首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
Security policies: The phrase that strikes fear in the hearts of many security professionals. Policy and policy enforcement is a critical part of any organization’s security posture. Unfortunately, many administrators find policy mundane or frustrating. When it comes to wireless security, a clear and complete policy is even more critical. Few other technologies can punch a hole into the core of an organization’s network like wireless. Thankfully for security professionals and their employers, wireless networks are new, interesting, and dangerous enough to actually warrant interest in creating and enforcing a policy.  相似文献   

2.
在高校就业信息化建设中,对进入高校招聘毕业生的企业客户进行等级分类和预测能够有效帮助高校管理者评估与该企业的合作效用,推动大学生就业信息化服务向更具针对性的个性化推荐方向发展。目前该问题的解决方案大多基于从业人员的主观经验判断,缺乏完善的定量分析模型。抽取某高校教育管理信息系统中与进校招聘企业客户相关的数据样本,并借助BP神经网络模型搭建有效的数据分析模型,使用训练样本数据训练模型从而确定分析模型中各节点参数,将训练后的分析模型用于预测测试样本集得到最终的性能指标,最后将该模型的分类性能与当前同类问题的其他解决方案进行比较。对比结果显示,基于BP神经网络模型的分类方式在预测准确度和精度方面明显优于其他现有模型。该研究成果能够在信息化平台中为该问题提供高效的解决方案,帮助高校就业工作管理者及服务人员依靠该模型对进校招聘企业做出快速精准的客户等级预测,为高校就业服务工作决策提供支持。  相似文献   

3.
Holmes  N. 《Computer》2002,35(4)
Digital technology tempts with empowering connectivity while it threatens our privacy and leisure time. As digital technology gets more and more personal, so do its personal effects. The obvious personal effect is communication by snapshot, which might or might not banish e-mail fatigue. This trend will certainly bring snapshot marketing to consumers in its wake, particularly with digital speech and location processing. Given their special knowledge and skills, the author warns that computing professionals must be even more alert to the possible side effects of the digital systems they design and manufacture than they are to these systems' direct effects. These computing professionals must persuade their employers to avoid or counteract these side effects, and they must inform the public of anticipated side effects outside their employers' control.  相似文献   

4.
由于具有分布式特性,导致移动自组网容易遭受攻击。为了增强移动自组网的安全性,建立一套适合自组织、无认证中心的节点信任评估模型是非常必要的。因此,提出了一种移动自组网中基于多约束和协同过滤的动态信任机制。其主要思想是在根据节点自身的经历的基础上,采用一个带多约束的信任更新算法来评估直接信任。其中:时间衰减因子保证了信任度随时间进行衰减;奖励因子保证了良好的节点应受到奖励;惩罚因子保证了恶意节点应受到惩罚。另外,采用协同过滤技术来评估推荐信任,以此来阻止不诚实的推荐。通过定量评估分析和模拟仿真,结果表明所提出的方法比Bayesian模型能更精确地计算节点之间的信任度和提高移动自组网的安全性。  相似文献   

5.
软件工程专业卓越工程师培养探索   总被引:1,自引:0,他引:1  
软件工程专业作为当今迅速发展的一个新型热门专业之一,正在面临高校毕业生过剩所引发的就业难困境,以及用人单位存在大量缺口急需招收员工以解燃眉之急间的矛盾。必须改变现今软件工程专业培养模式,大力推行面向用人单位的实用型、复合型软件工程技术培养方式。本文给出了采用卓越工程师培养模式,培养软件专业人才的思路和方法。  相似文献   

6.
The authors discuss the pros and cons of IT certification by exploring why so much attention is focused on it, as well as the different kinds of certifications that are available, current changes in requirements, and where IT professionals can get certified.  相似文献   

7.
The European Directive on computer work (VDU 90/270/EEC) is implemented in the Finnish Government Decree. The aim of the present study was to evaluate the effects of the legislation and its applications in practice. The quantitative method used an online questionnaire. The respondents were employers (N = 934), employees (N = 1872) and occupational health care (OHC) units (N = 289). The majority of all these three groups considered the provisions clear and easy to understand, comprehensive, and easy to comply with. The provisions had a great impact on preventing mental overloading, arranging sight tests at the employer's cost, and on the refunding of eyeglasses for computer work. Most employers felt they did not need any more specific provisions, whereas half of the employees and OHC professionals would have liked the provisions to be more detailed. More explicit and specific regulations were also needed for practice applications in particular, as well as for the refunding of the costs of special eyeglasses for computer work. A total of 59% of the employers reported that costs of glasses are refunded, whereas the figure for employees was clearly lower (37%). OHC professionals reported that the costs of glasses were refunded in 82% of their customer workplaces. The practical conclusion is that employees' sight examinations and compensation for eyeglasses should be promoted in computer work. Moreover, ergonomic applications are best carried out in co-operation with OHC personnel.  相似文献   

8.
9.
In today's digital and technical environment, employers are looking for personnel that can contribute to the organization not only with the use of technical skills but can also express their expertise with the use of positive emotional intelligence and communication effectiveness. As research is lacking in the investigation of soft skills used by information technology professionals, the relationship between emotional intelligence and communication adaptability is the focus of this research. This quantitative non-experimental correlational analyses the emotional intelligence and communication adaptability level of 111 Information Technology professionals that work in the United States. The research found a significant positive relationship between emotional intelligence and the communication adaptability of the information technology professional. The positive outcome of this study suggests that information technology professions that have a strong relationship between emotional intelligence and communication aptitude can have positive implications for organizations for organizational teamwork/relationship building.  相似文献   

10.
《Computer》2006,39(10):94-96
Topics covered this month include awards for technical achievement, a list of newly certified software development professionals, and a list of recipients of the 2006 Anita Borg Scholarships.  相似文献   

11.
A large number of certified mail systems have been put into operation on the market over the last years. In contrast to standard mailing systems like e-Mail, certified mail systems provide the secure, reliable and evidential exchange of messages with the quality of traditional postal registered or certified mail. Most of these systems are tailored to national laws, policies, needs and technical requirements and are thus closed and only accessible by certain user groups. However, the ongoing globalization and opening of the markets, especially in the European Union, ask for global certified mailing as already known from e-Mail. Interoperability of certified mail systems is a new and challenging research field. This article presents a framework and standard to make arbitrary certified mail systems interoperable. The presented approach uses a federated trust network of so-called electronic delivery gateways for seamless certified mailing across systems. This is achieved by converting protocols and system specifics on different layers using a harmonized interoperability protocol. The presented framework has been standardized by the European Telecommunications Standards Institute (ETSI) as Registered Electronic Mail specification for interoperable certified mail systems.  相似文献   

12.
To protect information systems from increasing levels of cyber threats, organizations are compelled to institute security programs. Because information security policies are a necessary foundation of organizational security programs, there exists a need for scholarly contributions in this important area. Using a methodology involving qualitative techniques, we develop an information security policy process model based on responses from a sample of certified information security professionals. As the primary contribution of this research study, the proposed model illustrates a general yet comprehensive policy process in a distinctive form not found in existing professional standards or academic publications. This study's model goes beyond the models illustrated in the literature by depicting a larger organizational context that includes key external and internal influences that can materially impact organizational processes. The model that evolved from the data in this research reflects the recommended practices of our sample of certified professionals, thus providing a practical representation of an information security policy process for modern organizations. Before offering our concluding comments, we compare the results of the study with the literature in both theory and practice and also discuss limitations of the study. To the benefit of the practitioner and research communities alike, the model in this study offers a step forward, as well as an opportunity for making further advancements in the increasingly critical area of information security policy.  相似文献   

13.
针对人才培养与市场要求脱节的情况。从计算机网络技术专业人员的角度,分析国内各种计算机网络技术初级专业认证的目标、要求、内容和特点,从教学内容、教学方法和手段、课程体系和评估方式四个方面阐述基于初级专业认证的计算机网络技术专业人才培养模式.旨在培养出符合市场要求的初级专业人才。  相似文献   

14.
The growth of social media has crossed the boundary from individual to organizational use, bringing with it a set of benefits and risks. To mitigate these risks and ensure the benefits of social media use are realized, organizations have developed a host of new policies, procedures, and hiring practices. However, research to date has yet to provide a comprehensive view on the nature of risk associated with the use of social media by organizations. Using a multi-panel Delphi approach consisting of new entrants to the workforce, certified human resource professionals, and certified Information Technology auditors, this study seeks to understand organizational social media risk. The results of the Delphi panels are compared against a textual analysis of 40 social media policies to provide a comprehensive view of the current state of social media policy development. We conclude with directions for future research that may guide researchers interested in exploring social media risk in organizations.  相似文献   

15.
分层次的计算机网络课程体系建设   总被引:1,自引:0,他引:1  
针对不同专业学生对学习计算机网络知识的需求,我们研究和设计了分层次的计算机网络课程体系。文章提出网络工程专业注重网络设计、分析和研究,计算机科学与技术类专业侧重网络基本理论和组网技术,全校其他专业侧重网络基础知识和因特网应用的研究思路;设计针对不同专业、能力和要求的分层次教学大纲,提出"计算机网络理论、技术与应用相融合"的教学方法。  相似文献   

16.
网络出版这种全新的数字化出.版方式,有着传统出版无可比拟的优点,它给中国出版业实现跨越式发展带来了前所未有的机遇。但是,由于网络出版的技术基础、工作流程等与传统出版有很大的差异,我国出版业现行运行机制和人员配置还很难顺利实施网络出版,网络出版人才的缺失尤其显著。本文提出,人才资源是发展网络出版最重要的战略资源,应尽早做好网络出版人才的开发培训工作,为快速发展的网络出版业提供充足的智力支持。  相似文献   

17.
网络出版这种全新的数字化出版方式,有着传统出版无可比拟的优点,它给中国出版业实现跨越式发展带来了前所未有的机遇。但是,由于网络出版的技术基础、工作流程等与传统出版有很大的差异,我国出版业现行运行机制和人员配置还很难顺利实施网络出版,网络出版人才的缺失尤其显著。本文提出,人才资源是发展网络出版最重要的战略资源,应尽早做好网络出版人才的开发培训工作,为快速发展的网络出版业提供充足的智力支持。  相似文献   

18.
面向应用型人才培养的网络工程专业课程体系探索与实践   总被引:5,自引:4,他引:1  
探索面向应用型人才培养的网络工程知识领域与课程体系,对构建该专业教学规范,提高教育质量具有重要的现实意义。本文给出了应用型人才的界定,分析了基于CC2005的网络工程问题空间及其知识取向,探讨了网络工程专业的基本定位和培养目标,确立了网络工程人才的基本能力要求。在研究网络工程专业核心知识体系的基础上,本文还提出了与工程教育认证标准相结合的"32X"网络工程专业课程体系基本框架,并以某地方高校应用型网络工程专业课程体系为案例,探索了其应用人才培养的基本思路和模式。由于教学改革实践效果好,该校网络工程被确立为省级特色专业。  相似文献   

19.
在信息技术高速发展的今天,应用型信息技术人才,已经成为我们社会经济发展不可或缺的重要力量。面对社会的需要,职业院校计算机专业教育要根据自身实际,把握住市场需求,广泛深入研究人才培养模式,重新定位专业人才的培养目标,重组新的课程体系,改革教学模式,创新教学手段,结合实际针对性地创新教学,打破职业院校计算机专业的学生不能令用人单位满意的尴尬局面。  相似文献   

20.
Fernandez-Sanz  L. 《Computer》2009,42(10):110-111
In this paper, the issues regarding computing professionals and their personal skill required in industry is discussed. A study commissioned by a Spanish private university analyzed the social and organizational image of professional graduates in various fields. This study found that computing people tend to be considered technically competent and efficient, but were seen as outliers in the game of influence within their organization. They typically work in places close to data processing centers, far away from the luxurious offices of top management. In general, human resources specialists tend to believe that computing people must improve their interpersonal competence. In the area of human resources, competencies management has been the rage for the past several years. This approach highlights general personal skills as the key for success in any discipline of the professional world. Different studies have developed lists of what employers, or what people in charge of HR or the main areas of company management, think are the most adequate abilities for high performance in almost every area of business action. Words like teamwork, leadership, and creativity have been touted as desired talents. Relating these concepts to computing professionals is the challenge.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号