Search results for "ToF"
showing 10 items of 841 documents
Additional file 3 of Low awareness and common misconceptions about schistosomiasis in endemic lowland areas in Western Ethiopia: a mixed-methods study
2021
Additional file 3: Supplementary file 3 Schistosoma infection risky behaviors observation guide.pdf
An Enhanced Authentication System for the JADE-S Platform
2004
Multi-agent systems require a set of security mechanism threats such as confidentiality, privacy, authentication, data integrity, access control. Authentication is the process of deducing which user has made a specific request in a multi-agent system. The goal of authentication is to allow legitimate system entities to process while denying illegitimate ones. The JADE-S platform requires that users must be authenticated, providing a username and password, in order to be able to perform actions on the platform. In this paper an enhanced user authentication system for the JADE-S platform, requiring user fingerprint in addition to the standard items, is outlined. Due to their uniqueness and im…
The engagement of auditors in the reporting of corporate social responsibility disclosure
2018
In this research, we aim to examine how large auditing firms and audit/non‐audit fees affect corporate social responsibility (CSR) disclosure. We show that the big four auditing firms and the audit and non‐audit fees paid by audited firms encourage CSR reporting. Overall, our findings suggest that big auditing firms play a relevant role in CSR disclosure, which may help to mitigate informative asymmetries between managers and stakeholders. Furthermore, audit and non‐audit fees paid by audited companies promote voluntary non‐financial information disclosure. These findings should be of interest to policymakers given the relevant role that CSR disclosure may play in the decision‐making proces…
Bases del Derecho Administrativo
2013
Presentación en powerpoint sobre las Bases del Derecho Administrativo
Too many passwords? : How understanding our memory can increase password memorability
2018
Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related to memory…
Improving Password Memorability, While Not Inconveniencing the User
2019
Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental groups). Ps…
Frequently Using Passwords Increases Their Memorability - A False Assumption or Reality?
2017
Password memorability is a significant problem that is getting worse as the numbers grow. As a direct result of memory limitations, adopted insecure password practices have substantial consequences as organizations lose millions to security breaches and helpdesk costs. IS research has examined memory theories to increase the memorability of passwords. However, in our research we have discovered some anomalous findings. It is commonly known that more frequently and recently recalled information is more easily remembered (assumed for password recall also); our previously collected objective data revealed no effect on password recall. This study will strive to confirm whether or not password m…
Vietnam as an emerging destination for offshore outsourcing of software development for finnish companies: A conceptual perspective
2009
Companies are constantly under pressure to produce software products more efficiently and within tight budgets. Offshore outsourcing has been seen as one solution to the dilemma, and lucrative outsourcing businesses have evolved in many countries, such as India, China and Russia. Vietnam is now emerging within this global outsourcing sector. This study investigates Vietnam as an offshore outsourcing destination for Finnish companies for developing their software products and related services. The research was undertaken by reviewing the literature of a) offshore outsourcing, b) offshore software production, c) information technology industry in developing countries, especially in Vietnam an…
Workshop on Global Outsourcing of Software Development
2010
Global outsourcing is a pertinent issue in today’s business world. Increasingly, software and non-software organizations from private and public sectors are attempting to develop some or all of their software through global outsourcing in order to enhance innovation, reduce development time and cost, improve quality and productivity, adapt to changing global economic and market conditions, to name a few. Global outsourcing is composed of near shore outsourcing (the software development work is done by the service provider in a nearby country) and offshore outsourcing (the development work is done in a very far away country). Global outsourcing is gaining significant importance, as it can pr…
Advanced imaging of the gastrointestinal tract: research vs. clinical tools?
2009
Diagnostic endoscopy has moved forward considerably in the recent years. Still, three major needs have to be satisfied: endoscopy should be able to detect a lesion, characterize the lesion, and then its nature should be confirmed. These steps should ideally translate into an immediate therapeutic decision.High definition endoscopy has optimized our endoscopic view onto the mucosa and can be combined with digital surface enhancement modalities. Chromoendoscopy still holds a place to detect especially flat lesions in high-risk patients such as ulcerative colitis. Digital chromoendoscopy techniques such as narrow band imaging, i-scan, or Fuji intelligent chromo endoscopy offer new possibilitie…