Search results for "Other"

showing 10 items of 12132 documents

The privatization of death: the emergence of private cemeteries in Romania’s postsocialist deathscape

2020

Private cemeteries constitute a new development in the Romanian postsocialist death system that poses a challenge to the traditional burial culture. This paper charts the emergence of privately own...

021110 strategic defence & security studiesHistoryRomanian05 social sciences0211 other engineering and technologies02 engineering and technologylanguage.human_language0506 political scienceChurch-state relationsPolitical sciencePolitical Science and International Relations050602 political science & public administrationlanguageEconomic historySoutheast European and Black Sea Studies
researchProduct

Proper Incentives for Proper IT Security Management _ A System Dynamics Approach

2017

021110 strategic defence & security studiesIncentive0211 other engineering and technologies0202 electrical engineering electronic engineering information engineeringEconomics020201 artificial intelligence & image processing02 engineering and technologyIndustrial organizationSystem dynamicsProceedings of the 50th Hawaii International Conference on System Sciences (2017)
researchProduct

Committee Parliamentary Specialization Index. Explaining MPs’ specialisation in the Spanish Congreso de los Diputados

2019

Nowadays legislatures are largely based on committee systems. This enables a division of work and specialisation, in the context of highly complex politics and policy development. It seems clear that MP specialisation in the field of the committee they serve on is an important political asset, both for MPs and their parliamentary party group. This paper presents the Committee Parliamentary Specialization Index. This index measures the degree an MP is specialised in the jurisdiction of the committee they serve on. In the second part of the paper, the index is applied to the Spanish Congreso de los Diputados, an interesting case for testing this multi-faceted index, to find institutional, pol…

021110 strategic defence & security studiesIndex (economics)Division of workJurisdiction05 social sciences0211 other engineering and technologiesContext (language use)Legislature02 engineering and technologyPublic administration0506 political sciencePoliticsPolitical sciencePolitical Science and International RelationsSpecialization (logic)050602 political science & public administrationAsset (economics)LawThe Journal of Legislative Studies
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

Automated Dental Identification with Lowest Cost Path-Based Teeth and Jaw Separation

2016

Abstract Teeth are some of the most resilient tissues of the human body. Because of their placement, teeth often yield intact indicators even when other metrics, such as finger prints and DNA, are missing. Forensics on dental identification is now mostly manual work which is time and resource intensive. Systems for automated human identification from dental X-ray images have the potential to greatly reduce the necessary efforts spent on dental identification, but it requires a system with high stability and accuracy so that the results can be trusted. This paper proposes a new system for automated dental X-ray identification. The scheme extracts tooth and dental work contours from the X-ray…

021110 strategic defence & security studiesK5000-5582business.industrySeparation (aeronautics)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologyAnatomyDental identificationpath-findinghuman dental identificationCriminal law and procedurestomatognathic diseasesstomatognathic systemSocial pathology. Social and public welfare. CriminologyPath (graph theory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessHV1-9960Scandinavian Journal of Forensic Science
researchProduct

Building Resilience Through Effective Disaster Management

2017

Existing literature argues that taking a holistic approach to disaster management is important for organizations in building resilience. Theoretical underpinnings to achieve a holistic understanding, however, is lacking. This article applies the notion of an ecosystem as a holistic lens to understand complex disaster management. The paper reports two case studies from Japan and Nepal to illustrate how an ecosystem works during a disaster. The theoretical framework of information ecology is used in analyzing the cases. Based on the findings, the study shows three interconnected mechanisms that can build resilience of an ecosystem in a disaster management context, namely (1) coevolution, (2) …

021110 strategic defence & security studiesKnowledge managementEmergency managementbusiness.industry05 social sciencesPerspective (graphical)0211 other engineering and technologies02 engineering and technologyInformation ecology0502 economics and businessSociologybusinessResilience (network)Environmental planningComputingMilieux_MISCELLANEOUS050203 business & managementInternational Journal of Information Systems for Crisis Response and Management
researchProduct

The politics of Argentina today: human rights and Kirchnerismo

2016

After the effects of bloody dictatorship that whipped the region, Argentina as many other Latin American countries experienced a great trauma which not only altered the ways politics was lived, but also undermined the social trust of citizens respecting to their institutions. The rise of Kirchneristes and Kirchnerismo post stock and market crisis of 2001, initiated a new age in Argentina. Kirchnerismo opened the doors for the vindication of many claims of human rights organisations, but at the same time, the discourse of human rights was adjusted to the interests of Cristina Kirchner and her followers. As a result of this, the cause of human rights allowed government to produce a new way of…

021110 strategic defence & security studiesLatin AmericansHuman rightsmedia_common.quotation_subject0211 other engineering and technologies021107 urban & regional planning02 engineering and technologyDictatorshipPoliticsPolitical economyLawSociologySocial trustStock (geology)media_commonInternational Journal of Human Rights and Constitutional Studies
researchProduct

Understanding the Importance of Proper Incentives for Critical Infrastructures Management – How System Dynamics Can Help

2016

International audience; Computer and information systems are now at the core of numerous critical infrastructures. However, their security management is by far not a trivial issue. Further, these systems, by their very nature, belong to the domain of complex systems, where system dynamics (SD) is an established method, which aims at modelling such systems, their analysis and understanding. Further, on this basis it enables simulation of various policies to properly manage complex systems. More precisely, through understanding of the basic elements of the whole mosaic and their interplay, proper incentives can be tested. And this is important, because proper incentives can lead to the desire…

021110 strategic defence & security studiesManagement sciencebusiness.industry020209 energy0211 other engineering and technologiesComplex systemModeling and simulation02 engineering and technologyDomain (software engineering)System dynamicsManagementModeling and simulationCritical infrastructuresIncentiveRisk analysis (engineering)0202 electrical engineering electronic engineering information engineeringInformation systemSecurity managementThe Internet[INFO]Computer Science [cs]BusinessPolicies
researchProduct

Terrorism communication : characteristics and emerging perspectives in the scientific literature 2002–2011

2013

This paper aims to clarify current knowledge on the contribution of communication to crisis management in the case of terrorism incidents. This is done by means of a systematic review of the scientific literature on terrorism communication over the last 10 years to identify the many challenges facing communication in such crises, and represents the first attempt of its kind. To date, within the literature on terrorism communication, much attention has been paid to chemical, biological, radiological or nuclear hazards. Terrorism crises are complex and challenging. Preparedness for such diverse low-probability high-impact crises can best be included in a wider educative approach. Terrorism cr…

021110 strategic defence & security studiesManagement sciencebusiness.industry05 social sciences0211 other engineering and technologieskriiisiviestintä050801 communication & media studies02 engineering and technologyScientific literatureCrisis managementterrorismManagement Monitoring Policy and LawPublic relations16. Peace & justicekriisiviestintäManagement Information Systems0508 media and communicationsterrorismiPreparednessPolitical scienceTerrorismbusinesscrisis communication
researchProduct