1 |
A multivariate description of an observed sample of driversWilson, P. January 1987 (has links)
No description available.
|
2 |
A Study of Driver Behavior Under Potential Threats in Vehicle TrafficMalta, Lucas, Miyajima, Chiyomi, Takeda, Kazunori 06 1900 (has links)
No description available.
|
3 |
Identifikace a hodnocení chyb ve výrobním procesu / Identification and assessment of errors in the production processVáclavek, Jan January 2020 (has links)
The presented diploma thesis concerns about identification and assessment of errors in the production process. The thesis is focused on methods of human factor reliability analysis. In the first part of the thesis is a general description of human factor and human factor reliability. In the second part of it the process of assessment of human factor reliability is designed including general description of used analytical techniques. Third part of the thesis contains general description of selected process, process data analysis and outputs of processed analytical techniques. In the last part of thesis are described suggestions of corrective measures with recommendations for the further development of this topic.
|
4 |
Phishing a ľudský faktor / Phishing and the human factorKalinová, Diana January 2013 (has links)
The main aim of the diploma thesis is to underline the importance of human factor for the success of phishing attacks and to identify the reasons, why the Czech and Slovak users are vulnerable to phishing. The thesis focuses on the user as the weakest part in the system which phishers exploit. Social and technical tricks that are cheating users are in the second chapter. The third chapter focuses on social engineering and sociological methods of attack. The fourth chapter is devoted to the delivery of phishing and fifth chapter explores the various types of phishing attacks. The sixth chapter presents the reasons for the operation of phishing, the aspects of credibility and authenticity of e-mails and web sites, that users follow and the implications of using the context in phishing. The victims of phishing have specific reactions which are mentioned in the seventh chapter. The eighth chapter explores the various measures against phishing, not just technology. Mentioned eight chapters present a theoretical basis for the following chapters of the diploma thesis. In the ninth chapter is performed analysis of the global situation of phishing. Through analysis are identified current and historical trends in phishing. Finally, the chapter shows the implications for the user. The tenth chapter is devoted to the phishing attacks in the Czech and Slovak Republic which are interesting in terms of the importance of human factor. We determine whether users are able to defend attacks only with their carefulness, mindfulness and awareness of phishing. Within the last chapter is taken empirical research through the questionnaire survey. The research verifies the awareness of the Czech and Slovak users about phishing, their personal experiences with phishing, their security habits and the aspects of credibility and authenticity that they consider in emails and websites. Based on all findings are drawn conclusions and recommendations.
|
5 |
Hodnocení spolehlivosti lidského činitele / Human Factor Reliability EvaluationRichter, Marek January 2010 (has links)
This thesis is focused on evaluation human factor reliability of assembly line, which is in company Hella Autotechnik, s.r.o. from Mohelnice. This analysis will be made with several methods. At first will be estimated operator errors with method TESEO, then will be used method Fault Tree Analysis (FTA) for detection hazard factors, which are influenced by production on the assembly line. In the end will be identified hazard precaution with HAZOP study.
|
6 |
Percepción de la relación líder-miembro y engagement en una muestra de colaboradores que trabaja de día y estudia de noche en Lima / Engagement and Perception of the Leader Member Exchange in a Sample of Collaborators from Lima CompaniesAragonés Miró Quesada, André 06 February 2020 (has links)
Se investigó la relación entre el engagement y la percepción del colaborador sobre la relación con su jefe. La muestra estuvo compuesta por 162 colaboradores de empresas, de los cuales el 53.1% fueron hombres mientras que el 46.9% fueron mujeres con un promedio de 29.8 años de edad. Debían formar parte de un equipo de trabajo. Los participantes respondieron la encuesta de bienestar en el trabajo (UWES) y la encuesta de percepción de intercambio líder – miembro (LMX-MDM). Se hipotetizó una relación directa, positiva y significativa entre las variables percepción del líder y engagement. De acuerdo a lo hipotetizado, los resultados mostraron que la variable percepción en el intercambio líder-miembro, compuesta por los factores respeto hacia el supervisor y trabajo positivo con el supervisor, se relaciona positivamente con el engagement, compuesta por los factores actitud positiva en el trabajo y continuidad en el trabajo. Esta investigación podrá ser utilizada como base para investigaciones futuras acerca de las dinámicas grupales en equipos de trabajo corporativos. / The relationship between engagement and the employee’s perception of the relationship with their boss was investigated. The sample was composed of 162 employees of which 53.1% were men while 46.9% were women with an average of 29.8 years of age. Necessarily, they should be part of a work team. Participants responded to the survey on well-being at work (UWES) and the leader-member exchange perception survey (LMX-MDM). A direct, positive and significant relationship between the variables was hypothesized. The results showed that the variable engagement, composed of positive attitude and continuity at work is positively related to the variable perception of the leader-member exchange, composed of respect towards the supervisor and positive work with supervisor. Through this investigation, business leaders will be able to modify their behavior around employees, strengthening their relationship. They may implement strategies to improve work engagement through actions directed towards the collaborator’s well-being. Also, this research may be used as a basis for future research about group dynamics in corporate work teams. / Tesis
|
7 |
Exploring the nature and extent of entrepreneurial intensity in the insurance industry in hyper-inflationary Zimbabwe 2007-2010Kapepa, Oliver January 2017 (has links)
Superintending an enterprise in an adverse environment can be a daunting task. If that environment is fraught with economic vagaries such as once found in the hyperinflationary Zimbabwe it can be catastrophic. Yet, some businesses survived when others collapsed. Suffice to infer that most insurance companies in Zimbabwe, buoyed by the need to confront the vagaries of the hyperinflation such as stunted growth, at the very least and enterprise collapse at the very worst had to resort to entrepreneurial intensity for survival. The research therefore sought to explore the extent of entrepreneurial intensity in such an adverse environment. Background to the research contextualised this study to the Zimbabwean scenario. The research problem was also dissected. Research objectives and questions were subsequently advanced to guide the direction of this study. Hypotheses were also proffered. From the outset, the study sought to project entrepreneurial intensity as collaborated and corroborated by other key concepts such as corporate entrepreneurship and entrepreneurial orientation. The research also explored various definitions of entrepreneurial intensity. It was noted that entrepreneurial intensity is synonymous with intensified entrepreneurial performance. Critical drivers for entrepreneurial intensity were analysed and essential determinants and antecedents of entrepreneurship were accorded space and importance. Various conceptual frameworks were also articulated to buttress the emerging arguments in the complex field of entrepreneurship and entrepreneurial intensity. The models advanced then served as a beacon in navigating the complex phenomenon of entrepreneurial intensity throughout this discourse. The study also argued that entrepreneurship can be measured to gauge its intensification levels at any given point in time. Consequently, a few models were advanced to explain entrepreneurial outcomes. Therefore, data gathered on 307 respondents were subjected to various tests in an effort to discover if entrepreneurial intensity was responsible for keeping most insurance companies afloat during the hyperinflation. Ultimately, the results confirmed the presence of entrepreneurship – its nature and form in the insurance industry in hyperinflationary Zimbabwe, particularly in the years 2007-2010. / Thesis (PhD)--University of Pretoria, 2017. / Business Management / PhD / Unrestricted
|
8 |
Production Management Model Based on Lean Manufacturing Focused on the Human Factor to Improve Productivity of Small Businesses in the Metalworking SectorHuamán, Jonathan, Llontop, José, Raymundo, Carlos, Dominguez, Francisco 01 January 2020 (has links)
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. / Micro and small businesses in the metalworking sector present a high percentage of informality, and the majority of their production processes are not documented nor standardized. The production approach of Toyota, the enterprise-resource-planning system, and the lean manufacturing system were created for large organizations with sufficient financial resources to successfully implement these models. However, the human factor is a critical component in implementing these models. Therefore, a production management model has been proposed, which is based on lean manufacturing and focuses on the human factor, to increase productivity in the production area of a metalworking company, a small business. The result was that the company’s mentality changed, reaching a productivity of 70% through the use of lean manufacturing tools in the production area.
|
9 |
Investigating Security Threats of Resource Mismanagement in Networked SystemsLiu, Guannan 10 August 2023 (has links)
The complexity of networked systems has been continuously growing, and the abundance of online resources has presented practical management challenges. Specifically, system administrators are required to carefully configure their online systems to minimize security vulnerabilities of resource management, including resource creation, maintenance, and disposal. However, numerous networked systems have been exploited or compromised by adversaries, due to misconfiguration and mismanagement of human errors. In this dissertation, we explore different network systems to identify security vulnerabilities that adversaries could exploit for malicious purposes.
First, we investigate the identity-account inconsistency threat, a new SSO vulnerability that can cause the compromise of online accounts. We demonstrate that this inconsistency in SSO authentication allows adversaries controlling a reused email address to take over online accounts without using any credentials. To substantiate our findings, we conduct a measurement study on the account management policies of various cloud email providers, highlighting the feasibility of acquiring previously used email accounts. To gain insight into email reuse in the wild, we examine commonly employed naming conventions that contribute to a significant number of potential email address collisions. To mitigate the identity-account inconsistency threat, we propose a range of useful practices for end-users, service providers, and identity providers.
Secondly, we present a comprehensive study on the vulnerability of container registries to typosquatting attacks. In typosquatting attacks, adversaries intentionally upload malicious container images with identifiers similar to those of benign images, leading users to inadvertently download and execute malicious images. Our study demonstrates that typosquatting attacks can pose a significant security threat across public and private container registries, as well as across multiple platforms. To mitigate the typosquatting attacks in container registries, we propose CRYSTAL, a lightweight extension to the existing Docker command-line interface.
Thirdly, we present an in-depth study on hardware resource management in cloud gaming services. Our research uncovers that adversaries can intentionally inject malicious programs or URLs into these services using game mods. To demonstrate the severity of these vulnerabilities, we conduct four proof-of-concept attacks on cloud gaming services, including crypto-mining, machine-learning model training, Command and Control, and censorship circumvention. In response to these threats, we propose several countermeasures that cloud gaming services can implement to safeguard their valuable assets from malicious exploitation. These countermeasures aim to enhance the security of cloud gaming services and mitigate the security risks associated with hardware mismanagement.
Last but not least, we present a comprehensive and systematic study on NXDomain, examining its scale, origin, and security implications. By leveraging a large-scale passive DNS database, we analyze a vast dataset spanning from 2014 to 2022, identifying an astonishing 146 trillion NXDomains queried by DNS users. To gain further insights into the usage patterns and security risks associated with NXDomains, we carefully select and register 19 NXDomains in the DNS database. To analyze the behavior and sources of these queries, we deploy a honeypot for our registered domains and collect 5,925,311 queries over a period of six months. Furthermore, we conduct extensive traffic analysis on the collected data, uncovering various malicious uses of NXDomains, including botnet takeovers, malicious file injections, and exploitation of residual trust. / Doctor of Philosophy / This dissertation investigates the security risks arising from resource management in various network systems. On the one hand, we explore the security risks of software resource mismanagement, examining two specific threats: the identity-account inconsistency threat in Single Sign-On authentication schemes and the typosquatting attack in container registries. On the other hand, we investigate hardware resource misuse in network systems, focusing on two security issues: the exploitation of computing hardware in cloud gaming services and the analysis of NXDomains within the Domain Name System (DNS). By thoroughly analyzing and understanding these security risks, this dissertation contributes to the advancement of networked system security and provides necessary countermeasures to protect Internet users against these threats.
|
10 |
Användardriven design : Utveckling av interaktiv karriärhemsida för Ericsson / User-Centered Design : Developing an Interactive career website at EricssonEskilsson, Sara, Haltia, Daniel January 2012 (has links)
Hemsidan är den enskilt största kommunikationskanalen mellan Ericsson och potentiellt framtida anställda. Företaget har idag problem med att den globala karriärhemsidan inte uppfattas som användarvänlig av särskilt studenter, och detta examensarbete syftar till att definiera krav för hur en global karriärhemsida bör utformas för att vara användarvänlig och välkomnande för studenter. Med en användarcentrerad designstrategi och en teoretisk bas inom interaktionsdesign och human factor syftar avhandlingen till att förstå vad studenterna efterfrågar och hur Ericsson kan möta och överträffa dessa förväntningar. Tester, workshops, utvärderingar och intervjuer har använts för att iterativt utveckla en prototyp och kravspecifikation. Studien visar att det finns två huvudsakliga typer av användare att designa för: de med ett tydligt mål att hitta ett jobb och de som försöker ta reda på om företaget är av intresse. Vanliga känslor hos användarna att ta hänsyn till är ångest, ensamhet, beslutsamhet, spänning och glädje. Några av slutsatserna kring den befintliga karriärhemsidan är att den vänstra menyn inte är organiserad på ett sätt som hjälper användaren att hitta vad han/hon letar efter, innehållet i mitten är för allmän och tråkig för många användare och högerspalten används sällan, trots att den innehåller vissa användbara funktioner. Resultaten från studierna har lett till rekommendationer så som att omorganisera den vänstra menyn, att använda startsidan för visualisering och kategorisering av hemsidans innehåll, att göra det möjligt att få information baserat på användarens intresse och att sätta arbete och företagets produkt i ett sammanhang. Resultatet är ett försök att balansera användarnas behov och omedvetna önskemål med vad som är möjligt att genomföra. Även om vissa kompromisser har gjorts är resultatet uppskattat av både användare och intressenter på Ericsson. / The website is the single largest communication channel between Ericsson and its potential future employees. Today the company is facing problems with their global career website being found not user-friendly by students. This master thesis project is to set requirements for how a global career website should be designed to be user friendly and welcoming for global students With a user-centered design approach and a theoretical base within interaction design and human factor the thesis aim is to understand what the students require and how Ericsson can meet and exceed the expectations. Tests, workshops, evaluations and interviews have been used to iteratively develop a concept prototype and set requirements. The workshops show there are two main types of users to be designed for: the ones having a clear goal finding a job and the ones trying to find out if the company is of interest. Common user feelings take into consideration while designing are anxiety, loneliness, determination, excitement and joy. Some conclusions concerning the existing career website is that the left menu used for navigation is not organized in a way that help the user find what he/she is looking for, the content in the middle is to general and bored many users, and the right section is never used, although containing some useful functionality. The results from the studies have led to recommendations such as reorganizing the left menu, using the entrance page for visualizing and categorizing the site content, make it possible to get information based on the users interest, and put the work and company product in a context. The resulting concept prototype is an attempt to balance the users‘ needs and un-dreamed of requirements with what is possible to implement. Although some compromises have been done, the result is appreciated by both user focus groups and Ericsson stakeholders.
|
Page generated in 0.1025 seconds