Search results for "Security"
showing 10 items of 1693 documents
Data Communication Security of Advanced Metering Infrastructure in Smart Grid
2013
Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…
DETECTING FALLS AT HOME: USER-CENTERED DESIGN OF A PERVASIVE TECHNOLOGY
2016
Falling is the main cause of domestic accidents and fatal injuries to seniors at home. In this paper, we describe the design process for a new pervasive technology (CIRDO). The aim of this technology is to detect falls (via audio and video sensors) and to alert the elderly's family or caregivers. Two complementary studies were performed. Firstly, the actual risk situations of older adults were analyzed. Secondly, social acceptance was investigated for the different homecare field stakeholders. Our results highlight the tensions among social actors towards the tool and their impacts on technology acceptance by the elderly. Also, we show a significant change in the fall process due to the dev…
Spillover outcomes of job insecurity: differences among men and women (Consecuencias indirectas de la inseguridad laboral: diferencias entre hombres …
2021
A vast literature on job insecurity can be found. However, there are still several significant research gaps. Little attention has been paid to the spillover effect of job insecurity on employees’ ...
Food insecurity with hunger and sexual behavior among adolescents from 53 countries
2021
Objectives: To examine the relationship of food insecurity with sexual intercourse, multiple sexual partners and non-condom use. Methods: Data on food insecurity (hunger) and sexual behaviors from 205,296 adolescents from 53 countries. Associations were analyzed using meta-analysis. Results: Overall, 16.0% of the adolescents ever had sexual intercourse and the prevalence of moderate and severe food insecurity was 44.9% and 6.2%, respectively. Moderate and severe food insecurity was associated with higher odds for sexual intercourse. Any food insecurity was significantly associated with condom nonuse at last sex. Conclusions: Food insecurity was associated with higher odds of ever having sex…
Problem odpowiedzialności członków zarządu spółki kapitałowej za zobowiązania z tytułu składek na ubezpieczenie społeczne powstałe w czasie trwania p…
2020
<div><p>The study is devoted to the problem of management board members’ liability for social insurance contributions arising during the course of proceedings with the option of concluding an arrangement based on the provisions of both the Bankruptcy and Reorganization Law and the Restructuring Law. It defends the view that a member of the management board is not responsible for liabilities under social security contributions arising during the course of proceedings with the option of concluding an arrangement, initiated in good time, conducted on the basis of the provisions of the Bankruptcy and Reorganization Law as well as on the provisions of the Restructuring Law.</p>…
Cyber-Identities and Social Life in Cyberspace
2011
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-pr…
Assisted labeling for spam account detection on twitter
2019
Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…
The role of social networking services in eParticipation
2009
Published version of a chapter published in Lecture Notes in Computer Science, 5694, 46-55. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-03781-8_5 A serious problem in eParticipation projects is citizen engagement – citizens do not necessarily become more willing to participate simply because net-services are provided for them. Most forms of eParticipation in democratic contexts are, however, dependent on citizen engagement, interaction and social networking because democratic systems favour the interests of larger groups of citizens – the more voices behind a political proposition, the greater its chances of success. In this context of challenges the study of s…
A privacy-aware framework for decentralized online social networks
2015
Online social networks based on a single service provider suffer several drawbacks, first of all the privacy issues arising from the delegation of user data to a single entity. Distributed online social networks (DOSN) have been recently proposed as an alternative solution allowing users to keep control of their private data. However, the lack of a centralized entity introduces new problems, like the need of defining proper privacy policies for data access and of guaranteeing the availability of user's data when the user disconnects from the social network. This paper introduces a privacy-aware support for DOSN enabling users to define a set of privacy policies which describe who is entitle…
Promotion of Social Policies – an Investment in the Future: Canada – European Union – Baltic States – Nordic Countries
2009
This volume represents presentations, discussions and research papers in conjunction with the Forum for a Comparative Dialog- an Investment in the Future. The Forum was held in Riga at the University of Latvia on November 6-8, 2008 and was organised by the Centre for European and Transition Studies at the University of Latvia and Capilano University, Canada.