Search results for " security"
showing 10 items of 1419 documents
Fire in operating room: The adverse "never" event. Case report, mini-review and medico-legal considerations.
2020
Abstract The patient’s security and safety represent a topic of great importance for public health that led several healthcare organizations in many Countries to share documents to promote risk management and preventing adverse events. Surgical Fire (SF) is an infrequent adverse event generally occurring in the operating room (OR) and consisting of a fire that occurs in, on, or around a patient undergoing a medical or surgical procedure. Here a medico-legal case involving a 65-year-old woman reporting burns to the neck due to an SF during a thyroidectomy was described. A literature review was performed using Pubmed and Scopus databases, focusing on epidemiology, causes, prevention activitie…
User experience and the security of graphical passwords
2015
Graafiset salasanat ovat lupaava vaihtoehto alfanumeeriselle autentikaatiolle. Älypuhelinten ja muiden korkea resoluutioisten kosketusnäytöllisten laitteiden määrä on kasvussa ja alfanumeeriset salasanat ovat kehitetty alun perin näppäimistölle syötettäviksi. Tarkkuutta vaativa kirjoittaminen ei tällöin ole välttämättä käyttäjälle kaikkein mielekkäintä. Graafisia ja alfanumeerisia salasanoja on tutkittu muistin toiminnan sekä käytettävyyden näkökulmasta. Tutkielma on tehty kirjallisuuden pohjalta käyttäen apuna erilaisia tieteellisia julkaisuja sisältäviä tietokantoja, kuten IEE Explore ja ACM Digital Library - tietokantoja. Tutkielman tarkoituksena oli kuvata ja tutkia tieteellisten artikk…
Assessment of Cyber Security risks : A Smart Terminal Process
2023
In Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operatio…
Sorption of V and VI group metalloids (As, Sb, Te) on modified peat sorbents
2016
AbstractThe present work investigates arsenic, antimony and tellurium sorption using iron modified peat. The results were obtained using batch tests and the sorption was studied as a function of initial metalloid concentration, pH and sorption time, as well as the presence of competing substances. The obtained results indicate that modification of peat with Fe compounds significantly enhances the sorption capacity of the sorbents used for sorption of arsenic, antimony and tellurium. The optimal pH interval for the sorption of Sb(III) is 6.5–9 and for As(V) and Sb(V) – 3–6, while As(III) and tellurium sorption using Fe-modified peat is favourable in a wider interval of 3–9. The presence of c…
An Empirical Examination of the Economics of Mobile Application Security
2021
The growth of mobile devices coupled with the advances in mobile technologies has resulted in the development and widespread use of a variety of mobile applications (apps). Mobile apps have been developed for social networking, banking, receiving daily news, maintaining fitness, and for job-related tasks. The security of the apps is an important concern. However, in some cases, the app developers may be less interested to invest in the security of the apps, if users are unwilling to pay for the added security. In this paper, we empirically examine whether consumers are less willing to pay for security features than for usability features. In addition, we examine whether a third-party certif…
Henkilöstön tietoturvakäyttäytyminen yrityskontekstissa
2016
Tämä tutkielma on toteutettu kirjallisuuskatsauksena, jonka lähteinä on käytet-ty pääasiassa akateemisten julkaisujen artikkeleita. Tutkielman tarkoitus oli sel-vittää mitä on tietoturvakäyttäytyminen, tekijät jotka vaikuttavat henkilöstön tietoturvakäyttäytymiseen ja miten henkilöstön käyttäytymistä voitaisiin paran-taa, tietoturvan säilyttämiseksi. Kirjallisuuden perusteella onnistuttiin löytä-mään kattava lista erilaisia käyttäytymisen vaikuttavia tekijöitä ja henkilöstön motivoinnin keinoja. Näistä tekijöistä ja keinoista muodostettiin kontribuutiona havainnollistava kuva, sekä konkreettinen tehtävälista. This thesis is a literature review based mainly on academic publications. Mean-ing…
Prosessiteoreettinen näkökulma, joka selittää henkilökohtaisen tietokoneen käyttöön liittyvää tietoturvakäyttäytymisen muutosta
2016
IS security behavior has become a mainstream topic in information systems. Extent research is dominated with the viewpoint for discovery of generic and stable predictors. The viewpoint rests on the implicit assumption that information security behavior can be explained by discovering these factors. The best know examples are IS security behavior models grounded upon Protection Motivation Theory (PMT) and the Deterrence Theory (DT). The success of this perspective hinges on the question as to what extend the IS security behavior and the reasons for it, are constant from time to time and from one specific security situation to another. The viewpoint is successful if computer users have built …
Èkonomičeskaâ desuverenizaciâ gosudarstva kak ugroza èkonomičeskoj bezopasnosti Ukrainy
2015
In the article it is made the analysis of factors influencing economic desovereignization of Ukraine and it is determined the effects of objective and subjective economic globalization for Ukraine. On the basis of the analysis it is justified immediate steps for ensuring the formation of a competitive and self-sufficient economy of Ukraine.
Il costruttivismo. La rivalutazione delle idee nelle relazioni internazionali
2021
The chapter traces the roots and evolution of constructivism, the defining features and the value added to IR theory. It also presents some contributions by constructivst scholars and identifies challenges.
Framing Effects on Online Security Behavior
2020
We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.