Página 1 dos resultados de 1368 itens digitais encontrados em 0.006 segundos

Comércio internacional, um modelo para segurança portuária de modernização da aduana brasileira.; International trade, a model for port security and Brazilian Customs modernization.

Russo Filho, Antonio
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Dissertação de Mestrado Formato: application/pdf
Publicado em 01/09/2006 PT
Relevância na Pesquisa
46.33%
Este trabalho consta da apresentação de um modelo, denominado de Plano de Segurança Aduaneira Portuária (PSAP), a ser implementado pela Secretaria da Receita Federal, a partir de suas unidades locais, denominadas de ?Inspetorias da Receita Federal? ou de ?Alfândega de determinado Porto ou Aeroporto?. Foi desenvolvido especificamente para os portos alfandegados brasileiros e considera uma implantação gradual e acompanhada, a partir de um projeto piloto a ser testado no Porto de Santos. O PSAP consiste na automação de todos os processos e controles da atividade portuária, com utilização de alta tecnologia para a fiscalização da aduana, mediante inspeção não-intrusiva de contêineres, sua lacração e rastreamento na zona portuária. Centralizando os dados de diversos sistemas de controle das atividades portuárias em uma Central de Tratamento das Informações (CTI) e trabalhando esses registros mediante o cruzamento de todos os dados disponíveis. O Plano busca, com o resultado dessa análise integral, disparar uma ação fiscal específica, baseada na determinação do ?risco? potencial da carga, com probabilidade de elevado grau de sucesso da operação. Além das necessidades de equipamentos e software, o modelo define todas as rotinas operacionais para a utilização desses recursos de maneira eficaz e duradoura garantindo a viabilidade do modelo. A apresentação deste trabalho está subdividida em sete itens: apresentação geral da pesquisa; apreciação do conceito de segurança; informações sobre o estado da arte...

Plano de continuidade de negócios aplicado à segurança da informação; Business continuity plan applied to information security

Pereira Junior, Jorge Hosni Pereira de
Fonte: Universidade Federal do Rio Grande do Sul Publicador: Universidade Federal do Rio Grande do Sul
Tipo: Trabalho de Conclusão de Curso Formato: application/pdf
POR
Relevância na Pesquisa
36.38%
Antigamente o ambiente computacional era pequeno e controlado, tornando a informação mais segura. Atualmente, esse ambiente é complexo e a informação tornouse o ativo mais importante para a sobrevivência e o sucesso de uma organização. Portanto, as organizações precisam estar protegidas contra ameaças e vulnerabilidades e as informações precisam estar disponíveis quando solicitadas. A preocupação com a continuidade do negócio começou a ser levada realmente a sério após os eventos ocorridos no dia 11 de setembro de 2001, levando a uma reformulação de normas e procedimentos relacionados à segurança da informação. O presente trabalho tem o propósito de apresentar os conceitos, as fases e as melhores práticas utilizadas na implementação de um plano de continuidade de negócios aplicado à segurança da informação. Inicialmente são definidos alguns conceitos sobre gestão de risco e segurança da informação. A seguir, são apresentados o modelo de processo de melhoria contínua, as etapas para realização do gerenciamento de riscos, as normas e as melhores práticas adotadas hoje para auxiliar a organização no mapeamento e tratamento dos seus processos de negócio. As organizações precisam estar protegidas contra atividades maliciosas que podem tornar indisponíveis os seus ativos de informação. Neste trabalho são apresentadas as principais ameaças...

Review of Cost of Compliance with the New International Freight Transport Security Requirements : Consolidated Report of the Investigations Carried Out in Ports in the Africa, Europe and Central Asia, and Latin America and Caribbean Regions

Kruk, C. Bert; Donner, Michel Luc
Fonte: World Bank, Washington, DC Publicador: World Bank, Washington, DC
EN_US
Relevância na Pesquisa
46.41%
Without transport there is no economic development and, in a reciprocal conclusion, the more efficient transport is, the better is the development. Bearing in mind that more than 90 percent of the world trade in tons per year is transported by sea and against the background of increasing ship sizes (especially in the container trade) and continuously growing globalization, the requirements for adequate and secure port facilities and the resulting logistics challenges are accelerating worldwide. The International Ship and Port Facility Security Code (ISPS code) is a comprehensive set of measures to enhance the security of ships and port facilities and came into force on the July 1, 2004. The ISPS code is implemented through chapter XI-2 special measures to enhance maritime security in the International Convention for the Safety of Life at Sea (SOLAS). The code has two parts, one mandatory (part A) and one recommendatory (part B). Compliance is mandatory for the 148 contracting parties to SOLAS; detailed implementation of the code is a matter for the individual national governments. The introduction of the ISPS Code has led to many questions and misunderstandings. The code does not...

Estudio de sistemas de seguridad basado en la detección de intrusos física y tecnológica; Study of security sistems based intrudion detection physical and technological

Aranda Luengo, Ricardo
Fonte: Universidade de Cantabria Publicador: Universidade de Cantabria
Tipo: Dissertação de Mestrado
SPA
Relevância na Pesquisa
36.28%
RESUMEN: Toda persona u organización requiere de seguridad tanto física como tecnológica. A lo largo de estos últimos años han aumentado las tecnologías y los sistemas de seguridad empleados son cada vez más eficaces. El objetivo de este proyecto es el análisis y estudio de todos los sistemas de seguridad cuya finalidad es la misma: prevenir y actuar ante cualquier intrusión física y lógica. Desde hace unos meses formo parte del equipo de Ingeniería de Seguridad de la empresa ITM Sistemas: empresa con una dilatada experiencia en la seguridad integral de todo tipo de instalaciones. Este estudio es una motivación personal como ampliación a mis conocimientos de la seguridad física y aplicaciones actuales de la seguridad privada. Esta motivación deriva del interés y adquisición de conocimientos de seguridad informática dada su relación con la seguridad física pero en su aplicación lógica. Un claro ejemplo de aplicación de los dos tipos de seguridad es la integración de las grabaciones de las cámaras de tecnología IP a través de la nube. Con el avance de las tecnologías de la información y, con ello, la integridad, confidencialidad y disponibilidad de las mismas en redes internas y externas, es necesaria la implantación de medidas cada vez más complejas que garanticen la seguridad tanto física como lógica de toda información de vital importancia. Como objeto de este proyecto se analizará y estudiará la propuesta de un Sistema de Seguridad Integral como un único sistema...

How military actions affected citizen security during Plan Colombia

Muller, Graydon
Fonte: Monterey, California: Naval Postgraduate School Publicador: Monterey, California: Naval Postgraduate School
Tipo: Tese de Doutorado
Relevância na Pesquisa
46.38%
Approved for public release; distribution is unlimited; This thesis examines the effects on citizen security caused by the Colombian military’s actions during Plan Colombia and its successor plans. Military actions are often evaluated according to their effect on state security, but the concern of this thesis is whether or not the advantages of military security actions outweighed the costs for Colombian citizens. The military benefited citizens by weakening the insurgency and increasing state presence across Colombia’s territory, but the military’s involvement also incurred costs, including human rights abuses and large numbers of internally displaced persons. Considerable disagreement exists over the final value of the military’s involvement, as it does over many aspects of Plan Colombia. This thesis seeks to add some clarity to the debate, with a focus on military operations’ effects on civilians’ lives, while also asking what the Colombian experience can teach the United States (and other countries) about counterinsurgency. Overall, this thesis finds that the use of the Colombian military during Plan Colombia improved citizen security, and furthermore that the United States played a positive role in this outcome.; ; Major...

Hospital-based first responder mass prophylaxis plan

Massey, Mary S.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: xiv, 41 p. : col. ill., col. map
Relevância na Pesquisa
46.11%
CHDS State/Local; Approved for public release, distribution is unlimited; As the United States improves its collective awareness and emergency preparedness in the face of increased terrorist activity, more efforts are being made to create and enhance community readiness for catastrophic events. There have been substantial efforts to improve the nation's bioterrorism preparedness. Better planning, equipment, training, surveillance, and pharmaceutical caches have elevated the nation's readiness for biological attacks. In order to effectively meet the challenges created by a bioterrorism attack, its first lines of defense, the first responders, must be rapidly prophylaxed to allow the continuance of their mission. Many states and localities have tackled the gigantic undertaking of mass prophylaxis plans to provide chemoprophylaxis to civilians should the need arise. Many cities have developed and tested their plans to provide general public mass prophylaxis. It is assumed, or briefly mentioned, that the mass prophylaxis of first responders will occur, but few plans have been developed. The primary objective of this research is to develop, test, and make recommendations for a straightforward, adaptable mass prophylaxis plan to meet the prophylactic requirements of local first responders in the event of a biological attack.; Paramedic and Disaster Coordinator...

The United Nations' plan for collective security: is it relevant today?

Fish, Joanne Marie.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: 156 p.
EN_US
Relevância na Pesquisa
46.07%
Approved for public release; distribution is unlimited.; This study analyzes the original intentions of the creators of the United Nations for a collective security arrangement to provide for international peace and security. The study answers the questions: What kind of world order was the United Nations desig; Lieutenant Commander, United States Navy

NATO, Greece and the 2004 Summer Olympics

Brianas, Jason John
Fonte: Monterey California. Naval Postgraduate School Publicador: Monterey California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: xiv, 67 p. : ill. (some col.) ;
Relevância na Pesquisa
46.13%
Approved for public release; distribution in unlimited.; Since the end of the Cold War the Alliance's transformation has erased doubts about its survival. NATO continues to adapt to new threat environments by expanding its mission scope to out-of-area operations and by assuming new security missions. For the 2004 Summer Olympics in Athens, Greece, the 11 September 2001 terrorist attacks against the United States and subsequent 11 March 2004 Madrid bombings in Spain complicated an already robust Greek security plan. Greece's extensive security planning, in addition to coordinating NATO support, highlighted the challenges and readiness requirements for the Alliance in the 21st century. Terrorist concerns, burden-sharing, recognition of Greek sovereignty, political limitations in deploying NATO's CBR Defense team and NRF utilization were all elements of the challenges faced in security preparation for the Games. In assessing the dynamics behind NATO's history and its security participation in the 2004 Summer Olympics, this thesis serves as a case study in the continuing transformational role and adaptability of NATO. Overall, the Alliance's willingness to assume security support to a major international sporting event represented its long-time relationship with Greece...

Filling Hungry Bellies: The move to put food security on the agenda at the G20

Musgrove, Alison
Fonte: Universidade Nacional da Austrália Publicador: Universidade Nacional da Austrália
Tipo: Relatório
Relevância na Pesquisa
36.28%
Hunger affects approximately one billion people worldwide. The food price crisis of 2007-08 pushed food prices so high that an estimated 100 million people were pushed over the poverty line. After a brief reprieve in 2009, food prices have risen again, and in early 2011 w ere even higher than during the previous crisis. Despite the efforts of international organisations such as the World Food Programme and the Food and Agricultural Organization, the problem of global hunger has remained intractable and it is clear that a new approach needs to be formulated to solve this problem. In recent years, expectations have fallen on the G20 to step into the breach. With nineteen of the world's largest economies and the European Union, the G20 has been called the 'Goldilocks' of world organisations, being small enough to facilitate negotiation yet large enough to have the necessary economic and political clout to drive the development agenda forward. With over 65% of the world's farmland and producing 77% of the world's cereals, the G20 countries are vital to achieving world 'food security', defined as access to safe and sufficient food for everyone at all times. Given that 54% of the world's hungry live in member states China and India alone...

Brazil : Critical Issues in Social Security, Volume 2. Policy Report

World Bank
Fonte: Washington, DC Publicador: Washington, DC
ENGLISH; EN_US
Relevância na Pesquisa
36.26%
The study consists of two volumes, the first volume contains a detailed summary of the report findings, and policy implications, and, the second volume, the Policy Report, contains discussions on policy recommendations for each of the components of the Brazilian social security system. An overview on the dimensions of the social security challenge, reviews the system components, revealing unsustainable fiscal imbalances, and administrative weaknesses in both the unreformed General Regime for Social Security (RGPS), and the Pension Regime for Government Workers (RJU), with large tax-related distortions, and labor market inefficiency. Thus the goals of Brazil's reforms are to reduce fiscal deficits, lower actuarial imbalances, increase equity and redistribution, reduce collateral inefficiencies, and facilitate growth of funded pensions. The study implies there is no recourse for the country, but to lower the high, uniform replacement rates (experience suggests that rates higher than 40-70 percent, cannot be sustained) and...

Vieillissement démographique et gestion des sociétés vieillissantes des Caraïbes dans le contexte du premier cycle d'évaluation du Plan d'action international de Madrid

Vézina, Samuel
Fonte: Université de Montréal Publicador: Université de Montréal
Tipo: Thèse ou Mémoire numérique / Electronic Thesis or Dissertation
FR
Relevância na Pesquisa
36.26%
La dynamique démographique ayant cours au sein de la région des Caraïbes est très particulière, notamment par la rapidité avec laquelle la population vieillit, un rythme des plus élevés par rapport aux autres régions du monde. Les enjeux cruciaux que sont ceux d’assurer la qualité de vie des aînés d’aujourd’hui et de demain ainsi qu’une gestion efficace de ces sociétés vieillissantes se doivent d’être abordés et pris en compte. Le présent mémoire diffuse les résultats d'une analyse ciblée des caractéristiques sociodémographiques des personnes âgées de quatre États des Caraïbes (Antigua-et-Barbuda, Sainte-Lucie, Saint-Vincent-et-les-Grenadines et Trinité-et-Tobago) à partir des données de leur plus récent recensement. Ce portrait met une emphase particulière sur les conditions de vie, la santé et la participation sur le marché du travail des personnes âgées, soit sur les grands thèmes des trois objectifs du Plan d’action international sur le vieillissement de Madrid. Par ailleurs, un regard est posé sur les effets des cinq premières années en vigueur du Plan de Madrid sur les populations caribéennes. Les informations obtenues à la suite d’interviews effectués auprès de personnes contacts de quelques pays caribéens sont synthétisées et identifient les efforts déployés principalement par les gouvernements pour inclure les objectifs du Plan de Madrid et autres enjeux du vieillissement démographique dans les mécanismes et les politiques de développement social et économique ainsi que ceux de respect des droits humains.; This study presents the major findings of a statistical analysis of population census data sets (2000 census round) for four countries in the Caribbean region: Antigua and Barbuda...

seguridad portuaria: una necesidad o una ventaja competitiva para colombia; PORT SECURITY: A NECESSITY OR A COMPETITIVE ADVANTAGE FOR COLOMBIA

Cruz Ibague, Angelica Maria; Bernal Torres, Cesar Augusto
Fonte: Universidad Militar Nueva Granada; Facultad de Ciencias Económicas; Especialización en Gerencia en Comercio Internacional Publicador: Universidad Militar Nueva Granada; Facultad de Ciencias Económicas; Especialización en Gerencia en Comercio Internacional
Tipo: bachelorThesis; Trabajo de grado Formato: pdf; pdf
SPA
Relevância na Pesquisa
46.3%
Este ensayo sobre la seguridad portuaria, reflexiona acerca de los principales riesgos a los que se someten los países en cuanto al flujo de mercancías y pasajeros, y a la implementación de sistemas que aporten solución a este flagelo, un ejemplo claro de inseguridad, fue el hecho ocurrido en el año 2001, que además, de cobrar vidas inocentes, destruir parte de una ciudad, y poner en alerta máxima a todo el mundo, afectó de manera sustancial la economía mundial, generó tal conmoción y rivalidad entre países, que llevo al gobierno de Estados Unidos a proponer a Canadá y México, la seguridad patria, se firmaron los acuerdos entre fronteras inteligentes, iniciativa que tuvo por objeto, evitar el ingreso de terroristas; en la actualidad el impacto internacional ha sido el vínculo entre el narcotráfico y el terrorismo, por cuanto, se considera oportuno aprovechar iniciativas de Seguridad Portuaria Marítima y Aérea, en Colombia se ha venido trabajando con un grupo de entidades del estado, que tienen competencias en el tema de protección marítima y portuaria, cuyo propósito es diseñar procedimientos comunes que lleven a desarrollar acciones tendientes al mejoramiento, y a la implementación de un plan de protección que permita incrementar sus estándares de seguridad...

El Plan Colombia o el desarrollo como seguridad: un análisis documental entre la primera versión del Plan Colombia y la definitiva

Guevara Latorre, Juan Pablo
Fonte: Escuela de Ciencias Humanas Publicador: Escuela de Ciencias Humanas
Tipo: info:eu-repo/semantics/bachelorThesis; info:eu-repo/semantics/acceptedVersion Formato: application/pdf
Publicado em 11/12/2009 SPA
Relevância na Pesquisa
36.28%
El Plan Colombia fue diseñado como un paquete de ayuda internacional para la búsqueda de la paz en un marco de colaboración multilateral. Tras una negociación bilateral de dos años entre Colombia y Estados Unidos, el Plan concentró sus objetivos en la lucha contra el narcotráfico. Este trabajo pretende mostrar en qué consistió este cambio y describir el significado de la política del Plan. Se plantea que la política está determinada por la concepción del desarrollo como seguridad (Duffield, 2001 y 2002). Para ello, se realiza un análisis comparativo documental entre el primer texto del Plan Colombia, incluido en el Plan Nacional de Desarrollo de 1998, y el texto definitivo hecho por el gobierno en el 2000. La monografía argumenta que la ayuda otorgada está determinada por la lucha internacional contra las drogas y un nuevo modelo de Estado que implica tanto replantear las relaciones sociales a nivel local como una reflexión acerca de la soberanía estatal en el marco de nuevas tendencias globales.; The “Plan Colombia” was designed as an international aid package for the construction of peace in a multilateral donors frame. However, after two years of bilateral negotiation between Colombia and The United States, the Plan focused on the fight against drug trafficking as its main goal. This text intends to show how did the Plan pass from one goal to another...

Family income and crowd out among children enrolled in Massachusetts Children's Medical Security Plan.

Feinberg, E; Swartz, K; Zaslavsky, A; Gardner, J; Klein Walker, D
Fonte: PubMed Publicador: PubMed
Tipo: Artigo de Revista Científica
Publicado em /12/2001 EN
Relevância na Pesquisa
46.03%
OBJECTIVE: To assess whether participation in a state publicly financed health insurance program, Massachusetts Children's Medical Security Plan (CMSP) , which is open to children regardless of income, was associated with disenrollment from private insurance. DATA SOURCES/STUDY DESIGN: A survey of participants in CMSP who were enrolled as of April 1998 was used. We conducted analyses to detect differences in access to and uptake of private insurance between Medicaid-eligible and in eligible children, and between children eligible for the State Children's Health insurance Program (SCHIP) and in eligible children. DATA COLLECTION METHODS: A stratified sample of children was drawn from administrative files. the sampling strategy allowed us to examine crowd out among children based on in come and eligibility for publicly funded coverage: those who were Medicaid-eligible (income pound 133 percent of the federal poverty level [FPL]) , those who were SCHIP-eligible (134-200 percent of FPL) , and those with family in comes that exceed SCHIP eligibility criteria (> 200 percent of FPL). The majority of telephone interviews were conducted with the child's parent/guardian between November 1998 and March 1999. The overall response rate was 61.8 percent ...

The Security Plan: Effectively Teaching How To Write One

Clark, Paul C.
Fonte: Naval Postgraduate School (U.S). Publicador: Naval Postgraduate School (U.S).
Tipo: Artigo de Revista Científica
Relevância na Pesquisa
66.41%
The United States government requires all federal systems to have a customized security plan. In addition, the National Training Standard for Information Systems Security (INFOSEC) Professionals requires programs that meet this standard to produce students capable of developing a security plan. The Naval Postgraduate School (NPS) teaches courses that comply with several CNSS standards, and therefore requires students to develop a security plan for a hypothetical scenario. Experience in these courses has shown that the same strategies for teaching high school students how to write a research report can successfully be used to teach university students how to write a security plan that is compliant with NIST guidelines.

IT Security Plan for Flight Simulation Program

Hood, David; Rahman, Syed Shawon
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 07/11/2011
Relevância na Pesquisa
46.09%
Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United States. Compromise insecurity could lead severe consequences. However, technology changes so rapidly that change has to be made to reflect these changes with security in mind. This article outlines a growing technological change (virtualization and cloud computing), and how to properly address IT security concerns within an operating environment. By leveraging a series of encrypted physical and virtual systems, andnetwork isolation measures, this paper delivered a secured high performance computing environment that efficiently utilized computing resources, reduced overall computer processing costs, and ensures confidentiality, integrity, and availability of systems within the operating environment.; Comment: 24 pages

Information Security Plan for Flight Simulator Applications

Slaughter, Jason; Rahman, Syed Shawon M.
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 07/11/2011
Relevância na Pesquisa
56.26%
The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. We will be creating a system that will allow them to access their programs, back office and administrator functions remotely. A security plan outlining our security architecture will be delivered prior to the final code roll out. The plan will include responses to encryption used and the security architecture applied in the final documentation. The code will be delivered in phases to work out any issues that may occur during the implementation; Comment: 15 pages; International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3, No 3, June 2011

Complete Network Security Protection for SME's within Limited Resources

Todd, Margie; Rahman, Shawon
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 30/11/2015
Relevância na Pesquisa
46.21%
The purpose of this paper is to present a comprehensive budget conscious security plan for smaller enterprises that lack security guidelines.The authors believe this paper will assist users to write an individualized security plan. In addition to providing the top ten free or affordable tools get some sort of semblance of security implemented, the paper also provides best practices on the topics of Authentication, Authorization, Auditing, Firewall, Intrusion Detection & Monitoring, and Prevention. The methods employed have been implemented at Company XYZ referenced throughout

A Security Plan for Smart Grid Systems Based On AGC4ISR

Riahi, Ghazal
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 24/01/2014
Relevância na Pesquisa
56.26%
This paper is proposed a security plan for Smart Grid Systems based on AGC4ISR which is an architecture for Autonomic Grid Computing Systems. Smart Grid incorporates has many benefits of distributed computing and communications to deliver a real-time information and enable the near-instantaneous balance of supply and demand at the device level. AGC4ISR architecture is Organized by Autonomic Grid Computing and C4ISR (Command, Control, Communications, Computers and Intelligence, Surveillance, & Reconnaissance) Architecture. In this paper we will present a solution for as security plan which will be consider encryption, intrusion detection, key management and detail of cyber security in Smart Grids. In this paper we use the cryptography for the packet in the C4ISR and we use a key management for send and receive a packet in the smart grid because it is necessary for intelligent networks to keeping away from packet missing.; Comment: The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue

Rethinking Security Incident Response: The Integration of Agile Principles

Grispos, George; Glisson, William Bradley; Storer, Tim
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 11/08/2014
Relevância na Pesquisa
36.25%
In today's globally networked environment, information security incidents can inflict staggering financial losses on organizations. Industry reports indicate that fundamental problems exist with the application of current linear plan-driven security incident response approaches being applied in many organizations. Researchers argue that traditional approaches value containment and eradication over incident learning. While previous security incident response research focused on best practice development, linear plan-driven approaches and the technical aspects of security incident response, very little research investigates the integration of agile principles and practices into the security incident response process. This paper proposes that the integration of disciplined agile principles and practices into the security incident response process is a practical solution to strengthening an organization's security incident response posture.; Comment: Paper presented at the 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, Georgia