66 research outputs found

    Automated Measuring of Information Security Related Habits

    Get PDF
    Since the digital age requires interaction with digital services, the information security awareness (ISA) of everyone gets more important than ever. Since the ISA is defined as a set of aspects, it is not enough to increase the knowledge. This work focuses on the aspect of habits. Therefore, we used design science research to create an artifact which allows the automated measurement of habits. The automation can be achieved through a client-server application which tracks the behavior of employees in a GDPR-compliant way and calculates multiple metrics based on the tracked behavior. However, not all of the defined metrics are applicable in every company. Therefore, additional process iterations of the design science research methodology are required

    Proposal of the future maritime education and training for maritime officers of Pakistan

    Get PDF
    This paper is specifically directed towards the maritime education and training of Pakistan. The objectives of this paper are explained in the following paragraphs. .1 In countries where shipping activities are not sizable the maritime institutions have to justify their survival. There are questions asked about the cost effectiveness of the maritime educational institutions. There is an acute need to publicise the importance of such education and training. With reasons for having it in specialised institutions. .2 The present slump in shipping has rendered many useful technical personnel (seafarers) jobless. One of the major reasons is the non-equivalence of maritime educational systems with the regular national academic educational systems. It is of paramount importance to eliminate this reason and so ease the pressures on the shipping industry and its personnel. Doing this will help the general national policies of rooting out the social evils of unemployment. .3 we are passing through the end of a technological era. This fact is to be taken seriously. a review of the entire maritime education and training system is the need of the time. In this paper I have tried to provide one possible way of solving these problems. Particularly in the context of Pakistani environmen

    Centering Disability in Technology Policy: Issue Landscape and Potential Opportunities for Action

    Get PDF
    Technology has the power to create a more just and inclusive society by providing greater autonomy, safety, economic opportunity, and convenience for historically marginalized groups. However, all too often, technology instead exacerbates existing discrimination and the structural barriers faced by historically marginalized groups, including people of color, women, and people with disabilities, and especially those who experience intersecting forms of oppression.Undertaken as a collaboration between the American Association of People with Disabilities (AAPD) and the Center for Democracy and Technology (CDT) with the support of Freedman Consulting, this report is intended to help public interest organizations do more inclusive, effective work at the intersection of technology and disability issues in the United States. Based on conversations with 20 disability and technology leaders, this report will explore issue areas and ways where technology justice organizations can better integrate a disability lens into their work. In addition, issues surfaced in this report may help disability groups identify meaningful opportunities to engage on technology policy issues and advance their often-long-standing priorities. Along with identifying policy issues at the intersection of disability and technology, this report will also highlight the challenges and needs that must be addressed in order to break down barriers between siloed fields and do more effective work.Historically, technology has played a significant role in improving the quality of life, and in certain instances, longevity, for many disabled people. This report is not meant to contest or stand in denial of that reality. In taking an intersectional approach, this report aims to ensure that the pursuit of technologies to create opportunity and lower barriers for some does not create inequities or limitations for others. Technology has great potential to improve life and autonomy for people with disabilities, but it also requires equitable and inclusive development, thoughtful, responsive implementation and oversight, and a commitment to identifying and mitigating harms to already-marginalized communities

    Gift from Pandora's Box : the software crisis

    Get PDF

    Implementation of Specialized Software in Hospital Foodservice Departments: A Multi-Case Study Approach

    Get PDF
    This study investigated the implementation of specialized hospital foodservice software in five hospital foodservice departments using qualitative and quantitative research methods. The software provided diet office systems management, purchasing, inventory, production tools, financial, and cafeteria management features. The departments underwent a mandatory implementation of the software. Each hospital belonged to a division of 17 hospitals within a large for-profit healthcare corporation. Face-to-face interviews were conducted with 27 individuals involved in the implementation of the software or who used the software during and following implementation. Additionally, a questionnaire investigating technology readiness and willingness to adopt was administered post-implementation to 104 hospital foodservice employees working in the five hospital foodservice departments. Secondary patient satisfaction data and financial data spanning six months pre-implementation through six months post-implementation were analyzed. Findings included: identification of barriers and facilitators to software implementation, preferred methods of training, and identification of requested communication tools. Benefits and disadvantages regarding the implementation were identified and modifications to department operations made post-implementation were pinpointed. A perceived effect on departmental efficiency was noted at four of the five foodservice departments; however, the perceived effect was not consistent and no overall effect was found. Patient satisfaction was impacted by the implementation process. Four of the five foodservice departments experienced a decrease in patient satisfaction during the quarter software implementation occurred. The results from the survey indicated there was familiarity with and perceived value in the use of technology. The majority of foodservice employees (69%) indicated they ‘liked the idea of automating the diet office’. This study found leadership and communication are key components in the implementation of software in hospital foodservice. Evidence of strong leadership and good communication helped to facilitate the implementation, while poor communication and leadership were barriers to the implementation process. Electronic training methods were poorly received by the end users, while hands on training was well received and found effective by end users. The addition of registered dietitians in the implementation process appeared beneficial and resulted in the end users feeling proficient with the software

    Self-Guard: Empower the LLM to Safeguard Itself

    Full text link
    The jailbreak attack can bypass the safety measures of a Large Language Model (LLM), generating harmful content. This misuse of LLM has led to negative societal consequences. Currently, there are two main approaches to address jailbreak attacks: safety training and safeguards. Safety training focuses on further training LLM to enhance its safety. On the other hand, safeguards involve implementing external models or filters to prevent harmful outputs. However, safety training has constraints in its ability to adapt to new attack types and often leads to a drop in model performance. Safeguards have proven to be of limited help. To tackle these issues, we propose a novel approach called Self-Guard, which combines the strengths of both safety methods. Self-Guard includes two stages. In the first stage, we enhance the model's ability to assess harmful content, and in the second stage, we instruct the model to consistently perform harmful content detection on its own responses. The experiment has demonstrated that Self-Guard is robust against jailbreak attacks. In the bad case analysis, we find that LLM occasionally provides harmless responses to harmful queries. Additionally, we evaluated the general capabilities of the LLM before and after safety training, providing evidence that Self-Guard does not result in the LLM's performance degradation. In sensitivity tests, Self-Guard not only avoids inducing over-sensitivity in LLM but also can even mitigate this issue

    International Conference on Information Systems

    Get PDF
    UBT Annual International Conference is the 11th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent advancements in different research fields, and provide them with a unique forum to share their experiences. It is also the place to support the new academic staff for doing research and publish their work in international standard level. This conference consists of sub conferences in different fields like: Art and Digital Media Agriculture, Food Science and Technology Architecture and Spatial Planning Civil Engineering, Infrastructure and Environment Computer Science and Communication Engineering Dental Sciences Education and Development Energy Efficiency Engineering Integrated Design Information Systems and Security Journalism, Media and Communication Law Language and Culture Management, Business and Economics Modern Music, Digital Production and Management Medicine and Nursing Mechatronics, System Engineering and Robotics Pharmaceutical and Natural Sciences Political Science Psychology Sport, Health and Society Security Studies This conference is the major scientific event of the UBT. It is organizing annually and always in cooperation with the partner universities from the region and Europe. We have to thank all Authors, partners, sponsors and also the conference organizing team making this event a real international scientific event. Edmond Hajrizi, President of UBT UBT – Higher Education Institutio
    corecore