Search results for "Security"

showing 10 items of 1693 documents

PLC security and critical infrastructure protection

2013

Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…

Control system securityEngineeringbusiness.industryProgrammable logic controllerCritical infrastructure protectionIndustrial control systemComputer securitycomputer.software_genreStuxnetCritical infrastructureData Protection Act 1998Isolation (database systems)businesscomputer2013 IEEE 8th International Conference on Industrial and Information Systems
researchProduct

Initiation of deep convection at marginal instability in an ensemble of mesoscale models: a case-study from COPS

2011

The present study investigates the initiation of precipitating deep convection in an ensemble of convection-resolving mesoscale models. Results of eight different model runs from five non-hydrostatic models are compared for a case of the Convective and Orographically-induced Precipitation Study (COPS). An isolated convective cell initiated east of the Black Forest crest in southwest Germany, although convective available potential energy was only moderate and convective inhibition was high. Measurements revealed that, due to the absence of synoptic forcing, convection was initiated by local processes related to the orography. In particular, the lifting by low-level convergence in the planet…

Convection021110 strategic defence & security studiesAtmospheric ScienceConvective inhibition010504 meteorology & atmospheric sciencesMeteorologyPlanetary boundary layer0211 other engineering and technologiesMesoscale meteorologyOrography02 engineering and technologyForcing (mathematics)01 natural sciencesConvective available potential energyFree convective layerPhysics::Fluid Dynamics13. Climate actionClimatologyPhysics::Atmospheric and Oceanic PhysicsGeology0105 earth and related environmental sciencesQuarterly Journal of the Royal Meteorological Society
researchProduct

Modeling of biomass smoke injection into the lower stratosphere by a large forest fire (Part I): reference simulation

2006

Abstract. Wildland fires in boreal regions have the potential to initiate deep convection, so-called pyro-convection, due to their release of sensible heat. Under favorable atmospheric conditions, large fires can result in pyro-convection that transports the emissions into the upper troposphere and the lower stratosphere. Here, we present three-dimensional model simulations of the injection of fire emissions into the lower stratosphere by pyro-convection. These model simulations are constrained and evaluated with observations obtained from the Chisholm fire in Alberta, Canada, in 2001. The active tracer high resolution atmospheric model (ATHAM) is initialized with observations obtained by r…

ConvectionAtmospheric SciencePyrocumulonimbus cloudMeteorology010504 meteorology & atmospheric sciences0211 other engineering and technologies02 engineering and technologySensible heatAtmospheric sciences7. Clean energy01 natural scienceslcsh:ChemistryTropospherePhysics::Fluid DynamicsLatent heatCloud baseAstrophysics::Solar and Stellar AstrophysicsStratospherePhysics::Atmospheric and Oceanic Physics0105 earth and related environmental sciences040101 forestry[SDU.OCEAN]Sciences of the Universe [physics]/Ocean Atmosphere021110 strategic defence & security studies04 agricultural and veterinary sciences15. Life on landlcsh:QC1-999lcsh:QD1-99913. Climate action0401 agriculture forestry and fisheriesEnvironmental scienceTropopauselcsh:Physics
researchProduct

The 1-way on-line coupled atmospheric chemistry model system MECO(n) – Part 3: Meteorological evaluation of the on-line coupled system

2012

Abstract. Three detailed meteorological case studies are conducted with the global and regional atmospheric chemistry model system ECHAM5/MESSy(→COSMO/MESSy)n, shortly named MECO(n), in order to assess the general performance of the on-line coupling of the regional model COSMO to the global model ECHAM5. The cases are characterised by intense weather systems in Central Europe: an intense cold frontal passage in March 2010, a convective frontal event in July 2007, and the high impact winter storm "Kyrill" in January 2007. Simulations are performed with the new on-line-coupled model system and compared to classical, off-line COSMO hindcast simulations driven by ECMWF analyses. Precipitation o…

Convectionmodel evaluationnestingMeteorology010504 meteorology & atmospheric sciencesatmospheric model0207 environmental engineering0211 other engineering and technologies02 engineering and technologyprecipitation01 natural sciencesMESSyHindcastPrecipitationmeteorology020701 environmental engineeringLine (formation)0105 earth and related environmental sciences021110 strategic defence & security studiesglobal modelregional modelCOSMOlcsh:QE1-996.5Stormlcsh:GeologyCold front13. Climate actionAtmospheric chemistryClimatologyEnvironmental sciencemodel couplingDynamik der AtmosphäreLead time
researchProduct

The Migration Crisis: An Introduction

2020

In 2015, the EU and its member states struggled to coordinate, communicate, and cooperate on the migration crisis as the chapters in this section show. Schilde and Wallace Goodman point out that while border security contains examples of deeper integration, asylum management policy has followed the scenarios of breaking down and muddling through. All the authors highlight the Dublin convention as particularly ill-devised and thus paving the way for the refugee crisis. Bosilca finds evidence for breaking down in addition to minimal reforms of border security policy that constitute muddling through. Crawford argues that the migration crisis provides evidence both of muddling through and headi…

ConventionHeading (navigation)Section (archaeology)Political economyPolitical scienceMember statesRefugee crisisBorder Security
researchProduct

Making Communication Strategy Choices in a Fast Evolving Crisis Situation—Results from a Table-Top Discussion on an Anthrax Scenario

2016

This paper aims at clarifying a timely topic of how communication strategy choices are made in evolving, complex crises, such as those caused by terrorism involving chemical, biological, radiological, or nuclear (CBRN) agents. This is done by examining data gathered from a table-top discussion among crisis communication experts, focusing on a scenario of an anthrax attack and analysed qualitatively. The communication experts followed the evolving crisis situation by gathering inputs from various actors in the crisis management network, thereby creating situational understanding, and interpreted these inputs for decision-making on communication strategies. The underlying process of coping wi…

Coping (psychology)Process managementcommunication strategies; crisis communication; terrorism0211 other engineering and technologies050801 communication & media studies02 engineering and technologyCrisis managementkriisiviestintälcsh:Social Sciences0508 media and communicationsterrorismicommunication strategiesta518Situational ethicscrisis communicationCrisis communication021110 strategic defence & security studiesManagement science05 social sciencesGeneral Social Sciencesviestintästrategiatterrorism16. Peace & justicelcsh:HPreparednessTerrorismPsychology
researchProduct

Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats

2021

According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the firs…

Coping (psychology)vaikutuksetApplied psychologyuhatasenteetMobile malwareCoping theoryArts and Humanities (miscellaneous)tunteetDevelopmental and Educational PsychologyInformation systemtietoturvariskittietojärjestelmättorjuntaturvallisuusEmotion focusedprotection motivation theoryselviytyminenGeneral Social SciencestietoturvakäyttäytyminenHuman-Computer InteractionhaittaohjelmatProtection motivation theoryinformation security behaviourPsychologyinward emotion-focused copingcoping theory
researchProduct

Perceived Decrease in Workplace Security Since the Beginning of the COVID-19 Pandemic: The Importance of Management Styles and Work-Related Attitudes

2021

The coronavirus disease 2019 (COVID-19) pandemic has reduced the sense of security of people in everyday life. The efforts of managers in the workplace to minimize the health risks and economic damage, however, can provide the employees with a greater sense of security. The aim of this study was to identify the types of workplace responses to the pandemic outbreak with respect to the characteristics of employees and their employers accomplishing the differences in subjective sense of workplace security before the pandemic and during the outbreak. Three hundred and thirty-seven Polish employees completed an online survey during the first 2 weeks of the COVID-19 pandemic in March 2020. Using …

Coronavirus disease 2019 (COVID-19)business.industrymanagement styleManagement stylesCOVID-19Public relationspsychological securityDisease clusterWork relatedBF1-990psychological safety and trustWork (electrical)satisfaction of workworkplace securityPandemicPsychologyPositive attitudePsychologyEveryday lifebusinessGeneral PsychologyOriginal ResearchFrontiers in Psychology
researchProduct

Variation on the theme 'In Search of New Foundations for Corporate Finance and Corporate Governance'

2003

Our purpose is to explore an alternative way to give new foundations to the theory of corporate finance and governance. The definition we give of corporate finance considers capital-budgeting as central. The shortcomings of the contract theory of the firm result in proposing new foundations to corporate finance based on the knowledge-based theories of the firm. Lastly, we explore the consequences of these new foundations. It leads to give new explanations of the role of external equity financing, financial debt and especially of internal financing, and to re-examine the corporate governance and financial evaluation questions.

Corporate financeInternal financingbusiness.industryCorporate governanceStakeholderEconomicsFinancial modelingAccountingCorporate Real EstateCorporate communicationbusinessCorporate securitySSRN Electronic Journal
researchProduct

Resilience, security and the politics of processes

2014

The prominence of resilience thinking in contemporary governance and security policies has received increasing critical attention. By engaging in dialogue with some of these recent critiques, predominantly leaning on biopolitics or neoliberal governmentality, this article develops an Arendtian reading of resilience as a temporal regime of processuality. Originating from life sciences such as ecology and complexity thinking, the increasingly malleable resilience discourse privileges the functioning of societal life processes over political action and human artifice. The article argues that this ‘rule of nobody’ is in danger of suffocating the concept of public space, so crucial for politics …

Corporate governanceEnvironmental ethicsSecurity policynobodyPoliticsPublic spacePolitical scienceta517General Earth and Planetary SciencesSocial scienceResilience (network)BiopowerGeneral Environmental ScienceGovernmentalityResilience
researchProduct