6,858 research outputs found

    Tracking Chart 2009 H&M Hennes & Mauritz AB, China, Factory 3

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2009TrackingChart_HMChina1.pdf: 62 downloads, before Oct. 1, 2020

    Desktop security as a three-dimensional problem

    Get PDF
    In this paper we argue against viewing computer desktop security solely as a technical issue. Instead, we propose a perspective that combines three related dimensions: technical infrastructure, usability and user engagement. In this light, we suggest that a viable approach to desktop security should embrace these three key dimensions of the end-user context. An example desktop application is described that has been engineered to embody these dimensions in support of the desktop user

    Securing library information system: Vulnerabilities and threats

    Get PDF
    Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet. Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats

    Russell Brands – Tracking Report – Philippines Factory Code: 260059567J; December 15, 2011

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2011_Russell_TR_Philippines_260059567J.pdf: 27 downloads, before Oct. 1, 2020

    Work Organisation and Innovation - Case Study: LHT, Germany

    Get PDF
    [Excerpt] Lufthansa Technik AG (LHT) provides aircraft-related technical services to a worldwide customer base comprising airlines, aircraft leasing companies, maintenance organisations, and operators of business and VIP aircrafts. Besides the maintenance, repair, and overhaul (MRO) services that form the organisation’s core business, activities also include development and production activities, as well as logistics

    Usage habits of business information system in Hungary

    Get PDF
    The IT functions of the companies can be executed in different ways in-house solution, outsourcing, in sourcing, formation a spin-off company. Predominantly this function is provided within the company in Hungary. The larger a company is; it is more likely that a separate IT manager will be entrusted for the supervision of IT functions. Only a very small number of small-sized enterprises said that they paid special attention to formulating an IT strategy, while it was not considered important by microenterprises at all

    Towards a Layered Architectural View for Security Analysis in SCADA Systems

    Full text link
    Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of a successful attack could lead to disastrous consequences in the physical world, ensuring the security of these systems is of vital importance. A fundamental prerequisite to securing a SCADA system is a clear understanding and a consistent view of its architecture. However, because of the complexity and scale of SCADA systems, this is challenging to acquire. In this paper, we propose a layered architectural view for SCADA systems, which aims at building a common ground among stakeholders and supporting the implementation of security analysis. In order to manage the complexity and scale, we define four interrelated architectural layers, and uses the concept of viewpoints to focus on a subset of the system. We indicate the applicability of our approach in the context of SCADA system security analysis.Comment: 7 pages, 4 figure
    • …
    corecore