Search results for " security"
showing 10 items of 1419 documents
Odnawialne źródła energii w zrównoważonym rozwoju
2017
W artykule starano się udowodnić, iż rozwój energetyki w kierunku zwiększenia udziału odnawialnych źródeł energii (OZE) wpisuje się w realizację koncepcji zrównoważonego rozwoju. Wyzwaniami dla ludzkości dzisiaj jest równy dostęp do wszelkiego rodzaju dóbr: energii czy wody, w celu zapewnienia odpowiedniego standardu życiowego. Rabunkowa gospodarka surowcami spowodowała głęboką dewastację środowiska naturalnego. Konsekwentne wdrażanie polityki ekologicznej (w tym OZE) w ramach zrównoważonego rozwoju stanowi gwarancję bezpieczeństwa energetycznego oraz podejmowania przez podmioty gospodarcze działań w zakresie ochrony środowiska.
Glosa do uchwały Sądu Najwyższego - Izba Pracy, Ubezpieczeń Społecznych i Spraw Publicznych z dnia 4 sierpnia 2016 r., III UZP 11/16
2017
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment
2012
This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…
Toward a stage theory of the development of employees’ information security behavior
2020
Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such models cannot explain a case where the reasons for ISB change. However, the underlying reasons and motives for users’ ISB are not static but may change over time. To understand the change in reasoning between different antecedents, we examine stage theorizing in other fields and develop the requirements for an emergent theory of the development of employees’ ISB: (1) the content of stages based on the stage elements and their stage-specific attributes; (2) the stage-independent element explaini…
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…
Giving patients secure " google-like " access to their medical record
2008
International audience; The main problem for the patient who wants to have access to all of the information about his health is that this information is very often spread over many medical records. Therefore, it would be convenient for the patient, after being identified and authenticated, to use a kind of specific medical search engine as one part of the solution to this main problem. The principal objective is for the patient to have access to his or her medical information at anytime and wherever it has been stored. This proposal for secure "Google Like" access requires the addition of different conditions: very strict identity checks using cryptographic techniques such as those planned …
Liberal Institutionalism
2020
The application of liberal institutionalism to peacekeeping has shed light on several important questions regarding why member states support the deployment of a specific operation, how they build support for their position, whether domestic preferences influence their strategies in the Security Council and why they volunteer troops for peacekeeping. Sponsorship records have proven to be a useful sourse for researching coalition-building on peacekeeping.
Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education
2019
Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…
Cyber security exercise : Literature review to pedagogical methodology
2019
This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future a new model for teaching in cyber security exercises. Cyber security exercises are the major service at JYVSECTEC - Jyväskylä Security Technology, cyber security research, training and development center in Finland [1]. JYVSECTEC Cyber security exercises are executed in real life simulation environment, RGCE (Realistic Global Cyber Environment) [1]. It provides the same functionality as the real Internet, but it is isolated from the real Internet and fully controlled by JYVSE…