30 research outputs found

    When Deviant Behavior In The Workplace Gets Technical

    Get PDF
    Workplace deviant behavior typologies typically include absenteeism, theft, incivility and violence. Three recent case studies are reviewed that indicate computer sabotage should be added to these classifications

    United States v. Irving

    Get PDF

    Seguridad de la informaci贸n de un Estado democr谩tico moderno: contexto axiol贸gico

    Get PDF
    The authors of the research focus on the role and significance of values in forming the basis for the information security of a modern democratic state. In the course of the research, the authors applied general scientific methods (analysis, synthesis, analogy, etc.), philosophical methods (dialectical, hermeneutic), and special legal methods (normative-analytical). Information security includes not only the protection of information resources of the society, state and people, but also ensures the preservation of value aspects, historical memory, cultural traditions, and a particular people鈥檚 specific national way of life. The most important objective of information society institutions is the protection of the country鈥檚 information sovereignty. Information wars are the continuation of economic, political, as well as cultural and religious conflicts on our planet. In this research, the authors come to the conclusion that one of the aspects of information wars is value confrontation. That is why it is necessary to consider information security not only in the legal, communication-technical and political aspects but also in the axiological context.Los autores de la investigaci贸n se centran en el papel y la importancia de los valores para formar la base de la seguridad de la informaci贸n de un estado democr谩tico moderno. En el curso de la investigaci贸n, los autores aplicaron m茅todos cient铆ficos generales (an谩lisis, s铆ntesis, analog铆a, etc.), m茅todos filos贸ficos (dial茅cticos, hermen茅uticos) y m茅todos legales especiales (normativo-anal铆ticos). La seguridad de la informaci贸n incluye no solo la protecci贸n de los recursos de informaci贸n de la sociedad, el estado y las personas, sino que tambi茅n garantiza la preservaci贸n de los aspectos de valor, la memoria hist贸rica, las tradiciones culturales y la forma de vida nacional espec铆fica de un pueblo en particular. El objetivo m谩s importante de las instituciones de la sociedad de la informaci贸n es la protecci贸n de la soberan铆a de la informaci贸n del pa铆s. Las guerras de informaci贸n son la continuaci贸n de conflictos econ贸micos, pol铆ticos, culturales y religiosos en nuestro planeta. En esta investigaci贸n, los autores llegan a la conclusi贸n de que uno de los aspectos de las guerras de informaci贸n es la confrontaci贸n de valores. Es por eso que es necesario considerar la seguridad de la informaci贸n no solo en los aspectos legales, de comunicaci贸n, t茅cnicos y pol铆ticos, sino tambi茅n en el contexto axiol贸gico

    On the role of outside option in wage bargaining.

    Get PDF
    Chen, Fengjiao.Thesis (M.Phil.)--Chinese University of Hong Kong, 2011.Includes bibliographical references (leaves 34-35).Abstracts in English and Chinese.Chapter 1 --- Introduction --- p.1Chapter 2 --- Literature Review --- p.5Chapter 2.1 --- Wage Bargaining and Strike --- p.6Chapter 2.2 --- Outside Option --- p.7Chapter 3 --- The Model Setting --- p.9Chapter 4 --- Equilibrium Analysis --- p.12Chapter 4.1 --- Equilibrium when b We --- p.15Chapter 4.4 --- Opting Out is an Equilibrium --- p.26Chapter 4.5 --- Implications on Preemption and Renegotiation --- p.27Chapter 5 --- Discussion --- p.28Chapter 5.1 --- Without Outside Option (HHFG Model) --- p.28Chapter 5.2 --- Committed to Strike (Shaked 1994) --- p.29Chapter 5.3 --- The Influence of discount factor 5 --- p.30Chapter 5.4 --- Equilibrium Refinement by Good Faith Bargaining Rule --- p.31Chapter 6 --- Conclusion --- p.3

    The BG News October 2, 1969

    Get PDF
    The BGSU campus student newspaper October 2, 1969. Volume 54 - Issue 7https://scholarworks.bgsu.edu/bg-news/3363/thumbnail.jp

    A trust supportive framework for pervasive computing systems

    Get PDF
    Recent years have witnessed the emergence and rapid growth of pervasive comput- ing technologies such as mobile ad hoc networks, radio frequency identification (RFID), Wi-Fi etc. Many researches are proposed to provide services while hiding the comput- ing systems into the background environment. Trust is of critical importance to protect service integrity & availability as well as user privacies. In our research, we design a trust- supportive framework for heterogeneous pervasive devices to collaborate with high security confidence while vanishing the details to the background. We design the overall system ar- chitecture and investigate its components and their relations, then we jump into details of the critical components such as authentication and/or identification and trust management. With our trust-supportive framework, the pervasive computing system can have low-cost, privacy-friendly and secure environment for its vast amount of services
    corecore