Search results for "Security"

showing 10 items of 1693 documents

Communication Platform for Disaster Response

2016

The present research proposes an information platform for enhanced communication and information sharing in municipalities struck by disasters. Once a disaster happens, collecting and sharing information with and among citizens is the most important tasks for municipalities. However, empirical research of the Great East Japan Earthquake in 2011 revealed a marked lack of tools supporting municipal communication and data sharing activities at the initial stage. A smartphone and tablet based application was subsequently developed and evaluated in the field as a means of first response in future disasters. The application is based on the notion of frugality, which proved to be very useful in th…

Knowledge managementEmergency managementbusiness.industryInformation sharingDisaster responseComputer securitycomputer.software_genreField (computer science)Data sharingEmpirical researchGeographyFrugalitybusinesscomputer
researchProduct

Challenges of Government Enterprise Architecture Work – Stakeholders’ Views

2008

At present, a vast transformation within government systems is executed towards electronic government. In some countries, this change is initiated as enterprise architecture work. This paper introduces results from an empirical study on different stakeholders' views on enterprise architecture development within Finnish state government. The data is gathered from 21 interviews accomplished during spring 2007 among participants of the Interoperability Programme of Finnish state administration. The interviewees represent different sectors and levels of Finnish government and IT companies. On the basis of qualitative data analysis we discuss challenges of enterprise architecture work in the con…

Knowledge managementEnterprise architecture managementbusiness.industryBusiness architectureEnterprise integrationEnterprise architectureBusinessEnterprise information security architectureNIST Enterprise Architecture ModelEnterprise planning systemEnterprise software
researchProduct

Dimensions of Community Assets for Health. A Systematised Review and Meta-Synthesis

2021

Since Aaron Antonovsky’s salutogenesis theory and Morgan and Ziglio’s health assets model were first proposed, there has been a growing concern to define the resources available to the individual and the community to maintain or improve health and well-being. The aim of the present study was to identify the dimensions that characterise community assets for health. To this end, we conducted a systematised review with a meta-synthesis and content analysis of research or projects involving asset mapping in the community. Articles that met our eligibility criteria were: (1) based on the salutogenic approach and (2) described an assets mapping process and among their results, explained what, how…

Knowledge managementHealth Toxicology and MutagenesisScopusMEDLINEDimensionsCategorical analysisAsset (computer security)Article03 medical and health sciences0302 clinical medicineHealth assetshealth assets030212 general & internal medicineDimension (data warehouse)030505 public healthbusiness.industryRPublic Health Environmental and Occupational HealthGrey literaturecategorical analysisSalutogenesisContent analysisSustainabilityMedicineEnfermeríasalutogenesisdimensions0305 other medical sciencebusinessPsychologySalutogenesis
researchProduct

Using the ITIL Process Reference Model for Realizing IT Governance: An Empirical Investigation

2014

Information Technology Infrastructure Library ITIL is a popular framework for IT governance, but little academic research on ITIL exists. The authors investigate the overlap between ITIL and IT governance practices to illustrate ITIL's potential to stimulate IT governance. A field study shows that IT implementation success is particularly influenced by group efficacy and organizational resources, and, to a lesser extent, senior-management involvement. Findings show that ITIL, as expected, is a framework that contributes to IT governance by stimulating process management practices.

Knowledge managementbusiness.industryCorporate governanceIT service managementInformation technologyIT portfolio managementLibrary and Information SciencesCapacity managementComputer Science ApplicationsInformation Technology Infrastructure LibraryITIL security managementFinancial management for IT servicesbusinessInformation Systems
researchProduct

Managing information security in a business network of machinery maintenance services business – Enterprise architecture as a coordination tool

2007

Today, technologies enable easy access to information across organizational boundaries, also to systems of partners in business networks. This raises, however, several complex research questions on privacy, information security and trust. The study reported here provides motivation and a roadmap for approaching integrated security management solutions in a business network of partners with heterogeneous information and communication technologies (ICT): Systems, platforms, infrastructures as well as security policies. Enterprise architecture (EA) is proposed as a means for comprehensive and coordinated planning and management of corporate ICT and the security infrastructure. The EA approach …

Knowledge managementbusiness.industrySherwood Applied Business Security ArchitectureBusiness system planningEnterprise architectureInformation securityEnterprise information security architectureSecurity information and event managementInformation security managementHardware and ArchitectureBusiness architecturebusinessSoftwareInformation SystemsJournal of Systems and Software
researchProduct

Electronic system for assessing and analysing digital competences in the context of Knowledge Society

2019

The digital competencies of users, in general, and of public administration personnel, in particular, must allow the people access to graphical interfaces and applications, including databases. The use of digital competences is not simply about the emergence and use of computer tools to a certain level but also to develop new digital skills to face the challenges of data quality, responsibility, confidence in information received, the privacy of the user and the safety of its data. The study tool in this paper is managed and applied online, and the collection and centralization of data is done automatically, also ensuring information security. The basic method used in this paper is the mode…

Knowledge societyKnowledge managementComputer toolsComputer sciencebusiness.industryData qualityFace (sociological concept)Context (language use)Digital skillsInformation securitybusinessElectronic systems2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
researchProduct

Społeczeństwo XXI wieku wobec zagrożenia islamskim terroryzmem

2018

Korannationalismterrorismsecuritymigrationterrorist attackpesuralpopulismStudia nad Autorytaryzmem i Totalitaryzmem
researchProduct

Biskup Franciszek Jop w aktach bezpieki (1952-1976 [1979])

2016

Socjalistyczne państwo ludowe przez lata prowadziło szeroką siatkę agenturalną, obejmując kontrolą realnych, potencjalnych i wyimaginowanych przeciwników systemu. W sposób szczególny inwigilowano pasterzy Kościoła, których, razem z innymi duchownymi, uważano za główną siłę antysocjalistyczną w PRL. Jak każdy wyższy duchowny, tak i biskup Franciszek Jop inwigilowany był przez funkcjonariuszy komunistycznego aparatu bezpieczeństwa. Informacje o nim i jego działalności gromadzono już od pierwszych dni powojennych. Wraz z przejściem pasterza do archidiecezji krakowskiej w 1952 r. bezpieka założyła na biskupa Jopa sprawę agenturalno-operacyjną, którą kontynuowano po objęciu przez niego posługi p…

Kościół a Służba BezpieczeństwaDiocese of Opolebiskup Franciszek Jopthe Church and the Security Servicethe Church in the People’s Republic of PolandKościół w PRLbishop Franciszek Jopdiecezja opolska
researchProduct

A Personal LPWAN Remote Monitoring System

2021

Firefighters are equipped with an immobility detector device also called the Personal Alert Safety System (PASS) that is integrated into the user's Self-Contained Breathing Apparatus (SCBA). If a firefighter remains motionless for a certain period of time, a loud audible alert is triggered to notify the Firefighter Assist and Search Team (FAST) deployed in the area of intervention that the wearer of the PASS device is in trouble and in need of rescue. However, this device is not reliable enough since it triggers frequently false positives which lead to developing a tolerance for sounding alarms among the crew. As a consequence, they do not seem to be concerned about it as they should and th…

LPWANEmergency responseComputer scienceCrewFalse positive paradoxLocation awarenessMonitoring systemcomputer.software_genreComputer securitySet (psychology)Wireless sensor networkcomputer2021 International Wireless Communications and Mobile Computing (IWCMC)
researchProduct

Unemployment Transitions to Stable and Unstable Jobs Before and During the Crisis

2014

Using administrative records data from Spanish Social Security, we analyse the pattern and the determinants of individual unemployment benefit spell durations. We compare a period of expansion (2005-2007) and the recent recession (2009-2011), allowing us to determine the impact of the current crisis. In line with the duality that characterizes the Spanish labour market, we distinguish between exits to a stable job and exits to an unstable job. We estimate a Multivariate Mixed Proportional Hazard Model for each time period. We find similar effects of the crisis for stable and unstable jobs, which are particularly strong in the first year of the spell. Moreover, slight negative duration depen…

Labour economicsjel:C41media_common.quotation_subjectImmigrationjel:E32SpellDuration dependencejel:J64RecessionSocial securityUnemploymentFinancial crisisBusiness cycleEconomicsunemployment durations; Business cycle; dual labour markets; re-employment probabilitymedia_commonSSRN Electronic Journal
researchProduct