首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
2.
Allen  K. J. 《Computer Journal》1975,18(3):194-197
  相似文献   

3.
信息化时代的飞速发展给人们的生活带来了很大便利,人们已经从一个传统金融模式时代迈向了由网络作为基础的网络经济时代,金融计算机网络已经逐渐的渗入到了我们的日常生活.大数据、物联网和移动支付的兴起推动了金融计算机网络发展,同时越来越多的安全隐患暴露了出来.本文通过系统分析,旨在为广大金融IT产品用户找到一种规避风险的安全服务.  相似文献   

4.
Computer systems now dominate the processing of financial information. In many cases these systems are very sophisticated and provide people with direct access to an organisation's financial information. This paper proposes a new approach to evaluating the risks of fraud and error in such computer systems. This approach is efficient to use, precise in its conclusions and has already been widely tested in practice.  相似文献   

5.
随着科学技术水平的提升,当前计算机网络已经渗透到我们生活各个领域,影响着我们的工作学习方式,与此同时,网络安全问题也愈发的凸显出来。因为计算机网路自身的开放性质,很容易出现各方面的安全隐患,所以了解计算机网络安全问题的发生原因,并针对性的实施可行措施予以防范应对,是计算机专业领域的关键任务。  相似文献   

6.
7.
随着计算机技术的急速发展,其在网络应用上存在着不少的隐患和风险。这对我国银行金融电子化的推进带来重大的影响。因此,本文在分析金融电子化发展的基础上,对计算机风险对我国金融电子化推进造成的问题进行探索,并进一步阐释我国金融电子化推进的对策。  相似文献   

8.
随着我国科技的不断发展,我国已经步入信息化时代的潮流中,全国各地对计算机网络的应用越来越广泛,计算机网络应用极大的为人们生活带来方便和快捷、同时不断促使着我国市场经济的发展、带领我国的经济和文化走向国际化发展前沿,但是在计算机网络的使用中,出现着种种弊端,计算机网络其实就是一把双刃剑,给人们带来优越生活的同时,也出现着各种危害,本文针对计算机网络安全现状进行分析,主要研究计算机网络安全的主要隐患,并提出合理化管理措施。  相似文献   

9.
It is noted that surveys are increasingly being used to: (1) complement census data in the allocation of federal and state monies to local governments for long- and short-term program commitments; (2) assist in articulating need assessments for Request for Proposals (RFPs) in these program areas; (3) as tools in the evaluation of such programs; and (4) in the planning and evaluation of municipal services. It is also noted that surveys are generally more inaccurate for ethnic minorities than they are for the majority. As a consequence, minorities are less likely to receive the benefits, or voice, to which they are entitled by law. Guidelines for improving the accuracy of surveys which include minorities are provided.  相似文献   

10.
Internet-based data collection is becoming an increasingly popular method of conducting psychological research. A growing number of studies have investigated the equivalence of data collected over the Internet and data gathered using traditional assessment methods. Many of these studies, however, have had methodological limitations such as using non-equivalent comparison groups and inappropriate data analytic strategies. In this study, 213 undergraduate students were randomly assigned to complete attractiveness ratings via traditional paper-and-pencil methods or through an Internet site; data were analyzed using equivalency testing methodology. Results indicated that mean ratings of physical and sexual attractiveness between the two conditions were equivalent for the full sample. However, when examined separately by respondent gender, ratings of same gender targets were significantly higher for the paper-and-pencil methodology. Implications are discussed.  相似文献   

11.
12.
13.
《Computer Audit Update》1991,1991(3):11-14
  相似文献   

14.
The development of a software system for general network design using interactive computer graphics poses many problems, which must be solved in a way consistent with the principles of man-machine communication as applied to network design, so as to obtain a system suited both to networks of any nature and also to any type of network design technique.This paper states the principles influencing the development of such a system and presents the design decisions made and the one implementation.  相似文献   

15.
16.
Using a computer to produce sound in the classroom is not new and has been used for ear training and drill-and-practice for some time. Computer music can also provide computer students with an alternative means to explore traditional computer concepts: modular design, functional decomposition, and iterative development. Combining these uses for computer music would produce a course where both computer students and music students could gain an insight to the use of system development techniques. Such a course is described in this paper along with notes on how this course was implemented.  相似文献   

17.
本文主要介绍缓冲区溢出和输入检查漏洞利用技术,还介绍了计算机病毒是如何利用这些技术。  相似文献   

18.
19.
Accompanying the increase in computer and Internet use worldwide, physical inactivity has become prevalent in most developed and developing countries. Extended computer use may contribute to symptoms such as visual impairment and musculoskeletal disorders. To reduce the risk of physical inactivity and promote healthier computer use, this study tries to develop a timed broadcast of health-related animations for users sitting at computers for prolonged periods. In addition, we examine the effects that the program has on the computer-related health beliefs and behaviour of participants. Before-and-after survey questionnaires were used for data collection. The results show that the animation program indeed had a positive effect when reminding participants to take a break and stretch their bodies. The program influenced the beliefs and behaviours of participants with regard to their health. The development and examination were documented and discussed within the context of health agencies planning the next steps in an effort to promote, develop and evaluate healthy computer use.  相似文献   

20.
A statistical method is proposed for quantifying the impact of factors that influence the quality of the estimation of costs for IT-enabled business projects. We call these factors risk drivers as they influence the risk of the misestimation of project costs. The method can effortlessly be transposed for usage on other important IT key performance indicators (KPIs), such as schedule misestimation or functionality underdelivery. We used logistic regression as a modeling technique to estimate the quantitative impact of risk factors. We did so because logistic regression has been applied successfully in fields including medical science, e.g. in perinatal epidemiology, to answer questions that show a striking resemblance to the questions regarding project risk management. In our study we used data from a large organization in the financial services industry to assess the applicability of logistic modeling in quantifying IT risks. With this real-world example we illustrated how to scrutinize the quality and plausibility of the available data. We explained how to deal with factors that cannot be influenced, also called risk factors, by project management before or in the early stage of a project, but can have an influence on the outcome of the estimation process. We demonstrated how to select the risk drivers using logistic regression. Our research has shown that it is possible to properly quantify these risks, even with the help of crude data. We discussed the interpretation of the models found and showed that the findings are helpful in decision making on measures to be taken to identify potential misestimates and thus mitigate IT risks for individual projects. We proposed increasing the auditing process efficiency by using the found cost misestimation models to classify all projects as either risky projects or non-risky projects. We discovered through our analyses that projects must not be overstaffed and the ratio of external developers must be kept small to obtain better cost estimates. Our research showed that business units that report on financial information tend to be risk mitigating, because they have more cost underruns in comparison with business units without reporting; the latter have more cost overruns. We also discovered a maturity mismatch: an increase from CMM level 1 to 2 did not influence the disparity between a cost estimate and its actual if the maturity of the business is not also increased.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号