649 research outputs found
Marketing competencies of trade personnel
Literature approaching the field of marketing deals with issues specific to the human resources competencies especially in the chapters regarding the organization of the marketing activity. The number of studies and the articles published in this area so far is, however, a rather low one. This article attempts to produce, from the perspective of an exploratory approach and without having as goal to develop or validate a list containing various items, the answers to a series of questions such as: what is meant by marketing skills and what they are, what are the main marketing skills that should be found at the level of the staff working in the field of trade and which should be the qualities of trade personnel conducting marketing activities.marketing competencies, personnel, trade, professional map of the marketing specialist
Redesigning an Undergraduate Software Engineering Course for a Large Cohort
Teaching Software Engineering on an undergraduate programme is challenging, particularly when dealing with large numbers of stu- dents. On one hand, a strong understanding of software and good programming skills are prerequisites. On the other hand, the scale of the projects developed as part of undergraduate programmes do not always make the need for engineering obvious. Encourag- ing teamwork when students have little professional experience also adds to the level of complexity when delivering material. In this paper, we present a study on the redesign of a second year undergraduate course on Software Engineering for a large cohort
Design as Code: Facilitating Collaboration between Usability and Security Engineers using CAIRIS
Designing usable and secure software is hard with-
out tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range of security and usability engineering activities,
its architecture needs to evolve to meet the workflows of these stakeholders. To this end, this paper illustrates how CAIRIS and its models act as a vehicle for collaboration between usability and security engineers. We describe how the modified architecture of CAIRIS facilitates this collaboration, and illustrate the tool using three usage scenarios
Design as Code: Facilitating Collaboration between Usability and Security Engineers using CAIRIS
Designing usable and secure software is hard with-
out tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range of security and usability engineering activities,
its architecture needs to evolve to meet the workflows of these stakeholders. To this end, this paper illustrates how CAIRIS and its models act as a vehicle for collaboration between usability and security engineers. We describe how the modified architecture of CAIRIS facilitates this collaboration, and illustrate the tool using three usage scenarios
Using Extreme Characters to Teach Requirements Engineering
One of the main challenges in teaching Software Engineering as an undergraduate course is making the need for software processes and documentation obvious. Armed with some knowledge of programming, students may feel inclined to skip any development phase not involving coding. This is most pronounced when dealing with the Requirements Engineering practices. In this paper, we describe a practical approach to teaching Requirements Engineering using Extreme Characters. The exercise aimed to achieve the following learning objectives: a) understanding the need of including the end user in any requirements analysis phase, b) identifying the requirements engineering phase as a iterative process, c) understanding the necessity of constantly double checking the analysts interpretation of the user requirements, d) ensuring the rigorous documentation of both user and system requirements, and e) identifying the place of requirements engineering in the overall development process, and the forces and challenges around this phase of development
Measurement of the half-life of 198Au in a non-metal: High-precision measurement shows no host-material dependence
We have measured the half-life of the beta decay of 198Au to be 2.6948(9) d,
with the nuclide sited in an insulating environment. Comparing this result with
the half-life we measured previously with a metallic environment, we find the
half-lives in both environments to be the same within 0.04%, thus contradicting
a prediction that screening from a "plasma" of quasi-free electrons in a metal
increases the half-life by as much as 7%
Balance with Unbounded Complexes
Given a double complex there are spectral sequences with the terms
being either H (H or HH. But if
both spectral sequences have all their terms 0. This can
happen even though there is nonzero (co)homology of interest associated with
. This is frequently the case when dealing with Tate (co)homology. So in
this situation the spectral sequences may not give any information about the
(co)homology of interest. In this article we give a different way of
constructing homology groups of when HH. With this
result we give a new and elementary proof of balance of Tate homology and
cohomology
Ethical Hazards and Safeguards in Penetration Testing
Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming
the system nor encroaching on the dignity of those affected by it. To improve the interaction between
penetration testers and their processes and technology, we need to understand the factors that affect
decisions they make with ethical import. This paper presents four ethical hazards faced by penetration
testers, and three safeguards that address them. We also present preliminary results validating the hazards
and safeguards
- …