Search results for "Event management"

showing 10 items of 14 documents

Event Management and Terrorism in a Global Order

2020

Over the recent years, the public spectacle and media events have become fertile grounds for terrorist attacks. Particularly, media events play a leading role enhancing the social cohesion as well as revitalizing the psychological frustrations that happened during the working days. Paradoxically, terrorism needs to maximize its gains while the costs are minimized. The spectacularisation tourism and events offer a double-edge sword. The same attractiveness that makes global cities a safer place to live are employed by the terrorist cells to cause chaos and uncertainty. The chapter theoretically explores the difficult interrelation between terrorism and event management as well as the concept…

021110 strategic defence & security studiesOrder (business)Political science0502 economics and business05 social sciencesTerrorism0211 other engineering and technologies02 engineering and technologyComputer securitycomputer.software_genrecomputer050212 sport leisure & tourismEvent management
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Refining sorafenib therapy: lessons from clinical practice

2015

ABSTRACT  Understanding the best use of sorafenib is essential in order to maximize clinical benefit in hepatocellular carcinoma. Based on Phase III and noninterventional study data, as well as our extensive experience, we discuss dose modification in order to manage adverse events, disease response evaluation and how to maximize treatment benefit. Sorafenib should be initiated at the approved dose (400 mg twice daily) and reduced/interrupted as appropriate in order to manage adverse events. Dose modification should be considered before discontinuation. Appropriate tumor response assessment is critical. Focusing on radiologic response may result in premature sorafenib discontinuation; symp…

Cancer ResearchSettore SECS-P/06 - Economia ApplicataAntineoplastic AgentAge FactorChild–Pugh Bpostprogression treatmentresponse assessmentdose modificationClinical Trials as TopicLiver Neoplasmsadverse event managementAge FactorsChild-Pugh Bpostprogression treatmenthepatocellular carcinomaGeneral MedicinePrognosisadverse event management; child–Pugh B; dose modification; elderly hepatocellular carcinoma; mRECIST; postprogression treatment; eal-world data; response assessment; sorafenibelderly hepatocellular carcinomaCombined Modality Therapychild–Pugh BClinical PracticeTreatment OutcomeOncologyLiver Neoplasmeal-world dataHepatocellular carcinomaadverse event managementRetreatmentDisease Progressiondose modificationHumanmedicine.drugPhenylurea CompoundNiacinamideSorafenibmedicine.medical_specialtyCarcinoma HepatocellularDisease ResponsePrognosielderly hepatocellular carcinomaProtein Kinase InhibitorAntineoplastic AgentsmRECISTelderlymRECISTAdverse event management Child–Pugh B dose modification elderly hepatocellular carcinoma mRECIST postprogression treatment real-world data response assessment sorafenibmedicineChild–Pugh BHumansCombined Modality TherapyIntensive care medicineAdverse effectProtein Kinase InhibitorsDose Modificationreal-world databusiness.industryPhenylurea Compoundsmedicine.diseaseDiscontinuationSurgeryreal-world dataresponse assessmentsorafenibbusinessFuture Oncology
researchProduct

Introduction to Emerging Risks and Systemic Concerns in Information Security Research and Applications Minitrack

2013

Critical security studiesCloud computing securityKnowledge managementCertified Information Security Managerbusiness.industryStandard of Good PracticeInformation securityComputer securitycomputer.software_genreSecurity information and event managementInformation security managementSecurity managementBusinesscomputer2013 46th Hawaii International Conference on System Sciences
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

Aligning Two Specifications for Controlling Information Security

2014

Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in…

Information Systems and ManagementComputer Networks and Communicationsinformation securitysecurity specification alignmentComputer securitycomputer.software_genreSecurity information and event managementInformation security auditKATAKRIsecurity managementSafety Risk Reliability and Qualitysecurity audit criteriaInformation security management systemta113Certified Information Security ManagerInformation securitySecurity controlsISO/IEC 27001ISO/IEC 27002ITIL security managementRisk analysis (engineering)Security servicesecurity cerificationHardware and ArchitectureBusinessSafety ResearchcomputerSoftwaresecurity controls
researchProduct

Identity and Access Management for Remote Maintenance Services in Business Networks

2007

Access to information systems across corporate boundaries with high demands to privacy and trust result into ambitious research and development targets. This study provides motivation and a roadmap for approaching integrated security management solutions in a business network of partners with heterogeneous ICT and security infrastructures. We aim at describing specifics of identity and access management in inter-organizational collaboration, and a vision and arguments for identity and access management in a business network. A case study with Metso Paper, Inc., the leading manufacturer of paper machinery and related services, validates the results, thus providing a motivating example of the…

Information managementKnowledge managementbusiness.industryData managementBusiness networkingSecurity managementBusinessDigital firmSecurity information and event managementIdentity managementBusiness relationship management
researchProduct

Information Security and Privacy in Medical Application Scenario

2010

This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.

Information privacyCloud computing securityPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreSecurity information and event managementInformation sensitivityInformation security managementbusinessPersonally identifiable informationcomputer
researchProduct

Managing information security in a business network of machinery maintenance services business – Enterprise architecture as a coordination tool

2007

Today, technologies enable easy access to information across organizational boundaries, also to systems of partners in business networks. This raises, however, several complex research questions on privacy, information security and trust. The study reported here provides motivation and a roadmap for approaching integrated security management solutions in a business network of partners with heterogeneous information and communication technologies (ICT): Systems, platforms, infrastructures as well as security policies. Enterprise architecture (EA) is proposed as a means for comprehensive and coordinated planning and management of corporate ICT and the security infrastructure. The EA approach …

Knowledge managementbusiness.industrySherwood Applied Business Security ArchitectureBusiness system planningEnterprise architectureInformation securityEnterprise information security architectureSecurity information and event managementInformation security managementHardware and ArchitectureBusiness architecturebusinessSoftwareInformation SystemsJournal of Systems and Software
researchProduct

Analysis of dynamic service oriented systems for security related problems detection

2017

The paper presents an approach to solve some problems arising in the management process of IT security. Our motivation of this research is to study in every detail the context of service oriented systems, which can be defined as considerable heterogeneous, dynamic and flexible configuration of the hardware and software system resources. The fundamental difference between security management systems with traditional centralized and monolithic architecture and service oriented systems is discussed. We propose a multilayered-reference model for service-oriented systems aimed predominantly at principal objectives related to IT based systems security working in dynamic environments. Likewise, co…

Security engineeringCloud computing securitysecurity incidentsSecurity serviceSoftware security assuranceComputer scienceDistributed computingSherwood Applied Business Security Architecturesecurity levelSecurity managementservice oriented systemsComputer security modelSecurity information and event management
researchProduct