Search results for " security"
showing 10 items of 1419 documents
User expectations, use experiences and continued adoption of a mobile secure communication application
2018
The importance of secure communication between employees in enterprises and governmental organizations as well as technologies to support that has increased tremendously over the past years. This study examines the user expectations before and the use experiences during the implementation phase of a mobile secure communication application together with expectation–confirmation and its influence on continued adoption. The study is explorative in nature and empirically based on thematic analysis of qualitative data collected from pilot users of a mobile secure communication application who work in a governmental organization in Finland. The theoretical basis of the study draws from two well-e…
The associations of quantitative/qualitative job insecurity and well-being: The role of self-esteem.
2019
Job insecurity is recognized as one of the most prominent job stressors for employees. Despite decades of research, the concurrent examination of both quantitative (i.e. perceived threat of job loss) and qualitative (i.e., perceived threat of losing some job features) job insecurity and the analysis of their different relationships with well-being at work have received relatively scarce attention. This study examined a moderated mediation model of the relationship between quantitative job insecurity and well-being at work. In doing so, the focus was on the mediating effects of qualitative job insecurity and the moderating effects of self-esteem in the abovementioned relationships. Drawing f…
Job security provisions, wage setting and unemployment persistence
1998
Krievijas Federācijas bruņojuma kontroles politika
2020
Maģistra darba „Krievijas Federācijas bruņojuma kontroles politika” mērķis ir analizēt Krievijas bruņojuma kontroles politiku Eiropas drošības kontekstā. Darbā aplūkoti teorētiskie skaidrojumi drošības konceptam, kā arī uzticību veicinošu mēru nozīme. Darba gaitā tiek skaidrots, kādi ir nosacījumi, kāpēc valstis izvēlas bruņojuma kontroles īstenošanu, kādi ir tās uzdevumi un kā tā ir attīstījusies. Lai aplūkoto Krievijas bruņojuma kontroles politiku, kā gadījumi izpētei ir izvēlēta stratēģiskā bruņojuma samazināšana, kā arī dalība konvencionālā bruņojuma kontroles mēros. Darbā analizēta Krievijas motivācija būt daļai no šiem bruņojuma kontroles mēriem, kā arī analizēta tās saistību ievēroša…
« Deirdre O’Mahony, artiste et archéologue des savoirs techniques indigènes »
2022
Les projets participatifs et collaboratifs de l’artiste irlandaise Deirdre O’Mahony, ancrés dans le monde rural du Burren, valorisent le patrimoine vernaculaire et les savoir-faire indigènes. Ses recherches de terrain portant sur l’évolution du paysage abordé comme milieu et les collaborations multiples qu’elle entreprend aboutissent à des propositions artistiques revisitant le land art. Ses interventions dans le paysage sont souvent complétées par des propositions dialogiques, dont le repas partagé, qui invite les participants à explorer l’histoire des lieux, les jeux de pouvoir qui s’y tissent et la pertinence des savoirs vernaculaires pour les enjeux de demain, notamment en matière de sé…
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…
Vanhempien työ, työn siirräntä kotiin ja lasten hyvinvointi : kohtaamisia tuulikaapissa
2013
Ocena wiarygodności internetowych serwisów ubezpieczeniowych w Polsce
2016
Wiarygodność partnera transakcji czy usług realizowanych przez Internet stanowi istotny czynnik dla dalszego rozwoju gospodarki internetowej. Dotyczy to między innymi rozwoju ubezpieczeń internetowych. Dlatego umiejętność oceny wiarygodności serwisów WWW staje się ważnym narzędziem w rywalizacji na rynku ubezpieczeniowym. Celem artykułu jest przedstawienie wyników oceny wiarygodności serwisów WWW wybranych ubezpieczycieli prowadzących działalność w Polsce. W artykule pokazano, że kryteria oceny wiarygodności serwisów internetowych można przyporządkować do trzech wymiarów; są nimi: zdolność serwisu do zapewniania wiarygodności, życzliwość projektantów, twórców i administratorów serwisu w zak…
Computer Networks
2018
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.
From disaster to development : parliamentary debate analysis: Atomausstieg and securitization
2017
Tutkimukseni tehtävänä on selvittää, mitä turvallisuusargumentteja käytettiin Saksan parlamentaarisissa debateissa, jotka koskivat atomivoimasta luopumista vuonna 2011 maaliskuusta kesäkuuhun, jolloin keskustelu oli vilkkainta. Alkupäivämäärä määräytyi Fukushiman ydinonnettomuuden mukaan ja loppupäivämäärän määritteli hetki, jolloin Saksan parlamentti, Bundestag, hyväksyi uusia lakeja liittyen ydinenergian käyttöön ja rajoittamiseen. Ydinenergian käytön rajoittamiseen ja poistamiseen viitataan termillä Atomausstieg. Taustoitan työtä keskustelemalla ensin parlamentaarisista debateista yleensä, sitten turvallistamisesta ja energiaturvallisuudesta. Aineistossani viittaukset Fukushiman ydinonne…