Search results for "SWORD"

showing 10 items of 51 documents

Disseminating scientific research: a double-edged sword?

2017

Practitioners rarely have the time or propensity to read scientific research, and scholarly researchers seldom write for non-academic audiences. Nevertheless, both groups would probably agree that researchers could solve many problems faced by practitioners and that research is important to guide practice. This article acknowledges scientists’ failure to communicate successfully with practitioners, and discusses the main differences between academic and practitioner-oriented journals in management and business related disciplines. Author guidelines of the most prominent journals that appeal to both academics and practitioners are reviewed and discussed. A thorough literature review is also …

Knowledge managementAppealAcademic journalsLibrary and Information SciencesScientific researchResearch outputManagement Information SystemsInvestigacióKnowledge disseminationManagement of Technology and InnovationPolitical science:Economia i organització d'empreses [Àrees temàtiques de la UPC]0502 economics and businessBusiness and International ManagementKnowledge disseminationSWORDDisseminationInvestigadorsbusiness.industryResearch05 social sciencesPublic relationsSpecialization (logic)050211 marketingbusinessPractitioner-oriented journalsUniversity-industry gap050203 business & managementKnowledge Management Research & Practice
researchProduct

Were Bronze Age metalworkers skilled?: Perspectives from the study of the making of Bronze Age swords

2019

International audience; Beyond the provocation of the title, the question of ancient metalworkers’ skills, that has been recently discussed by Maikel Kuijpers for Bronze Age axes, makes perfect sense concerning Bronze Age swords, especially when equipped with a metallic hilt. These weapons are indeed almost always described as masterpieces of metalwork made by skilled and specialized craftsmen. This does not take into account the breakthroughs made since the 1960s in the study of the fabrication techniques of bronze artefacts. Even if it is true that most Bronze Age swords are looking flawless on the surface, imaging techniques such as X-ray or CT-scan enable archaeologists to have a glimps…

Bronze Age[SHS.ARCHEO] Humanities and Social Sciences/Archaeology and PrehistorySwordAge du BronzeÉpée[SHS.ARCHEO]Humanities and Social Sciences/Archaeology and PrehistorySkillMétallurgieMetalworkSavoir-faire
researchProduct

Exposure to mercury among 9-year-old Spanish children: Associated factors and trend throughout childhood

2019

Mercury is considered a neurotoxicant and human exposure occurs mainly from the consumption of marine species. We aimed to describe total mercury concentrations (THg) and associated factors in 9-year old children, as well as to explore the trend in THg from 4 to 9 years of age. The study population consisted of 9-year-old children participating in the INMA (Environment and Childhood) birth cohort study in Valencia, Spain (n = 405, 2013–2014). THg in hair samples was measured by atomic absorption spectrometry at the age of 4 and 9 years. Sociodemographic and dietary data was obtained through questionnaires. Multiple linear regression was used to explore the association between THg and covari…

010504 meteorology & atmospheric sciencesChild Diet exposure Environmental exposure Mercury Postnatal exposure SpainDiet exposureMotherschemistry.chemical_elementFood Contamination010501 environmental sciences01 natural sciencesWorld healthCohort StudiesEnvironmental healthmedicineAnimalsHumansChildlcsh:Environmental sciences0105 earth and related environmental sciencesGeneral Environmental Sciencelcsh:GE1-350Pregnancybusiness.industryPostnatal exposureSwordfishFishesMercuryEnvironmental exposureEnvironmental exposuremedicine.diseaseConfidence intervalMercury (element)SeafoodchemistrySpainChild PreschoolMultivariate AnalysisLinear ModelsPopulation studyFemalebusinessBody mass indexHairEnvironment International
researchProduct

The Bronze Age in France

2013

010506 paleontology[SHS.ARCHEO] Humanities and Social Sciences/Archaeology and PrehistoryHistory060102 archaeology[SHS.ARCHEO]Humanities and Social Sciences/Archaeology and Prehistory06 humanities and the artsChalcolithicAncient history01 natural sciencesÂge du bronzeArchéologie[ SHS.ARCHEO ] Humanities and Social Sciences/Archaeology and PrehistoryBronze Age0601 history and archaeologySWORDCultural divide0105 earth and related environmental sciences
researchProduct

An Embedded Biometric Sensor for Ubiquitous Authentication

2013

Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…

PasswordInformation managementUser informationSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEngineeringUbiquitous computingBiometricsTraceabilitybusiness.industry FPGA rapid prototypingBiometric identity managementFingerprintSelf-contained sensorUbiquitous authenticationIdentity managementEmbedded systembusinessEmbedded system
researchProduct

Improving the security of multiple passwords through a greater understanding of the human memory

2016

Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its failures. Through studying memory elements that influence users’ password memorability, we may increase our understanding of the user and therefore make proposals to increase the security of the password authentication mechanism. This dissertation examines the human memory to understand password security behaviors; and moreover, develops new theories and revises prominent memory theories for the password context. This research employs memory theories to not only increase the me…

Software_OPERATINGSYSTEMSrepetitionkäytettävyysuser memorypassword memorabilitymuistiteoriatmetamemoryinterferencepassword reuseunohtaminenmuistisalasanatunique passwordsComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSmetamuistipassword securityuser conveniencemuistaminentietoturvamemory theories
researchProduct

Secure integration of multiprotocol instant messenger

2017

Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…

PasswordCode reviewPidginbusiness.industryComputer scienceComputer securitycomputer.software_genreEncryptionWorld Wide WebIdentifierServerPlug-inbusinesscomputerProtocol (object-oriented programming)2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)
researchProduct

SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager

2018

Password managerComputer scienceComputer securitycomputer.software_genrecomputerProceedings of the 4th International Conference on Information Systems Security and Privacy
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

The double-edge sword effect of interorganizational trust on involvement in interorganizational networks: The mediator role of affective commitment

2020

Abstract Some organizations collaborate with other partner organizations to reach common goals, establishing interorganizational networks. The governance of the network is often enacted by an interorganizational governing team composed of the directors or top managers of the partner firms. This team plans, manages, and supervises the advancement of the network’s common goals. The success of the network depends, to a large extent, on the involvement of the members of the governing team. In this study, we tested a multilevel model of the antecedents of the involvement of governing team members in the management activities of interorganizational networks. We examined whether the relationship b…

Strategy and ManagementCorporate governance05 social sciencesMultilevel modeleducationSample (statistics)Organizational commitmentAffective commitmentInformationSystems_GENERALInterorganizational governing teamGreat RiftNegative relationshipInterorganizational trustInterorganizational network Involvement0502 economics and business050211 marketingSWORDPsychologyConstruct (philosophy)Social psychology050203 business & management
researchProduct