Search results for "Security"
showing 10 items of 1693 documents
Revisiting the buffers of job insecurity : investigating new buffering factors between perceived job insecurity and employee outcomes
2013
Bijural services as factors of production
2005
This study is primarily concerned with the security of transactions and contracts in contexts in which there is more than one legal system - in bijural (or multijural) societies - and with the contribution that bijural lawyers can make to the security of transactions and contracts, that is with the productivity of bijural lawyers. It is, as a consequence, focused on the demand for bijurallawyers as factor inputs in the production of contractual security and, at one remove, transaction security.1 To be in a position to proceed with this analysis, certain basic concepts must be clarified and the domain of the inquiry delineated. We devote the Introduction to these tasks.(...)
Italy
2012
Summary: 1. The constitutional protection of personal freedom. - 1.1. A little history: united Italy and the Albertine Statute. - 1.2. The current situation: the Constitution of 1948.- 1.1.1. Inviolability of personal freedom and guarantees of Habeas Corpus. - 1.1.2. Presumption of innocence and rule of treatment. - 2. Active enforcement: the system of personal precautionary measures. - 2.1. Non-custodial precautionary measures. - 2.2. Custodial precautionary measures. - 2.3. The operational core of the system. - 2.3.1. The requirement of proof: serious evidence of guilt. - 2.3.2. Precautionary needs. - 2.3.3. The selection criteria. – 3. Precautionary proceedings. - 3.1. Internal regulatio…
Współczesna wojna - model klasyfikacyjny surowców krytycznych
2016
The paper adresses the problem of the list of critical raw materials for the European Union. The theoretical model of classification of the critical raw materials was presented. The presented model is based on two variables: index of the compatibility (substitutability index) and recycling index.
Cultural Heritage and Security in Europe - "Ours - Yours - Shared"
2014
System for Executing Encrypted Native Programs
2017
An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system …
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Missio…
2022
Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, an…
Towards digital cognitive clones for the decision-makers: adversarial training experiments
2021
Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
2021
Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…
Developing and Validating a Behavioural Model of Cyberinsurance Adoption
2021
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity me…