Search results for "Security"

showing 10 items of 1693 documents

Auxilum Medicine: A Cloud Based Platform for Real-Time Monitoring Medical Devices

2015

Nowadays, time is a very valuable resource and can make the difference between life and death. Having knowledge about this fact we decided to deal with one of the most important aspects of contemporary medicine, EMS (emergency medical services) response time. Modern systems that encourage intelligent communication methods between medical devices and doctors are a must in ubiquitous health care environments. Auxilum Medicine fosters a triple-win situation regarding the relationship between medical institutions, doctors and patients. Emergency patients should be treated with utmost care because their life is hanging by a thread if nobody is present to take immediate action. We are presenting …

business.industryComputer scienceeMixMedical equipmentWearable computerCloud computingComputer securitycomputer.software_genreSmartwatchHealth careEmergency medical servicesbusinessWireless sensor networkcomputer2015 20th International Conference on Control Systems and Computer Science
researchProduct

ITIL Implementation: The Role of ITIL Software and Project Quality

2012

This research will investigate the implementation status of the Information Technology Infrastructure Library (ITIL) reference processes and the influence of ITIL software quality and ITIL project quality on implementation status. The paper analyzes data from a survey of 160 Nordic companies.

business.industryComputer sciencemedia_common.quotation_subjectIT portfolio managementCapacity managementSoftware qualityInformation Technology Infrastructure LibraryEngineering managementSoftwareITIL security managementFinancial management for IT servicesQuality (business)businessmedia_common2012 23rd International Workshop on Database and Expert Systems Applications
researchProduct

The United Nations and the European Union

2019

The European Union (EU) and the United Nations (UN) are expressions of a rules-based global order. The EU has enshrined support to the UN in its security strategies, and its priorities indicate an engagement in a wide range of UN programs and activities to maintain the rules-based order and adapt it to face internal and external challenges. The EU and its member states are the largest contributors to the UN budget. Following the adoption of the Lisbon treaty, the EU has increased its representation at the UN, gaining enhanced observer status in the General Assembly. However, because of the intergovernmental nature of the forum, only its member states have the right to vote. This has led sch…

business.industryGeneral assemblyPolitical sciencemedia_common.cataloged_instanceEU–UN EU cohesion General assembly Security Council Security Council reform EU actorness effective multilateralism EU priorities at the UN EU representation and performance peace and security maintenance European Union politicsSecurity councilInternational tradeEuropean unionbusinessSettore SPS/04 - Scienza Politicamedia_common
researchProduct

Dynamic Modeling of the Cyber Security Threat Problem

2009

This chapter discusses the possible growth of black markets (BMs) for software vulnerabilities and factors affecting their spread. It is difficult to collect statistics about BMs for vulnerabilities and their associated transactions, as they are hidden from general view. We conduct a disguised observation of online BM trading sites to identify causal models of the ongoing viability of BMs. Our observation results are expressed as a system dynamic model. We implement simulations to observe the effects of possible actions to disrupt BMs. The results suggest that without interventions the number and size of BMs is likely to increase. A simulation scenario with a policy to halt BM operations re…

business.industryInternet privacyBlack marketBusinessComputer securitycomputer.software_genrecomputerSystem dynamics
researchProduct

Ancel Keys (1904-2004)

2005

business.industryMedicinePharmacology (medical)General MedicineComputer securitycomputer.software_genrebusinessCardiology and Cardiovascular MedicinecomputerClínica e Investigación en Arteriosclerosis
researchProduct

Trust-based framework for security enhancement of P2PSIP communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…

business.industryNetwork securityComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCryptographyCommunications systemComputer securitycomputer.software_genreDistributed hash tableNAT traversalServerConfidentialitybusinessChord (peer-to-peer)computerComputer network2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
researchProduct

Cyber Security Strategy Implementation Architecture in a Value System

2018

In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing ope…

business.industryProcess (engineering)Computer scienceOperating environmentmedia_common.quotation_subjectInformation structureProblem statementcomputer.file_formatComputer securitycomputer.software_genreStrategy implementationQuality (business)ExecutablebusinesscomputerAgile software developmentmedia_common
researchProduct

Key drivers of internet banking services use

2009

PurposeThe purpose of this paper is to analyse the determinants of internet banking use, paying special attention to the role of product involvement, perceived risk and trust.Design/methodology/approachThe impact of trust, perceived risks, product involvement and TAM beliefs (ease of use and usefulness) on internet banking adoption is tested through structural equation modelling techniques. The sample consists of 511 Spanish internet banking services users and the data are collected through an internet survey. Risk is measured as a formative construct.FindingsData analysis shows that TAM beliefs and perceived risks (security, privacy, performance and social) have a direct influence on e‐ban…

business.industryProduct involvementUsabilitySample (statistics)Library and Information SciencesComputer securitycomputer.software_genreStructural equation modelingComputer Science ApplicationsRisk perceptionFormative assessmentKey (cryptography)The InternetMarketingbusinesscomputerInformation SystemsOnline Information Review
researchProduct

Security of information in IT systems

2005

The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.

business.industrySocial engineering (security)Telecommunication securityInformation technologyEavesdroppingElectromagnetic emissionComputer securitycomputer.software_genreInformation protection policyInformation security managementSociologyTempestbusinesscomputerSPIE Proceedings
researchProduct

Corporate Governance and Company Law Reform: a German perspective

2005

Corporate crises and international trends in corporate governance have revealed the need for reform, and resulted in a great number of changes in corporate law. In spite of this, the existing legal framework for corporate governance in Germany presents itself reluctant to major changes. The German approach to reform has focused on the improvement of corporate monitoring by the supervisory board. It neither questions the two-tier structure, nor does it reconsider the existing representation of shareholders or other stakeholders under the current form of co-determination. The German Corporate Governance Code represents a new instrument of soft law and its recommendations are likely argued to …

business.industryStrategy and ManagementCorporate governanceStakeholderComputingMilieux_LEGALASPECTSOFCOMPUTINGAccountingCorporate Real EstateGeneral Business Management and AccountingCorporate groupManagement of Technology and InnovationCorporate lawBusinessCorporate communicationSoft lawCorporate securityCorporate Governance: An International Review
researchProduct