Search results for "Security policy"
showing 10 items of 46 documents
Security Management in Electronic Health Records: Attitudes and Experiences Among Health Care Professionals
2018
Electronic health records play an important role for management, exchange and storage of information within health care organizations. Health care organizations are obliged to adopt strategies for information security and privacy associated with access to medical and sensitive information, but at the same time, the information needs to be available for authorized health care professionals carrying out patient treatment. This paper presents a study about attitudes and experiences among health care professionals towards security management in electronic health records. Qualitative research methods were used, with an initial literature review that was followed by observations and interviews wi…
Security Implications of Using Third-Party Resources in the World Wide Web
2018
Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…
State of the Art in Information Security Policy Development
2020
Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an o…
Foreign and Security Policy
2015
In early 2014 the foreign and security policy discourse in the Baltic region was transformed as a resurgent and assertive Russia annexed Crimea and launched covert operations in eastern Ukraine.1 Observers were quick to point out that events in Ukraine eerily paralleled the 1940 occupation of the Baltic states. The traditional security concerns about Russian intentions in the region that the Baltic states had increasingly suppressed over the previous 20 years once again rushed to the surface. The post-existential era of Baltic foreign and security policy that had marked the decade that followed accession to the EU and NATO seemed to have come to an end.
Securing Peace : article 9 and security policy under Koizumi Junichiro and Abe Shinzo
2016
Tarkastelen maisterintutkielmassani Japanin perustuslain sodan ja sotajoukkojen kieltävää 9. pykälää sekä Japanin turvallisuuspolitiikkaa kahden japanilaisen pääministerin, Koizumi Junichiron ja Abe Shinzon, puheissa. Tutkimuksen tehtävänä on selvittää, miten Koizumi ja Abe perustelevat 9. pykälän tulkinnan ja turvallisuuspolitiikan muutoksia heidän kausillaan sekä verrata tästä syntyviä tuloksia. Tutkimukseni monipuoliseen teoreettiseen viitekehykseen kuuluvat turvallisuus, kansainvälinen yhteisö, utopia ja realismi, rauha sekä retoriikka. Aineiston muodostaa rajattu määrä Koizumin ja Aben puheita, jotka olen valinnut käytyäni puheita läpi laajemmin. Tutkimuksen tulokset osoittavat, että J…
Constraints validation in privacy-preserving attribute-based access control
2015
Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.
ViSPE: A Graphical Policy Editor for XACML
2015
In this paper we present the Visual Security Policy Editor (ViSPE), a policy-maker-friendly graphical editor for the eXtensible Access Control Markup Language (XACML). The editor is based on the programming language Scratch and implemented in Smalltalk. It uses a graphical block-based syntax for declaring access control polices that simplifies many of the cumbersome and verbose parts of XACML. Using a graphical language allows the editor to aid the policy-maker in building polices by providing visual feedback and by grouping blocks and operators that fit together and also indicating which blocks that stick together. It simplifies building policies while still maintaining the basic structure…
Identity, Instrumental Self-Interest and Institutional Evaluations: Explaining Public Opinion on Common European Policies in Foreign Affairs and Defe…
2008
This paper addresses public opinion on common European policies in foreign affairs and defence. It proposes three models of support for common policies in these fields. Drawing on Eurobarometer data, the analysis shows that instrumental self-interest and territorial identities contribute considerably to explaining support for common foreign affairs and defence policies. Moreover, support for common policies is strongly driven by domain-specific evaluations of the European Union's performance. These findings suggest that popular support for common European policies in foreign affairs and defence has an experiential base. Thus, elites have an incentive to respond to public opinion when makin…
Polityka bezpieczeństwa Polski – wnioski z badań empirycznych
2023
Celem artykułu jest zbadanie kondycji polityki bezpieczeństwa Polski po eskalacji wojny rosyjsko-ukraińskiej w 2022 roku. Stanowi on naukowe opracowanie badań, jakie przeprowadzono na potrzeby raportu „Bezpieczeństwo Polski po szczycie NATO w Madrycie”, który ukazał się w połowie października 2022 roku1, a także w związku z projektem Ministerstwa Spraw Zagranicznych RP „Nowe idee dla Polski – bezpieczeństwo”. Badania polegały na zebraniu informacji dotyczących polityki bezpieczeństwa Polski od wyselekcjonowanej grupy ekspertów w sierpniu i wrześniu 2022 roku, interpretacji i opracowaniu tych informacji, zwłaszcza w zakresie wpływu, jaki na pozycję geopolityczną i bezpieczeństwo Polski wywar…
Crisis and EU Foreign and Security Policy: An Introduction
2020
This chapter sums up the main findings in the four papers discussing the impact of various external crises on the development of the EU’s Common Foreign and Security Policy, the CFSP. Chapters discuss the EU’s foreign and security policy responses to the Russian annexation of Crimea and the ongoing war in Ukraine, the EU’s crisis management capacities, and the impact of crises on EU–US relations. Despite member states’ traditional reluctance to integrate further in this domain of EU policy, the CFSP is not breaking down. Instead, all the chapters suggest that the EU is able to cope with crises and that overall, crises and increased uncertainty have led to a strengthening of the CFSP mainly …