Search results for "Security"

showing 10 items of 1693 documents

Expectations and Experiences of Implementing a Mobile Secure Communication Application

2020

The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…

organisaatioviestintäComputer Networks and CommunicationsComputer scienceStrategy and Managementorganisaatiot02 engineering and technologyComputer securitycomputer.software_genresovellusohjelmatManagement Information SystemsSecure communicationmobiililaitteet020204 information systems0502 economics and businessyksityisyys0202 electrical engineering electronic engineering information engineeringodotuksetmobiilisovelluksettietoturvaviestintäMarketingbusiness.industryturvallisuus05 social sciencesComputer Science Applicationstietoliikennekokemukset050211 marketingbusinesscomputer
researchProduct

Giving patients secure " google-like " access to their medical record

2008

International audience; The main problem for the patient who wants to have access to all of the information about his health is that this information is very often spread over many medical records. Therefore, it would be convenient for the patient, after being identified and authenticated, to use a kind of specific medical search engine as one part of the solution to this main problem. The principal objective is for the patient to have access to his or her medical information at anytime and wherever it has been stored. This proposal for secure "Google Like" access requires the addition of different conditions: very strict identity checks using cryptographic techniques such as those planned …

patient identifier[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]watermarking[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]electronic signaturedirect accessdata securitymedical recordgridComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Liberal Institutionalism

2020

The application of liberal institutionalism to peacekeeping has shed light on several important questions regarding why member states support the deployment of a specific operation, how they build support for their position, whether domestic preferences influence their strategies in the Security Council and why they volunteer troops for peacekeeping. Sponsorship records have proven to be a useful sourse for researching coalition-building on peacekeeping.

peacekeeping Security Council United Nations liberal institutionalism coalitions
researchProduct

Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

2019

Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…

pedagogical approachessähköinen arviointiresponsible research and innovationeducación superiorhenkilöllisyysauthorship verificationverificación de autoríae-assessmentidentitytekijyysAuditor's reportAuthentication4. Education05 social scienceseducació superior050301 educationelectronic authenticationPublic relationsAuthentication (law)Autentificación de documentosverifiointitodentaminenhigher educatione-authenticationThe InternetPsychologyautenticación electrónica050101 languages & linguisticsplagiointiHigher educationBest practiceCheatingData securityautenticacióEducationautenticación0501 psychology and cognitive sciencestietoturvaauthorshipcheating detectionbusiness.industrytrustInformation securityautenticació electrònicae-arviointiAutenticació de documentsverificació de l'autoriabusiness0503 educationarviointi
researchProduct

Ethos i tożsamość służby a bezpieczeństwo pracowników służb społecznych

2017

Bezpieczeństwo pracowników służb społecznych jest jedną z najważniejszych kwestii warunkujących jakość usług systemu pomocy i integracji społecznej, należy bowiem do katalogu podstawowych potrzeb człowieka. W sferze zawodowej pełni również funkcję regulatora relacji interpersonalnych, ponieważ określa relacje społeczne typu pracownik służby społecznej - użytkownik (odbiorca świadczeń i usług systemu pomocy i integracji społecznej). Ethos i tożsamość służby społecznej należą do tzw. grupy niewidzialnych instrumentów warunkujących bezpieczeństwo tej grupy zawodowej. W tych rozważaniach pełnią one dodatkowo rolę narzędzi analizy, która nawiązuje do czynnikowej teorii bezpieczeństwa pracowników…

pedagogika społecznaidentity of social servicetożsamość służby społecznejHelena Radlińskaethossecuritysocial pedagogybezpieczeństwoAnnales Universitatis Mariae Curie-Skłodowska. Sectio J, Paedagogia-Psychologia
researchProduct

Cyber security exercise : Literature review to pedagogical methodology

2019

This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future a new model for teaching in cyber security exercises. Cyber security exercises are the major service at JYVSECTEC - Jyväskylä Security Technology, cyber security research, training and development center in Finland [1]. JYVSECTEC Cyber security exercises are executed in real life simulation environment, RGCE (Realistic Global Cyber Environment) [1]. It provides the same functionality as the real Internet, but it is isolated from the real Internet and fully controlled by JYVSE…

pelillistäminensimulation pedagogyexercisegame based learningsimulaatioharjoitteluharjoituksetSociologyyhteisöllinen oppiminenComputer securitycomputer.software_genrekyberturvallisuuscomputer
researchProduct

Zagrożenie bezpieczeństwa osadzonych w przestrzeni izolacji więziennej

2019

Pomimo wielu przeobrażeń systemowych i penitencjarnych zjawisko nieformalnej degradacji nadal występuje, a skazani poszkodowani (zdegradowani) reprezentują specyficzną grupę osób odbywających karę pozbawienia wolności. Ich specyfika wynika zarówno z tego, kim są (cech osobowości), jak i z traktowania ich przez ogół kryminalnej populacji. W artykule opisano wyniki autorskich badań na temat funkcjonowania poszkodowanych w polskich więzieniach ze szczególnym uwzględnieniem (poczucia) bezpieczeństwa. Istotne było zbadanie czynników, które owo poczucie determinują, czyli: przyczyn degradacji więziennej; relacji interpersonalnych, jakie zachodzą pomiędzy chronionymi a pozostałymi więźniami (gryps…

penal institution; penal subculture; injured prisoners; victim; sense of securityzakład karny; podkultura więzienna; skazani poszkodowani; ofiara; poczucie bezpieczeństwaAnnales Universitatis Mariae Curie-Skłodowska. Sectio J, Paedagogia-Psychologia
researchProduct

Retirement Awareness as a Determinant of the Choice of Tools For Collecting Pension Capital

2018

The article deals with the problem of retirement awareness of adult citizens. Its purpose was to determine the level of this awareness and knowledge about the pension system, as well as to learn the motives of decisions related to the optional part of the pension system. In addition, the aim was to identify what voluntary forms of raising capital for the retirement are most often chosen, and which factors in particular make people to take action to secure their retirement future. The study established that the respondents negatively judge the effectiveness of the Polish pension system, do not have adequate knowledge about the functioning of the pension system and show little interest in add…

pension systemvoluntary forms of building pension security.retirement awareness
researchProduct

Security and perceptions of security

2017

One of the ways of analysing complex systems is studying them by building simplified models of some phenomena and evaluating them. By evaluation of a model we understand making some predictions and verifying whether such predictions are reflected in the reality. Knowledge of an underlying model of a social security enables us to foresee dangerous events and minimize potential losses or even prevent them, when possible. To be able to draw substantial conclusions, created model should be based on meaningful assumptions. One of the potential sources of error is to equate the feeling of safety with the safety itself. Such statement is false and can lead to draw incorrect conclusions. In this pa…

perception of securitysecuritysocial security
researchProduct

Il Perimetro di sicurezza nazionale cibernetica

2023

Il presente contributo intende approfondire la disciplina del Perimetro di sicurezza cibernetica istituito dal Decreto-legge 21 settembre 2019 , n. 105. Segnatamente, il lavoro intende approfondire l’architettura di tale sistema attraverso un’analisi del quadro organizzativo, con particolare riferimento alla distribuzione di competenze (e obblighi) dei diversi attori pubblici e privati coinvolti.

perimetro di sicurezza nazionale cibernetica cybersecurity cibersicurezza PSNC sicurezza nazionale sicurezza ciberneticaSettore IUS/09 - Istituzioni Di Diritto Pubblico
researchProduct