Search results for "Security"

showing 10 items of 1693 documents

HEALTH COVER, THE CASE OF MARTIN AND CAROLINA IN AUSTRALIA

2014

This research examines, from a qualitative perspective, some public opinion related to issues associated with the management of a tensed situation. In that process, it identifies some of the subtle differences in the Anglo-Latino cultural expectations. Martin, an Argentine tourist, contracted the Gullien-Barre syndrome in Australia, while enjoying his honeymoon vacation on a Tasmanian island with his partner Carolina. With the passing of days, Martin lost his mobility and was finally hospitalized in emergency. Doctors induced Martin into a coma temporarily because his muscles were paralyzed by the action of the virus. Health costs were more expensive than the family could absorb in Australi…

illness hospitality abroad tourism drama.lcsh:Gillness; hospitality; health; tourism; security;lcsh:Geography. Anthropology. Recreationlcsh:G1-922lcsh:Geography (General)Revista de Turism: Studii si Cercetari in Turism
researchProduct

Global Climate Policies, Local Institutions and Food Security in a Pastoral Society in Ethiopia

2020

This paper explores climate change adaptation within national policy priorities in a least developed country (LDC). The premise of the article is that when considering food security, climate is an exogenous trigger, while the deeper causes lie in social problems. Therefore, adaptation is subordinate to poverty alleviation. The paper examines how these two goals, climate adaptation and poverty alleviation, can be combined. Recent studies have shown that the most effective way to adapt to changing climate conditions in a poor country is to rely on local institutions that have established and sustainable mechanisms to deal with extreme climatic conditions. This research analyzes the stakeholde…

ilmastomuutokseen sopeutuminenEconomicsilmastoon sopeutuminenClimatic changes--Government policyStakeholder malliLDCclimate adaptationFood securityClimatic changesclimate adaptation. poverty alleviationYmpäristötiede - Environmental sciencespoverty alleviationValtio-oppi hallintotiede - Political scienceSocial structureMuut yhteiskuntatieteet - Other social sciencesPoverty--Preventionvähiten kehittyneet maatStakeholder modelköyhyyden vähentäminen
researchProduct

Alternative Military Keynesianism as a Tool of Civil-Military Cooperation in the Framework of the EU Defence Policy

2015

During the last year the security threats to the European Union have increased dramatically under the influence of military crisis in eastern Ukraine and Islamic terrorist activities in Europe. Consequently the demand for defence in the member states of the European Union has become greater than in previous years.This situation leads to the dilemma when the high level of defence expenditure can hamper the financial support of other sectors of national economy.Therefore it is necessary to increase the efficiency of available financial resources that have been allocated for the defence without a significant increase in defence expenditure. In order to achieve this efficiency the concept of cl…

industrial clustersdefence industryEconomic policynational economyArts & Humanitiesmilitary goodsIslamMilitary Keynesianismpublic-private partnershipDilemmamilitary KeynesianismPublic–private partnershipNational economyOrder (exchange)TerrorismEconomicstax relief.media_common.cataloged_instanceEuropean unionEconomic systemCommon Security and Defence<br />Policy of the European Unionmedia_commonEuropean Integration Studies: Research and Topicalities
researchProduct

Informace : výzva bezpečnostního systému

2018

The issue of information in the security system is extremely wide. Therefore, it is also difficult to deal with it within a scientific article. At the launch of this publication, the author did not aim, on the basis of the research will be able to solve problems related to the functioning of information system security. That is why he also focused on his issues in his papers, which are, in his opinion, the most important.

information operations.security systeminformation
researchProduct

Case study of why information security investment fail?

2015

Tämä tutkielma keskittyy tietoturvainvestointien päätöksentekoprosessiin. Ta- voitteena on tutkia miksi tietoturvainvestointipäätös hylätään. Tutkimuksen teoreettinen tausta perustuu aiemmin suoritettuun tutkimukseen, mikä on pää- osin käsitellyt tietoturvainvestointeja joko optimaalisen investointitason näkö- kulmasta, tai tehokkaan investointitason näkökulmasta. Aiempi tutkimus ei ole käsitellyt tietoturvainvestointeja epäonnistuneen päätöksenteon näkökulmasta, eikä siten voi esittää perusteluita päätöksenteolle. Tämän tutkielman tuloksena esitetään teoreettisia väittämiä, jotka tarjoavat mahdollisia vastauksia tutki- muskysymykseen. Tämä tutkimus täydentää osaltaan akateemista kirjallisu…

information security investmentknowledgemethod.Information securitycapabilityosaaminenpäätöksentekotietoturvadecision makinginvestoinnit
researchProduct

Analysis of information risk management methods

2014

Zudin, Rodion Analysis of information risk management methods Jyväskylä: University of Jyväskylä, 2014, 33 p. Information Systems, Bachelor’s Thesis Supervisor: Siponen, Mikko A brief overview in the information risk management field is done in this study by introducing the shared terminology and methodology of the field using literature overview in the first chapter. Second chapter consists of examining and comparing two information risk management methodologies proposed by two different guides: Risk Management Guide for Information Technology Systems by National Institute of Standards and Technology and The Security Risk Management Guide by Microsoft. By finding common factors and methods…

information security managementrisk assessmentrisk mitigation
researchProduct

Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions

2022

In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…

information security policy complianceComputer Networks and Communicationsohjeidenmukainen käyttäytyminentietoturvapolitiikkatietoturvadeterrent effectpelotteetpeloteteoriadeterrence theoryManagement Information Systemstietojärjestelmät
researchProduct

Moral sensitivity in information security dilemmas

2019

Activities that undermine information security such as noncompliance with information security policies raise moral concerns since they can expose valuable information assets. Existing research shows that moral reflection could play an inhibitory role in one’s decision to undermine information security. However, it is not clear whether users interpret such decisions from a moral standpoint to engage in moral reflection in the first place. Users have to be morally sensitive before they engage in moral reflection. Moral sensitivity involves perceiving a situation as morally relevant, identifying the parties involved and perceiving possible courses of action. We examine moral sensitivity in se…

information security policy compliancemoral sensitivityComputingMilieux_THECOMPUTINGPROFESSIONmoraaliinformation securitytietoturvapolitiikkaComputingMilieux_LEGALASPECTSOFCOMPUTINGtietoturvamoral behaviorComputingMilieux_MISCELLANEOUS
researchProduct

Investigating the Impact of Organizational Culture on Information Security Policy Compliance : The Case of Ethiopia

2021

Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most of the security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to c…

information security policy compliancetietosuojaRational Choice Theoryorganisaatiokulttuuriorganizational culturecomputing value frameworktietoturvapolitiikkaorganisaatiottietoturvarationaalisen valinnan teoria
researchProduct

Euroopan unionin yleisen tietosuoja-asetuksen aiheuttamat muutokset organisaatioiden tietoturvapolitiikkoihin

2017

EU:n yleistä tietosuoja-asetusta aletaan soveltaa toukokuun 25. päivänä 2018 ja sen aiheuttamat muutokset ovat merkittäviä ja kunnianhimoisia. Se on yksi laaja-alaisimpia EU:n lakimuutoksia viimevuosien ajalta. Yleisen tietosuoja-asetuksen vaikutukset ovat merkittäviä organisaatioille, sillä epäonnistuessaan asetuksen vaatimusten noudattamisessa organisaatio joutuu maksamaan merkittävät sakot, korkeimmillaan joko 4% yrityksen globaalista vuosittaisesta liikevaihdosta tai 20 000 000 euroa riippuen siitä, kumpi on korkeampi. Yleinen tietosuoja-asetus tulee luultavasti vaikuttamaan tietoturvapoliitikkojen kehitykseen, kun yritykset pyrkivät noudattamaan uusia vaatimuksia. Tietotu…

information security policytietosuojalainsäädäntöhenkilötiedotn yleinen tietosuoja-asetus (2016/679) [EU]organisaatiottietoturvapolitiikkanoudattaminenGeneral Data Protection Regulation
researchProduct