Proceedings from the IDIMT Conference 2017

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings from the IDIMT Conference 2017 IDIMT-2017 Digitalization in Management, Society and Economy 25th Interdisciplinary Information Management Talks The 25th annual IDIMT conference is continuing in its tradition as an interdisciplinary forum for multi-disciplinary, multi-national, and future-oriented research. It deals with current and future effects and challenges caused by Information and Communication Technologies (ICT) and the progressive digitalization of our lives, our society and economics by expanding its fields of applicability. The seamlessness offered by digitalization leads to a permanent transformations of daily processes, also reflected in changes in everyday life. As a consequence the interdependence between Society and Technology is increasing. Based on a blind review process 32 submitted papers were accepted together with 13 invited papers. The authors come from 11 different countries: Austria, Czech Republic, Denmark, Germany, Ireland, Italy, Romania, Russia, Slovakia, South Korea and Ukraine. Schriftenreihe IDIMT-2017 Informatik Doucek Petr r Chroust Gerhard r The papers have been grouped according to the following themes: r Digital Economy Oškrdal Václav (Editors) r Digital Single Market Innovation r Smart Systems Everywhere IDIMT-2017 46 r Cyber Security r Innovation, New Business Models and Strategies Oškrdal (Editors) Digitalization in Management, r Industry 4.0 and Enterprise Information Systems r r Corporate and ICT Performance Management Society and Economy r Crisis Management 25th Interdisciplinary r Social Media Chroust r e-Health r Information Management Talks, Sept. 6–8, 2017 Doucek Poděbrady, Czech Republic ISBN 978-3-99062-119-6 www.trauner.at Band 46 VERLAG universität Podebrady Schriftenreihe Informatik 46 Doucek Petr r Chroust Gerhard r Oškrdal Václav (Editors) IDIMT-2017 Digitalization in Management, Society and Economy 25th Interdisciplinary Information Management Talks, Sept. 6–8, 2017 Poděbrady, Czech Republic Impressum Schriftenreihe Informatik Doucek Petr r Chroust Gerhard r Oškrdal Václav (Editors) IDIMT-2017 Digitalization in Management, Society and Economy 25th Interdisciplinary Information Management Talks This publication was partially supported by the Česká spořitelna, a.s. and University of Economics, Prague – project IGA 409017 © 2017 Gerhard Chroust, The Conference IDIMT-2017 Linz, Österreich took place September 6–8, 2017 in Poděbrady, Czech Republic Das Werk und seine Teile sind ur- heberrechtlich geschützt. Autoren Programme Committee und ihre Organisationen dürfen Aumayr Georg, AT eigenen Beiträge auf ihren eigenen Chroust Gerhard, AT Webserver veröffentlichen, wenn auf der ersten Seite die Copyright- Doucek Petr, CZ Notiz und das volle Zitat der Origi- Fabó Edit, HU nalveröffentlichung aufscheint. Fischer Jakub, CZ Kučera Jan, CZ Authors and their organisations Helfert Markus, IR are permitted to post their own Maryška Miloš, CZ contributions on their own web Neubauer Georg, AT servers provided that the copyright notice and a full citation to the Novotný Ota, CZ original work appear on the first Oškrdal Václav, CZ screen of the posted copy. Pavlíček Antonín, CZ Pitner Tomáš, CZ Herausgeber: Pucihar Andreja, SI Em.o.Univ.-Prof. Purcarea Anca Alexandra, RO Dr. Gerhard Chroust Raffai Maria, HU Johannes Kepler Universität Linz Tel. +43 664 28 29 978 Rainer Karin, AT Ruzzeddu Massimiliano, I Herstellung: Kern: Sąsiadek Michał, PL Johannes-Kepler-Universität Linz, Schoitsch Erwin, AT 4040 Linz, Österreich/Austria Šiška Ladislav, CZ Sonntag Michael, AT Herstellung: Umschlag: Yablotchnikov Sergej, RU TRAUNER Druck GmbH & Co KG, 4020 Linz, Köglstraße 14, Zimmermann Hans-Dieter, CH Österreich/Austria ISBN 978-3-99062-119-6 www.trauner.at Table of Contents A Short Journey Through 25 Years of IDIMT Conferences ............................................................... 9 Gerhard Chroust, Petr Doucek, Lea Nedomová Invited Contribution ICT Beyond the Red Brick Wall ........................................................................................................ 21 Christian W. Loesch Session A: Digital Economy Digital Economy ................................................................................................................................ 33 Petr Doucek, Jakub Fischer, Ota Novotný Relation Between Job and the Content of Study of ICT Students in the Czech Republic ................. 41 Kristýna Vltavská, Jakub Fischer Regulation of Cyber Security in the Banking Sector ......................................................................... 49 Luděk Novák, Petr Doucek Is the Sharing Economy Unfair Competition and Should It Be Regulated? ...................................... 55 Lenka Švecová, Jaromír Veber Session B: Innovation, New Business Models and Strategies Innovation and Diversity .................................................................................................................... 63 Andreja Pucihar, Tomáš Pitner, Jan Ministr Innovation of the Information Management in Compliance Management Area ............................... 71 Jan Ministr, Tomáš Pitner Motivation in the Students´ Start–Ups ............................................................................................... 79 Klára Antlová, Marián Lamr, Petra Rydvalová Innovation of Quality Control During Coal Sales ............................................................................. 85 Roman Danel Pestle Analysis and its Impact Factor as an Innovative IT Application in Industrial Enterprises ..... 93 Roman Kozel, Kateřina Chuchrová, Martin Šanda Session C: Crisis Management Co-Operation in Managing the Migration Flow in Austria 2015 and 2016..................................... 103 Georg Neubauer, Daniel Auferbauer, Alexander Preinerstorfer, Gerald Lichtenegger, Karin Rainer, Ronald Nippold 1 Multiple Types of Sensor Data; Challenges and Perspectives for an Operational Picture for Response to Crises with Mass Involvement .................................................................................... 111 Karin Rainer, Diana Silvestru, Georg Neubauer, Veronika Ruzsanyi, Alexander Almer, Thomas J. Lampoltshammer Detecting People Being Trafficked or Smuggled Via the Sensing of Trace Volatiles .................... 127 Veronika Ruzsanyi, Helmut Wiesenhofer, Clemens Ager, Cristopher Mayhew Session D: Social Media Cross Culture Differences on Facebook .......................................................................................... 137 Antonín Pavlíček, Vlasta Střížová Availability of Social Influencers: Market Barriers on the Supply Side ......................................... 147 Jitka Ládrová Initiative To Support Use of Social Media Functions To Improve Education Effect ...................... 155 Zdeněk Vondra From the Dictate of the Regime To the Dictate of Ratings and Reach – Strategies of Culture News Reporting on Social Media .............................................................................................................. 163 Věra Radváková, Tereza Willoughby Model of Online Privacy .................................................................................................................. 173 Tomáš Sigmund Sales Promotion and Using Social Media in the Slovak Internet Book Market .............................. 181 Karol Čarnogurský, Anna Diačiková, Anna Chocholáková, Anton Lisnik Do Gender and Personality Traits Influence Visits of and Purchases at Deal Sites? ...................... 189 František Sudzina, Antonín Pavlíček Impact of gender and personality traits (BFI-10) on Tech Savviness ............................................. 195 Antonín Pavlíček, František Sudzina, Ludmila Malinová Online Platforms - Method of Promoting an IT Company Through Social Media ......................... 201 Anca Purcarea, Mirona Popescu, Simona Gheorghe Session E: e-Health Conquering Frailty with a Multi-Perspective Approach .................................................................. 211 Georg Aumayr Utilization of ICT in Hospital Human Resources Management ...................................................... 217 Jana Holá, Iva Špačková, Markéta Moravcová Methodology of e-Health Implementation to Healthcare Facilities ................................................. 225 Martin Potančok 2 Session F: Digital Single Market Innovation Digital Single Market Innovation .................................................................................................... 235 Michal Tkáč, Radoslav Delina Procuring Commodities through e-Auctions: Results and Specifics ............................................... 245 Vojtěch Klézl, Pavlína Pawlasová, Alena Delinová Conceptual Framework for Evaluating the Efficiency of Public Administration ............................ 253 Roman Lacko, František Hurný, Anna Rozkošová Online Reputation of Selected Car Brands ...................................................................................... 261 František Pollák, Peter Dorčák, Peter Markovič, Nella Svetozarovová Session G: Cyber Security Privacy and Security - Friends or Enemies? .................................................................................... 271 Michael Sonntag Early Traffic Warning Using SMS .................................................................................................. 281 David Kubát Data Protection as a Part of Cyber Security ..................................................................................... 289 Jan Čapek Lessons Learned from Phishing Test ..............................................................................................
Recommended publications
  • Iso 37001:2016
    Licensed to Ministerio de Economía y Finazas / Carlos Cabascango ([email protected]) ISO Store Order: OP-384013 / Downloaded: 2019-08-01 Single user licence only, copying and networking prohibited. NORMA ISO INTERNACIONAL 37001 Primera edición 2016-10 Traducción oficial -15 Official translation Traduction officielle Sistemas de gestión antisoborno — Requisitos con orientación para su uso Anti-bribery management systems — Requirements with guidance for use Systèmes de management anti-corruption — Exigences et recommandations de mise en oeuvre Grupo de Trabajo Spanish TranslationPublicado por Task la ForceSecretaría (STTF) Central de ISO en Ginebra, Suiza, como traducción oficial en español avalada por el , que ha certificado la conformidad en relación con las versiones inglesa y francesa. Número de referencia ISO 37001:2016 (traducción oficial) © ISO 2016 Licensed to Ministerio de Economía y Finazas / Carlos Cabascango ([email protected]) ISO Store Order: OP-384013 / Downloaded: 2019-08-01 Single user licence only, copying and networking prohibited. ISO 37001:2016 (traducción oficial) DOCUMENTO PROTEGIDO POR COPYRIGHT © ISO 2016, Publicado en Suiza Reservados los derechos de reproducción. Salvo prescripción diferente, no podrá reproducirse ni utilizarse ninguna parte de esta publicación bajo ninguna forma y por ningún medio, electrónico o mecánico, incluidos el fotocopiado, o la publicación en Internet o una Intranet, sin la autorización previa por escrito. La autorización puede solicitarse a ISO en la siguiente dirección o al organismo miembro de ISO en el país solicitante. ISO copyright office Ch. de Blandonnet 8 • CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 [email protected] www.iso.org ii Traducción oficial/Official translation/Traduction officielle © ISO 2016 – Todos los derechos reservados Licensed to Ministerio de Economía y Finazas / Carlos Cabascango ([email protected]) ISO Store Order: OP-384013 / Downloaded: 2019-08-01 Single user licence only, copying and networking prohibited.
    [Show full text]
  • D4.4.D3 BOLD Vision
    UvA-DARE (Digital Academic Repository) BOLD Vision 2020 Designing a vision for the future of Big Open Legal Data Wass, C.; Sageder, C.; Winkels, R.; van Eechoud, M.; Marsden, C.; Guadamuz, A.; Dini, P.; van der Graaf, S.; Passani, A.; Heistracher, T.; Hirsch, E.; Marcon, G.; Zanioli, M. DOI 10.5281/zenodo.158999 Publication date 2016 Document Version Final published version License CC BY-SA Link to publication Citation for published version (APA): Wass, C., Sageder, C., Winkels, R., van Eechoud, M., Marsden, C., Guadamuz, A., Dini, P., van der Graaf, S., Passani, A., Heistracher, T., Hirsch, E., Marcon, G., & Zanioli, M. (2016). BOLD Vision 2020: Designing a vision for the future of Big Open Legal Data. ByWass. https://doi.org/10.5281/zenodo.158999 General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon
    [Show full text]
  • Executing Large Scale Processes in a Blockchain
    The current issue and full text archive of this journal is available on Emerald Insight at: www.emeraldinsight.com/2514-4774.htm JCMS 2,2 Executing large-scale processes in a blockchain Mahalingam Ramkumar Department of Computer Science and Engineering, Mississippi State University, 106 Starkville, Mississippi, USA Received 16 May 2018 Revised 16 May 2018 Abstract Accepted 1 September 2018 Purpose – The purpose of this paper is to examine the blockchain as a trusted computing platform. Understanding the strengths and limitations of this platform is essential to execute large-scale real-world applications in blockchains. Design/methodology/approach – This paper proposes several modifications to conventional blockchain networks to improve the scale and scope of applications. Findings – Simple modifications to cryptographic protocols for constructing blockchain ledgers, and digital signatures for authentication of transactions, are sufficient to realize a scalable blockchain platform. Originality/value – The original contributions of this paper are concrete steps to overcome limitations of current blockchain networks. Keywords Cryptography, Blockchain, Scalability, Transactions, Blockchain networks Paper type Research paper 1. Introduction A blockchain broadcast network (Bozic et al., 2016; Croman et al., 2016; Nakamoto, 2008; Wood, 2014) is a mechanism for creating a distributed, tamper-proof, append-only ledger. Every participant in the broadcast network maintains a copy, or some representation, of the ledger. Ledger entries are made by consensus on the states of a process “executed” on the blockchain. As an example, in the Bitcoin (Nakamoto, 2008) process: (1) Bitcoin transactions transfer Bitcoins from a wallet to one or more other wallets. (2) Bitcoins created by “mining” are added to the miner’s wallet.
    [Show full text]
  • Unit-Iso 9004:2018
    INSTITUTO URUGUAYO UNIT-ISO DE NORMAS TÉCNICAS 9004:2018 (Adopción UNIT noviembre 2018) Edición 2018-11 Gestión de la calidad — Calidad de una organización — Orientación para lograr el éxito sostenido (ISO 9004:2018, IDT) Quality management — Quality of an organization — Guidance to achieve sustained success Management de la qualité — Qualité d'un organisme — Lignes directrices pour obtenir des performances durables Número de referencia UNIT-ISO 9004:2018 Licenciado por UNIT para el curso on line Gestión de la calidad y sistemas integrados 2020-04-15 Licencia individual, prohibida su copia y distribución El INSTITUTO URUGUAYO DE NORMAS TÉCNICAS ha adoptado en noviembre de 2018 la Norma ISO 9004:2018 como Norma: UNIT-ISO 9004:2018; Gestión de la calidad — Calidad de una organización — Orientación para lograr el éxito sostenido. El texto de esta Norma UNIT-ISO corresponde a la traducción idéntica de la Norma ISO 9004 la que ha sido publicado por UNIT sin modificaciones. Esta norma anula y sustituye a la Norma UNIT-ISO 9004:2009. A los efectos de la aplicación de esta Norma UNIT-ISO las referencias normativas de la Norma ISO 9004 original se ajustan a las indicadas en la siguiente tabla: Referencia original ISO Se aplica ISO 9000:2015 UNIT-ISO 9000:2015 En la siguiente tabla se indica la correspondencia entre la Bibliografía de la norma ISO/TS y documentos editados por UNIT. Bibliografía ISO/TS Documentos UNIT ISO 9001 UNIT-ISO 9001 ISO/TS 9002 PU UNIT-ISO/TS 9002 ISO 10001 UNIT-ISO 10001 ISO 10002 UNIT-ISO 10002 ISO 10003 UNIT-ISO 10003
    [Show full text]
  • Keyless Signature Infrastructure for Digital India's Security
    ISSN (Online) 2456 -1304 International Journal of Science, Engineering and Management (IJSEM) Vol 4, Issue 10, October 2019 Keyless Signature Infrastructure for Digital India’s Security [1] Mridul Sharma, [2]Rupali Sharma [1][2] University Institute of Engineering, Rayat Bahra University, Mohali, Punjab, India Abstract— In the making of new Digital India there are lots of threats which are there in the path of this dream. Acts of data breach of AADHAAR and Bank Accounts due to the lack of security in our digital services are common but the world is now, moving towards digital era so to be with the world in this digital transformation we must work on our security enhancement to provide a secure platform to government organisations. To serve the three aspects of security that is confidentiality, integrity, and availability of data we need an infrastructure that ensures all these. The Blockchain-Based KSI is the new technology which will support the government of India to achieve its goal of ensuring secure digital Services. It will help the government in providing strong authentication through digital signatures, and will also give the citizens a trust that their PII data is secure and confidential so that they can use these digital services for their all daily work. On the inspiration from Estonia where all their government services are digital in a way such that every government work from issuing a birth certificate to passport verification all these tasks are done digitally. This paper is made to help India in the implementation of this powerful Infrastructure for the digital governmental services providing ease to people and bureaucrats.
    [Show full text]
  • Plan De Estudio 2017
    PLAN DE ESTUDIO 2017 Plan de estudio 2017 Índice Prefacio........................................................ 6 Glosario........................................................ 7 Cronograma ................................................ 18 Plan de Estudio ........................................... 38 PREFACIO Las normas son documentos técnicos que representan el estado de El concepto de sostenibilidad de las actividades productivas con sus la ciencia y de las mejores prácticas en un momento dado, y con- tres componentes económico-productivo, ambiental y social, se ha tienen información consensuada por todas las partes interesadas. transformado en una característica que recorre transversalmente la IRAM es el Organismo Nacional de Normalización de la Argentina y mayoría de las áreas de normalización. participa en diferentes organizaciones internacionales, hemisféricas La normalización internacional se hace eco de estas tendencias y y regionales de normalización, defendiendo la posición de la comu- una de las tareas de IRAM es difundirlas, de modo de poder partici- nidad argentina. par en su evolución para ponerlas a disposición de nuestra sociedad. El Plan de estudio de normas para el año 2017 ha sido elaborado Para poder cumplir con este cometido, IRAM está presente en los en base a las necesidades de normalización manifestadas por los foros regionales, hemisféricos e internacionales donde se estudian diversos sectores productivos, de servicios, del gobierno, de las las normas que se relacionan con los intereses y oportunidades para entidades científico-técnicas y académicas, así como de los consu- el intercambio de bienes y el desarrollo del país, tanto en lo referido midores y los distintos sectores sociales. a productos como a sistemas de gestión, en sus diversos aspectos, El espectro y campo de aplicación de las normas que se consideran como por ejemplo las normas para la evaluación de la conformidad.
    [Show full text]
  • Keyless Signatures' Infrastructure
    Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1;2, Andres Kroonmaa1, and Risto Laanoja1;2 1 GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. 2 Tallinn University of Technology, Raja 15, 12618 Tallinn, Estonia. Abstract. Keyless Signatures Infrastructure (KSI) is a globally dis- tributed system for providing time-stamping and server-supported digi- tal signature services. Global per-second hash trees are created and their root hash values published. We discuss some service quality issues that arise in practical implementation of the service and present solutions for avoiding single points of failure and guaranteeing a service with reason- able and stable delay. Guardtime AS has been operating a KSI Infras- tructure for 5 years. We summarize how the KSI Infrastructure is built, and the lessons learned during the operational period of the service. 1 Introduction Keyless signatures are an alternative solution to traditional PKI signatures. The word keyless does not mean that no cryptographic keys are used during the signature creation. Keys are still necessary for authentication, but the signatures can be reliably verified without assuming continued secrecy of the keys. Keyless signatures are not vulnerable to key compromise and hence provide a solution to the long-term validity of digital signatures. The traditional PKI signatures may be protected by timestamps, but as long as the time-stamping technology itself is PKI-based, the problem of key compromise is still not solved completely. Keyless signatures are a solution to this problem. In a keyless signature system, the functions of signer identification and of evidence integrity pro- tection are separated and delegated to cryptographic tools suitable for those functions.
    [Show full text]
  • Block Chain Based KSI for Delivering Governmental Services in Democratic Nations
    International Journal of Recent Engineering Research and Development (IJRERD) ISSN: 2455-8761 www.ijrerd.com || Volume 03 – Issue 07 || July 2018 || PP. 15-24 Block chain based KSI for delivering governmental services in democratic nations Vedna Sharma Junior Research Fellow Institute of Technology Management (Defense Research & Development Organization) Landour Cantt. Mussoorie Uttarakhand (India) Abstract: There are various challenges that government organizations are addressing naturally characterized by transparency and security in government records, improved confidentiality and integrity of data, secure transactions and information security. Government has to be choosing the design that best fits for balancing security and central control with the convenience and opportunity of sharing information or data between organizations and individuals. Government Organizations are also investing in digital technologies to support their goals. Significant investment in technology and efforts has yielded great progress in growth, efficiency & demand of organizations. Block chain stands out as a technology in which various organizations see potential to solve these challenges by implementing strong authentication, data encryption and digital signature. Keywords: Blockchain, Digital Signature, Hashing, public key Infrastructure, Keyless Signature Infrastructure and Governmental Services 1. Introduction Blockchain is decentralized technology that is built on the model of offering security and trust. Blockchain technology have the potential to help governments to collect taxes, deliver benefits, issue passports, record land registries, assure the supply chain of goods and generally ensure the integrity of government records and services. Blockchain technology can simplify the management of trusted information, making it easier for government agencies to access and use critical public-sector data while maintaining the security of this information.
    [Show full text]
  • International Standard Iso 19600:2014(E)
    This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-918326 INTERNATIONAL ISO STANDARD 19600 First edition 2014-12-15 Compliance management systems — Guidelines Systèmes de management de la conformité — Lignes directrices Reference number ISO 19600:2014(E) © ISO 2014 This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-918326 ISO 19600:2014(E) COPYRIGHT PROTECTED DOCUMENT © ISO 2014 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of the requester. ISOTel. copyright+ 41 22 749 office 01 11 Case postale 56 • CH-1211 Geneva 20 FaxWeb + www.iso.org 41 22 749 09 47 E-mail [email protected] Published in Switzerland ii © ISO 2014 – All rights reserved This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-918326 ISO 19600:2014(E) Contents Page Foreword ........................................................................................................................................................................................................................................iv Introduction ..................................................................................................................................................................................................................................v
    [Show full text]
  • Advanced Trust Services Facilitated by the Industrial-Scale Blockchain Technology
    Advanced trust services facilitated by the Industrial-Scale Blockchain technology Risto Laanoja Security Engineer Outline • Guardtime • KSI • What it does • How it works • Trust assumptions • KSI / blockchain applicability in providing eIDAS trusted services • Standardization challenges 2 Advanced trust services facilitated by the Industrial-Scale Blockchain technology 1. Company Overview 3 Advanced trust services facilitated by the Industrial-Scale Blockchain technology Introducing Guardtime Who we are: • Systems engineering company, fundamental and applied research into cryptographic applications • Founded in 2007 in Tallinn, Estonia • Offices in Amsterdam, Palo Alto, Tallinn and Tartu • 71 people 4 Advanced trust services facilitated by the Industrial-Scale Blockchain technology 2. KSI Technology An Industrial Scale Blockchain 5 Advanced trust services facilitated by the Industrial-Scale Blockchain technology Keyless Signature Infrastructure (KSI): An Industrial Scale Blockchain KSI enables real-time Scalability Settlement time massive-scale data One of the most significant In contrast to the widely distributed integrity validation. challenges with traditional crypto-currency approach, the blockchain approaches is scalability number of participants in KSI The technology – they scale at O(n) complexity i.e. blockchain distributed consensus overcomes two major they grow linearly with the number protocol is limited. By limiting the weaknesses of traditional of transactions. number of participants it becomes possible to achieve consensus In contrast the KSI blockchain blockchains: synchronously, eliminating the need scales at O(t) complexity – it grows for Proof of Work and ensuring linearly with time and independently settlement can occur within one from the number of transactions. second. 6 Advanced trust services facilitated by the Industrial-Scale Blockchain technology KSI Signature The KSI Signature is a Upon verification, KSI Signature piece of meta-data which allows to assert: enables the properties of • Signing time the data to be verified.
    [Show full text]
  • Ingham County News; Mason, Mich
    urcr. Rep. Ralph Young, East Lan· On the bonrd of directors are sing, m!lde the. dedicatory ad· K G. Brow.n, Glen Watkins, Dorr dress. Howard Seibert, president Ecl;hart, Fred L. JOrcher, Mrs. of the hospital board, presented Mary 0, Blacl> and Wilfred Jew· the hospital .to the community. ctt from the Ingl1am county Mayor Paul D. Richat•ds of Ma· board of supervisors and Hulett son accepted it on behalf of the and Otto Hartig. · community. · Hartig stepped down from the Y,oung, former coach and ath· pl·esident's job ll1ls year. · letic director at Michigan State, · Spcnny and Davis will both go ct·edited the· hospital to com· alonrr with the Mason delegation munity teamwork and sacrifice. to the, state mectii1g slated for - Detroit in .January to sign 1959! Seibert told of the devotion of - Othet· who came from afat• tri fair attractions. · hundreds of men and women who attend the dedication included 3 had a part In providing the funds men from Wyeth Laboratories and maldng and carrying out Ine: They were George Pattison, plans for the hospital. Mayor Cleveland, divisional sales man­ Richards likened the dedication of the hospital to the birth of a agel", and Robert Messetlgcr,­ Council Looks child, pointing out that 'the com· Flint, and Thomas Newburgcr, munity has an expanded respon- Toledo, district sale~ managers. , If horses do any wondering, sibillty to maintain the hospital. A, G. Benson, assistant vice­ Bonnie is probably wondering For Big Gift Earlier resldents built school president, and' Milbert Anderson;-­ about her master, Ralph Hink· houses and churches, he declared, assistant cashier, of the National ley.
    [Show full text]
  • Catálogo De Formación 2021
    Catálogo de Formación 2021 SALUD, SEGURIDAD Y BIENESTAR FORMACIÓN POR Y PARA PROFESIONALES PRESENTACIÓN Para este año 2021, en el Instituto de Seguridad y Bienestar Laboral, hemos preparado un catálogo de formación pensado para todos aquellos profesionales del sector de la salud, seguridad y bienestar, que desean seguir desarrollando nuevas habilidades que le permitan mejorar su desempeño en la situación actual. Hemos realizado una apuesta importante por nuestros master profesionales, alguno ya con un recorrido importante y otros de nueva creación, siempre pensando en las necesidades y demandas que recibimos. Nuestros masters y cursos son impartidos por profesionales altamente cualificados y con experiencia contrastada en las diferentes áreas que se presentan. Dr. Agustín Sánchez-Toledo Ledesma Esperamos que todo ello os anime a participar y a no dejar pasar esta Director Instituto de Seguridad Bienestar Laboral oportunidad. INDICE MASTERS § Gestión de Empresas Saludables § Prevención de Riesgos Psicosociales § Sistemas de Gestión Normalizados y Auditorias § Master Habilidades Profesionales FORMACIÓN PRESENCIAL § Seguridad § Riesgos Psicosociales § Legales § Sistemas de Gestión § Habilidades y Empresa Saludable FORMACIÓN PARA EXPERTOS § Habilidades Directivas § Empresa Saludable § Sistemas de Gestión § ISO 45001 § ISO 39001 § Sistemas Integrados de Gestión § Auditorías Integradas Sistemas de Gestión FORMACIÓN BIENESTAR SALUD § Bienestar § Relaciones § Engagement/Compromiso § Gestión FORMACIÓN IN-COMPANY FORMACIÓN ON LINE CERTIFICADOS PRECIOS, LUGARES DE CELEBRACIÓN Y CALENDARIO EMPRESAS QUE HAN CONFIADO EN ISBL MASTERS ISBL FORMACIÓN PRESENCIAL ISBL CURSO RIESGO DE EXPLOSION POR ATMÓSFERAS EXPLOSIVAS. PREVENCIÓN Y PROTECCIÓN OBJETIVOS: conocer el fenómeno atex y los criterios de clasificación y evaluación de riesgos, para aumentar la seguridad en las instalaciones y dar cumplimiento legal a las obligaciones marcadas en la normativa actual.
    [Show full text]