Search results for "Security"

showing 10 items of 1693 documents

Data Communication Security of Advanced Metering Infrastructure in Smart Grid

2013

Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…

Smart meterComputer scienceNetwork packetWireless networkbusiness.industryAuthentication serverCommunications securityComputer securitycomputer.software_genreSmart gridSecurity servicebusinesscomputerAutomatic meter readingComputer network2013 5th International Conference on Computational Intelligence and Communication Networks
researchProduct

DETECTING FALLS AT HOME: USER-CENTERED DESIGN OF A PERVASIVE TECHNOLOGY

2016

Falling is the main cause of domestic accidents and fatal injuries to seniors at home. In this paper, we describe the design process for a new pervasive technology (CIRDO). The aim of this technology is to detect falls (via audio and video sensors) and to alert the elderly's family or caregivers. Two complementary studies were performed. Firstly, the actual risk situations of older adults were analyzed. Secondly, social acceptance was investigated for the different homecare field stakeholders. Our results highlight the tensions among social actors towards the tool and their impacts on technology acceptance by the elderly. Also, we show a significant change in the fall process due to the dev…

Social PsychologyIterative designComputer scienceProcess (engineering)Video sensorsApplied psychology[SHS.PSY]Humanities and Social Sciences/PsychologyComputer securitycomputer.software_genreField (computer science)050906 social workmedicine0501 psychology and cognitive sciences050107 human factorsUser-centered designelderly peoplelcsh:T58.5-58.64lcsh:Information technologypervasive technologyCommunication05 social sciencesHuman-Computer Interactionrisk situationFalling (accident)Pervasive technologydomestic activity0509 other social sciencesmedicine.symptomEngineering design processcomputeracceptance
researchProduct

Spillover outcomes of job insecurity: differences among men and women (Consecuencias indirectas de la inseguridad laboral: diferencias entre hombres …

2021

A vast literature on job insecurity can be found. However, there are still several significant research gaps. Little attention has been paid to the spillover effect of job insecurity on employees’ ...

Social PsychologyJob insecuritySpillover effectFamily satisfactionDemographic economicsPsychologyFamily cohesionInternational Journal of Social Psychology
researchProduct

Food insecurity with hunger and sexual behavior among adolescents from 53 countries

2021

Objectives: To examine the relationship of food insecurity with sexual intercourse, multiple sexual partners and non-condom use. Methods: Data on food insecurity (hunger) and sexual behaviors from 205,296 adolescents from 53 countries. Associations were analyzed using meta-analysis. Results: Overall, 16.0% of the adolescents ever had sexual intercourse and the prevalence of moderate and severe food insecurity was 44.9% and 6.2%, respectively. Moderate and severe food insecurity was associated with higher odds for sexual intercourse. Any food insecurity was significantly associated with condom nonuse at last sex. Conclusions: Food insecurity was associated with higher odds of ever having sex…

Social Psychologydigestive oral and skin physiologyPublic Health Environmental and Occupational HealthDermatologyPsychosocial IssueDevelopmental psychologyGender StudiesFood insecuritySexual intercourseMultiple sexual partnersReproductive MedicineSexual behaviorDevelopmental/Behavioral IssuesPsychologyPsychosocialAdolescent Health/Medicine
researchProduct

Problem odpowiedzialności członków zarządu spółki kapitałowej za zobowiązania z tytułu składek na ubezpieczenie społeczne powstałe w czasie trwania p…

2020

<div><p>The study is devoted to the problem of management board members’ liability for social insurance contributions arising during the course of proceedings with the option of concluding an arrangement based on the provisions of both the Bankruptcy and Reorganization Law and the Restructuring Law. It defends the view that a member of the management board is not responsible for liabilities under social security contributions arising during the course of proceedings with the option of concluding an arrangement, initiated in good time, conducted on the basis of the provisions of the Bankruptcy and Reorganization Law as well as on the provisions of the Restructuring Law.</p>…

Social insuranceSocial securityPublic AdministrationRestructuringBankruptcyCapital (economics)LiabilityBusinessLawLaw and economicsStudia Iuridica Lublinensia
researchProduct

Cyber-Identities and Social Life in Cyberspace

2011

Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-pr…

Social lifebusiness.industryInternet privacySociologyComputer securitycomputer.software_genrebusinessCyberspacecomputerPseudonymityAnonymity
researchProduct

Assisted labeling for spam account detection on twitter

2019

Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…

Social network021110 strategic defence & security studiesInformation retrievalSocial networkbusiness.industryComputer scienceSpam detectionSmart device0211 other engineering and technologies020206 networking & telecommunicationsUsability02 engineering and technologycomputer.software_genrePhishinglaw.inventionManual annotationlawComputer security0202 electrical engineering electronic engineering information engineeringBlacklistingMalwarebusinessCluster analysiscomputer
researchProduct

The role of social networking services in eParticipation

2009

Published version of a chapter published in Lecture Notes in Computer Science, 5694, 46-55. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-03781-8_5 A serious problem in eParticipation projects is citizen engagement – citizens do not necessarily become more willing to participate simply because net-services are provided for them. Most forms of eParticipation in democratic contexts are, however, dependent on citizen engagement, interaction and social networking because democratic systems favour the interests of larger groups of citizens – the more voices behind a political proposition, the greater its chances of success. In this context of challenges the study of s…

Social networkComputer sciencebusiness.industrymedia_common.quotation_subjectContext (language use)Public relationsComputer securitycomputer.software_genreDemocracyPeer reviewPoliticseParticipation social networking servicesThe InternetVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321businessCitizen engagementcomputermedia_common
researchProduct

A privacy-aware framework for decentralized online social networks

2015

Online social networks based on a single service provider suffer several drawbacks, first of all the privacy issues arising from the delegation of user data to a single entity. Distributed online social networks (DOSN) have been recently proposed as an alternative solution allowing users to keep control of their private data. However, the lack of a centralized entity introduces new problems, like the need of defining proper privacy policies for data access and of guaranteeing the availability of user's data when the user disconnects from the social network. This paper introduces a privacy-aware support for DOSN enabling users to define a set of privacy policies which describe who is entitle…

Social networkDelegationbusiness.industryComputer sciencePrivacy policymedia_common.quotation_subjectControl (management)Computer Science (all)Service providerComputer securitycomputer.software_genreTheoretical Computer ScienceSet (abstract data type)Data availabilityData accessPrivacyDecentralized online social network Privacy Data availabilityDecentralized online social networkbusinesscomputermedia_common
researchProduct

Promotion of Social Policies – an Investment in the Future: Canada – European Union – Baltic States – Nordic Countries

2009

This volume represents presentations, discussions and research papers in conjunction with the Forum for a Comparative Dialog- an Investment in the Future. The Forum was held in Riga at the University of Latvia on November 6-8, 2008 and was organised by the Centre for European and Transition Studies at the University of Latvia and Capilano University, Canada.

Social policies - Nordic countriesSocial policies - EUHealth Insurance coverageFamily policySocial policies - CanadaOpening addressesIncome security in transitionSocial policies - Baltic States
researchProduct