Search results for "Security"
showing 10 items of 1693 documents
TECNOLOGICAL PARAMETERS OF SUSTAINABILITY: FACTORS OF DECAY AND PREVENTION MEASURES
2006
This is the age of the"global knowledge", of the "local inadequacies", of the specialist enterprises and of the management difficulties. Today is necessary to create new perspectives to limit the rissk both material (structural decay / phisical obsolescence/ security needs/ static disease) and cultural and environmental (funtion degradations - inattentive environmental conditions) and to realize the right living conditions and protection for the development of guidelines for the 21st century construction. This research aims at the creation of new tools for developing a history of building technologies as they relate to their pathologies.
Bezpieczeństwo w zakładach karnych i aresztach śledczych : uwagi dotyczące unormowań i praktyki
2018
Decision-cache based XACML authorisation and anonymisation for XML documents
2012
Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…
Distributed denial-of-service attacks in the Internet
2005
Avoimen lähdekoodin alustojen sopivuus älykotiin
2017
Internet of Things kasvaa jatkuvasti ja sen eräs suurimmista sovelluskohteista on älykoti. IoT:n ongelmana on kuitenkin ollut keskimäärin erittäin huono tietoturva ja tämä on heijastunut myös älykoteihin esimerkiksi hakkeroituina kameroina ja itkuhälyttiminä. Toinen, älykodissa erityisen suuri ongelma on kerätyn tiedon yksityisyys. Tässä tutkielmassa kartoitetaan, kuinka hyvin avoimen lähdekoodin ohjelmistot soveltuvat toimivan ja turvallisen älykodin toteuttamiseen. Turvallisuuden osalta painopisteenä on erityisesti etäyhteys. Tutkimus toteutettiin konstruktiivisena tutkimuksena. Se ei käsittele yksittäisiä ohjelmistoja kovin syvällisesti, vaan sen tarkoituksena oli saada kattavahko yleisk…
Quality, Reliability, Security and Robustness in Heterogeneous Systems
2020
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.
A study on The Factors Affecting Merger and Acquisition Decision In Nepalese Banking Sector
2016
Master's thesis Business Administration BE501 - University of Agder 2016 The main purpose of this study is to find out the factors that would lead to making decision regarding going for merger and acquisition among the banks in Nepalese banking sector. This thesis finds out various factors that would affect merger and acquisition decision in banking sector based upon previous studies, and tries to check whether these are significant in case of Nepalese banking sector or not. Four theories: neo-classical, agency, behavioral and resource dependency; have been taken into consideration for purpose of finding out factors affecting decision to go for merger and acquisition. Based upon the previou…
Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process
2022
Information Technology (IT) security breaches and the extent of damage they may cause to an organization are inherently uncertain. Therefore, managers’ decisions about whether to make IT security investment (ITSI) and how much, depend upon a subjective assessment of the economic value of the investment and the likelihood of the damage to the organization. When managers delay or fail to decide on whether and how much to invest in IT security, it can make organizations vulnerable to operational and strategic perils. Based upon interviews, document reviews, and observations in three organizations in Finland that made ITSI decisions to acquire a secure email application system, we examined the …
Kan brist i alarmkjeden unngås? : Delphistudie med funn av faktorer som er viktige for kvalitetssikring i et velferdsteknologisk responssenter
2016
Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 The future brings with it an increased number of elderly in need of aid or assistance. One way of meeting these challenges is an increased usage of healthcare technological solutions. Through media, it is illustrated that there have been several unfortunate incidents related to the handling of personal alarm systems. This has happened not only when receiving an alarm at the responsecenter, but also with the turn-out at the place of emergency. The goal with this study is to identify important factors that are necessary to secure the quality at the responsecenters when the alarms are received and how they are forwarded a…
Sieci społecznościowe w ukraińskiej edukacji: blaski i cienie
2018
W artykule przedstawiono koncepcyjne podstawy bezpieczeństwa w zakresie korzystania z sieci społecznościowych w edukacji na Ukrainie. Potwierdzono stanowisko, że tylko z wystarczającym stopniem kształcenia w tym wymiarze, edukacja nabywa nieprzerwanej formy i może skutecznie pełnić funkcję rozwoju aktualnych wartości dla narodu ukraińskiego i innych nacji. Podkreślono ideę potencjalnego wpływu sieci społecznych jako innowacyjnego narzędzia edukacyjnego wpływającego bezpośrednio lub pośrednio na bezpieczeństwo humanitarne państwa ukraińskiego. Wykazano, że wpływ ten jest spowodowany szybkim i dyskretnym rozpowszechnianiem informacji za pośrednictwem sieci społecznościowych, realizowanym zaró…