نتایج جستجو برای: enforcement mechanisms

تعداد نتایج: 555562  

2004
K. I. Munro J. F. Cohen

The ethical behavior of information systems personnel remains a key IS management problem in need of attention. Codes of ethics have become important mechanisms for influencing ethical behavior, yet their efficacy has not been proven. The communication and enforcement of codes within an organization are thought to be necessary for ensuring a code’s success in influencing employee behavior. This...

Journal: :Law and human behavior 2002
Christian A Meissner Saul M Kassin

Detecting deception is an inherently difficult task, but one that plays a critical role for law enforcement investigators in the interrogation room. In general, research has failed to indicate that performance in this domain is improved by training or prior experience. A signal detection framework is applied to the paradigm to better conceptualize the influence of these two factors. We found th...

2013
Robert Soulé Shrutarshi Basu Emin Gün Sirer Nate Foster

This paper presents the Merlin network management framework. With Merlin, network administrators express functionality such as accounting, bandwidth provisioning, and traffic filtering in a high-level policy language, and use automated tools and mechanisms to implement them. The framework includes: (i) a declarative language for specifying policies, (ii) infrastructure for distributing, refinin...

Journal: :Proceedings. Biological sciences 2007
E Toby Kiers Mark G Hutton R Ford Denison

Enforcement mechanisms are thought to be important in maintaining mutualistic cooperation between species. A clear example of an enforcement mechanism is how legumes impose sanctions on rhizobial symbionts that fail to provide sufficient fixed N2. However, with domestication and breeding in high-soil-N environments, humans may have altered these natural legume defences and reduced the agricultu...

2007
Ivan P.L. Png Chen-Yu Wang Qiu-Hong Wang

We present two methodologies that adapt the event study from research in finance and economics to study the impact of enforcement on information security attacks. One uses linear regression with the number of attacks as the dependent variable and indicators of enforcement events as independent variables. The other measures the impact of enforcement by the difference between the actual and predi...

2013
Tim K Mackey Bryan A Liang

BACKGROUND Digital forms of direct-to-consumer pharmaceutical marketing (eDTCA) have globalized in an era of free and open information exchange. Yet, the unregulated expansion of eDTCA has resulted in unaddressed global public health threats. Specifically, illicit online pharmacies are engaged in the sale of purportedly safe, legitimate product that may in fact be counterfeit or substandard. Th...

2007
Shuo Chen

The browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult at both the policy-specification level and the implementation level. This paper is focused on the implementations of browser isolation mechanisms. As a concrete example, we discuss the enforcement of the well-defined cross-frame isolation policy, which...

2003
Gary J. Vecellio William M. Thomas

Component and service-based application infrastructures provide mechanisms for efficiently composing a system from a diverse collection of components and services. However, because of the lack of insight into the components and services within the application, integrating changes can be challenging. One class of change that we perceive as being both common and necessary is in the area of policy...

2009
Hakima Ould-Slimane Mohamed Mejri Kamel Adi

Execution monitoring (EM) is a widely adopted class of security mechanisms. EM-enforceable security properties are usually characterized by security automata and their derivatives. However Edit automata (EA) have been recently proposed to specify more powerful EMs. Being able to feign the execution of sensitive program actions, these EMs are supposed to enforce more security properties. However...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید