Search results for "Security"

showing 10 items of 1693 documents

Ant colony optimisation for planning safe escape routes

2013

Published version of a chapter from the volume: Recent Trends in Applied Artificial Intelligence. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-38577-3_6 An emergency requiring evacuation is a chaotic event filled with uncertainties both for the people affected and rescuers. The evacuees are often left to themselves for navigation to the escape area. The chaotic situation increases when a predefined escape route is blocked by a hazard, and there is a need to re-think which escape route is safest. This paper addresses automatically finding the safest escape route in emergency situations in large buildings or ships with imperfect knowledge of the hazards. The proposed so…

Emergency personnelVDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Operations researchSmart phoneComputer scienceEvent (computing)VDP::Technology: 500::Information and communication technology: 550Ant colonyComputer securitycomputer.software_genreHazard (computer architecture)Emergency situationscomputerWireless sensor network
researchProduct

Strategic cyber threat intelligence : Building the situational picture with emerging technologies

2020

In 2019, e-criminals adopted new tactics to demand enormous ransoms from large organizations by using ransomware, a phenomenon known as “big game hunting.” Big game hunting is an excellent example of a sophisticated and coordinated modern cyber-attack that has a significant impact on the target. Cyber threat intelligence (CTI) increases the possibilities to detect and prevent cyber-attacks and gives defenders more time to act. CTI is a combination of incident response and traditional intelligence. Intelligence modifies raw data into information for decision-making and action. CTI consists of strategic, operational, or tactical intelligence on cyber threats. Security event monitoring, event-…

Emerging technologiesStrategic Cyber Threat IntelligencetekoälyComputer securitycomputer.software_genremachine learningkoneoppiminenArtificial IntelligencetiedusteluBusinessCyber threat intelligenceSituational ethicskyberturvallisuuscomputerverkkohyökkäykset
researchProduct

Cyber World as a Social System

2015

The increasing applying of information and communication technology is transforming the society into an unknown ground of the continuously evolving cyber world. This challenges the actors of the society and has increased complexity. The purpose of this chapter is to form a hypothesis about how to identify patterns i.e., emergent phenomena about the cyber world for developing security in the society. The cyber world is considered as a complex adaptive system. A system modelling approach to complex adaptive systems is briefly outlined and a social system model of a society is introduced as a content analysis method to complex adaptive systems. The model is populated with a small set of empiri…

Empirical dataPoint (typography)Content analysisSocial systemComputer scienceInformation and Communications TechnologyInformation securityComplex adaptive systemData scienceSecurity planning
researchProduct

RELATIONSHIP MARKETING ON THE INTERNET: BUILDING A LONG-TERM RELATIONSHIP WITH CUSTOMERS

2018

The purpose of the study is to find out the main approaches to the relationship marketing on the internet that could help companies to build a long-term relationship with their customers. Principal objectives are to find and analyse scientific literature on the topic; with statistical and empirical analysis to find out the main differences between relationship marketing in the traditional and internet dimension. The research methods of the paper are scientific literature theoretical analysis, statistical and empirical data analysis. The results of the research are both theoretical and practical. Using results companies will be able to share their customers seeing at what stage they are loca…

Empirical databusiness.industry05 social sciencesPrincipal (computer security)02 engineering and technologyScientific literatureTerm (time)020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingThe InternetDimension (data warehouse)MarketingbusinessRelationship marketing10th International Scientific Conference “Business and Management 2018”
researchProduct

Job Insecurity in Nursing: A Bibliometric Analysis

2021

Nurses are a key workforce in the international health system, and as such maintaining optimal working conditions is critical for preserving their well-being and good performance. One of the psychosocial risks that can have a major impact on them is job insecurity. This study aimed to carry out a bibliometric analysis, mapping job insecurity in 128 articles in nursing, and to determine the most important findings in the literature. The search was conducted in the Web of Science Core Collection database using the Science Citation Index (SCI)-Expanded and Social Sciences Citation Index (SSCI) indexes on 6 March 2020. This field of discipline has recently been established and has experienced s…

EmploymentCanadaBibliometric analysisHealth Toxicology and Mutagenesislcsh:MedicineEnvironmental Sciences & EcologyArticle03 medical and health sciencesbibliometric analysisNursingnursing0502 economics and businessHumansjob insecurityFinlandPublic Environmental & Occupational HealthScience & Technology030504 nursingJob insecuritybusiness.industry05 social scienceslcsh:RPublic Health Environmental and Occupational HealthScience Citation IndexAustraliaInternational healthUnited KingdomSocial Sciences Citation IndexBibliometricsWorkforceJob satisfaction0305 other medical sciencebusinessPsychologyPsychosocialLife Sciences & Biomedicine050203 business & managementEnvironmental SciencesInternational Journal of Environmental Research and Public Health
researchProduct

Job insecurity and sickness absence: Correlations between attrition and absence in 36 occupational groups

2012

Aims: To investigate how job insecurity, as indicated by attrition rates out of employment, affects sickness absence among remaining workers. Methods: A longitudinal analysis investigated how the percentage of workers absent due to sickness was affected by attrition out of employment in Norwegian Labour Force Surveys from 1997 to 2005, between 31 quarterly observations at the level of 36 occupational groups. Results: Rising attrition is associated with more sickness absence. Conclusions: Previous research has argued that job insecurity can lead to more absence because of a stressor effect as well as to less absence because of a disciplinary effect. This research indicates that the stressor…

EmploymentSickness absenceOccupational groupJob stressJob insecurityNorwayLongitudinal databusiness.industryUncertaintyPublic Health Environmental and Occupational HealthGeneral Medicinemedicine.diseaseEnvironmental healthAbsenteeismPersonnel DownsizingAbsenteeismmedicineHumansAttritionLongitudinal StudiesOccupationsSick LeavebusinessStress PsychologicalScandinavian Journal of Public Health
researchProduct

What shapes Norwegian wind power policy? Analysing the constructing forces of policymaking and emerging questions of energy justice

2021

Abstract This paper employs an assemblage theoretical approach to analyse how Norwegian land-based wind power policies are constructed over time and what forces dominate and resist wind power policy development. The entanglement of policies, technology deployment and (lack of) social acceptance emphasizes the need to critically question what and who influence the construction of energy transition policies and how and what concerns are left out, especially in relation to the tenets of energy justice. We find that wind power policies are primarily influenced by energy authorities, developers and interest organizations, furthering arguments of climate concerns, energy security and economic opp…

Energy (esotericism)0211 other engineering and technologies0507 social and economic geographyEnergy Engineering and Power Technology02 engineering and technologyNorwegianProcedural justiceEnergy transitionEconomic JusticeEnergy policyPolitical science021108 energyWind powerRenewable Energy Sustainability and the Environmentbusiness.industry05 social sciencesEnergy securityVDP::Matematikk og Naturvitenskap: 400language.human_languageFuel TechnologyNuclear Energy and EngineeringPolitical economylanguagebusiness050703 geographySocial Sciences (miscellaneous)
researchProduct

ES enerģijas politika un Turcijas loma energoapgādes drošības kontekstā.

2015

Ņemot vērā vietējo energoresursu trūkumu, ES ir bijusi enerģijas importētājas pozīcijā jau kopš tās dibināšanas. Lai gan energoapgādes drošība galvenokārt ir bijusi ES darba kārtībā, tikai nesen ir veikti stingri drošības pasākumi. Konflikts starp Ukrainu un Krieviju sākās 2013. gadā un parāda, cik steidzama un stingra rīcība ir nepieciešama, lai tiktu nodrošināta droša energoapgāde. Saistībā ar iepriekš minēto, enerģijas piegāžu diversifikācija ieņem ļoti īpašu lomu dalībvalstu dienaskārtībā kopā ar to uzticamo sabiedroto - Turciju. Šī pētījuma mērķis ir izskaidrot kā ES enerģētiskā atkarība ir mainījusies laika gaitā, analizēt esošos energoapgādes drošības pasākumus un pierādīt Turcijas l…

Energy CorridorTurkey-EU Energy CooperationEnergy PolicyEkonomikaEuropean UnionEnergy Security
researchProduct

Designing a Specialized Devices for Correction of the Axis Deviation at the Human Leg

2013

The presented article is an original contribution which implies the design of a specialized device for high tybial osteotomy (HTO) optimization. In the papers are presented the sources that imply HTO, the axial deviations of the human lower member from the correct position. This sources are the gonarthosys owed to the usage of the knees cartilages or owed to some diseases (such as the Blount disease) and the vicious consolidated fractures. After presenting the needs to realize such a specialized device for HTO, the principal requests the device shall fulfill are underlined. Starting from these , two sub ensembles were projected, one for the tibial positioning and for the execution of the ho…

Engineering drawingEngineeringHigh tibial osteotomyPosition (vector)business.industryPrincipal (computer security)Blount diseaseGeneral MedicineHuman legbusinessRealization (systems)Instant centre of rotationSimulationApplied Mechanics and Materials
researchProduct

Safety and Efficacy for New Techniques and Imaging using New Equipment to Support European Legislation (SENTINEL) — Education and Training Aspects

2007

SENTINEL is a Coordinated Action funded by the European Commission under the specific program (EURATOM) for research and training in the nuclear energy field as part of the 6th Framework Program.

Engineering managementPatient safetyEngineeringbusiness.industryEuropean commissionLegislationTraining aspectsComputer securitycomputer.software_genrebusinesscomputer
researchProduct