Search results for " security"

showing 10 items of 1419 documents

Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence

2022

Organisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, instead of a technical problem. Hence, organisations must change the security protocol from reactive action to proactive operation; must develop information security strategies that support the business; should implement better controls, systems, and services; and must create a process to proactively gather information about the possible threats and adversaries. This study proposes a novel method for combining a zero-trust strategy with cyber counterintelligence to gain th…

rikollisuuskybersodankäyntiturvallisuustietoturvapolitiikkariskienhallintatietoturvavastavakoilukyberturvallisuusennakointizero trust cyber counterintelligenceinformation security strategy
researchProduct

Robots, privacy and data protection

2015

A research on robots, drones and privacy/data protection, with focus on cloud robotics, Internet of Things, contracts and the use cases of telepresence, courier robots and smart cities quadricopters.

robot drones unmanned aerial vehicles internet of things cloud computing cloud robotics privacy data protection security remotely piloted aerial systems RPAS UAVSettore IUS/01 - Diritto Privato
researchProduct

Two decades of discussion on charitable food aid in Finland : analysing the framing by and through the media

2016

Jo kaksi vuosikymmentä virallisen sosiaalipolitiikan rajapinnoilla toiminut ruoka-apu on murrosvaiheessa: Tulisiko toiminta hiljaisen hyväksynnän sijaan tunnustaa, jolloin avun kohdentamista ja järjestämistä voidaan avoimesti kehittää yhdessä kirkon, kunnallisen sosiaalitoimen ja yksityisen sektorin kesken? Onko toiminnan fokus siirtymässä väliaikaiseksi tarkoitetusta akuutin nälän torjunnasta kohti sosiaalipoliittisen ruoka- köyhyyden ja ekologisen ruokahävikin ongelmat yhdistävää ratkaisumallia? Julkisen, yksityisen ja kolmannen sektorin yhteistyönä toteutettavan saksalaisen ruoka-apumallin (Berliner Tafel -ruokapankkiverkosto) rantautuminen Suomeen (Yhteinen Pöytä …

ruokahävikkikehysanalyysiwelfare responsibilityfood securitykansalaisyhteiskuntaruokaturvacharitable food aidwelfare regimesfood wastehyvinvointivaltioframe package analysishyvinvointivastuucivil societyruoka-apu
researchProduct

Corporate responsibility in the food chain: The criteria and indicators

2012

Corporate responsibility (CR) is becoming a key issue in the food chain. In order to make sense of this phenomenon, a seminal aper by Maloni and Brown (2006) called for further empirical investigation on the criteria of responsibility in the food supply chain. The purpose of this paper is to answer the call by identifying the criteria for defining CR and develop indicators for measuring the responsibility performance of the food chain. The study was based on interactive and participatory stakeholder dialogues with diverse experts, corporate representatives and other stakeholders, including non-governmental organizations (NGOs) and governmental bodies. Through an iterative research process w…

ruokaketjumittaaminenfood chainkestävä kehitysyritysvastuumääritelmätCorporate responsibility food chain social environmental economic criteria indicators measuring definition Agribusiness Food Consumption/Nutrition/Food Safety Food Security and Poverty Health Economics and Policydefinitionindikaattoritmeasuring
researchProduct

U.S. Grand Strategy Towards Russia 2001-2017

2019

Objectives<i>U.S. foreign policy towards Russia is of the utmost importance for the national security of the countries on the NATO eastern flank. Grand strategies are among the analytical concepts for classification and analysis of U.S. actions in the international arena. This paper uses grand strategy classification framework to classify and analyse U.S. strategy towards Russia from 2001 to 2017.</i>Methods<i>36 speeches about Russia by U.S. Presidents George Bush and Barack Obama and Vice President Joe Biden from 2001 to 2017 were used in content analysis. U.S. grand strategy classification framework was used as the tool for coding and classifying different foreign polic…

russialcsh:Military ScienceEconomyGrand strategylcsh:UPolitical scienceInternational securitygrand strategyGeopoliticsusaSecurity and Defence Quarterly
researchProduct

Towards CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety - Feasibility Study in Jyväskylä

2021

AbstractIn order to withstand the ever-increasing invasion of privacy by CCTV cameras and technologies, on par CCTV-aware solutions must exist that provide privacy, safety, and cybersecurity features. We argue that a first important step towards such CCTV-aware solutions must be a mapping system (e.g., Google Maps, OpenStreetMap) that provides both privacy and safety routing and navigation options. Unfortunately, to the best of our knowledge, there are no mapping nor navigation systems that support CCTV-privacy and CCTV-safety routing options. At the same time, in order to move the privacy vs. safety debate related to CCTV surveillance cameras from purely subjective to data-driven and evide…

safetyComputer sciencePrivacy laws of the United StatesContext (language use)PedestrianprivacyComputer securitycomputer.software_genrelcsh:TelecommunicationDomain (software engineering)anti-surveillancelcsh:TK5101-6720yksityisyyskameravalvontakarttapalvelutcctv-aware technologymappingnavigationreititysanonymityNavigation systemvalvontajärjestelmätcctvroutingsurveillanceRouting (electronic design automation)anonymiteettiScale (map)yksilönsuojacomputerAnonymity2021 28th Conference of Open Innovations Association (FRUCT)
researchProduct

PSD2 ja sen vaikutukset verkkomaksamisen tietoturvaan ja liiketoimintamalleihin

2016

Web payments have created a whole industry around them in the last decade where sensitive data is moved around and where security is one of the key concepts. On top of internal facilities, members of the EU are regulated by EU directives of which the second will be taken to legislation by the start of year 2017. It forces the banks to open interfaces that allow third parties to use web shop customers banking credentials in order to initiate payments. Second directive on payment services brings up a set of web security hazards that have yet to be studied. In this thesis a literature review is made on web payment security. I will also study the second directive on payment services and its eff…

second directive on payment servicesverkkomaksaminencyber securitydirektiivitWeb-paymenttietoturvapayment service providerkyberturvallisuusdirective on payment services
researchProduct

Leveraging National Auditing Criteria to Implement Cybersecurity Safeguards for the Automotive Emergency Response Vehicles : A case study from Finland

2017

A modern Emergency Response Vehicle (ERV) is a combination of emergency services and functional mobile office on the wheels. The mobile office is aiming to leverage the benefits of fixed office while moving on the wheels. Researchers have observed that emergency response personnel including Law Enforcement Authorities (LEAs), Police and border guards, could be on the duty while having possibility to use same services compared to fixed office. On the one hand, demand of mobile office has significantly improved the emergency response services. On the other hand, emergency vehicle designers should rethink the demand of users. This resulted into modern standard emergency response vehicle with t…

secure technologyinformation securitysafeguardcross-border collaborationKATAKRItietoturvakyberturvallisuusturvallisuustekniikkaemergency response vehiclesyhteistyö
researchProduct

Terroryzm w obliczu bezpieczeństwa państwa

2018

securit threatsinternational securitysecurity environmentterrorismStudia nad Autorytaryzmem i Totalitaryzmem
researchProduct

Organising civil preparedness in Finland, Sweden and Norway : comparing national approaches

2019

Master's thesis Innovative governance and public management ME523 - University of Agder 2019 Our security environment hasbecome more complex during the past years and the variety of threats and vulnerabilities that emerge have become more unpredictable and transboundary. Civil prepared-nessis aconceptwhich is used to addresscross-sectoralsecuritymattersfocusing on sustainingthe essential societal functions, ensuringbasic supply tothe population and actingin extraordinary cir-cumstances as well as the civilian sector’s ability to support the military defence if needed.The or-ganisation of civil preparedness is a national matter and the ways governments have organised itvaries. This study see…

security governancecivil preparednessNordic MP in Innovative Governance and Public Managementsocietal securityME523VDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240comprehensive security
researchProduct