Search results for "Security"
showing 10 items of 1693 documents
Informasjonsflyt ved mottak og respons på trygghetsalarmer : en casestudie for å undersøke hvilken betydning tilgang på informasjon og informasjonsfl…
2016
Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 The theme of this study is security alarms and information flow. The background for the study is estimates regarding an upcoming growing number of security alarms in municipal healthcare services, recommendations on the transition from analogue to digital security alarms, and reports on the current organization of the safety alarms of varying quality and low efficiency (Frantzen, 2014; Fensli, 2015 Kvernland-Berg, 2014). Purpose The aim of this study was to find what importance access to information and information flow had in the working process with security alarms for a future-oriented health services. Method The su…
Èkonomičeskaâ desuverenizaciâ gosudarstva kak ugroza èkonomičeskoj bezopasnosti Ukrainy
2015
In the article it is made the analysis of factors influencing economic desovereignization of Ukraine and it is determined the effects of objective and subjective economic globalization for Ukraine. On the basis of the analysis it is justified immediate steps for ensuring the formation of a competitive and self-sufficient economy of Ukraine.
Il costruttivismo. La rivalutazione delle idee nelle relazioni internazionali
2021
The chapter traces the roots and evolution of constructivism, the defining features and the value added to IR theory. It also presents some contributions by constructivst scholars and identifies challenges.
Framing Effects on Online Security Behavior
2020
We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.
Odnawialne źródła energii w zrównoważonym rozwoju
2017
W artykule starano się udowodnić, iż rozwój energetyki w kierunku zwiększenia udziału odnawialnych źródeł energii (OZE) wpisuje się w realizację koncepcji zrównoważonego rozwoju. Wyzwaniami dla ludzkości dzisiaj jest równy dostęp do wszelkiego rodzaju dóbr: energii czy wody, w celu zapewnienia odpowiedniego standardu życiowego. Rabunkowa gospodarka surowcami spowodowała głęboką dewastację środowiska naturalnego. Konsekwentne wdrażanie polityki ekologicznej (w tym OZE) w ramach zrównoważonego rozwoju stanowi gwarancję bezpieczeństwa energetycznego oraz podejmowania przez podmioty gospodarcze działań w zakresie ochrony środowiska.
Glosa do uchwały Sądu Najwyższego - Izba Pracy, Ubezpieczeń Społecznych i Spraw Publicznych z dnia 4 sierpnia 2016 r., III UZP 11/16
2017
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment
2012
This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions
2023
AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …
Toward a stage theory of the development of employees’ information security behavior
2020
Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such models cannot explain a case where the reasons for ISB change. However, the underlying reasons and motives for users’ ISB are not static but may change over time. To understand the change in reasoning between different antecedents, we examine stage theorizing in other fields and develop the requirements for an emergent theory of the development of employees’ ISB: (1) the content of stages based on the stage elements and their stage-specific attributes; (2) the stage-independent element explaini…