6,858 research outputs found
Tracking Chart 2009 H&M Hennes & Mauritz AB, China, Factory 3
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2009TrackingChart_HMChina1.pdf: 62 downloads, before Oct. 1, 2020
Desktop security as a three-dimensional problem
In this paper we argue against viewing computer desktop security solely as a technical issue. Instead, we propose a perspective that combines three related dimensions: technical infrastructure, usability and user engagement. In this light, we suggest that a viable approach to desktop security should embrace these three key dimensions of the end-user context. An example desktop application is described that has been engineered to embody these dimensions in support of the desktop user
Securing library information system: Vulnerabilities and threats
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the
public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats
Russell Brands – Tracking Report – Philippines Factory Code: 260059567J; December 15, 2011
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2011_Russell_TR_Philippines_260059567J.pdf: 27 downloads, before Oct. 1, 2020
Work Organisation and Innovation - Case Study: LHT, Germany
[Excerpt] Lufthansa Technik AG (LHT) provides aircraft-related technical services to a worldwide customer base comprising airlines, aircraft leasing companies, maintenance organisations, and operators of business and VIP aircrafts. Besides the maintenance, repair, and overhaul (MRO) services that form the organisation’s core business, activities also include development and production activities, as well as logistics
Usage habits of business information system in Hungary
The IT functions of the companies can be executed in different ways in-house solution, outsourcing, in sourcing, formation a spin-off company. Predominantly this function is provided within the company in Hungary. The larger a company is; it is more likely that a separate IT manager will be entrusted for the supervision of IT functions. Only a very small number of small-sized enterprises said that they paid special attention to formulating an IT strategy, while it was not considered important by microenterprises at all
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control
the operation of many critical infrastructures that our society depend on, such
as power grids. Since SCADA systems become a target for cyber attacks and the
potential impact of a successful attack could lead to disastrous consequences
in the physical world, ensuring the security of these systems is of vital
importance. A fundamental prerequisite to securing a SCADA system is a clear
understanding and a consistent view of its architecture. However, because of
the complexity and scale of SCADA systems, this is challenging to acquire. In
this paper, we propose a layered architectural view for SCADA systems, which
aims at building a common ground among stakeholders and supporting the
implementation of security analysis. In order to manage the complexity and
scale, we define four interrelated architectural layers, and uses the concept
of viewpoints to focus on a subset of the system. We indicate the applicability
of our approach in the context of SCADA system security analysis.Comment: 7 pages, 4 figure
- …