Search results for "Computer security"

showing 10 items of 433 documents

Indicadores para la Evaluación de las Instituciones Universitarias: Validación a través del Método Delphi

2012

Artículo distribuido bajo una licencia de uso y distribución “Creative Commons Reconocimiento-No Comercial 3.0 España”.

higher education institutionsKnowledge managementHigher educationProcess (engineering)Delphi methodDelphi methodUniversitatsLibrary and Information SciencesBibliography. Library science. Information resourcesindicator systemsProfessional literaturemétodo DelphiEvaluationMétodo delphievaluationEvaluaciónbusiness.industryHigher education institutionsPrincipal (computer security)instituciones de educación superiorevaluaciónsistemas de indicadoreslcsh:ZManagementlcsh:Bibliography. Library science. Information resourcesIdentification (information)Sistemas de indicadoresIndicator systemsAvaluació educativabusinessPsychologyKnowledge transferInstituciones de educación superiorZ
researchProduct

A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki

2018

Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…

information securityInterface (Java)Computer scienceBusiness processmedia_common.quotation_subjectriskienhallinta02 engineering and technologyComputer securitycomputer.software_genretietämyksenhallintaBusiness continuitydesign science research020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringtietoturvakyberturvallisuusRisk managementmedia_commonbusiness.industryService design05 social sciencesInformation securityResilience (organizational)CountermeasurePsychological resiliencebusinesscomputer050203 business & management
researchProduct

Reporting in Conflict Zones in Pakistan: Risks and Challenges for Fixers

2020

As a backbone of reporting in war and conflicts, fixers offer essential assistance to the foreign correspondent in conflict zones, also in Pakistan. With valuable local knowledge and contacts, fixers can arrange travel to secure entry of foreign correspondents into conflict zones in addition to securing interviews with otherwise unattainable figures, while offering reliable translation services. Pakistani media, despite being one of the largest and most developed in South Asia, remains under the strict control of powerful military establishment and government, while seeming to mirror the overarching government sentiment with a distinct lack of research-based news. Challenging this state of …

journalistmedia_common.quotation_subjectSüdasien050801 communication & media studiesState of affairspolitischer KonfliktjournalismsecurityPublic administrationSouth AsiaAsset (computer security)Enthüllungsjournalismusddc:070lcsh:Communication. Mass media0508 media and communicationsState (polity)foreign correspondentCommunicator Research JournalismPolitical sciencepolitical conflict050602 political science & public administrationconflict zonesPakistanAuslandskorrespondentmedia_commonNews media journalism publishingfixersBerichterstattungGovernmentreportingpakistansensationalist journalismCommunication05 social sciencesSensationalismCensorshipIslamVDP::Samfunnsvitenskap: 200::Medievitenskap og journalistikk: 310Kommunikatorforschung Journalismuslcsh:P87-960506 political scienceSicherheitJournalismPublizistische Medien JournalismusVerlagswesen
researchProduct

Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach

2021

Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and are used for testing a systems security before or after implementation, and such testing is carried out against the existing system. Threat modeling however focuses on the early stages of the system design when it is feasible and easy to fix security-related flaws and prevent possible damage caused by them. For example, STRIDE is one very popular threat modeling framework. A STRIDE threat modelling specialist deals with abstract categorizations o…

järjestelmäsuunnittelucybersecurityComputer scienceVulnerabilitySTRIDETK5101-6720cveComputer securitycomputer.software_genrethreat lifecyclestrideSoftwaretietokannattietoturvakyberturvallisuushaavoittuvuusweaknessesvulnerabilitiesScope (project management)business.industrytietokoneohjelmatTechnological innovationcwemapping automationohjelmistosuunnitteluSystems development life cycleTask analysisThreat modelTelecommunicationTask analysisManualsSystems designthreat modellingmallit (mallintaminen)ohjelmistokehitysbusinessEstimationcomputervulnerability lifecycleSoftware2021 29th Conference of Open Innovations Association (FRUCT)
researchProduct

Cyber deterrence and Russia’s active cyber defense

2020

kybersodankäyntisotilasstrategiacyber deterrencestrategic cultureComputer securitycomputer.software_genreRussiaCyber defenseVenäjäactive cyber defensePolitical scienceDeterrence (psychology)infrastruktuuritkyberturvallisuuscomputerturvallisuuspolitiikka
researchProduct

Cartesian Psychology – Could There Be One?

2008

The chapter examines what it would mean to talk about “psychology” in Descartes’ terms and argues that within the Cartesian framework we cannot really formulate the questions that are posed by contemporary psychologists. This results from the fact that psychological topics can be found on all three levels of Cartesian science: in metaphysics, in physics and finally in the applied sciences, such as medicine and morals. The aim is to show that the sensory and vegetative functions are often taken together by Descartes. Therefore, the Cartesian system does not recognize any principal difference between sensory functions, such as vision, and vegetative functions, such as digestion. Humans can be…

lawmedia_common.quotation_subjectInterpretation (philosophy)Principal (computer security)Sensory FunctionsMetaphysicsCartesian coordinate systemFunction (engineering)SoulPsychologymedia_commonlaw.inventionEpistemology
researchProduct

Terrorism, homeland safety and event management

2014

As the last attacks on Boston showed terrorism is based not only on speculation but also on surprise. Terrorists do not want to destroy or to kill everybody, their goal is aimed to inflict and administrate fear to the witnesses. The fact is that tourism and mega-events represented a fertile source to perpetrate terrorist attacks, not only for the casualties but also by the psychological effects on citizenry. This paper explores the nature of terrorism in the context of leisure as well as proposing a valid model to understand the connection among tourism, event management and terrorism.

media_common.quotation_subjectHomelandContext (language use)CriminologyComputer securitycomputer.software_genreEvent managementSurprisePolitical scienceTerrorismSpeculationcomputerTourismmedia_commonInternational Journal of Hospitality and Event Management
researchProduct

Artificial intelligence: the unstoppable revolution in ophthalmology.

2020

Artificial Intelligence (AI) is an unstoppable force that is starting to permeate all aspects of our society as part of the revolution being brought into our lives (and into medicine) by the digital era, and accelerated by the current COVID-19 pandemic. As the population ages and developing countries move forward, AI-based systems may be a key asset in streamlining the screening, staging, and treatment planning of sight-threatening eye conditions, offloading the most tedious tasks from the experts, allowing for a greater population coverage, and bringing the best possible care to every patient. This paper presents a review of the state of the art of AI in the field of ophthalmology, focusin…

medicine.medical_specialtyCoronavirus disease 2019 (COVID-19)Digital eraComputer sciencePopulationAsset (computer security)Field (computer science)03 medical and health sciences0302 clinical medicineArtificial IntelligenceOphthalmologymedicineHumanseducationPandemicseducation.field_of_studybusiness.industrySARS-CoV-2Infant NewbornCOVID-19GlaucomaImage enhancementOphthalmology030221 ophthalmology & optometryArtificial intelligenceApplications of artificial intelligencebusiness030217 neurology & neurosurgeryStrengths and weaknessesSurvey of ophthalmology
researchProduct

Expectations and Experiences of Implementing a Mobile Secure Communication Application

2020

The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…

organisaatioviestintäComputer Networks and CommunicationsComputer scienceStrategy and Managementorganisaatiot02 engineering and technologyComputer securitycomputer.software_genresovellusohjelmatManagement Information SystemsSecure communicationmobiililaitteet020204 information systems0502 economics and businessyksityisyys0202 electrical engineering electronic engineering information engineeringodotuksetmobiilisovelluksettietoturvaviestintäMarketingbusiness.industryturvallisuus05 social sciencesComputer Science Applicationstietoliikennekokemukset050211 marketingbusinesscomputer
researchProduct

Cyber security exercise : Literature review to pedagogical methodology

2019

This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future a new model for teaching in cyber security exercises. Cyber security exercises are the major service at JYVSECTEC - Jyväskylä Security Technology, cyber security research, training and development center in Finland [1]. JYVSECTEC Cyber security exercises are executed in real life simulation environment, RGCE (Realistic Global Cyber Environment) [1]. It provides the same functionality as the real Internet, but it is isolated from the real Internet and fully controlled by JYVSE…

pelillistäminensimulation pedagogyexercisegame based learningsimulaatioharjoitteluharjoituksetSociologyyhteisöllinen oppiminenComputer securitycomputer.software_genrekyberturvallisuuscomputer
researchProduct