Search results for "Security policy"

showing 10 items of 46 documents

Security Management in Electronic Health Records: Attitudes and Experiences Among Health Care Professionals

2018

Electronic health records play an important role for management, exchange and storage of information within health care organizations. Health care organizations are obliged to adopt strategies for information security and privacy associated with access to medical and sensitive information, but at the same time, the information needs to be available for authorized health care professionals carrying out patient treatment. This paper presents a study about attitudes and experiences among health care professionals towards security management in electronic health records. Qualitative research methods were used, with an initial literature review that was followed by observations and interviews wi…

020205 medical informaticsbusiness.industryAccess controlInformation needs02 engineering and technologyInformation securitySecurity policyInformation sensitivityNursingHealth care0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSecurity managementBusinessQualitative research2018 International Conference on Computational Science and Computational Intelligence (CSCI)
researchProduct

Usability and Trust in E-Banking

2007

This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n=104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. © Psychological Reports 200…

AdultMaleSettore M-PSI/01 - Psicologia GeneraleEconomicse-banking e-banking servicesInternet privacyTrustSecurity policyRisk AssessmentUser groupHumansStudentsWeb usabilityComputer SecurityGeneral PsychologyInternetAttitude to Computersbusiness.industryData CollectionFraudE bankingUsabilityItalyInstitution (computer science)FemalePsychologybusinessPsychological Reports
researchProduct

Characteristics and Measures for Mobile-Masquerader Detection

2006

Personal mobile devices, as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by an unintended person may result in a severe security incident concerning private or corporate data and services. Organizations develop their security policy and mobilize preventive techniques against unauthorized use. Current solutions, however, are still breakable and there still exists strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define what measures to monitor.

Computer scienceFunctional abilitiesSubstitution (logic)Computer securitycomputer.software_genreSecurity policycomputerMobile device
researchProduct

Resilience, security and the politics of processes

2014

The prominence of resilience thinking in contemporary governance and security policies has received increasing critical attention. By engaging in dialogue with some of these recent critiques, predominantly leaning on biopolitics or neoliberal governmentality, this article develops an Arendtian reading of resilience as a temporal regime of processuality. Originating from life sciences such as ecology and complexity thinking, the increasingly malleable resilience discourse privileges the functioning of societal life processes over political action and human artifice. The article argues that this ‘rule of nobody’ is in danger of suffocating the concept of public space, so crucial for politics …

Corporate governanceEnvironmental ethicsSecurity policynobodyPoliticsPublic spacePolitical scienceta517General Earth and Planetary SciencesSocial scienceResilience (network)BiopowerGeneral Environmental ScienceGovernmentalityResilience
researchProduct

Beyond material factors? Identity, culture and the foreign and security policy of the EU

2015

The evolution of European integration in the field foreign, security and defence policy and the coordination practices established by EU member states cannot be fully explained by looking at material factors only. The chapter adds to the picture the importance of identity, and, in particular, the we-feeling typical of belonging to a security community and security culture in the evolution of the practices adopted for the international projection of the EU and its member states. In consideration of the importance that support to the UN has acquired since the 2003 ESS, both as a strategic priority and as a constitutive element of the EU identity, the chapter focuses on the coordination practi…

EU foreign and security policyEU member states cohesionUN General Assemblysecurity cultureSettore SPS/04 - Scienza Politicaidentity
researchProduct

The European Union’s Development Policy: A Balancing Act between ‘A More Comprehensive Approach’ and Creeping Securitization

2016

More than a decade after the release of the European Security Strategy (ESS) in 2003, its affirmation that development and security policy should work together is still one of its most discussed features. The vision of a more comprehensive — if not integrated — approach to security and development was underwritten by substantial changes to the EU’s external relations bureaucracy following the 2009 Lisbon Treaty. This ambition raises several important questions regarding the potential ‘securitization’ of EU development policy and foreign aid. Have security concerns had a growing influence on EU development policy and aid allocation? Do key concepts that have become prominent since the ESS wa…

EconomyPolitical sciencePolitical economymedia_common.cataloged_instanceSecuritizationSocioeconomic developmentFragile stateTreatyEuropean unionSecurity policyInternational developmentEuropean Security Strategymedia_common
researchProduct

A Century with the Same Problem - Similar but still Different Solutions? : Four perspectives on the security policies of Finland and Estonia during t…

2020

EstoniaVirosecurity policyBaltian maatSuomiItämeren alueBaltic Sea Regionkansainväliset suhteetgeopolitiikkaFinlandgeopolitics international relationsturvallisuuspolitiikka
researchProduct

State of the Art in Information Security Policy Development

2020

Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an o…

General Computer ScienceComputer scienceliterature reviewmedia_common.quotation_subjectContext (language use)Sample (statistics)02 engineering and technologyOutcome (game theory)information security policyconcept definitionState (polity)development method0202 electrical engineering electronic engineering information engineeringtietoturvaFunction (engineering)media_commonComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSpolicy developmenttietoturvapolitiikka020206 networking & telecommunicationsSubject (documents)kehittäminenInformation securityData scienceTerm (time)Information security policy020201 artificial intelligence & image processingLawkäsiteanalyysi
researchProduct

A framework for behavior-based detection of user substitution in a mobile context

2007

Personal mobile devices, such as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by unintended persons may result in severe security breaches concerning private or corporate data and services. Organizations develop their security policy and employ preventive techniques to combat unauthorized use. Current solutions, however, are still breakable and there is a strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define the measures to be monitored. In this paper, a structured conceptual framework for mobile-user substitution detection is proposed.…

General Computer ScienceComputer sciencemedia_common.quotation_subjectUser modelingSubstitution (logic)Computer user satisfactionIntrusion detection systemComputer securitycomputer.software_genreSecurity policyUser interface designHuman–computer interactionPersonalityLawcomputerMobile devicemedia_commonComputers & Security
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct