Search results for "Security"

showing 10 items of 1693 documents

Towards proactive context-aware self-healing for 5G networks

2017

In this paper, we suggest a new research direction and a future vision for Self-Healing (SH) in Self-Organizing Networks (SONs). The problem we wish to solve is that traditional SH solutions may not be sufficient for the future needs of cellular network management because of their reactive nature, i.e., they start recovering after detecting already occurred faults instead of preparing for possible future faults in a pre-emptive manner. The detection delays are especially problematic with regard to the zero latency requirements of 5G networks. To address this problem, existing SONs need to be upgraded from reactive to proactive response. One of the dimensions in SH research is to employ more…

ta213Computer Networks and CommunicationsComputer science020206 networking & telecommunicationsSelf-organizing network02 engineering and technologyuser contextcontext aware systemComputer securitycomputer.software_genre5G networksSelf-healing0202 electrical engineering electronic engineering information engineeringCellular networkself-organizing networkself-healing020201 artificial intelligence & image processingcomputer5G
researchProduct

The construction of academic identity in the changes of Finnish higher education

2013

This article sets out to explore how academics make sense of the current transformations of higher education and what kinds of academic identities are thereby constructed. Based on a narrative analysis of 42 interviews with Finnish academics, nine narratives are discerned, each providing a different answer as to what it means to be an academic in the present-day university. Narratives of resistance, loss, administrative work overload and job insecurity are embedded in a regressive storyline, describing deterioration of academic work and one's standing. In a sharp contrast, narratives of success, mobility and change agency rely on a progressive storyline which sees the current changes in a p…

ta520Higher educationbusiness.industrySelf-conceptIdentity (social science)Resistance (psychoanalysis)EducationNarrative inquiryJob securityAgency (sociology)Pedagogyta516NarrativeSociologybusinessStudies in Higher Education
researchProduct

Changing people’s attitudes and beliefs toward driving through floodwaters : Evaluation of a video infographic

2018

Abstract Despite awareness of campaigns such as ‘Turn Around, Don’t Drown’ and the Australian state of Queensland’s ‘If It’s Flooded, Forget It’, people continue to drive through floodwaters, causing loss of life, risk to rescuers, and damage to vehicles. The aim of this study was to develop a video infographic that highlights the dangers of driving through floodwaters and provide safety tips to reduce the risk, and to evaluate its effectiveness in changing the beliefs and intentions of Australian adults toward this risky driving behaviour. This study adopted an online three-wave non-controlled pretest–posttest design. Australian licensed drivers (N = 201, male = 41, female = 160; Mage = 34…

ta520flooded waterwaysTransportationvesiäylät03 medical and health sciences0302 clinical medicineuskomuksethukkuminenPsychological TheorydrivingDrowning prevention030212 general & internal medicineta518Empirical evidenceApplied Psychologyta515Civil and Structural EngineeringSubjective norm030505 public healthwater safetyturvallisuusdrowningInfographicsocial cognitive theoriesRegretta3141tulvatwaterwaysRisk perceptionfloodsAutomotive Engineeringbeliefs0305 other medical sciencePsychologyLoss of lifeClinical psychologysafety and securityTransportation Research Part F : Traffic Psychology and Behaviour
researchProduct

Opportunity Discovery and Creation in Cloud Computing

2013

Cloud computing provides opportunities for firms selling or using cloud services. However, little is known about how entrepreneurs discover or create these opportunities for cloud computing. In this study, we found that the opportunities discovered in cloud computing were related to the development of software for a particular need. By contrast, created opportunities were developed under conditions of technological uncertainty, at a time when the market did not yet exist. It appears that created opportunities, if successful, bring long-term competitive advantages, whereas discovered opportunities are more easily copied and exploited by competitors. peerReviewed

ta520pilvipalvelutCloud computing securityKnowledge managementUtility computingbusiness.industrycloud computingCloud computingCompetitor analysisbusinessCompetitive advantageOpportunity discovery
researchProduct

Care for older people in early twenty-first-century Europe : dimensions and directions of change

2017

ta520sosiaaliturvaTwenty-First Centuryvanhuksetcare for older peopleWelfare stateGender studiesta5142elderlyvanhustenhuoltohoitoEuropeHuman geographycareOlder peoplesocial security
researchProduct

El crimen de agresión : ¿es posible su persecución judicial internacional?

2021

The paper analyses the crime of aggression, in particular the recent activation of the jurisdiction of the International Criminal Court over it and the main obstacles to its effective prosecution, taking into consideration the low number of States Parties that have ratified the Amendments that regulate it

taking into consideration the low number of States Parties that have ratified the Amendments that regulate it Crimen de agresión:CIENCIAS JURÍDICAS [UNESCO]Security Council. 286 321María The paper analyses the crime of aggressionCrime of aggressionInternational Criminal Courtin particular the recent activation of the jurisdiction of the International Criminal Court over it and the main obstacles to its effective prosecutionact of aggressionCorte Penal Internacional2070-8157 22082 Revista Boliviana de Derecho 565487 2021 31 7730060 El crimen de agresión ¿es posible su persecución judicial internacional? Carro PitarchUNESCO::CIENCIAS JURÍDICASConsejo de Seguridad.acto de agresión
researchProduct

Vakcinācijas sertifikātu mobilo lietotņu drošības novērtēšana

2022

Maģistra darba tēma “Vakcinācijas sertifikātu mobilo lietotņu drošības novērtēšana” izvēlēta, ņemot vērā tās aktualitāti un saistībā ar izaicinājumiem, ar kuriem saskārusies Pasaules sabiedrība. Populārāko mobilo operētājsistēmu Android un iOS lietotņu veikalos ir pieejamas daudzas dažādas lietotnes vakcinācijas kvadrātkodu izmantošanai, tomēr nav izdarīts pētījums par šādu Latvijā izplatīto lietotņu kiberapdraudējumu un tehnisko drošības līmeni. Lai pārliecinātos, ka drošība netiek apdraudēta, un identificētu ievainojamības, ir veikta risinājumu potenciālo draudu modelēšana un tehniskās drošības pārbaudes, kā arī sniegti secinājumi un ieteikumi turpmākam darbam. Maģistra darbs izpildīts La…

tehniskā drošības pārbaudeDatorzinātneprogrammatūras ievainojamībassecuritydrošībamobilā lietotne
researchProduct

Creating modern blue pills and red pills

2019

The blue pill is a malicious stealthy hypervisor-based rootkit. The red pill is a software package that is designed to detect such blue pills. Since the blue pill was originally proposed there has been an ongoing arms race between developers that try to develop stealthy hypervisors and developers that try to detect such stealthy hypervisors. Furthermore, hardware advances have made several stealth attempts impossible while other advances enable even more stealthy operation. In this paper we describe the current status of detecting stealth hypervisors and methods to counter them. peerReviewed

tekninen rikostutkintaforensicsvirtualisointikyberrikollisuusinformation securitytietoturvakyberturvallisuusvirtualizationtietomurtoverkkohyökkäykset
researchProduct

CZYM JEST ASZ-SZABAB? ZARYS ATAKU NA GALERIĘ HANDLOWĄ WESTGATE

2017

: We wrześniu 2013 roku światem wstrząsnęła informacja o krwawym zamachu w Nairobi. Mimo zaangażowania mediów w relacjonowanie całego zajścia samo zjawisko organizacji Asz-Szabab nie zostało wyczerpująco wyjaśnione. Autorzy artykułu podjęli więc próbę ukazania złożoności i stopnia skomplikowania całego zagadnienia. W pracy starano się w sposób obiektywny zbudować wizerunek Asz-Szabab, jak i przedstawić sposób jej działania w ujęciu bezpieczeństwa wewnętrznego głównie kontynentu Afrykańskiego i Europejskiego. Dokonano tego analizując szczegółowo sam zamach w Kenii, jak i codzienne działanie organizacji na swoim terenie. Zarysowano również tło historyczne oraz kulturowe w celu określenia waru…

terroryzmInternational SecuritySomaliaAl ShabaabSzariatAsz-SzababterrorismAl KaidaSharia LawIslambezpieczeństwo międzynarodoweRoczniki Studenckie Akademii Wojsk Lądowych
researchProduct

Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic

2021

Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers. Organizations with working antivirus systems and firewalls may be surprised when they discover their network has been encrypted by a ransomware operator. This raises a serious question, how did the attacks go undetected? The conducted research focuses on the most common pitfalls regarding late or even non-existent detection by defining the root cause behind the failed detec…

threat detectionorganisaatiotTK5101-6720threat analysiscyber defensetietotekniikkacybersecurity frameworktestauscyber attack simulationTelecommunicationsimulointisoctietoturvakyberturvallisuusverkkohyökkäyksetexploitationpalomuurit (tietoturva)
researchProduct