Search results for "Security"

showing 10 items of 1693 documents

Informasjonsflyt ved mottak og respons på trygghetsalarmer : en casestudie for å undersøke hvilken betydning tilgang på informasjon og informasjonsfl…

2016

Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 The theme of this study is security alarms and information flow. The background for the study is estimates regarding an upcoming growing number of security alarms in municipal healthcare services, recommendations on the transition from analogue to digital security alarms, and reports on the current organization of the safety alarms of varying quality and low efficiency (Frantzen, 2014; Fensli, 2015 Kvernland-Berg, 2014). Purpose The aim of this study was to find what importance access to information and information flow had in the working process with security alarms for a future-oriented health services. Method The su…

municipal healthcare serviceinformation flowkommunehelsetjenestenHSI500informasjonsflyttrygghetsalarmerVDP::Technology: 500::Information and communication technology: 550security alarmsorganizationorganisering
researchProduct

Èkonomičeskaâ desuverenizaciâ gosudarstva kak ugroza èkonomičeskoj bezopasnosti Ukrainy

2015

In the article it is made the analysis of factors influencing economic desovereignization of Ukraine and it is determined the effects of objective and subjective economic globalization for Ukraine. On the basis of the analysis it is justified immediate steps for ensuring the formation of a competitive and self-sufficient economy of Ukraine.

national interests in the economic sphereeconomic securitynational sovereigntyeconomic desovereignization of stateeconomic globalization.
researchProduct

Il costruttivismo. La rivalutazione delle idee nelle relazioni internazionali

2021

The chapter traces the roots and evolution of constructivism, the defining features and the value added to IR theory. It also presents some contributions by constructivst scholars and identifies challenges.

normeanarchymilitary interventionconstructivismpluralistic security communitiecostruttivismo teoria delle relazioni internazionaliIR theorycomunità di sicurezzaauthoritySettore SPS/04 - Scienza Politica
researchProduct

Framing Effects on Online Security Behavior

2020

We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.

nudgeOnline securityProcess (engineering)Vendorlcsh:BF1-990Internet privacyonline behaviorgain vs. loss frame050105 experimental psychologyEconomíaPassword strength03 medical and health sciences0302 clinical medicineProspect theoryPsychology0501 psychology and cognitive sciencesGeneral PsychologyOriginal ResearchG500business.industrycyber security05 social sciencesprospect theoryFraming effectC800lcsh:Psychologythreat assessmentlab experimentPsychologybusinessThreat assessment030217 neurology & neurosurgeryFrontiers in Psychology
researchProduct

Odnawialne źródła energii w zrównoważonym rozwoju

2017

W artykule starano się udowodnić, iż rozwój energetyki w kierunku zwiększenia udziału odnawialnych źródeł energii (OZE) wpisuje się w realizację koncepcji zrównoważonego rozwoju. Wyzwaniami dla ludzkości dzisiaj jest równy dostęp do wszelkiego rodzaju dóbr: energii czy wody, w celu zapewnienia odpowiedniego standardu życiowego. Rabunkowa gospodarka surowcami spowodowała głęboką dewastację środowiska naturalnego. Konsekwentne wdrażanie polityki ekologicznej (w tym OZE) w ramach zrównoważonego rozwoju stanowi gwarancję bezpieczeństwa energetycznego oraz podejmowania przez podmioty gospodarcze działań w zakresie ochrony środowiska.

odnawialne źródła energiienvironmental policiesrenewable energy resourcessustainable developmentbezpieczeństwo energetycznezrównoważony rozwójochrona środowiskaenergy securityEtyka Biznesu i Zrównoważony Rozwój : interdyscyplinarne studia teoretyczno-empiryczne
researchProduct

Glosa do uchwały Sądu Najwyższego - Izba Pracy, Ubezpieczeń Społecznych i Spraw Publicznych z dnia 4 sierpnia 2016 r., III UZP 11/16

2017

odwołanie od decyzji organu rentowegocases involving social securityappealpostępowanie cywilne (odrębne)insured party(separete) civil proceedingsappeal against pension authority's decisionsprawy z zakresu ubezpieczeń społecznychapelacjaubezpieczonyOrzecznictwo Sądów Polskich
researchProduct

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct

Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment

2012

This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…

oppimisympäristöHigher educationMultimediaComputer sciencebusiness.industryDesign-based researchCommunicationLearning environmentData securityCollaborative learningcomputer.software_genreGrounded theoryComputer Science ApplicationsEducationInformation and Communications TechnologyComputer-supported collaborative learningtietokoneavusteinenoppiminenComputingMilieux_COMPUTERSANDEDUCATIONMedia Technologycomputer-supported collaborated learningtietoturvabusinesscomputerlangattomat verkotOnline Journal of Communication and Media Technologies
researchProduct

Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions

2023

AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …

oppiva organisaatioComputer Networks and Communicationsbreach costTheoretical Computer Sciencecybersecurity investmentorganizational learningcybersecurity breachbreach identifcationcybersecurity performancetietoturvakyberturvallisuusSoftwaretieto- ja viestintärikoksetInformation SystemsInformation Systems Frontiers
researchProduct

Toward a stage theory of the development of employees’ information security behavior

2020

Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such models cannot explain a case where the reasons for ISB change. However, the underlying reasons and motives for users’ ISB are not static but may change over time. To understand the change in reasoning between different antecedents, we examine stage theorizing in other fields and develop the requirements for an emergent theory of the development of employees’ ISB: (1) the content of stages based on the stage elements and their stage-specific attributes; (2) the stage-independent element explaini…

organisaatiokäyttäytymineninformaatiokäyttäytyminenStage theoryoppiminenInformation securitytietoturvapolitiikkaLearningCompliance with information security policiesInformation security behaviortietoturva
researchProduct