Search results for "Security"
showing 10 items of 1693 documents
Generations of Stateless People: Many Years of The Rohingya’s Personal Security at Risk and the Support of the EU
2021
The Rohingya is an ethnic-religious Muslim minority that has struggled with serious human rights violations for decades. Indian migration to Burma, stimulated by British colonial rule, is pointed to as the main cause of the Muslim-Buddhist conflict. Although Indians in Burma currently constitute a fraction of the population (2.3%), resentment remained. The aim of the article is to analyze the threats to many aspects of the personal security of the Rohingya population. It is one of the most populous groups of stateless persons in the world; moreover, since the 1960s, this ethnic group has experienced oppression on a huge scale: from restrictions related to work and movement as well as diffic…
Cyber Threat Analysis in Smart Terminal Systems
2023
Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have ch…
Zagrożenia bezpieczeństwa wewnętrznego Niemiec jako konsekwencja procesów imigracyjnych
2017
In the Federal Republic of Germany there is a visible growth of the importance of immigration policy, of the weight of the problem of integration/lack of integration of mi- grants with the German society is visible, and of the need for permanent monitoring of internal security threats and difficulties with their prevention and fighting them. Many researchers working on the internal security of Germany admit that the current threats are linked, by the majority of Germans, with the influx of immigrants to this country. The migrants are seen as a source of potential risks, dangers and internal conflicts. It might be argued that there is an undeniable correlation between migra tion and security…
Organisational GDPR Investments and Impacts
2023
The aim of this empirical multi-case study is to understand the GDPR investments and impacts of the organisations. Among these, the measuring experiences related to GDPR and information security (Isec), and the future expectations are examined. Several interesting findings were recognised, which also enabled further suggestions. First, an understanding of the organisations’ investments and their impact is built by gathering information about the actions that organisations made to fulfil the GDPR requirements. In the second phase, it is deemed necessary to examine how organisations experience the measures and evaluation of GDPR development and progress, in order to understand how respondents…
APT Cyber-attack Modelling: Building a General Model
2022
The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other malicious actors who have embraced the Internet as a more anonymous, convenient, and profitable way of carrying out their activities. The systems are attacked more and more by single or multiple hacktivists, state sponsored hackers, cyber criminals, cyber terrorists, cyber spies, or cyber warfare warfighters. The cyber security approach requires a balance of cyber threat intelligence, real time cyber-attack detection and especially the cyber early…
Le renouvellement du contrôle juridictionnel de l’administration au moyen du recours pour excès de pouvoir
2017
The role of the administrative judge (the excess of power) has evolved due to the implementation of the various texts adopted recently as well as the developments in the case-law in recent years. In many areas, its role now goes beyond the mere confrontation of an administrative act with the rule of law. At the heart of the annulment decision is a statement and an assessment of the facts, apart from the interpretation of the law, which were usually separated by the principle of separation between the administration and its judge.Some jurisprudence which has become very classical, as well as others more recent, can be considered as characteristic manifestations of this new tendency of the ju…
Method and Practical Guidelines for Overcoming Enterprise Architecture Adoption Challenges
2017
During the last few years, interest towards Enterprise Architecture (EA) has increased, not least due to anticipated benefits resulting from adopting it. For instance, EA has been argued to provide cost reduction, technology standardisation, process improvement, and strategic differentiation. Despite these benefits, the EA adoption rate and maturity are still low. Consequently, EA benefits are not realised. A major reason hindering the adoption is that EA is not understood correctly. This paper aims for minimising the effect of the lack of understanding EA to adopting EA. Based on the research conducted in Finnish public sector, we propose an improved Enterprise Architecture Adoption Method…
The end of the Euro-Atlantic pluralistic security community? the new agenda of transatlantic security relations in the global political system
2009
The chapter analyses security relations between the US and the EU, as reflected in the new agenda of transatlantic security relations and in its outcomes. Differences in international actorness, in the strategic culture and in threat perception between the two international actors are analyzed. It is noted that, the emerging of security challenges not strictly of a military type, most often transnational in nature, creates an incentive for the two actors to cooperate. An empirical analysis of the answers given by the US-EU to international security crises in the period 1990-2000 is conducted to show that a US-EU cooperation nucleus, built on the long practice of the Atlantic cooperation, is…
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
2015
Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast to detrimental the networks and hosts. Due to these reasons real-time monitoring, processing and intrusion detection are now among the key features of NIDS. Traditional types of intrusion detection systems such as signature base IDS are not able detect intrusions with new and complex strategies. Now days, automatic traffic analysis and anomaly intrusion detection became more efficient in field of network security however they suffer from high number of false alarms. Among all …
Safety Evaluation of Turbo-Roundabouts with and without Internal Traffic Separations Considering Autonomous Vehicles Operation
2021
The paper presents a microsimulation approach for assessing the safety performance of turbo-roundabouts where Cooperative Autonomous Vehicles “CAVs” have been introduced into the traffic mix alongside conventional vehicles “CVs”. Based on the analysis of vehicle trajectories from VISSIM and subsequent analysis of traffic conflicts through the Surrogate Safety Assessment Model (SSAM), the research aims to evaluate the safety benefits of turbo-roundabouts where the lanes are physically separated by raised curbs, compared to roundabouts without such curbs. The paper will then describe the methodological path followed to build VISSIM models of turbo-roundabouts with and without raised curbs in …