306 research outputs found

    Critical success factors and their implementation in sports events organisation and management

    Get PDF
    A successful sport event is not only an implementation of the management principles from the organisers but a live adaptation process that requires a deep understanding of the political, economic and social environment that takes place in a specific area at a specific time. As success has many different parameters and stakeholders with different expectations who define success in different terms, organisers need to be flexible in their recognition of the specific characteristics of each sport event so as to adopt new ideas, methods and skills or develop novel know-how where is needed in order to ensure the event is a success. For this reason the objectives of this study are: a. To understand how event organisers define the success of an event, b. Identify the Critical Success Factors (CSFs) that influence the success of different types of sporting event, c. To propose a framework of CSFs for the sports events in order to develop a broader and deeper understanding of how to deliver a successful sporting event. In order to meet these three research objectives in this study twenty two people from five sporting organisations participated like FIBA, FINA, UEFA, the LAUSSANE TRIATHLON and the APHRODITE HALF MARATHON. In this multifaceted organisational environment in which event organisers operate, the recognition and identification of critical success factors for each event organisational area will provide a helpful framework for the successful organisation of events. The results of the present study were collected through semi-structured interviews and the classification and coding was done through use of NVivo 10 software. The study provides a useful basis for sports events organisation that connects the identified success factors that could influence the sports events with the CSFs, as a closely connected organisational set. Also this study focuses on what event organisers consider the critical success factors areas for a sport event to be and how they use them during the life cycle of the event organisation. In this, the key performance indicators, provide a clear sequence between the objectives, targets, action plans and measures that will take place during the event organisation. It considers a broad framework of CSFs, including communication, governmental and public support, financial, organisational, sport community, and stakeholders, technical and technological factors that could influence the success of the sport event. In addition, the study provides a framework for the determination of CSFs to support the sporting event organisation to keep track of the implementation progress of the event

    Ανάσχεση βραχοπτώσεων στο λόφο Καστελίου Χώρας Σφακίων

    Get PDF
    Εθνικό Μετσόβιο Πολυτεχνείο--Μεταπτυχιακή Εργασία. Διεπιστημονικό-Διατμηματικό Πρόγραμμα Μεταπτυχιακών Σπουδών (Δ.Π.Μ.Σ.) “Σχεδιασμός και Κατασκευή Υπόγειων Έργων

    FACTORS OF PKI ADOPTION IN EUROPEAN FIRMS

    Get PDF

    Pseudorandom number generation based on controllable cellular automata

    Get PDF
    A novel Cellular Automata (CA) Controllable CA (CCA) is proposed in this paper. Further, CCA are applied in Pseudorandom Number Generation. Randomness test results on CCA Pseudorandom Number Generators (PRNGs) show that they are better than 1-d CA PRNGs and can be comparable to 2-d ones. But they do not lose the structure simplicity of 1-d CA. Further, we develop several different types of CCA PRNGs. Based on the comparison of the randomness of different CCA PRNGs, we find that their properties are decided by the actions of the controllable cells and their neighbors. These novel CCA may be applied in other applications where structure non-uniformity or asymmetry is desired

    Mobile Application Privacy Risks : Viber Users’ De-Anonymization Using Public Data

    Get PDF
    Mobile application developers define the terms of use for the applications they develop, which users may accept or declined during installation. Application developers on the one hand seek to gain access to as many user information as possible, while users on the other hand seem to lack awareness and comprehension of privacy policies. This allows application developers to store an enormous number of personal data, sometimes even irrelevant to the application’s function. It’s also common that users choose not to alter the default settings, even when such an option is provided. In combination, the above conditions jeopardize users’ rights to privacy. In this research, we examined the Viber application to demonstrate how effortless it is to discover the identity of unknown Viber users. We chose a pseudorandom sample of 2000 cellular telephone numbers and examined if we could reveal their personal information. We designed an empirical study that compares the reported behavior with the actual behavior of Viber’s users. The results of this study show that users’ anonymity and privacy is easily deprived and information is exposed to a knowledgeable seeker. We provide guidelines addressed to both mobile application users and developers to increase privacy awareness and prevent privacy violations

    AppAware: A Model for Privacy Policy Visualization for Mobile Applications

    Get PDF
    Privacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach for this purpose. Literature notes that users find difficulties in understanding privacy policies because they are usually written in technical or legal language even, although most users are unfamiliar with them. These difficulties have led most users to skip reading privacy policies and blindly accept them. In an effort to address this challenge this paper presents AppWare, a multiplatform tool that intends to improve the visualization of privacy policies for mobile applications. AppWare formulates a visualized report with the permission set of an application, which is easily understandable by a common user. AppWare aims to bridge the difficulty to read privacy policies and android’s obscure permission set with a new privacy policy visualization model. To validate AppAware we conducted a survey through questionnaire aiming to evaluate AppAware in terms of installability, usability, and viability-purpose. The results demonstrate that AppAware is assessed above average by the users in all categories

    Users’ Attitudes on Mobile Devices: Can Users’ Practices Protect their Sensitive Data?

    Get PDF
    Smartphones are the most popular personal electronic devices. They are used for all sorts of purposes, from managing bank accounts to playing games. As smartphone apps and services proliferate, the amount of sensitive data stored on or processed by handheld devices rise as well. This practice entails risks, such as violating users’ privacy, stealing users’ identities, etc. Particularly, stealing an unlocked device grants full access to sensitive data and applications. In this survey, we examine whether users adopt some basic practices to protect their sensitive personal data themselves, or is there a need to further strengthen their protection? Our statistical analysis assesses smartphone users’ security attitudes and practices among different age groups. Finally, we investigate the factors that affect the attitude of users with respect to their practices for the protection of personal data.The results of this study, show that while many smartphone users do take some security precautions, a high percentage (24%) of them still ignores security and privacy risks. In addition, 19,1 % of users do not follow any practices to protect their PINs and Passwords

    Charakterisierung der T-Zellen im Kontakt mit ercDC in Nierenzellkarzinom

    Get PDF

    Aligning Security Awareness With Information Systems Security Management

    Get PDF
    This paper explores the way information security awareness connects to the overall information security management framework it serves. To date, the formulation of security awareness initiatives has tended to ignore the important relationship with the overall security management context, and vice versa. In this paper we show that the two processes can be aligned so as to ensure that awareness activities serve the security management strategy and that security management exploits the benefits of an effective awareness effort. To do so, we analyze the processes of security awareness and security management using a process analysis framework and we explore their interactions. The identification of these interactions results in making us able to place awareness in a security management framework instead of viewing it as an isolated security mechanism

    Ὁ ἀμφηρωισμός τοῦ Περεγρίνου Πρώτεως

    Get PDF
    corecore