Search results for " security"

showing 10 items of 1419 documents

Odnawialne źródła energii w zrównoważonym rozwoju

2017

W artykule starano się udowodnić, iż rozwój energetyki w kierunku zwiększenia udziału odnawialnych źródeł energii (OZE) wpisuje się w realizację koncepcji zrównoważonego rozwoju. Wyzwaniami dla ludzkości dzisiaj jest równy dostęp do wszelkiego rodzaju dóbr: energii czy wody, w celu zapewnienia odpowiedniego standardu życiowego. Rabunkowa gospodarka surowcami spowodowała głęboką dewastację środowiska naturalnego. Konsekwentne wdrażanie polityki ekologicznej (w tym OZE) w ramach zrównoważonego rozwoju stanowi gwarancję bezpieczeństwa energetycznego oraz podejmowania przez podmioty gospodarcze działań w zakresie ochrony środowiska.

odnawialne źródła energiienvironmental policiesrenewable energy resourcessustainable developmentbezpieczeństwo energetycznezrównoważony rozwójochrona środowiskaenergy securityEtyka Biznesu i Zrównoważony Rozwój : interdyscyplinarne studia teoretyczno-empiryczne
researchProduct

Glosa do uchwały Sądu Najwyższego - Izba Pracy, Ubezpieczeń Społecznych i Spraw Publicznych z dnia 4 sierpnia 2016 r., III UZP 11/16

2017

odwołanie od decyzji organu rentowegocases involving social securityappealpostępowanie cywilne (odrębne)insured party(separete) civil proceedingsappeal against pension authority's decisionsprawy z zakresu ubezpieczeń społecznychapelacjaubezpieczonyOrzecznictwo Sądów Polskich
researchProduct

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct

Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment

2012

This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…

oppimisympäristöHigher educationMultimediaComputer sciencebusiness.industryDesign-based researchCommunicationLearning environmentData securityCollaborative learningcomputer.software_genreGrounded theoryComputer Science ApplicationsEducationInformation and Communications TechnologyComputer-supported collaborative learningtietokoneavusteinenoppiminenComputingMilieux_COMPUTERSANDEDUCATIONMedia Technologycomputer-supported collaborated learningtietoturvabusinesscomputerlangattomat verkotOnline Journal of Communication and Media Technologies
researchProduct

Toward a stage theory of the development of employees’ information security behavior

2020

Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such models cannot explain a case where the reasons for ISB change. However, the underlying reasons and motives for users’ ISB are not static but may change over time. To understand the change in reasoning between different antecedents, we examine stage theorizing in other fields and develop the requirements for an emergent theory of the development of employees’ ISB: (1) the content of stages based on the stage elements and their stage-specific attributes; (2) the stage-independent element explaini…

organisaatiokäyttäytymineninformaatiokäyttäytyminenStage theoryoppiminenInformation securitytietoturvapolitiikkaLearningCompliance with information security policiesInformation security behaviortietoturva
researchProduct

Expectations and Experiences of Implementing a Mobile Secure Communication Application

2020

The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…

organisaatioviestintäComputer Networks and CommunicationsComputer scienceStrategy and Managementorganisaatiot02 engineering and technologyComputer securitycomputer.software_genresovellusohjelmatManagement Information SystemsSecure communicationmobiililaitteet020204 information systems0502 economics and businessyksityisyys0202 electrical engineering electronic engineering information engineeringodotuksetmobiilisovelluksettietoturvaviestintäMarketingbusiness.industryturvallisuus05 social sciencesComputer Science Applicationstietoliikennekokemukset050211 marketingbusinesscomputer
researchProduct

Giving patients secure " google-like " access to their medical record

2008

International audience; The main problem for the patient who wants to have access to all of the information about his health is that this information is very often spread over many medical records. Therefore, it would be convenient for the patient, after being identified and authenticated, to use a kind of specific medical search engine as one part of the solution to this main problem. The principal objective is for the patient to have access to his or her medical information at anytime and wherever it has been stored. This proposal for secure "Google Like" access requires the addition of different conditions: very strict identity checks using cryptographic techniques such as those planned …

patient identifier[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]watermarking[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]electronic signaturedirect accessdata securitymedical recordgridComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Liberal Institutionalism

2020

The application of liberal institutionalism to peacekeeping has shed light on several important questions regarding why member states support the deployment of a specific operation, how they build support for their position, whether domestic preferences influence their strategies in the Security Council and why they volunteer troops for peacekeeping. Sponsorship records have proven to be a useful sourse for researching coalition-building on peacekeeping.

peacekeeping Security Council United Nations liberal institutionalism coalitions
researchProduct

Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

2019

Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…

pedagogical approachessähköinen arviointiresponsible research and innovationeducación superiorhenkilöllisyysauthorship verificationverificación de autoríae-assessmentidentitytekijyysAuditor's reportAuthentication4. Education05 social scienceseducació superior050301 educationelectronic authenticationPublic relationsAuthentication (law)Autentificación de documentosverifiointitodentaminenhigher educatione-authenticationThe InternetPsychologyautenticación electrónica050101 languages & linguisticsplagiointiHigher educationBest practiceCheatingData securityautenticacióEducationautenticación0501 psychology and cognitive sciencestietoturvaauthorshipcheating detectionbusiness.industrytrustInformation securityautenticació electrònicae-arviointiAutenticació de documentsverificació de l'autoriabusiness0503 educationarviointi
researchProduct

Cyber security exercise : Literature review to pedagogical methodology

2019

This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future a new model for teaching in cyber security exercises. Cyber security exercises are the major service at JYVSECTEC - Jyväskylä Security Technology, cyber security research, training and development center in Finland [1]. JYVSECTEC Cyber security exercises are executed in real life simulation environment, RGCE (Realistic Global Cyber Environment) [1]. It provides the same functionality as the real Internet, but it is isolated from the real Internet and fully controlled by JYVSE…

pelillistäminensimulation pedagogyexercisegame based learningsimulaatioharjoitteluharjoituksetSociologyyhteisöllinen oppiminenComputer securitycomputer.software_genrekyberturvallisuuscomputer
researchProduct