Search results for "Computer security"
showing 10 items of 433 documents
Class Actions or Collective Redress: The Need for an Efficient European Tool
2014
Collective redress makes sense both in court-based litigation and in alternative dispute resolution (ADR). Yet while the courts generally have a good sense of collective redress (though arguably there is room for improvements), in the second framework, there are some contradictions from a dogmatic point of view. When collective interests come up in conflict, judicial coercion and a judicial structure are often needed to resolve the conflict. In addition, the absence of a voluntary agreement, especially from the abuser’s side, makes it more difficult to resolve conflicts using ADR. The future EU Directive in Consumer Collective Redress aims to bring a new era to the field. In this paper, I s…
A Reference Scenario for IMS Strategic Design
1999
Today is fully acknowledged that manufacturing is a formidable competitive weapon. The strength of such a weapon is essentially defined during the first step of the design phase called strategic design. During this phase, in fact, the principal characteristics of the manufacturing systems are to be defined taking into account the competitive environment and the competition strategy. Classical analytical models for IMS design often neglect this aspect and, perhaps, this is one of the causes of IMS failure. The paper proposes a set of analytical models for strategic IMS design; they have been classified into four classes, each one pursuing a determined set of objectives, providing, in this wa…
Adaptative Network Topology for Data Centers
2016
Data centers have an important role in supporting cloud computing services (such as email, social networking, web search, etc.) enterprise computing needs, and infrastructure-based services. Data center networking is a research topic that aims at improving the overall performances of the data centers. It is a topic of high interest and importance for both academia and industry. Several architectures such as FatTree, FiConn, DCel, BCube, and SprintNet have been proposed. However, these topologies try to improve the scalability without any concerns about energy that data centers use and the network infrastructure cost, which are critical parameters that impact the performances of data centers…
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise
2015
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes …
Agile Deep Learning UAVs Operating in Smart Spaces: Collective Intelligence Versus “Mission-Impossible”
2017
The environments, in which we all live, are known to be complex and unpredictable. The complete discovery of these environments aiming to take full control over them is a “mission-impossible”, however, still in our common agenda. People intend to make their living spaces smarter utilizing innovations from the Internet of Things and Artificial Intelligence. Unmanned aerial vehicles (UAVs) as very dynamic, autonomous and intelligent things capable to discover and control large areas are becoming important “inhabitants” within existing and future smart cities. Our concern in this paper is to challenge the potential of UAVs in situations, which are evolving fast in a way unseen before, e.g., em…
Cyber Security for Wireless Semantic (SCADA/DCS) Systems
2016
International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …
Warehouse threats and loss prevention management in case of fire
2016
Abstract Warehouses play an important role when it comes to the reception, delivery and storage of various types of goods. Due to the complex scenarios that may occur, as well as the heterogeneous nature of goods, warehouses bear a higher risk of accidents. Regardless if we’re taking about removing hassle or standardizing operations we speak the same language: insuring efficiency and increased efficiency leads to smart cost maintenances. In the article hear by we will observe the behavior of different warehouse materials in the case of trigger fired. Starting from the results obtained during the low scale tests and completing the premises with the large scale experiment (warehouse scale), w…
Stop there’s water on the road! Identifying key beliefs guiding people’s willingness to drive through flooded waterways
2016
Floods are among the most widespread of natural disasters and exposure to floodwaters increases drowning risk. A leading cause of flood related drowning deaths is driving through flooded waterways. Drawing on the Theory of Planned Behaviour, a two-phased research program was conducted. Phase 1 (N = 25; Mage = 32.38, SD = 11.46) identified common beliefs about driving through a flooded waterway. Phase 2 (N = 174; Mage = 27.43, SD = 10.76) adopted a cross-sectional design to examine the belief predictors of drivers' willingness to drive through a flooded waterway. Given differences in consequences due to the depth of water, scenarios of low (road covered in 20 cm of water) and high (road cove…
Introduction to environmental security
2007
The term "Environmental Security" refers to a range of concerns that can be organized into three general categories: (1) concerns about the adverse impact of human activities on the environment, seen as an asset to be inherited by the next generations; (2) concerns about the direct and indirect effects of various forms of environmental change (especially scarcity and degradation), which may be natural or human-generated on national and regional security; (3) concerns about the loss of security individuals and groups (from small communities to humankind) experience due to environmental change such as water scarcity, air pollution, global warming, and so on. In order to provide sustainability…
Finland: Finnish Principal
2016
The presentation of principalship in Finland begins by giving an overall description of the Finnish education system and of the formal position of principals in Finland. The more detailed examination of the Finnish principal comprises two main sources. Both sources are reviews on research on principals in Finland in 2000–2010. The first one was conducted for the Swedish Research Council by Risku and Kanervio (Doctoral and regular research on principals in Finland 2000–2010. In: Johansson O (ed) Rektor – en forskningsoversikt 2000–2010 [Principal – a research report]. Vetenskapsradets rapportserie 4:161–186, 2011). The second one is a report by Alava et al. (Changing school management. Statu…