649 research outputs found

    Marketing competencies of trade personnel

    Get PDF
    Literature approaching the field of marketing deals with issues specific to the human resources competencies especially in the chapters regarding the organization of the marketing activity. The number of studies and the articles published in this area so far is, however, a rather low one. This article attempts to produce, from the perspective of an exploratory approach and without having as goal to develop or validate a list containing various items, the answers to a series of questions such as: what is meant by marketing skills and what they are, what are the main marketing skills that should be found at the level of the staff working in the field of trade and which should be the qualities of trade personnel conducting marketing activities.marketing competencies, personnel, trade, professional map of the marketing specialist

    Redesigning an Undergraduate Software Engineering Course for a Large Cohort

    Get PDF
    Teaching Software Engineering on an undergraduate programme is challenging, particularly when dealing with large numbers of stu- dents. On one hand, a strong understanding of software and good programming skills are prerequisites. On the other hand, the scale of the projects developed as part of undergraduate programmes do not always make the need for engineering obvious. Encourag- ing teamwork when students have little professional experience also adds to the level of complexity when delivering material. In this paper, we present a study on the redesign of a second year undergraduate course on Software Engineering for a large cohort

    Design as Code: Facilitating Collaboration between Usability and Security Engineers using CAIRIS

    Get PDF
    Designing usable and secure software is hard with- out tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range of security and usability engineering activities, its architecture needs to evolve to meet the workflows of these stakeholders. To this end, this paper illustrates how CAIRIS and its models act as a vehicle for collaboration between usability and security engineers. We describe how the modified architecture of CAIRIS facilitates this collaboration, and illustrate the tool using three usage scenarios

    Design as Code: Facilitating Collaboration between Usability and Security Engineers using CAIRIS

    Get PDF
    Designing usable and secure software is hard with- out tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range of security and usability engineering activities, its architecture needs to evolve to meet the workflows of these stakeholders. To this end, this paper illustrates how CAIRIS and its models act as a vehicle for collaboration between usability and security engineers. We describe how the modified architecture of CAIRIS facilitates this collaboration, and illustrate the tool using three usage scenarios

    Using Extreme Characters to Teach Requirements Engineering

    Get PDF
    One of the main challenges in teaching Software Engineering as an undergraduate course is making the need for software processes and documentation obvious. Armed with some knowledge of programming, students may feel inclined to skip any development phase not involving coding. This is most pronounced when dealing with the Requirements Engineering practices. In this paper, we describe a practical approach to teaching Requirements Engineering using Extreme Characters. The exercise aimed to achieve the following learning objectives: a) understanding the need of including the end user in any requirements analysis phase, b) identifying the requirements engineering phase as a iterative process, c) understanding the necessity of constantly double checking the analysts interpretation of the user requirements, d) ensuring the rigorous documentation of both user and system requirements, and e) identifying the place of requirements engineering in the overall development process, and the forces and challenges around this phase of development

    Measurement of the half-life of 198Au in a non-metal: High-precision measurement shows no host-material dependence

    Get PDF
    We have measured the half-life of the beta decay of 198Au to be 2.6948(9) d, with the nuclide sited in an insulating environment. Comparing this result with the half-life we measured previously with a metallic environment, we find the half-lives in both environments to be the same within 0.04%, thus contradicting a prediction that screening from a "plasma" of quasi-free electrons in a metal increases the half-life by as much as 7%

    Balance with Unbounded Complexes

    Get PDF
    Given a double complex XX there are spectral sequences with the E2E_2 terms being either HI_I (HII(X))_{II}(X)) or HII(_{II}(HI(X))_I (X)). But if HI(X)=HII(X)=0H_I(X)=H_{II}(X)=0 both spectral sequences have all their terms 0. This can happen even though there is nonzero (co)homology of interest associated with XX. This is frequently the case when dealing with Tate (co)homology. So in this situation the spectral sequences may not give any information about the (co)homology of interest. In this article we give a different way of constructing homology groups of XX when HI(X)=_I(X)=HII(X)=0_{II}(X)=0. With this result we give a new and elementary proof of balance of Tate homology and cohomology

    Ethical Hazards and Safeguards in Penetration Testing

    Get PDF
    Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their processes and technology, we need to understand the factors that affect decisions they make with ethical import. This paper presents four ethical hazards faced by penetration testers, and three safeguards that address them. We also present preliminary results validating the hazards and safeguards
    • …
    corecore