Search results for "Security"
showing 10 items of 1693 documents
Factorial Structure of Web-Credibility in a population of Italian Internet Users. A pilot study
2009
Recent studies by Fogg and his colleagues have defined a new psychological construct called Web credibility. It describes the principal dimensions which lead people to believe (or not) online information. In this framework, the factorial structure of Web credibility was explored in a sample of 152 Italian students of psychology who were Internet users, using a questionnaire. A consistent four-factorial structure emphasized crucial aspects of Web credibility, namely, Inaccuracy, Efficiency, Social Validation, and Commercial Features. Such results seem in line with Fogg's theoretical model; however, further research is required to identify dimensions of this construct.
Sleepiness, sleep, and use of sleepiness countermeasures in shift-working long-haul truck drivers
2015
Driver sleepiness is a prevalent phenomenon among professional drivers working unconventional and irregular hours. For compromising occupational and traffic safety, sleepiness has become one of the major conundrums of road transportation. To further elucidate the phenomenon, an on-road study canvassing the under-explored relationship between working hours and sleepiness, sleep, and use of sleepiness countermeasures during and outside statutory rest breaks was conducted. Testing the association between the outcomes and working hours, generalized estimating equations models were fitted on a data collected from 54 long-haul truck drivers (mean 38.1 ± 10.5 years, one female) volunteering in the…
Psychosocial Risks, Work Engagement, and Job Satisfaction of Nurses During COVID-19 Pandemic
2020
Context:COVID-19 pandemic is a serious health emergency that has affected countries all over the world. Health emergencies are a critical psychosocial risk factor for nurses. In general, psychosocial risks constitute serious problems as they impact workers' health, productivity, and efficiency. Despite their importance, few studies analyze nurses' psychosocial risks during a health emergency caused by a pandemic or analyze their perception of the emergency and its relation to such risks.Objectives:To analyze the perception of COVID-19 by nurses, especially about measures, resources, and impact on their daily work. Also, to analyze these professionals' psychosocial risks and the relationship…
Pseudonyms for Cancer Registries
1996
AbstractIn order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be prote…
State of the Art Literature Review on Network Anomaly Detection
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory
2018
Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
Unione africana e Nazioni Unite: coordinamento o subordinazione nella gestione delle crisi?
2019
The present chapter deals with the relationship between the United Nations and the African Union in the field of international peace and security. The shifting from the Organization for African Unity to the African Union and the establishment of the Peace and Security Council are the answers of African States to the failure of the United Nations to manage the several crisis scenarios in Africa since the early ’90s. If one considers, in fact, the practice of the Union, as regards enforcement actions, the lack of financial resources is the major obstacle to peace and security in Africa. Consequently, the AU Constitutive Act norms which seem to provide for a unilateral right to intervene of th…
Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection
2014
[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…
The dark side of romantic relationships: Aggression in adolescent couples and links to attachment
2015
Item does not contain fulltext This study focuses on romantic relationships from the perspective of both partners. This dyadic approach was chosen to account for the fact that both partners may differently contribute to the escalation of aggression. In a sample of 194 romantic partner dyads, differences between female and male partners׳ reports of aggression (relational and physical) and measures of attachment security and jealousy were assessed. A hierarchical cluster analysis identified five distinct subgroups of dyads with mutually aggressive or one-sided aggressive dyad. Of note were dyads with aggressive females and self-silencing males. The mutually aggressive couples showed the least…