Search results for "SECURITY"

showing 10 items of 1693 documents

Review of detection, assessment and mitigation of security risk in smart grid

2017

The integration of Information and Communication Technology (ICT) into the existing power grid has created new problems to the grid. The grid network has become more vulnerable to security threats and risk which is a corollary to the modern data network. Smart Grid has strict latency requirement for data communication and the violation of this latency is very costly. This paper assesses the threats and vulnerabilities associated with the Smart Grid network and reviews the methods to mitigate these security risks.

Grid networkComputer sciencebusiness.industryAccess controlComputer securitycomputer.software_genreGridSmart gridInformation and Communications TechnologyMalwareRisk assessmentbusinesscomputerRisk management2017 2nd International Conference on Power and Renewable Energy (ICPRE)
researchProduct

Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

2019

Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…

pedagogical approachessähköinen arviointiresponsible research and innovationeducación superiorhenkilöllisyysauthorship verificationverificación de autoríae-assessmentidentitytekijyysAuditor's reportAuthentication4. Education05 social scienceseducació superior050301 educationelectronic authenticationPublic relationsAuthentication (law)Autentificación de documentosverifiointitodentaminenhigher educatione-authenticationThe InternetPsychologyautenticación electrónica050101 languages & linguisticsplagiointiHigher educationBest practiceCheatingData securityautenticacióEducationautenticación0501 psychology and cognitive sciencestietoturvaauthorshipcheating detectionbusiness.industrytrustInformation securityautenticació electrònicae-arviointiAutenticació de documentsverificació de l'autoriabusiness0503 educationarviointi
researchProduct

Stakeholders, contradictions and salience: An empirical study of a Norwegian G2G effort

2006

Author's version of a chapter in Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences. Also available from the publisher at http://dx.doi.org/10.1109/HICSS.2006.436 Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly complex settings, consisting of a variety of stakeholders promoting different and often conflicting objectives. Yet, few studies have explicitly addressed the inherent challenges of this complexity. This study focuses on the extent to which contradictory stakeholder objectives can help explain the relatively slow progress of …

National securityEmpirical researchbusiness.industryInformation and Communications TechnologyLocal governmentInformation systemEconomicsStakeholderStakeholder analysisVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Public relationsbusinessStakeholder theory
researchProduct

Psychosocial Risks, Work Engagement, and Job Satisfaction of Nurses During COVID-19 Pandemic

2020

Context:COVID-19 pandemic is a serious health emergency that has affected countries all over the world. Health emergencies are a critical psychosocial risk factor for nurses. In general, psychosocial risks constitute serious problems as they impact workers' health, productivity, and efficiency. Despite their importance, few studies analyze nurses' psychosocial risks during a health emergency caused by a pandemic or analyze their perception of the emergency and its relation to such risks.Objectives:To analyze the perception of COVID-19 by nurses, especially about measures, resources, and impact on their daily work. Also, to analyze these professionals' psychosocial risks and the relationship…

AdultMalework engagementgenetic structuresProtective factornurseContext (language use)WorkloadNursing Staff HospitalJob Satisfaction03 medical and health sciences0302 clinical medicineNursingRisk Factorspeak pandemicSurveys and Questionnaires0502 economics and businessHumansjob insecurity030212 general & internal medicineBurnout ProfessionalPandemicsOriginal ResearchSARS-CoV-2Work engagementlcsh:Public aspects of medicine05 social sciencesPublic Health Environmental and Occupational HealthCOVID-19Emotion workWorkloadpsychosocial riskslcsh:RA1-1270Risk factor (computing)Middle AgedSpainJob satisfactionFemalePublic HealthPsychologyPsychosocial050203 business & managementFrontiers in Public Health
researchProduct

A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki

2018

Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…

information securityInterface (Java)Computer scienceBusiness processmedia_common.quotation_subjectriskienhallinta02 engineering and technologyComputer securitycomputer.software_genretietämyksenhallintaBusiness continuitydesign science research020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringtietoturvakyberturvallisuusRisk managementmedia_commonbusiness.industryService design05 social sciencesInformation securityResilience (organizational)CountermeasurePsychological resiliencebusinesscomputer050203 business & management
researchProduct

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment

2023

Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and su…

cybersecuritytestbed security operations centerkyberturvallisuusoperational technologygovernance modelteollisuusyritykset
researchProduct

La rétention de sûreté : la première mesure de sûreté privative de liberté depuis le nouveau Code pénal‎

2015

The French criminal law is characterised by a willingness to prevent recidivism. To give concrete expression to this will, security measures are implemented among which the secure detention. However, the secure detention is not an ordinary measure and gives rises to many debates which, in fact, take up old and recurrent controversies. This measure is based on the assumption that sexual and/or violent criminals show a disease which may suggest a risk of a second offence. As a result, by considering them as sick persons, the legislator asserts that they can be treated. Accordingly, medical care is advised as the only solution to prevent a second offence. However, this disease itself often ind…

[SHS.DROIT] Humanities and Social Sciences/LawPersonality disorderPrivation de libertéCriminologyDangerousnessTrouble de la personnalitéMesure de sûreté[ SHS.DROIT ] Humanities and Social Sciences/LawSecure detentionCriminologiePerpétuité[SHS.DROIT]Humanities and Social Sciences/LawRecidivismSecurity measureDangerositéPronosticPerpetual measureRécidiveRétention de sûretéPredictionDeprivation of liberty
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct