans le but d’examiner les mécanismes qui sous-tendent le développement de la sécurité d’attachement chez l’enfant, Grossmann et al. (1999; 2008) proposent une perspective plus vaste de l’étude de l’attachement chez l’enfant, examinant les comportements parentaux pertinents aux deux côtés de l’équilibre entre le système d’attachement et le système d’exploration. La thèse se base sur cette approche pour explorer la relation entre la sécurité d’attachement chez l’enfant et deux comportements maternels, soit la sensibilité maternelle et le soutien à l’autonomie maternel, de même que la relation entre ces deux comportements et l’état d’esprit maternel face à l’attachement. Le premier article propose que la théorie de l’autodétermination, avec ses études empiriques portant sur les comportements parentaux liés à l’exploration, offre une perspective utile pour l’étude des comportements d’exploration dans le cadre de l’équilibre attachement/exploration. L’article présente une revue théorique et empirique des domaines de l’attachement et de la théorie de l’autodétermination et souligne des analogies conceptuelles et empiriques entre les deux domaines, en plus de décrire la façon dont ils se complètent et se complémentent. Le deuxième article étudie les liens entre la sensibilité maternelle, le soutien à l’autonomie maternel et la sécurité d’attachement chez l’enfant. Soixante et onze dyades ont participé à deux visites à domicile. La sensibilité maternelle a été évaluée lorsque les enfants étaient âgés de 12 mois, alors que le soutien à l’autonomie maternel et la sécurité d’attachement chez l’enfant l’ont été lorsque les enfants avaient atteint l’âge de 15 mois. Les résultats indiquent que le soutien à l’autonomie maternel explique une portion significative de la variance de la sécurité d’attachement, et ce, après avoir contrôlé pour la sensibilité maternelle et le statut socio-économique. Le troisième article examine les relations entre deux dimensions de l’état d’esprit maternel face à l’attachement (esquivant et préoccupé/non-résolu), la sensibilité maternelle et le soutien à l’autonomie maternel. Soixante et onze dyades ont participé à trois visites à domicile. L’Entrevue d’Attachement Adulte (EAA) a été administrée lorsque les enfants étaient âgés de 8 mois, la sensibilité maternelle a été évaluée alors qu’ils avaient atteint l’âge de 12 mois et le soutien à l’autonomie maternel, lorsqu’ils avaient 15 mois. Les résultats révèlent qu’après avoir contrôlé pour le statut socio-économique, la sensibilité maternelle est liée de façon négative à la dimension « esquivant » de l’EAA, alors que le soutien à l’autonomie maternel est lié de façon négative à la dimension « préoccupé/non-résolu ». Les résultats présentés dans le deuxième et le troisième article sont discutés, de même que de leurs répercussions théoriques et cliniques. Des questions susceptibles de guider des recherches futures sont proposées.
Resumo:
Aquaculture is one of the prime catalysts for the socio-economic development of Indian economy contributing to the nations food and nutritional security, export earnings, income and employment generation. In this study an evaluation of extension activities in the development of aquaculture in Kerala. This study was conducted with a view to examine how the Kerala fisheries department offered extension services to the aquaculture farmers in the freshwater and brackish water sectors of the state through various agencies like Fish Farmers Development Agency(FFDA), Brackish water Fish Farmers Development Agency (BFFDA). In this study there are 3 category of respondent’s fresh water beneficiary farmers, brackish water beneficiary farmers and fisheries extension officers. The main motive of the thesis is to make an attempt to explore the responses of local producers to the extension programs of the state with special reference to the aquaculture sector of Kerala, India. The most important technical constraint faced by the fresh water farmers was lack of knowledge followed by non-availability of quality seeds. In the case of brackish water farming, it was infection of disease followed by lack of knowledge. The overall activities of the department of fisheries were ‘fairly good’. It indicate the need for improvements in the delivery of extension services to various target groups. The state fisheries department has already moving towards evolving these modes of extension activities by community participation.
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
Globalization and liberalization, with the entry of many prominent foreign manufacturers, changed the automobile scenario in India, since early 1990‟s. Manufacturers such as Ford, General Motors, Honda, Toyota, Suzuki, Hyundai, Renault, Mitsubishi, Benz, BMW, Volkswagen and Nissan set up their manufacturing units in India in joint venture with their Indian counterpart companies, by making use of the Foreign Direct Investment policy of the Government of India, These manufacturers started capturing the hearts of Indian car customers with their choice of technological and innovative product features, with quality and reliability. With the multiplicity of choices available to the Indian passenger car buyers, it drastically changed the way the car purchase scenario in India and particularly in the State of Kerala. This transformed the automobile scene from a sellers‟ market to buyers‟ market. Car customers started developing their own personal preferences and purchasing patterns, which were hitherto unknown in the Indian automobile segment. The main purpose of this paper is to come up with the identification of possible parameters and a framework development, that influence the consumer purchase behaviour patterns of passenger car owners in the State of Kerala, so that further research could be done, based on the framework and the identified parameters
Resumo:
The Kerala model of development mostly bypassed the fishing community, as the fishers form the main miserable groups with respect to many of the socio-economic and quality of life indicators. Modernization drive in the fishing sector paradoxically turns to marginalization drives as far as the traditional fishers in Kerala are concerned. Subsequent management and resource recuperation drives too seemed to be detrimental to the local fishing community. Though SHGs and cooperatives had helped in overcoming many of the maladies in most of the sectors in Kerala in terms of livelihood and employment in the 1980s, the fishing sector by that time had been moving ahead with mechanization and export euphoria and hence it bypassed the fishing sector. Though it has not helped the fishing sector in the initial stages, but because of necessity, it soon has become a vibrant livelihood and employment force in the coastal economy of Kerala. Initial success made it to link this with the governmental cooperative set up and soon SHGs and Cooperatives become reinforcing forces for the inclusive development of the real fishers.The fisheries sector in Kerala has undergone drastic changes with the advent of globalised economy. The traditional fisher folk are one of the most marginalized communities in the state and are left out of the overall development process mainly due to the marginalization of this community both in the sea and in the market due to modernization and mechanization of the sector. Mechanization opened up the sector a great deal as it began to attract people belonging to non-fishing community as moneylenders, boat owners, employers and middle men which often resulted in conflicts between traditional and mechanized fishermen. These factors, together with resource depletion resulted in the backwardness experienced by the traditional fishermen compared to other communities who were reaping the benefits of the overall development scenario.The studies detailing the activities and achievements of fisher folks via Self Help Groups (SHGs) and the cooperative movement in coastal Kerala are scant. The SHGs through cooperatives have been effective in livelihood security, poverty alleviation and inclusive development of the fisher folk (Rajasenan and Rajeev, 2012). The SHGs have a greater role to play as estimated fall in demand for marine products in international markets, which may result in reduction of employment opportunities in fish processing, peeling, etc. Also, technological advancement has made them unskilled to work in this sector making them outliers in the overall development process resulting in poor quality of physical and social infrastructure. Hence, it is all the more important to derive a strategy and best practice methods for the effective functioning of these SHGs so that the
Resumo:
Conceptual Information Systems are based on a formalization of the concept of "concept" as it is discussed in traditional philosophical logic. This formalization supports a human-centered approach to the development of Information Systems. We discuss this approach by means of an implemented Conceptual Information System for supporting IT security management in companies and organizations.