Search results for "Security"

showing 10 items of 1693 documents

Revisiting the buffers of job insecurity : investigating new buffering factors between perceived job insecurity and employee outcomes

2013

contextual coping resourcestyöhyvinvointiselviytyminenesimies-alaissuhdehyvinvointibuffering effectssosiaalinen tukityöpaikattyönohjaustyöepävarmuushenkinen hyvinvointiemployee outcomespersonal coping resourcesjob insecurity
researchProduct

Bijural services as factors of production

2005

This study is primarily concerned with the security of transactions and contracts in contexts in which there is more than one legal system - in bijural (or multijural) societies - and with the contribution that bijural lawyers can make to the security of transactions and contracts, that is with the productivity of bijural lawyers. It is, as a consequence, focused on the demand for bijurallawyers as factor inputs in the production of contractual security and, at one remove, transaction security.1 To be in a position to proceed with this analysis, certain basic concepts must be clarified and the domain of the inquiry delineated. We devote the Introduction to these tasks.(...)

contractual securitylegal systemlegal educationbijural societylawyers[ SHS.ECO ] Humanities and Social Sciences/Economies and financesComputingMilieux_LEGALASPECTSOFCOMPUTING[SHS.ECO] Humanities and Social Sciences/Economics and Finance[SHS.ECO]Humanities and Social Sciences/Economics and Financecontractlegal systems
researchProduct

Italy

2012

Summary: 1. The constitutional protection of personal freedom. - 1.1. A little history: united Italy and the Albertine Statute. - 1.2. The current situation: the Constitution of 1948.- 1.1.1. Inviolability of personal freedom and guarantees of Habeas Corpus. - 1.1.2. Presumption of innocence and rule of treatment. - 2. Active enforcement: the system of personal precautionary measures. - 2.1. Non-custodial precautionary measures. - 2.2. Custodial precautionary measures. - 2.3. The operational core of the system. - 2.3.1. The requirement of proof: serious evidence of guilt. - 2.3.2. Precautionary needs. - 2.3.3. The selection criteria. – 3. Precautionary proceedings. - 3.1. Internal regulatio…

criminal proceedingICCASettore IUS/16 - Diritto Processuale Penalepre-trial precautionary measureCBDsecuritybiodiversity conservation
researchProduct

Współczesna wojna - model klasyfikacyjny surowców krytycznych

2016

The paper adresses the problem of the list of critical raw materials for the European Union. The theoretical model of classification of the critical raw materials was presented. The presented model is based on two variables: index of the compatibility (substitutability index) and recycling index.

critical raw materialsindex of the compatibility (substitutability index)resource security
researchProduct

Cultural Heritage and Security in Europe - "Ours - Yours - Shared"

2014

cultural policiesEuropean cultural heritagecultural securitylocal and regional communities
researchProduct

System for Executing Encrypted Native Programs

2017

An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system …

cyber-securitytrusted computinghypervisorattestation
researchProduct

On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Missio…

2022

Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, an…

cybersecurityATClentokoneetUAT978availabilitylentoliikennecodesaerospace electronicsattackstransceiversaircraft navigationcomputer crashesATMsurveillanceDoSlennonjohtokyberturvallisuusaircraftverkkohyökkäyksetlennonvarmistusADS-B1090EStietojärjestelmät
researchProduct

Towards digital cognitive clones for the decision-makers: adversarial training experiments

2021

Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…

cybersecurityComputer scienceProcess (engineering)päätöksentukijärjestelmätneuroverkot02 engineering and technologytekoälyAdversarial machine learningAdversarial systemHuman–computer interactionComponent (UML)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceGenerative Adversarial NetworksCloning (programming)ohjausjärjestelmät020206 networking & telecommunicationsAdversaryIndustry 4.0koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingClone (computing)Procedia Computer Science
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct

Developing and Validating a Behavioural Model of Cyberinsurance Adoption

2021

Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity me…

cybersecurityMoral hazardtheory of planned behaviourGeography Planning and Development0211 other engineering and technologiesPsychological interventionTJ807-83002 engineering and technologyManagement Monitoring Policy and LawTD194-195Structural equation modelingRenewable energy sourcesTask (project management)SAFER0502 economics and businessRisk propensityGE1-350050207 economics021110 strategic defence & security studiesActuarial scienceEnvironmental effects of industries and plantsRenewable Energy Sustainability and the Environmentcyberinsuranceprotection motivation theory05 social sciencesTheory of planned behaviorG900C800Environmental sciencesProtection motivation theoryPsychologySustainability
researchProduct