Search results for "Computer security"
showing 10 items of 433 documents
The think aloud method in studying the translation process
2019
This paper presents a theoretical description of the process-oriented research method in translation studies known as the think aloud method and a case study of an experimental application of think-aloud protocols (TAP). The article begins with a brief description of the relevance of its topic, taking into account the state of current researches in the field of translation studies. A literature review of recent publications where the think aloud method and think-aloud protocols as the principal introspective and retrospective method in different translation studies is given. The shortcomings and advantages of applying the think aloud method are discussed and the ways to optimise the use of …
A Rule-Based Multi-agent System for Local Traffic Management
2009
Road Traffic presents a high dynamism which makes necessary the development of traffic management and control strategies to improve traffic flows and more important, road safety. So it is needed the use of intelligent systems to support traffic organizations and road operators to cope with incidents. In this paper we introduce a local autonomous system for traffic management. This way, though there could be a breakdown in the communications between the local system and the TCC, the local system will be able to warn the road users in case of incidents. The system uses multiagent technology to work with the specific characteristics of traffic domain. The expert MAS system is ruled-based that …
Not a Target. A Deep Learning Approach for a Warning and Decision Support System to Improve Safety and Security of Humanitarian Aid Workers
2019
Humanitarian aid workers who try to provide aid to the most vulnerable populations in the Middle East or Africa are risking their own lives and safety to help others. The current lack of a collaborative real-time information system to predict threats prevents responders and local partners from developing a shared understanding of potentially threatening situations, causing increased response times and leading to inadequate protection. To solve this problem, this paper presents a threat detection and decision support system that combines knowledge and information from a network of responders with automated and modular threat detection. The system consists of three parts. It first collects te…
Trust-aware RBAC
2012
Published version of a chapter in the book: Computer Network Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-33704-8_9 In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned trustworthiness level in the system. By adding trustworthiness constraints to roles we enhance system, for example, with more flexible ability to delegate roles, to control reading/updating…
Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking
2014
This paper presents a novel watermarking method, applied to the medical imaging domain, used to embed the patient’s data into the corresponding image or set of images used for the diagnosis. The main objective behind the proposed technique is to perform the watermarking of the medical images in such a way that the three main attributes of the hidden information (i.e., imperceptibility, robustness, and integration rate) can be jointly ameliorated as much as possible. These attributes determine the effectiveness of the watermark, resistance to external attacks, and increase the integration rate. In order to improve the robustness, a combination of the characteristics of Discrete Wavelet and K…
Institutional Dynamics in International Organizations: Lessons from the Recruitment Procedures of the European External Action Service
2014
Author's version of an article in the journal: Organization Studies. Also available from the publisher at: http://dx.doi.org/10.1177/0170840614544558 This article examines how organizational designs develop by proposing a novel theoretical framework that views organizational change as resulting from a dialectic process between interpretive agents. The key claim is that existing formal procedures (such as recruitment processes, our empirical focal point) are subject to involved actors’ interpretive efforts. This results in a bargaining situation based on the interpretations of the principal actors, which may induce a feedback loop whereby the original procedures are amended. The empirical re…
SHAPES secure cloud platform for healthcare solutions and services
2020
The SHAPES project is an ambitious endeavour that gathers stakeholders from across Europe to create, deploy and pilot at large-scale a EU-standardised open platform incorporating and integrating a broad range of solutions, including technological, organisational, clinical, educational and societal, to enable the ageing population of Europe to remain healthy, active and productive, as well as to maintain a high quality of life and sense of wellbeing for the longest time possible. Not only each digital solution will be ethical, legal and appropriate for users, but also the results will align with the full and ethically responsible end-to-end exploitation of the new functionalities empowered b…
The Theory of the Flying Geese Pattern of Development and Its Interpretations
1994
An interpretation is made of Akamatsu Kaname's theory of the flying geese pattern of development, launched in Japan during the 1930s. This theory explains how an undeveloped country can become developed relatively quickly. The undeveloped country adopts suitable labour-intensive industries from more developed countries. It produces first for the home market, but starts to export as soon as the industries have grown strong enough. Initially, products are simple, crude and cheap, but gradually the level of quality is elevated. The procedure is repeated over and over again, leading to a rapid process of national economic development. In Japanese postwar industrial policy, certain industries w…
Selection by committee: Anonymity and gratitude
2018
Abstract What kind of candidate is selected into a job when the principal has to appoint a committee to measure the candidates’ ability and select a winner? We find that if the committee takes into account the candidate’s gratitude towards them, a candidate with less than first best ability will be selected. A relevant exception may occur if the first best is the overall best candidate. First best selection is always achieved if the committee is anonymous to the candidates. If the committee is not detached enough from the candidates then delegation fares even worse than random selection.
CO2 Prices, Energy and Weather
2007
One of the main objectives of the European Union Emission Trading Scheme is the establishment of a market price level for allowances that show to European CO 2 emitting installations the environmental impact of their polluting activities. The aim of this paper is to focus on the daily price changes during 2005 in an attempt to examine the underlying rationality of pricing behaviour. Specifically, we study the effect of those weather and non-weather variables that academic and market agents consider as the major determinants of the of CO 2 price levels. The results show that the energy sources are the principal factors in the determination of CO 2 price levels, and that only extreme temperat…