Search results for "Security"

showing 10 items of 1693 documents

Factorial Structure of Web-Credibility in a population of Italian Internet Users. A pilot study

2009

Recent studies by Fogg and his colleagues have defined a new psychological construct called Web credibility. It describes the principal dimensions which lead people to believe (or not) online information. In this framework, the factorial structure of Web credibility was explored in a sample of 152 Italian students of psychology who were Internet users, using a questionnaire. A consistent four-factorial structure emphasized crucial aspects of Web credibility, namely, Inaccuracy, Efficiency, Social Validation, and Commercial Features. Such results seem in line with Fogg's theoretical model; however, further research is required to identify dimensions of this construct.

AdultMaleWeb-credibilitySettore M-PSI/01 - Psicologia GeneraleFactorialWeb credibilityPopulationPilot ProjectsSample (statistics)EfficiencyModels PsychologicalTrustcognitive assessementWorld Wide WebUser-Computer InterfaceSurveys and QuestionnairesHumansStudentseducationGeneral PsychologyStructure (mathematical logic)Interneteducation.field_of_studyAttitude to ComputersPrincipal (computer security)Equipment DesignTranslatingItalyFemaleInternet usersFactor Analysis StatisticalConstruct (philosophy)PsychologySocial psychologyfactorial study
researchProduct

Sleepiness, sleep, and use of sleepiness countermeasures in shift-working long-haul truck drivers

2015

Driver sleepiness is a prevalent phenomenon among professional drivers working unconventional and irregular hours. For compromising occupational and traffic safety, sleepiness has become one of the major conundrums of road transportation. To further elucidate the phenomenon, an on-road study canvassing the under-explored relationship between working hours and sleepiness, sleep, and use of sleepiness countermeasures during and outside statutory rest breaks was conducted. Testing the association between the outcomes and working hours, generalized estimating equations models were fitted on a data collected from 54 long-haul truck drivers (mean 38.1 ± 10.5 years, one female) volunteering in the…

AdultMalemedicine.medical_specialtySleepinessEveningShift workPoison controlTransportationHuman Factors and ErgonomicsComputer securitycomputer.software_genreCoffeeOccupational safety and healthShift workOn-road studySleep Disorders Circadian RhythmCaffeineSurveys and QuestionnairesWork Schedule ToleranceOdds RatioHumansMedicineAttentionOccupationsSocial BehaviorSafety Risk Reliability and Qualityta515FinlandRoad transportationMorningbusiness.industryAccidents TrafficPublic Health Environmental and Occupational HealthActigraphyta3142Middle AgedConfidence intervalSleepiness countermeasureMotor VehiclesAlertnessPhysical therapyCentral Nervous System StimulantsFemaleSleepbusinesscomputerAccident Analysis & Prevention
researchProduct

Psychosocial Risks, Work Engagement, and Job Satisfaction of Nurses During COVID-19 Pandemic

2020

Context:COVID-19 pandemic is a serious health emergency that has affected countries all over the world. Health emergencies are a critical psychosocial risk factor for nurses. In general, psychosocial risks constitute serious problems as they impact workers' health, productivity, and efficiency. Despite their importance, few studies analyze nurses' psychosocial risks during a health emergency caused by a pandemic or analyze their perception of the emergency and its relation to such risks.Objectives:To analyze the perception of COVID-19 by nurses, especially about measures, resources, and impact on their daily work. Also, to analyze these professionals' psychosocial risks and the relationship…

AdultMalework engagementgenetic structuresProtective factornurseContext (language use)WorkloadNursing Staff HospitalJob Satisfaction03 medical and health sciences0302 clinical medicineNursingRisk Factorspeak pandemicSurveys and Questionnaires0502 economics and businessHumansjob insecurity030212 general & internal medicineBurnout ProfessionalPandemicsOriginal ResearchSARS-CoV-2Work engagementlcsh:Public aspects of medicine05 social sciencesPublic Health Environmental and Occupational HealthCOVID-19Emotion workWorkloadpsychosocial riskslcsh:RA1-1270Risk factor (computing)Middle AgedSpainJob satisfactionFemalePublic HealthPsychologyPsychosocial050203 business & managementFrontiers in Public Health
researchProduct

Pseudonyms for Cancer Registries

1996

AbstractIn order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be prote…

Advanced and Specialized NursingInformation privacyeducation.field_of_studybusiness.industryPopulationHealth InformaticsCryptographyPseudonymComputer securitycomputer.software_genreHealth informaticsData flow diagramHealth Information ManagementSynonym (database)MedicinebusinesseducationcomputerRequirements analysisMethods of Information in Medicine
researchProduct

State of the Art Literature Review on Network Anomaly Detection

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatComputer science05 social sciences050801 communication & media studiesDenial-of-service attack02 engineering and technology021001 nanoscience & nanotechnologyComputer securitycomputer.software_genrenetwork anomaly detection0508 media and communicationsAnomaly detectionState (computer science)tietoturva0210 nano-technologyverkkohyökkäyksetcomputer
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct

Unione africana e Nazioni Unite: coordinamento o subordinazione nella gestione delle crisi?

2019

The present chapter deals with the relationship between the United Nations and the African Union in the field of international peace and security. The shifting from the Organization for African Unity to the African Union and the establishment of the Peace and Security Council are the answers of African States to the failure of the United Nations to manage the several crisis scenarios in Africa since the early ’90s. If one considers, in fact, the practice of the Union, as regards enforcement actions, the lack of financial resources is the major obstacle to peace and security in Africa. Consequently, the AU Constitutive Act norms which seem to provide for a unilateral right to intervene of th…

African Union United Nations Securuty Council unilateral interventionInternational peace and securitySettore IUS/13 - Diritto Internazionale
researchProduct

Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection

2014

[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…

Agent-based modelSoftware_OPERATINGSYSTEMSArticle SubjectApplied Mathematicslcsh:MathematicsComputer securitycomputer.software_genrelcsh:QA1-939ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAndroid malwareMalwareAndroid (operating system)MATEMATICA APLICADAcomputerAnalysisMathematics
researchProduct

The dark side of romantic relationships: Aggression in adolescent couples and links to attachment

2015

Item does not contain fulltext This study focuses on romantic relationships from the perspective of both partners. This dyadic approach was chosen to account for the fact that both partners may differently contribute to the escalation of aggression. In a sample of 194 romantic partner dyads, differences between female and male partners׳ reports of aggression (relational and physical) and measures of attachment security and jealousy were assessed. A hierarchical cluster analysis identified five distinct subgroups of dyads with mutually aggressive or one-sided aggressive dyad. Of note were dyads with aggressive females and self-silencing males. The mutually aggressive couples showed the least…

Aggressionmedia_common.quotation_subjectPerspective (graphical)educationPublic Health Environmental and Occupational HealthAttachment securityJealousySocial DevelopmentRomanceDevelopmental psychologyPsychiatry and Mental healthGreat Riftmedicinemedicine.symptomPsychologySocial psychologyDyadmedia_common
researchProduct