Search results for "Security"

showing 10 items of 1693 documents

A Unified Approach to Measuring Accuracy of Error Indicators

2014

In this paper, we present a unified approach to error indication for elliptic boundary value problems. We introduce two different definitions of the accuracy (weak and strong) and show that various indicators result from one principal relation. In particular, this relation generates all the main types of error indicators, which have already gained high popularity in numerical practice. Also, we discuss some new forms of indicators that follow from a posteriori error majorants of the functional type and compare them with other indicators. Finally, we discuss another question related to accuracy of error indicators for problems with incompletely known data.

Relation (database)Computer sciencePrincipal (computer security)Functional typeA priori and a posterioriApplied mathematicsBoundary value problemPopularityType I and type II errors
researchProduct

Prevention of occupational injuries moral hazard and complex agency relationship

2001

This paper exploits the results of agency theory with the aim of contributing a new viewpoint and a form for analysis of the current functioning of the occupational injury and disease section of the Social Security system in its mission of providing incentives for prevention. After outlining the organization and specific features of insurance against occupational risks, an initial level of analysis highlights the presence of moral hazard in relations between insurer and company and between company and employee. A second level of analysis and resort to complex agency relationship models, multitask model and third-party model, is necessary to take into account the consequences for occupationa…

Relations de travailSécurité socialeModèle[SHS.SOCIO]Humanities and Social Sciences/Sociology[SHS.SOCIO] Humanities and Social Sciences/SociologyAccident du travailSociologie du travail[ SHS.SOCIO ] Humanities and Social Sciences/SociologyWorking Relations.RisqueSociologie du travail et des organisationsMoralitySocial SecurityProductivitéRelation professionnelleProfessional RelationWork accidentSociology of work and organizationSociology of workThéorieTheoryMoralitéOrganisation du travailProductivityHazard
researchProduct

¿Cómo se define el liderazgo en la defensa europea? Un análisis fsQCA

2017

The paper addresses the issue of national leadership in the politics of European defence, in order to determine the relative value of different factors in the exercise of leadership, and the reasons why some countries are more willing than others to contribute to the development of the EU’s Common Security and Defence Policy. The article starts by discussing the main contributions of the (neo)realist and constructivist approaches to European leadership on defence. It then highlights the process of development of EU defence policy and its setbacks. Leadership factors that characterize this development process are identified and employed to construct a fsQCA analysis, which assesses the leade…

Relative valuePoliticsSociology and Political SciencePolitical Science and International RelationsCommon Security and Defence PolicySociologyPublic administrationSocial scienceNational leadershipRevista de Estudios Políticos
researchProduct

Research in disaster settings: a systematic qualitative review of ethical guidelines

2016

Background Conducting research during or in the aftermath of disasters poses many specific practical and ethical challenges. This is particularly the case with research involving human subjects. The extraordinary circumstances of research conducted in disaster settings require appropriate regulations to ensure the protection of human participants. The goal of this study is to systematically and qualitatively review the existing ethical guidelines for disaster research by using the constant comparative method (CCM). Methods We performed a systematic qualitative review of disaster research ethics guidelines to collect and compare existing regulations. Guidelines were identified by a three-tie…

Research ethics committeeHealth (social science)research ethicsvulnerabilityVulnerabilityVulnerabilityPoison controlethics guidelines0603 philosophy ethics and religionComputer securitycomputer.software_genreVulnerable PopulationsGrounded theoryEthics ResearchHealth(social science)Research ethicsDisasters03 medical and health sciences0302 clinical medicineMedicineDisaster researchHumans030212 general & internal medicineresearch ethics committeeEmpirical evidenceResearch ethicsbusiness.industryResearchHealth PolicyDisaster research06 humanities and the artsOrvostudományokEthics guidelinesSocial Control FormalIssues ethics and legal aspectsDisasterPhilosophy of medicinedisaster researchdisasterThe InternetEngineering ethics060301 applied ethicsEgészségtudományokbusinesscomputerResearch ArticleEthics Committees Research
researchProduct

Alternative Vehicle Fuel Management: Impact on Energy Security Indicators

2019

Land transport consumes primarily oil products. Their use effects on climate change. A tendency of crude oil price increasing, uneven allocation, and exhaustibility forces to look for alternatives. Alternative vehicle fuel can to reduce energy dependence and meet ecological requirement. The aim of the study was to reveal the basic principles of the alternative vehicle fuel management and its influence on energy security indicators. The fundamental objectives and principles of alternative fuel management were reviewed. The energy security indicators which are affected by the use of alternative fuels were considered. The primary goal of the alternative vehicle fuel management is profit optimi…

Resource (project management)Land transportbusiness.industryEnergy (esotericism)Climate changeEnergy marketBusinessEnergy securityDiversification (marketing strategy)Environmental economicsRenewable energy
researchProduct

HIV-Infected Children and Nutrition: The Friend and The Foe

2019

The impact of nutrition on HIV-infected children has been evaluated in multiple studies. Our review of the current trends of nutrition-related studies revealed that the focus has moved from simply the disease consequences of HIV to ensuring that antiretroviral therapy-treated children are well nourished to ensure growth and development. This update aims to present the state of the art regarding nutrition of HIV-infected children and the real potential for nutrition to serve as a dynamic therapy in this group. Recent World Health Organization reports indicate that the HIV/AIDS disease is curbing in incidence worldwide despite the high 1.8 million children, less than 15 years, reported in 201…

Resource poorSettore BIO/17 - IstologiaFood securitybusiness.industryIncidence (epidemiology)InformationSystems_INFORMATIONSTORAGEANDRETRIEVALDiseaseHIV/AIDS HIV-infected children nutrition in HIV nutrition for children adjunct therapy for HIVmedicine.diseaseWorld healthQuality of life (healthcare)Acquired immunodeficiency syndrome (AIDS)Hiv infectedEnvironmental healthmedicinebusinessGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)
researchProduct

Vulnerability Black Markets: Empirical Evidence and Scenario Simulation

2009

This paper discusses the manifest characteristics of online Vulnerability Black Markets (VBM), insider actors, interactions and mechanisms, obtained from masked observation. Because VBM transactions are hidden from general view, we trace their precursors as secondary evidence of their development and activity. More general attributes of VBMs and the exploits they discuss are identified. Finally, we introduce a simulation model that captures how vulnerability discoveries may be placed in a dual legal-black market context. We perform simulations and find that if legal markets expose vulnerabilities that go unresolved, the security and quality of software may suffer more than in the absence of…

Responsible disclosureExploitComputer scienceSoftware security assuranceVulnerabilityContext (language use)Vulnerability managementEmpirical evidenceComputer securitycomputer.software_genrecomputerIndustrial organizationInsider2009 42nd Hawaii International Conference on System Sciences
researchProduct

Tick Size and Price Diffusion

2011

A tick size is the smallest increment of a security price. Tick size is typically regulated by the exchange where the security is traded and it may be modified either because the exchange enforces an overall tick size change or because the price of the security is too low or too high. There is an extensive literature, partially reviewed in Sect. 2 of the present paper, on the role of tick size in the price formation process. However, the role and the importance of tick size has not been yet fully understood, as testified, for example, by a recent document of the Committee of European Securities Regulators (CESR) [1].

Return distributionFinancial economicsSecurity priceTick sizeEconomicsPrice formation
researchProduct

SEPARATION OF PRINCIPAL STRESSES ALONG SECTIONS OF SYMMETRY BY MEANS OF ISOPACHIC PATTERNS

1969

An approximate rapid method for the separation of principal stresses along sections of symmetry free from external loads is described. The method is based on the sum of principal stresses and checked by applying it to a circular ring under diametral compression and to a grooved bar in tension.

Ring (mathematics)Mechanics of MaterialsTension (physics)Bar (music)business.industryMechanical EngineeringPrincipal (computer security)GeometryStructural engineeringbusinessCompression (physics)Symmetry (physics)MathematicsStrain
researchProduct

Risk Assessment of Physical Security within a Technologized Knowledge Based Organization

2019

The purpose of this scientific paper is to support the decisionmaking process on the risk management based on the results of an analysis and subsequently on the risks hierarchy. This assessment involves the comparison of the level of risk determined by the analysis with the risk criteria developed in the context of the establishment phase. This scientific paper on assessing and treating risks to physical security has been developed to identify, assess and quantify the associated risk in a technologizedknowledge-based organization. The basis of this study on the assessment and treatment of risks to physical security is to identify specific potential risks as well as the emergency response pr…

Risk analysis (engineering)lcsh:TA1-2040lcsh:Engineering (General). Civil engineering (General)Risk assessmentPsychologyPhysical securityMATEC Web of Conferences
researchProduct