Search results for "Computer security"

showing 10 items of 433 documents

Changes in mode of transportation to work or school from pre-pregnancy to early pregnancy in the Norwegian Fit for Delivery study

2015

Objective To describe changes in mode of transportation to work or school from pre-pregnancy to early pregnancy, to describe levels of physical activity related to mode of transportation to work or school, and to examine associations between changes in mode of transportation to work or school and educational level, body mass index (BMI) and age. Methods Between September 2009 and February 2013, 575 healthy pregnant nulliparous women were included into the Norwegian Fit for Delivery (NFFD) trial. At inclusion they reported their current and their pre-pregnancy mode of transportation to work or school. Data were analysed by multilevel mixed models with dichotomized modes of transportation as …

Gerontologyeducationlcsh:MedicinePoison controlHealth InformaticsPublic transportationNorwegianMET-scoreWalkingComputer securitycomputer.software_genreOccupational safety and healthIPAQPregnancyInjury preventionmedicineActive transportationskin and connective tissue diseasesPregnancyCommutingPhysical activitylcsh:RPublic Health Environmental and Occupational HealthHuman factors and ergonomicsRegular Articlemedicine.diseaselanguage.human_languagePrivate transportationWork (electrical)Bikinglanguagesense organsPsychologyBody mass indexcomputerPreventive Medicine Reports
researchProduct

The Design of an Infrastructure for Technology Transfer in Southern Italy - Role of Regional Institutions

1979

Abstract This paper coordinates and integrates the interventions of Proff. G. LO GIUDICE and A. ROMANO, included in the conference programme. It starts mainly from the socio-economical system of Southern Italy, and it consists in the following main points: - analysis of the system features to be interconnected for the development of an infrastructure for developing technological transfer; - ways of understanding the suitability of technologies for Southern Italy; - a proposal for a macro-organizational model for the development of an infrastructure aiming at the technological transfer; - pointing out the role of the”Regioni” and of the direct Government interventions in the innovative proce…

GovernmentEngineeringbusiness.industrymedia_common.quotation_subjectPrincipal (computer security)Regional scienceTechnology transferOperations managementbusinessDutymedia_commonIFAC Proceedings Volumes
researchProduct

THE DESIGN OF AN INFRASTRUCTURE FOR TECHNOLOGY TRANSFER IN SOUTHERN ITALY– ROLE OF REGIONAL INSTITUTIONS

1980

This paper coordinates and integrates the interventions of Proff. G. LO GIUDICE and A. ROMANO, included in the conference programme. It starts mainly from the socio-economical system of Southern Italy, and it consists in the following main points: - analysis of the system features to be interconnected for the development of an infrastructure for developing technological transfer; - ways of understanding the suitability of technologies for Southern Italy; - a proposal for a macro-organizational model for the development of an infrastructure aiming at the technological transfer; - pointing out the role of the “Regioni” and of the direct Government interventions in the innovative processes. (I…

GovernmentPolitical sciencemedia_common.quotation_subjectPrincipal (computer security)Technology transferRegional scienceDutymedia_common
researchProduct

Trends in government communication in The Netherlands

2008

PurposeThe purpose of this paper is to provide a current state of the art of government communication in The Netherlands which can help to promote a dialogue about how communication quality in this field can be improved further.Design/methodology/approachIn 2006 a survey was conducted for the second time to trace the communication trends in ministries, provinces, municipalities and water boards. The survey was set up in association with sector representatives and it is implemented every two years. The respondents were the top manager and the communication managers of all organisations in the four public sectors. The questionnaire was answered online and the response was 33 per cent.Findings…

Governmentbusiness.industryStrategy and ManagementCommunicationmedia_common.quotation_subjectPrincipal (computer security)Public sectorgovernmentAlankomaatThe NetherlandsPublic relationsOptimismAction (philosophy)State (polity)SociologyMarketingbusinessCommunication qualitySet (psychology)hallitusmedia_commonviestintä
researchProduct

Review of detection, assessment and mitigation of security risk in smart grid

2017

The integration of Information and Communication Technology (ICT) into the existing power grid has created new problems to the grid. The grid network has become more vulnerable to security threats and risk which is a corollary to the modern data network. Smart Grid has strict latency requirement for data communication and the violation of this latency is very costly. This paper assesses the threats and vulnerabilities associated with the Smart Grid network and reviews the methods to mitigate these security risks.

Grid networkComputer sciencebusiness.industryAccess controlComputer securitycomputer.software_genreGridSmart gridInformation and Communications TechnologyMalwareRisk assessmentbusinesscomputerRisk management2017 2nd International Conference on Power and Renewable Energy (ICPRE)
researchProduct

Policing and Site Protection, Guard Posts, and Enclosure Walls

2015

Guard (information security)Engineeringbusiness.industryEnclosureForensic engineeringbusinessComputer securitycomputer.software_genrecomputer
researchProduct

IT-Sicherheit in medizinischen Netzen - aktuelle Probleme und Lösungsansätze

2000

Designers and users of medical networks have to face strong requirements for data protection and security. Professional discretion and data protection laws allow the transfer of or access to patient data only in a therapeutic context. These data should also be protected from the network provider. Patients should be safe from any harm by faulty data or buggy procedures. On the other hand the security of the most used software products gets worse and worse. The use of the internet endangers more and more the integrity of the user's computer. The security requirements can be met only through strict care in planning, building, and configuring the infrastructure. Some concrete recommendations an…

Guiding Principlesbusiness.industrymedia_common.quotation_subjectObstetrics and GynecologyContext (language use)DiscretionComputer securitycomputer.software_genreSoftwareHarmHealth careMedicineData Protection Act 1998The Internetbusinesscomputermedia_commonZentralblatt für Gynäkologie
researchProduct

The Press Coverage of Celebrity Suicide and the Development of Suicide Frequencies in Germany

2014

The existence of the so-called "Werther effect" is well confirmed, and there are several recommendations on how the media should (not) report suicide to minimize the risk of copycat behavior. Unfortunately, very little is known about how suicide is actually reported. The article examines the German press coverage of six celebrity suicides with respect to compliance with guidelines on suicide reporting and analyzes changes in suicides in the wake of the reporting. It concludes that German media do not respect the recommendations in a substantial number of their articles. In addition, a significant increase in suicides and similar suicides is found.

Health (social science)Famous Personsbusiness.industryCommunicationHuman factors and ergonomicsPoison controlCriminologyComputer securitycomputer.software_genreSuicide preventionOccupational safety and healthlanguage.human_languageCompliance (psychology)GermanSuicideGermanyCopycatInjury preventionlanguageHumansMedicineMass MediabusinesscomputerHealth Communication
researchProduct

Chemistry in Crime Investigation: Sodium Percarbonate Effects on Bloodstains Detection

2011

Chemistry plays a leading role in crime investigation. In the study of bloodstains, chemical reactions provide the means for the detection. All these procedures have been thoroughly studied. However, recently, a new source of error has been found: washing stains with "active oxygen" detergents abrogates presumptive and human hemoglobin tests for bloodstains (although visible). The aim of this investigation was to evaluate the ability of pure sodium percarbonate-main component of detergents-to abrogate presumptive and human hemoglobin tests. Then, a solution to this problem could be found. The results demonstrate that pure sodium percarbonate-itself-is able to abrogate all tests, as well as …

Hemoglobin testsChromatographyForensic chemistryBlood StainsPoison controlSodium percarbonateComputer securitycomputer.software_genreCrime investigationStainPathology and Forensic MedicineActive oxygenchemistry.chemical_compoundchemistryGeneticscomputerJournal of Forensic Sciences
researchProduct

Deployment of a WLCG network monitoring infrastructure based on the perfSONAR-PS technology

2014

The WLCG infrastructure moved from a very rigid network topology, based on the MONARC model, to a more relaxed system, where data movement between regions or countries does not necessarily need to involve T1 centres. While this evolution brought obvious advantages, especially in terms of flexibility for the LHC experiment's data management systems, it also opened the question of how to monitor the increasing number of possible network paths, in order to provide a global reliable network service. The perfSONAR network monitoring system has been evaluated and agreed as a proper solution to cover the WLCG network monitoring use cases: it allows WLCG to plan and execute latency and bandwidth te…

HistoryEngineeringbusiness.industryPerfSONARDistributed computingData managementNetwork monitoringNetwork topologyComputer securitycomputer.software_genreComputer Science ApplicationsEducationSoftware deploymentNetwork serviceUse casebusinesscomputerGraphical user interfaceJournal of Physics: Conference Series
researchProduct