Search results for "Security"
showing 10 items of 1693 documents
PLC security and critical infrastructure protection
2013
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…
Initiation of deep convection at marginal instability in an ensemble of mesoscale models: a case-study from COPS
2011
The present study investigates the initiation of precipitating deep convection in an ensemble of convection-resolving mesoscale models. Results of eight different model runs from five non-hydrostatic models are compared for a case of the Convective and Orographically-induced Precipitation Study (COPS). An isolated convective cell initiated east of the Black Forest crest in southwest Germany, although convective available potential energy was only moderate and convective inhibition was high. Measurements revealed that, due to the absence of synoptic forcing, convection was initiated by local processes related to the orography. In particular, the lifting by low-level convergence in the planet…
Modeling of biomass smoke injection into the lower stratosphere by a large forest fire (Part I): reference simulation
2006
Abstract. Wildland fires in boreal regions have the potential to initiate deep convection, so-called pyro-convection, due to their release of sensible heat. Under favorable atmospheric conditions, large fires can result in pyro-convection that transports the emissions into the upper troposphere and the lower stratosphere. Here, we present three-dimensional model simulations of the injection of fire emissions into the lower stratosphere by pyro-convection. These model simulations are constrained and evaluated with observations obtained from the Chisholm fire in Alberta, Canada, in 2001. The active tracer high resolution atmospheric model (ATHAM) is initialized with observations obtained by r…
The 1-way on-line coupled atmospheric chemistry model system MECO(n) – Part 3: Meteorological evaluation of the on-line coupled system
2012
Abstract. Three detailed meteorological case studies are conducted with the global and regional atmospheric chemistry model system ECHAM5/MESSy(→COSMO/MESSy)n, shortly named MECO(n), in order to assess the general performance of the on-line coupling of the regional model COSMO to the global model ECHAM5. The cases are characterised by intense weather systems in Central Europe: an intense cold frontal passage in March 2010, a convective frontal event in July 2007, and the high impact winter storm "Kyrill" in January 2007. Simulations are performed with the new on-line-coupled model system and compared to classical, off-line COSMO hindcast simulations driven by ECMWF analyses. Precipitation o…
The Migration Crisis: An Introduction
2020
In 2015, the EU and its member states struggled to coordinate, communicate, and cooperate on the migration crisis as the chapters in this section show. Schilde and Wallace Goodman point out that while border security contains examples of deeper integration, asylum management policy has followed the scenarios of breaking down and muddling through. All the authors highlight the Dublin convention as particularly ill-devised and thus paving the way for the refugee crisis. Bosilca finds evidence for breaking down in addition to minimal reforms of border security policy that constitute muddling through. Crawford argues that the migration crisis provides evidence both of muddling through and headi…
Making Communication Strategy Choices in a Fast Evolving Crisis Situation—Results from a Table-Top Discussion on an Anthrax Scenario
2016
This paper aims at clarifying a timely topic of how communication strategy choices are made in evolving, complex crises, such as those caused by terrorism involving chemical, biological, radiological, or nuclear (CBRN) agents. This is done by examining data gathered from a table-top discussion among crisis communication experts, focusing on a scenario of an anthrax attack and analysed qualitatively. The communication experts followed the evolving crisis situation by gathering inputs from various actors in the crisis management network, thereby creating situational understanding, and interpreted these inputs for decision-making on communication strategies. The underlying process of coping wi…
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
2021
According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the firs…
Perceived Decrease in Workplace Security Since the Beginning of the COVID-19 Pandemic: The Importance of Management Styles and Work-Related Attitudes
2021
The coronavirus disease 2019 (COVID-19) pandemic has reduced the sense of security of people in everyday life. The efforts of managers in the workplace to minimize the health risks and economic damage, however, can provide the employees with a greater sense of security. The aim of this study was to identify the types of workplace responses to the pandemic outbreak with respect to the characteristics of employees and their employers accomplishing the differences in subjective sense of workplace security before the pandemic and during the outbreak. Three hundred and thirty-seven Polish employees completed an online survey during the first 2 weeks of the COVID-19 pandemic in March 2020. Using …
Variation on the theme 'In Search of New Foundations for Corporate Finance and Corporate Governance'
2003
Our purpose is to explore an alternative way to give new foundations to the theory of corporate finance and governance. The definition we give of corporate finance considers capital-budgeting as central. The shortcomings of the contract theory of the firm result in proposing new foundations to corporate finance based on the knowledge-based theories of the firm. Lastly, we explore the consequences of these new foundations. It leads to give new explanations of the role of external equity financing, financial debt and especially of internal financing, and to re-examine the corporate governance and financial evaluation questions.
Resilience, security and the politics of processes
2014
The prominence of resilience thinking in contemporary governance and security policies has received increasing critical attention. By engaging in dialogue with some of these recent critiques, predominantly leaning on biopolitics or neoliberal governmentality, this article develops an Arendtian reading of resilience as a temporal regime of processuality. Originating from life sciences such as ecology and complexity thinking, the increasingly malleable resilience discourse privileges the functioning of societal life processes over political action and human artifice. The article argues that this ‘rule of nobody’ is in danger of suffocating the concept of public space, so crucial for politics …