Search results for " security"

showing 10 items of 1419 documents

Fire in operating room: The adverse "never" event. Case report, mini-review and medico-legal considerations.

2020

Abstract The patient’s security and safety represent a topic of great importance for public health that led several healthcare organizations in many Countries to share documents to promote risk management and preventing adverse events. Surgical Fire (SF) is an infrequent adverse event generally occurring in the operating room (OR) and consisting of a fire that occurs in, on, or around a patient undergoing a medical or surgical procedure. Here a medico-legal case involving a 65-year-old woman reporting burns to the neck due to an SF during a thyroidectomy was described. A literature review was performed using Pubmed and Scopus databases, focusing on epidemiology, causes, prevention activitie…

medicine.medical_specialtyOperating RoomsBest practiceScopus01 natural sciencesFiresPathology and Forensic Medicine03 medical and health sciences0302 clinical medicineBurns; Clinical risk management; Healthcare security and safety; Medical liability; Surgery; Surgical fireHealthcare security and safetyEpidemiologyHealth caremedicineHumans030216 legal & forensic medicineAdverse effectRisk managementSurgical fireAgedClinical risk managementMedical ErrorsMedical liabilitybusiness.industryPublic health010401 analytical chemistryLiabilityLiability Legalmedicine.disease0104 chemical sciencesIssues ethics and legal aspectsSurgeryFemaleMedical emergencybusinessBurnsLegal medicine (Tokyo, Japan)
researchProduct

User experience and the security of graphical passwords

2015

Graafiset salasanat ovat lupaava vaihtoehto alfanumeeriselle autentikaatiolle. Älypuhelinten ja muiden korkea resoluutioisten kosketusnäytöllisten laitteiden määrä on kasvussa ja alfanumeeriset salasanat ovat kehitetty alun perin näppäimistölle syötettäviksi. Tarkkuutta vaativa kirjoittaminen ei tällöin ole välttämättä käyttäjälle kaikkein mielekkäintä. Graafisia ja alfanumeerisia salasanoja on tutkittu muistin toiminnan sekä käytettävyyden näkökulmasta. Tutkielma on tehty kirjallisuuden pohjalta käyttäen apuna erilaisia tieteellisia julkaisuja sisältäviä tietokantoja, kuten IEE Explore ja ACM Digital Library - tietokantoja. Tutkielman tarkoituksena oli kuvata ja tutkia tieteellisten artikk…

memoryalfanumeerinen käytettävyysalphanumerical passwords information securityuser experiencegraafinen salasanamuistikäyttäjäkokemusgraphical passwordsconvenience
researchProduct

Assessment of Cyber Security risks : A Smart Terminal Process

2023

In Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operatio…

merikuljetusmaritime logisticsmart terminal processcyber security managementmeriliikennelogistiikkaälytekniikkamerenkulkusatamatriskinarviointikyberturvallisuusrisk assessments
researchProduct

Sorption of V and VI group metalloids (As, Sb, Te) on modified peat sorbents

2016

AbstractThe present work investigates arsenic, antimony and tellurium sorption using iron modified peat. The results were obtained using batch tests and the sorption was studied as a function of initial metalloid concentration, pH and sorption time, as well as the presence of competing substances. The obtained results indicate that modification of peat with Fe compounds significantly enhances the sorption capacity of the sorbents used for sorption of arsenic, antimony and tellurium. The optimal pH interval for the sorption of Sb(III) is 6.5–9 and for As(V) and Sb(V) – 3–6, while As(III) and tellurium sorption using Fe-modified peat is favourable in a wider interval of 3–9. The presence of c…

metalloidsPeatantimony0211 other engineering and technologieschemistry.chemical_element02 engineering and technology010501 environmental sciences01 natural scienceslcsh:ChemistryAntimonyGroup (periodic table)telluriumMaterials ChemistryArsenic0105 earth and related environmental sciences021110 strategic defence & security studiesarsenicSorptionGeneral Chemistrylcsh:QD1-999chemistrysorbentsEnvironmental chemistrypeatMetalloidTelluriumOpen Chemistry
researchProduct

An Empirical Examination of the Economics of Mobile Application Security

2021

The growth of mobile devices coupled with the advances in mobile technologies has resulted in the development and widespread use of a variety of mobile applications (apps). Mobile apps have been developed for social networking, banking, receiving daily news, maintaining fitness, and for job-related tasks. The security of the apps is an important concern. However, in some cases, the app developers may be less interested to invest in the security of the apps, if users are unwilling to pay for the added security. In this paper, we empirically examine whether consumers are less willing to pay for security features than for usability features. In addition, we examine whether a third-party certif…

mobile appsinformation asymmetrykäytettävyysturvallisuusrisk perceptionskäyttötietosuojamaksuhalukkuusmobiililaitteetmobiilipalvelutapplication securitymobiilisovelluksetmaksullisuustietoturvawillingness to paymatkapuhelimetriskit
researchProduct

Henkilöstön tietoturvakäyttäytyminen yrityskontekstissa

2016

Tämä tutkielma on toteutettu kirjallisuuskatsauksena, jonka lähteinä on käytet-ty pääasiassa akateemisten julkaisujen artikkeleita. Tutkielman tarkoitus oli sel-vittää mitä on tietoturvakäyttäytyminen, tekijät jotka vaikuttavat henkilöstön tietoturvakäyttäytymiseen ja miten henkilöstön käyttäytymistä voitaisiin paran-taa, tietoturvan säilyttämiseksi. Kirjallisuuden perusteella onnistuttiin löytä-mään kattava lista erilaisia käyttäytymisen vaikuttavia tekijöitä ja henkilöstön motivoinnin keinoja. Näistä tekijöistä ja keinoista muodostettiin kontribuutiona havainnollistava kuva, sekä konkreettinen tehtävälista. This thesis is a literature review based mainly on academic publications. Mean-ing…

motivaatioinformation security policymotivationinformation securitybehaviortietoturvapolitiikkahenkilöstöpersonneltietoturvakäyttäytyminen
researchProduct

Prosessiteoreettinen näkökulma, joka selittää henkilökohtaisen tietokoneen käyttöön liittyvää tietoturvakäyttäytymisen muutosta

2016

IS security behavior has become a mainstream topic in information systems. Extent research is dominated with the viewpoint for discovery of generic and stable predictors. The viewpoint rests on the implicit assumption that information security behavior can be explained by discovering these factors. The best know examples are IS security behavior models grounded upon Protection Motivation Theory (PMT) and the Deterrence Theory (DT). The success of this perspective hinges on the question as to what extend the IS security behavior and the reasons for it, are constant from time to time and from one specific security situation to another. The viewpoint is successful if computer users have built …

motivaatiosubjective construction of realitytarpeetIS security practicesprosessiteoriasubjektiivisuustietoturvakäyttäytyminenIS securitymotivestunteetkokemuksetmotivaatiopsykologiatietoturvakäyttäytyminenIS security behavior
researchProduct

Èkonomičeskaâ desuverenizaciâ gosudarstva kak ugroza èkonomičeskoj bezopasnosti Ukrainy

2015

In the article it is made the analysis of factors influencing economic desovereignization of Ukraine and it is determined the effects of objective and subjective economic globalization for Ukraine. On the basis of the analysis it is justified immediate steps for ensuring the formation of a competitive and self-sufficient economy of Ukraine.

national interests in the economic sphereeconomic securitynational sovereigntyeconomic desovereignization of stateeconomic globalization.
researchProduct

Il costruttivismo. La rivalutazione delle idee nelle relazioni internazionali

2021

The chapter traces the roots and evolution of constructivism, the defining features and the value added to IR theory. It also presents some contributions by constructivst scholars and identifies challenges.

normeanarchymilitary interventionconstructivismpluralistic security communitiecostruttivismo teoria delle relazioni internazionaliIR theorycomunità di sicurezzaauthoritySettore SPS/04 - Scienza Politica
researchProduct

Framing Effects on Online Security Behavior

2020

We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.

nudgeOnline securityProcess (engineering)Vendorlcsh:BF1-990Internet privacyonline behaviorgain vs. loss frame050105 experimental psychologyEconomíaPassword strength03 medical and health sciences0302 clinical medicineProspect theoryPsychology0501 psychology and cognitive sciencesGeneral PsychologyOriginal ResearchG500business.industrycyber security05 social sciencesprospect theoryFraming effectC800lcsh:Psychologythreat assessmentlab experimentPsychologybusinessThreat assessment030217 neurology & neurosurgeryFrontiers in Psychology
researchProduct