101 |
Managing IT Security In Organizations : A look at Physical and Administrative ControlsAsmah, Gilbert Yaw, Baruwa, Adebola Abdulrafiu January 2005 (has links)
Introduction Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control. Purpose Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls. Methods When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study. Conclusion Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.
|
102 |
Rebound predictions for elastic collisionsLiu, Pao-pao 02 May 1991 (has links)
In this paper, a numerical method is used to predict
the response of an elastic body during a collision in which
both normal and tangential impulses are important. Results
are compared with those from simplified prediction
procedures, which stem from the assumptions that the energy-returning
capacity of the normal deformation mechanism is
constant and the tangential compliance is neglected. The
finite-element predictions indicate the importance of the
tangential compliance for elastic collisions wherein
friction forces are significant. The results of both
methods of prediction point up the roles of friction and
inertia coupling in determining the normal velocity ratio
(the "coefficient of restitution"). / Graduation date: 1992
|
103 |
Assessing operational impact in enterprise systems with dependency discovery and usage miningMoss, Mark Bomi 15 July 2009 (has links)
A framework for monitoring the dependencies between users, applications, and other system components, combined with the actual access times and frequencies, was proposed. Operating system commands were used to extract event information from the end-user workstations about the dependencies between system, application and infrastructure components. Access times of system components were recorded, and data mining tools were leveraged to detect usage patterns. This information was integrated and used to predict whether or not the failure of a component would cause an operational impact during certain time periods. The framework was designed to minimize installation and management overhead, to consume minimal system resources (e.g. network bandwidth), and to be deployable on a variety of enterprise systems, including those with low-bandwidth and partial-connectivity characteristics. The framework was implemented in a test environment to demonstrate the feasibility of this approach. The system was tested on small-scale (6 computers in the GT CERCS Laboratory over 35 days) and large-scale (76 CPR nodes across the entire GT campus over 4 months) data sets. The average size of the impact topology was shown to be approximately 4% of the complete topology, and this size reduction was related to providing system administrators the capability to better identify those users and resources most likely to be affected by a designated set of component failures during a designated time period.
|
104 |
Managing IT Security In Organizations : A look at Physical and Administrative ControlsAsmah, Gilbert Yaw, Baruwa, Adebola Abdulrafiu January 2005 (has links)
<p>Introduction</p><p>Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control.</p><p>Purpose</p><p>Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls.</p><p>Methods</p><p>When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study.</p><p>Conclusion</p><p>Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.</p>
|
105 |
A constraint-based ITS for the Java programming language : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Science in Computer Science in the University of Canterbury /Holland, Jay. January 1900 (has links)
Thesis (M. Sc.)--University of Canterbury, 2009. / Typescript (photocopy). "January 2009." Includes bibliographical references (leaves 110-115). Also available via the World Wide Web.
|
106 |
Enhanced font services for X Window systemTsang, Pong-fan, Dex. January 2000 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2001. / Includes bibliographical references (leaves 80-84).
|
107 |
APTMC: AN INTERFACE PROGRAM FOR USE WITH ANSYS FOR THERMAL AND THERMALLY INDUCED STRESS MODELING/SIMULATION OF LEVEL 1 AND LEVEL 2 VLSI PACKAGINGShiang, Jyue-Jon, 1956- January 1987 (has links)
ANSYS Packaging Thermal/Mechanical Calculator (APTMC) is an interface program developed for use with ANSYS and specially designed to handle thermal and thermally induced stress modeling/simulation of Level 1 and Level 2 VLSI packaging structures and assemblies. APTMC is written in PASCAL and operates in an interactive I/O format mode. This user-friendly tool leads an analyst/designer through the process of creating appropriate thermal and thermally induced stress models and other operations necessary to run ANSYS. It includes such steps as the following: (1) construction of ANSYS commands through the string process; (2) creation of a dynamic data structure which expands and contracts during program execution based on the data storage requirements of the program sets to control model generation; (3) access of material data and model parameters from the developed INTERNAL DATABANK which contains: (a) material data list; (b) heat transfer modes; and (c) library of structures; (4) forming ANSYS PREP7 and POSTn command files. (Abstract shortened with permission of author.)
|
108 |
A FORTRAN program for the SPAN technique of group decision makingMacKinnon, Mary Matilda Sonntag, 1925- January 1967 (has links)
No description available.
|
109 |
FORTRAN computation of a table for the SPAN decision-making method in dyadsLillyquist, Michael J. January 1968 (has links)
No description available.
|
110 |
When the chips are down : attribution in the context of computer failure and repair.Quayle, Michael Frank. January 2004 (has links)
Cognitive attribution theories provide convincing and empirically robust models of attribution. However, critiques include the scarcity of empirical research in naturalistic settings and the failure of cognitive attribution theorists to account for why, when and how much people engage in attributional activity. The present study draws data from naturalistic
recordings of the common experience of computer failure and repair. A simple content analysis explores the extent to which everyday attributional talk is modelled by the cognitive theories of attribution. It is found that everyday talk matches the cognitive theories of attribution reasonably well for socially safe operative information about the problem, but poorly for socially unsafe inspective information about the agents and their actions. The second part of the analysis makes sense of this empirical pattern by using conversation and discourse analysis to explore the social functions of observed attributional talk. Participants use attributional talk to achieve two broad social goals: to negotiate and manage the social engagement and to construct and defend positions of competence and expertise. / Thesis (M.A.)-University of KwaZulu-Natal, Pietermaritzburg, 2004.
|
Page generated in 0.0657 seconds