1,425 research outputs found

    Employing a Multilevel Secure Approach in CRM Systems

    Get PDF
    This research shows how Multilevel Secure (MLS) data models can be used in a Customer Relationship Management (CRM) context. MLS models were originally developed as database models for the management of information in environments characterized by a strict hierarchy of security levels, such as military institutions and government security agencies. Improvements in evolving database technologies have made MLS data modeling practical as well as theoretically appealing. This paper illustrates how an MLS model can be used as a part of the technology for coordinating business-customer interactions with the objective of building long-term customer loyalty. Several examples are used to show how organizing a database management system based on MLS principles can be used to help businesses provide consistent and appropriate content to various customers and partners. Improvements in flexibility and cost of applications, as well as opportunities for new CRM strategies, are discussed as potential benefits of integrating MLS and CRM technology

    Meaning Matters: Cognitive Crafting as a Sensemaking Mechanism and Motivational Process to Enhance Gig Driver Well-being

    Get PDF
    As the gig work sector of the workforce continues to grow, organizational psychologists must actively contribute to raising the bar for gig drivers (e.g., ride-hailing, food delivery) so that they are not merely surviving but also thriving through their work. In my dissertation, I tested cognitive crafting as a positive meaning-making process that helps gig drivers make sense of their interactions with customers, generates positive, motivating states such as work engagement, and promotes positive outcomes such as work-related well-being and job satisfaction. My dissertation employed a mixed-methods design. The daily diary built on qualitative data results that identified interesting - and perhaps even counterintuitive - themes about gig drivers\u27 experiences and perceptions of their work. The daily diary results demonstrated that daily positive customer interactions were positively related to daily cognitive crafting and work engagement, and daily negative customer interactions had a negative relationship with daily cognitive crafting. These relationships were moderated by psychological capital. The serial mediation effects and the moderated serial mediation effects were not supported. This study provided insight into the customer interactions – cognitive crafting relationship at the daily level. Additionally, the results supported that individual differences in psychological capital explained which gig drivers cognitively crafted in light of customer interactions. As a whole, this dissertation provides important contributions to the literature by examining cognitive crafting and well-being in the unique context of gig driving with a positive organizational scholarship lens

    The Complete MLSK Model—incorporation of lattice operations and XML implementation

    Get PDF
    Many multilevel security relational models have been proposed and different models offer different advantages. In this paper, we adapt and refine some of the best ideas from these models and add new ones of own to extend our Multilevel Security with Key-polyinstantiation (MLSK) relational model. MLSK now supports relational algebra and user lattice manipulations while ensuring that the soundness, completeness and security that it originally guaranteed are not compromised. We also implement MLSK in a non-relational scenario, thereby demonstrating the extensibility of the model to other environments

    A Multilevel Secure Relational Database Model with key-polyinstantiation

    Get PDF
    In multilevel security there is a hierarchy of users or user-levels, in which each user has its own version of information. Most of the existing multilevel secure (MLS) data models support u-polyinstantiation. The only model that supports key-polyinstantiation was proposed by Gadia et al[GS1998, JS1990, CG1995], but work on it remains incomplete. It is important for a model to support key-polyinstantiation because in the real world it is often the case that an object varies in its key value(s) (such as name, SSN, identification number etc.) when it occurs in the beliefs of different users. Thus having a unique key across beliefs limits our ability to accurately model the real world. Our work focuses on the relational database model, supports key-polyinstantiation and has semantics defined in an SQL-like format since most database users are experienced in using SQL and hence such semantics are intuitive and easy to understand

    A Multilevel Secure Relational Database Model with key-polyinstantiation

    Get PDF
    The problem of recognizing motifs from biological data has been well-studied and numerous algorithms, both exact and approximate, have been proposed to address the underlying issue. We strongly believe that open availability and ease of accessibility of quality implementations for such algorithms are critical to the research community, in order to directly reproduce and utilize the results from other studies, so as not to reinvent the wheel. Moreover, it is also important for the implementation to be as generic as possible so that any researcher can to extend it with minimal effort to test a newly implemented algorithmic extension or heuristic. With this motivation, we choose to focus an existing algorithm, PatternBranching and, to a lesser degree, Yang2004. We analyze these approaches for minor heuristical changes & speed-ups by adjusting certain thresholds, and finally, implement the variant in high-level language (Java) using thought through programming practices and generic, extensible interfaces. We also analyze the performance of PatternBranching using a synthetically generated test-suite for a variety of sequence lengths and report the results. Code from this project will be made freely available online to the research community

    The Complete MLSK Model - incorporation of lattice operations and XML implementation

    Get PDF
    Many multilevel security relational models have been proposed and different models offer different advantages. In this paper, we adapt and refine some of the best ideas from these models and add new ones of own to extend our Multilevel Security with Key-polyinstantiation (MLSK) relational model. MLSK now supports relational algebra and user lattice manipulations while ensuring that the soundness, completeness and security that it originally guaranteed are not compromised. We also implement MLSK in a non-relational scenario, thereby demonstrating the extensibility of the model to other environments

    Profiles of Chinese preschoolers' academic and social–emotional development in relation to classroom quality: A multilevel latent profile approach

    Get PDF
    Linking classroom quality to separate domains of child development might neglect the transactional interactions across developmental domains. This research utilized latent profiles across academic and social–emotional development to explore which aspects of classroom quality can predict children's profiles at the classroom level. Data were drawn from 96 preschool classrooms and 547 children (3–5 years old) in China in 2020. Multilevel latent profile analysis identified three profiles (entitled low-, average- and high-level development at the individual level), and two classes (entitled average and below-, average and above) at the classroom level. Multinominal logistic regression analyses revealed that instructional quality in math, science, and diversity, and the interactional quality in supporting children's learning and critical thinking, predicted children's profiles.publishedVersio

    New Decomposition Technique for Decomposeing a Multilevel Secure Relation Into Single-Level Relations

    Get PDF

    V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service

    Get PDF

    Applicability of Temporal Data Models to Query Multilevel Security Databases: A Case Study

    Get PDF
    In a multilevel security database there are multiple beliefs about a given real world object. The ability of a database model to accommodate multiple beliefs is termed polyinstantiation in the multilevel security literature. In this paper we remark that in an abstract sense polyinstantiation is a priori present in all models for temporal and spatial databases. In particular we investigate the applicability of the parametric model for temporal data to query multilevel security data and, as a case study, compare it to a model for multilevel security given by Winslett, Smith, and Qian
    • …
    corecore