Search results for "Security"
showing 10 items of 1693 documents
Executives’ Commitment to Information Security : Interaction between the Preferred Subordinate Influence Approach (PSIA) and Proposal Characteristics
2020
Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…
Przestępstwa terrorystyczne w polskim prawie karnym
2016
Smart Terminal System of Systems’ Cyber Threat Impact Evaluation
2023
Systems of system-level thinking is required when the purpose is to develop a coherent understanding of the ecosystem where every user and system requirements are divided into specific parts. The smarter project, as a part of the Sea4value program of DIMECC, aims to develop harbor operations, including passenger and cargo transportation, in a way that port processes will improve, emissions will decrease, and overall security will enhance in smart ports. This paper describes cyber-attack impacts against the Smart terminal system of systems in the cyber realm by utilizing the MITRE ATTACK® framework to map the objectives of threat actors. The Smart Terminal system environment includes ICT, IC…
Cyber security challenges in aviation and maritime
2021
Cyber deterrence and Russia’s active cyber defense
2020
Tietoturvan ihmiselementti : sosiaalinen manipulointi
2017
Tämän tutkielman aiheena on sosiaalinen manipulointi, tietoturvan ihmiselementti ja sen huomioon ottaminen ja hyökkäysten ehkäiseminen yrityksen tai organisaation tietoturvassa. Sosiaalisella manipuloinnilla tarkoitetaan tutkielman kontekstissa tietojärjestelmän käyttäjiin kohdistuvaa manipulointia, jonka tavoitteena on informaation keruu tai tietojärjestelmään murtautuminen. Aihetta on tärkeää tutkia, sillä useat tietoturva-asiantuntijat ovat yhtä mieltä siitä, että merkittävin tietojärjestelmän tietoturvauhka on sen käyttäjät ja heidän tietoturvallisuuden näkökulmasta tekemät inhimilliset erehdykset. Sosiaalinen manipulointi kohdistuu juuri tähän tietoturvan heikkouteen. Tutkielman tuloks…
Hydro-mechanical analysis of volcanic ash slopes during rainfall
2016
Rainfall-induced landslides in volcanic ashes represent a major natural hazard in many regions around the world. Owing to their loose structure, volcanic ash slopes are prone to rainfall-induced landslides. The paper presents a continuum modelling approach for the analysis of wetting-induced instability phenomena at the onset of failure in loose volcanic ash slopes. A numerical simulation of a landslide-prone volcanic slope in Costa Rica is carried out with a two-dimensional hydro-mechanical finite-element slope model. A constitutive model based on the effective stress concept extended to partially saturated conditions is used to reproduce the volcanic ash hydro-mechanical behaviour. The m…
Cartesian Psychology – Could There Be One?
2008
The chapter examines what it would mean to talk about “psychology” in Descartes’ terms and argues that within the Cartesian framework we cannot really formulate the questions that are posed by contemporary psychologists. This results from the fact that psychological topics can be found on all three levels of Cartesian science: in metaphysics, in physics and finally in the applied sciences, such as medicine and morals. The aim is to show that the sensory and vegetative functions are often taken together by Descartes. Therefore, the Cartesian system does not recognize any principal difference between sensory functions, such as vision, and vegetative functions, such as digestion. Humans can be…
FOR A CONSCIUOS FRUITION OF THE CULTURAL HERITAGE OF ANCIENT NOTO (SICILY). EFIAN PROJECT AS OPPORTUNITY FOR VALORISATION
2017
Abstract. The archaeological site of Ancient Noto is all that remains of one of the most interesting and important cities in the Est part of Sicily. Architecture and political life made Noto a point of reference for the island, expecially in XVI and XVII century, before it was destroyed by a devastating earthquake in 1963. A general project of safeguard, together with archaeological excavations, could hand a great amount of information, archaeological finds, pieces of architecture, that are useful to understand the site, known as a "Sicilian Pompei". Our intervention has the aim to describe the importance of EFIAN (Experimental Fruition Ingenious Ancient Noto). The project is carried out as…
Vulnerability to climate change and adaptation strategies of local communities in Malawi: experiences of women fish-processing groups in the Lake Chi…
2016
Abstract. In recent years, research on climate change and human security has received much attention among policy makers and academia alike. Communities in the Global South that rely on an intact resource base and struggle with poverty, existing inequalities and historical injustices will especially be affected by predicted changes in temperature and precipitation. The objective of this article is to better understand under what conditions local communities can adapt to anticipated impacts of climate change. The empirical part of the paper answers the question as to what extent local women engaged in fish processing in the Chilwa Basin in Malawi have experienced climate change and how they …