نتایج جستجو برای: enforcement mechanisms
تعداد نتایج: 555562 فیلتر نتایج به سال:
The ethical behavior of information systems personnel remains a key IS management problem in need of attention. Codes of ethics have become important mechanisms for influencing ethical behavior, yet their efficacy has not been proven. The communication and enforcement of codes within an organization are thought to be necessary for ensuring a code’s success in influencing employee behavior. This...
Detecting deception is an inherently difficult task, but one that plays a critical role for law enforcement investigators in the interrogation room. In general, research has failed to indicate that performance in this domain is improved by training or prior experience. A signal detection framework is applied to the paradigm to better conceptualize the influence of these two factors. We found th...
This paper presents the Merlin network management framework. With Merlin, network administrators express functionality such as accounting, bandwidth provisioning, and traffic filtering in a high-level policy language, and use automated tools and mechanisms to implement them. The framework includes: (i) a declarative language for specifying policies, (ii) infrastructure for distributing, refinin...
Enforcement mechanisms are thought to be important in maintaining mutualistic cooperation between species. A clear example of an enforcement mechanism is how legumes impose sanctions on rhizobial symbionts that fail to provide sufficient fixed N2. However, with domestication and breeding in high-soil-N environments, humans may have altered these natural legume defences and reduced the agricultu...
We present two methodologies that adapt the event study from research in finance and economics to study the impact of enforcement on information security attacks. One uses linear regression with the number of attacks as the dependent variable and indicators of enforcement events as independent variables. The other measures the impact of enforcement by the difference between the actual and predi...
BACKGROUND Digital forms of direct-to-consumer pharmaceutical marketing (eDTCA) have globalized in an era of free and open information exchange. Yet, the unregulated expansion of eDTCA has resulted in unaddressed global public health threats. Specifically, illicit online pharmacies are engaged in the sale of purportedly safe, legitimate product that may in fact be counterfeit or substandard. Th...
The browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult at both the policy-specification level and the implementation level. This paper is focused on the implementations of browser isolation mechanisms. As a concrete example, we discuss the enforcement of the well-defined cross-frame isolation policy, which...
Component and service-based application infrastructures provide mechanisms for efficiently composing a system from a diverse collection of components and services. However, because of the lack of insight into the components and services within the application, integrating changes can be challenging. One class of change that we perceive as being both common and necessary is in the area of policy...
Execution monitoring (EM) is a widely adopted class of security mechanisms. EM-enforceable security properties are usually characterized by security automata and their derivatives. However Edit automata (EA) have been recently proposed to specify more powerful EMs. Being able to feign the execution of sensitive program actions, these EMs are supposed to enforce more security properties. However...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید