Search results for "Security"
showing 10 items of 1693 documents
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…
Giving patients secure " google-like " access to their medical record
2008
International audience; The main problem for the patient who wants to have access to all of the information about his health is that this information is very often spread over many medical records. Therefore, it would be convenient for the patient, after being identified and authenticated, to use a kind of specific medical search engine as one part of the solution to this main problem. The principal objective is for the patient to have access to his or her medical information at anytime and wherever it has been stored. This proposal for secure "Google Like" access requires the addition of different conditions: very strict identity checks using cryptographic techniques such as those planned …
Liberal Institutionalism
2020
The application of liberal institutionalism to peacekeeping has shed light on several important questions regarding why member states support the deployment of a specific operation, how they build support for their position, whether domestic preferences influence their strategies in the Security Council and why they volunteer troops for peacekeeping. Sponsorship records have proven to be a useful sourse for researching coalition-building on peacekeeping.
Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education
2019
Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…
Ethos i tożsamość służby a bezpieczeństwo pracowników służb społecznych
2017
Bezpieczeństwo pracowników służb społecznych jest jedną z najważniejszych kwestii warunkujących jakość usług systemu pomocy i integracji społecznej, należy bowiem do katalogu podstawowych potrzeb człowieka. W sferze zawodowej pełni również funkcję regulatora relacji interpersonalnych, ponieważ określa relacje społeczne typu pracownik służby społecznej - użytkownik (odbiorca świadczeń i usług systemu pomocy i integracji społecznej). Ethos i tożsamość służby społecznej należą do tzw. grupy niewidzialnych instrumentów warunkujących bezpieczeństwo tej grupy zawodowej. W tych rozważaniach pełnią one dodatkowo rolę narzędzi analizy, która nawiązuje do czynnikowej teorii bezpieczeństwa pracowników…
Cyber security exercise : Literature review to pedagogical methodology
2019
This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future a new model for teaching in cyber security exercises. Cyber security exercises are the major service at JYVSECTEC - Jyväskylä Security Technology, cyber security research, training and development center in Finland [1]. JYVSECTEC Cyber security exercises are executed in real life simulation environment, RGCE (Realistic Global Cyber Environment) [1]. It provides the same functionality as the real Internet, but it is isolated from the real Internet and fully controlled by JYVSE…
Zagrożenie bezpieczeństwa osadzonych w przestrzeni izolacji więziennej
2019
Pomimo wielu przeobrażeń systemowych i penitencjarnych zjawisko nieformalnej degradacji nadal występuje, a skazani poszkodowani (zdegradowani) reprezentują specyficzną grupę osób odbywających karę pozbawienia wolności. Ich specyfika wynika zarówno z tego, kim są (cech osobowości), jak i z traktowania ich przez ogół kryminalnej populacji. W artykule opisano wyniki autorskich badań na temat funkcjonowania poszkodowanych w polskich więzieniach ze szczególnym uwzględnieniem (poczucia) bezpieczeństwa. Istotne było zbadanie czynników, które owo poczucie determinują, czyli: przyczyn degradacji więziennej; relacji interpersonalnych, jakie zachodzą pomiędzy chronionymi a pozostałymi więźniami (gryps…
Retirement Awareness as a Determinant of the Choice of Tools For Collecting Pension Capital
2018
The article deals with the problem of retirement awareness of adult citizens. Its purpose was to determine the level of this awareness and knowledge about the pension system, as well as to learn the motives of decisions related to the optional part of the pension system. In addition, the aim was to identify what voluntary forms of raising capital for the retirement are most often chosen, and which factors in particular make people to take action to secure their retirement future. The study established that the respondents negatively judge the effectiveness of the Polish pension system, do not have adequate knowledge about the functioning of the pension system and show little interest in add…
Security and perceptions of security
2017
One of the ways of analysing complex systems is studying them by building simplified models of some phenomena and evaluating them. By evaluation of a model we understand making some predictions and verifying whether such predictions are reflected in the reality. Knowledge of an underlying model of a social security enables us to foresee dangerous events and minimize potential losses or even prevent them, when possible. To be able to draw substantial conclusions, created model should be based on meaningful assumptions. One of the potential sources of error is to equate the feeling of safety with the safety itself. Such statement is false and can lead to draw incorrect conclusions. In this pa…
Il Perimetro di sicurezza nazionale cibernetica
2023
Il presente contributo intende approfondire la disciplina del Perimetro di sicurezza cibernetica istituito dal Decreto-legge 21 settembre 2019 , n. 105. Segnatamente, il lavoro intende approfondire l’architettura di tale sistema attraverso un’analisi del quadro organizzativo, con particolare riferimento alla distribuzione di competenze (e obblighi) dei diversi attori pubblici e privati coinvolti.