Search results for "Computer Security"

showing 10 items of 433 documents

Yellow and social perceptions of racing cyclists’ sportspersonship: Proposing an inter-contextual analysis

2016

Through inter-contextual designs, the present set of experiments sought to explore whether the colour yellow would impact on social perceptions of sportspersonship exclusively in relation to competitive cycling. In Experiment 1 (N = 149), a silhouette image of a cyclist on a yellow background yielded lower perceptions of sportspersonship in comparison to grey or to the context of motocross, regardless of the colour. That interaction was conceptually replicated in Experiment 2 (N = 146) while changing measures (i.e., adaptation of the World Anti-Doping Code) and the context of comparison to sprinting. Furthermore, female and male observers' scores did not differ significantly thereby suggest…

MaleCompetitive BehaviorAdolescentgenetic structuresmedia_common.quotation_subjectColorPoison control050109 social psychologyPhysical Therapy Sports Therapy and RehabilitationContext (language use)Computer securitycomputer.software_genre03 medical and health sciences0302 clinical medicinePerceptionHumans0501 psychology and cognitive sciencesOrthopedics and Sports MedicineSet (psychology)media_commonDoping in SportsSocial perception05 social sciencesHuman factors and ergonomics030229 sport sciencesBicyclingContext analysisSocial PerceptionFemalePsychologyhuman activitiesSocial psychologycomputerMeaning (linguistics)Journal of Sports Sciences
researchProduct

Is the cardholder an efficient alarm system to detect credit card incidents?

2015

There is a growing tendency in credit card industry to increase the contribution of the smallest players, the cardholders, in the detection of card incidents. This article examines whether cardholders are efficient at detecting/communicating incidents of theft, loss or fraudulent use of their cards. The analysis focuses on whether they demonstrate enough speed of response to support a risk control subsystem by the issuer. The research follows a completely new approach showing how the issue can be handled by applying the concept of elasticity, a notion just recently exported from economics to the field of statistics by linking it with the reverse hazard rate. The issue is focused on the anal…

MarketingEconomics and EconometricsActuarial sciencebusiness.industryComputer science05 social sciencesPublic Health Environmental and Occupational HealthComputer securitycomputer.software_genre01 natural sciencesElasticity of a functionRisk perception010104 statistics & probabilityALARMCredit cardIssuer0502 economics and businessRisk Control050211 marketing0101 mathematicsbusinesscomputerApplied PsychologyRisk managementCredit card interestInternational Journal of Consumer Studies
researchProduct

Co-creation in hotel–disable customer interactions

2015

This study employs analytic hierarchy process (AHP) to develop a methodology that allows researchers to select factors for new measures in value co-creation analysis. AHP shows that successful factors for co-creation relate to the sequential stages of the relationship between hotels and disabled customers, which derives from co-creation processes. The resulting model highlights the principal factors affecting value co-creation when hotel/disabled customers interact, have a dialogue, and collaborate with staff to innovate and create new products and services at booking and stay encounters. These interactions may allow hotels to develop a strong foundation of common knowledge on value managem…

MarketingValue (ethics)Knowledge managementbusiness.industryPrincipal (computer security)Analytic hierarchy processCustomer relationship managementHospitality industryCommon knowledgeNew product developmentCo-creationIndustria hoteleraBusinessMarketing
researchProduct

Enforcing mobile security with location-aware role-based access control

2013

This paper describes how location-aware role-based access control RBAC can be implemented on top of the Geospatial eXtensible Access Control Markup Language GeoXACML. It furthermore sketches how spatial separation of duty constraints both static and dynamic can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations, which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC can be used to implement location-dependent access control and also other security enhancing solutions on mobile devices, such as location-dependent device locking, firewall, intrusion prevention or payment…

Markup languageGeospatial analysisComputer Networks and CommunicationsComputer scienceSeparation of dutiesbusiness.industryXACML020206 networking & telecommunicationsAccess control02 engineering and technologyComputer securitycomputer.software_genreFirewall (construction)020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access controlbusinessMobile devicecomputerInformation Systemscomputer.programming_languageComputer networkSecurity and Communication Networks
researchProduct

Revenue-based adaptive deficit round robin

2005

This paper presents an adaptive resource allocation model that is based on the DRR queuing policy. The model ensures QoS requirements and tries to maximize a service provider's revenue by manipulating quantum values of the DRR scheduler. To calculate quantum values, it is proposed to use the revenue criterion that controls the allocation of free resources. The simulation considers a single node with the implemented model that serves several service classes with different QoS requirements and traffic characteristics. It is shown that the total revenue can be increased due to the allocation of unused resources to more expensive service classes. At the same time, bandwidth and delay guarantees…

Mathematical optimizationService qualityQueueing theoryComputer scienceresource allocation modelQuality of serviceTotal revenueQoSDeficit round robinService providerComputer securitycomputer.software_genreScheduling (computing)DRR queuingRevenueResource allocationcomputerQueue
researchProduct

Accelerating Application Migration in HPC

2016

It is predicted that the number of cores per node will rapidly increase with the upcoming era of exascale supercomputers. As a result, multiple applications will have to share one node and compete for the (often scarce) resources available on this node. Furthermore, the growing number of hardware components causes a decrease in the mean time between failures. Application migration between nodes has been proposed as a tool to mitigate these two problems: Bottlenecks due to resource sharing can be addressed by load balancing schemes which migrate applications; and hardware errors can often be tolerated by the system if faulty nodes are detected and processes are migrated ahead of time.

Mean time between failuresComputer sciencebusiness.industry020206 networking & telecommunications02 engineering and technologyLoad balancing (computing)Computer securitycomputer.software_genreShared resourceVirtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct

A two-layer security model for accessing multimedia content in social networks

2016

La seguridad de un sitio web es hoy en día una de las principales preocupaciones de los administradores de sistemas. La seguridad es también el reto más importante al que se enfrentan los desarrolladores web a la hora de diseñar una plataforma fiable que ofrezca servicios a los usuarios públicos. Es bien sabido que el contenido multimedia en la web está en continuo crecimiento y, recientemente, este tipo de medios se utiliza cada vez más en las redes sociales. El acceso a los contenidos multimedia en el contexto de las redes sociales debe ser fácil y seguro. En este artículo se presenta un modelo de seguridad con capacidad semántica para el acceso a contenidos multimedia en las redes social…

Media type:CIENCIAS TECNOLÓGICAS [UNESCO]MultimediaSocial networkComputer sciencebusiness.industryTwo layeruser behaviorFace (sociological concept)020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer security modelUNESCO::CIENCIAS TECNOLÓGICAScomputer.software_genreComputer securityWorld Wide Webreference pattern0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSingle sign-onMulti-frequency networksocial networkbusinesscomputer
researchProduct

Psychological support and psychotherapy via digital devices in Covid-19 emergency time: Some critical issues

2020

The Covid-19 pandemic and the resulting fear, quarantine and lockdown measures implemented in Italy and other countries to contain the risk of contagion have seriously impacted the mental health of a large number of people. The need to offer psychological and psychotherapeutic support to these people, while respecting the government’s pressing calls to “stay home”, have led many psychologists and psychotherapists, both in the public and private sectors, to provide their professional services via teleconference, telephone, smartphone, etc. The aim of this work is to highlight some critical issues related to the sudden switch from the traditional method of providing psychological services to…

Mental Health ServicesTelemedicine020205 medical informaticsPneumonia Viral02 engineering and technologye-psychological careprivacyBetacoronavirus03 medical and health sciences0302 clinical medicineInformed consent0202 electrical engineering electronic engineering information engineeringprofessional responsibilityHumansConfidentiality030212 general & internal medicinePandemicsComputer SecurityGovernmentcriticismSARS-CoV-2business.industryinformed consentTeleconferenceGeneral MedicinePublic relationsPrivate sectorProfessional responsibilityMental healthTelemedicineItalyQuarantinePsychologybusinessCovid-19Coronavirus InfectionsConfidentiality
researchProduct

Are you a good employee or simply a good guy? Influence costs and contract design

2013

We develop a principal–agent model with a moral hazard problem in which the principal has access to a hard signal (the level of output) and a soft behavioral signal (the supervision signal) about the agent's level of effort. In our model, the agent can initiate influence activities and manipulate the behavioral signal. These activities are costly for the principal as they detract the agent from the productive task. We show that the agent's ability to manipulate the behavioral signal leads to low-powered incentives and increases the cost of implementing the efficient equilibrium as a result. Interestingly, the fact that manipulation activities entail productivity losses may lead to the desig…

MicroeconomicsOrganizational Behavior and Human Resource ManagementEconomics and EconometricsLevel of EffortIncentiveMoral hazardSIGNAL (programming language)Principal (computer security)EconomicsProductivityTask (project management)Journal of Economic Behavior & Organization
researchProduct

Vulnerabilities and Threats to Human Security Generated by an Ineffective Educational System

2017

Abstract The present trend towards globalization has led to people changing their views on possible threats to their existence. Nowadays, we witness a diversification of vulnerabilities and threats to human security, as well as a progressive reduction of our resilience. The article attempts to correlate the 5 dimensions of national security, as identified by the Copenhagen School of Security, with the problems of the Romanian educational system, explaining how these problems can become threats to the security of Romanian citizens. It offers an overview of the problems of the Romanian educational system, and the threats and vulnerabilities derived from them towards human security. It also su…

Military policySecurity through obscurityBusinessComputer securitycomputer.software_genreBusiness managementcomputerSecure codingHuman securityEducational systemsInternational conference KNOWLEDGE-BASED ORGANIZATION
researchProduct