Search results for "Security"

showing 10 items of 1693 documents

Using protection motivation theory in the design of nudges to improve online security behavior

2019

Abstract We conducted an online experiment (n = 2024) on a representative sample of internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highlighted the potential negative consequences of not doing so. Both increased secure behavior – but the coping message significantly more so. The coping message was also as effective as both messages combined, but not so the threat appeal. Risk attitudes, age and country had a significant effect on behavior. Initiatives seeking to promote se…

Online securityCoping (psychology)Nudge theoryG40005 social sciencesApplied psychologyGeneral EngineeringAppealHuman Factors and Ergonomics02 engineering and technologyBehavioral economicsFear appealC800EducationHuman-Computer InteractionProtection motivation theoryHardware and Architecture020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingInternet usersPsychologySoftwareInternational Journal of Human-Computer Studies
researchProduct

Specialized Applications Used in the Mobile Application Security Implementation Process

2020

In the paper, authors aim to determine the extent to which open source applications can replace specialized security applications for mobile applications. In this respect, open source components are selected at which level the implemented security features are identified, based on which a completeness-determining indicator is calculated. The value of this indicator is then compared to the value obtained for the .NET CF3 framework, with a hierarchy of the components being treated according to this indicator. Based on the same selected components or components derived from them, to which other components have been added, the issue of ensuring their quality is dealt with by calculating the com…

Open sourceHierarchy (mathematics)Computer scienceProcess (engineering)Distributed computingApplication securitymedia_common.quotation_subjectValue (computer science)Quality (business)media_common
researchProduct

Autonomous agent system using dispatching rules in the negotiation protocol

2002

In this paper, the most important results obtained by the simulated application of autonomous agent paradigms to a. real factory are presented. The classical rules of dispatching are compared with the autonomous agents approach. In particular, the possibility of redesigning the negotiation rules in terms of currency in order to take into account even non-time-related costs is considered. Finally, a new project on the effective application of the autonomous agent system to a test bed, modelling a simplified firm, is proposed.

Operations researchComputer scienceautonomous agentnegotiation protocolmedia_common.quotation_subjectAutonomous agentnegotiation protocolsScheduling (production processes)Computer securitycomputer.software_genreautonomous agents; negotiation protocols; schedulingNegotiationautonomous agentsschedulingcomputermedia_common
researchProduct

A Rule-Based Multi-agent System for Road Traffic Management

2009

Road Traffic presents a high dynamism which makes necessary the development of traffic management and control strategies to improve traffic flows and more important, road safety. This dynamism makes necessary the use of intelligent systems to support traffic organizations and road operators to cope with incidents. In this paper we introduce a new expert system to support traffic management when weather problems occur in the road network. The system uses multiagent technology to work with the specific characteristics of traffic domain and is able to work in two modes: a) coordinately, where all the agents works to solve problems in large networks and b) locally where due to communications pr…

Operations researchbusiness.industryComputer scienceMulti-agent systemIntelligent decision support systemFloating car dataVehicle Information and Communication Systemcomputer.software_genreComputer securityAdvanced Traffic Management SystemTechnology managementIntelligent agentTraffic engineeringComputerSystemsOrganization_MISCELLANEOUSbusinesscomputerRoad traffic2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology
researchProduct

Hybrid Passive Control Strategies for Reducing the Displacements at the Base of Seismic Isolated Structures

2019

In this paper, the use of hybrid passive control strategies to mitigate the seismic response of a base-isolated structure is examined. The control performance of three different types of devices used for reducing base displacements of isolated buildings is investigated. Specifically, the Tuned Mass Damper (TMD), the New Tuned Mass Damper (New TMD) and the Tuned Liquid Column Damper (TLCD), each one associated to a Base Isolated structure (BI), have been considered. The seismic induced vibration control of base-isolated structures equipped with the TMD, New TMD or the TLCD is examined and compared with that of the base-isolated system without devices, using real recorded seismic signals as e…

Optimal designComputer scienceGeography Planning and Development0211 other engineering and technologiesBase (geometry)Vibration control020101 civil engineering02 engineering and technology0201 civil engineeringlaw.inventionDamperPassive controltuned mass damperlcsh:HT165.5-169.9lawTuned mass damperInerteroptimal designinerter021110 strategic defence & security studiesbusiness.industryBuilding and ConstructionStructural engineeringlcsh:City planningUrban Studiesbase isolationhybrid structural controllcsh:TA1-2040Base isolationlcsh:Engineering (General). Civil engineering (General)businessFrontiers in Built Environment
researchProduct

ICOOLPS 2010 and MASPEGHI 2010.

2012

International audience; At ECOOP 2010 in Maribor, Slovenia, the two workshops MASPEGHI (MechAnisms for SPEcialization, Generalization and inHerItance) and ICOOOLPS (Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems) were combined because both were rather small and shared common concerns, their topic areas being strongly related. Six papers had been accepted to MASPEGHI, but only five were presented because the authors of one paper could not attend the conference and workshop. Three papers had been accepted to ICOOOLPS, and all were also presented. The workshop authors were later asked to submit extended versions of their papers for possible publica…

Optimization050208 financeInheritance[INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]GeneralizationComputer sciencemedia_common.quotation_subject05 social sciencesGeneralizationCompilationInheritance (object-oriented programming)[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Work (electrical)Implementation0502 economics and businessSpecialization (logic)Special sectionMathematics educationQuality (business)050207 economicsTopic areasSoftwaremedia_commonSpecialization
researchProduct

Multi-party metering: An architecture for privacy-preserving profiling schemes

2013

Several privacy concerns about the massive deploy- ment of smart meters have been arisen recently. Namely, it has been shown that the fine-grained temporal traces generated by these meters can be correlated with different users behaviors. A new architecture, called multi-party metering, for enabling privacy-preserving analysis of high-frequency metering data without requiring additional complexity at the smart meter side is here proposed. The idea is to allow multiple entities to get a share of the high-frequency metering data rather than the real data, where this share does not reveal any information about the real data. By aggregating the shares provided by different users and publishing …

OptimizationInformation privacyEngineeringtatistical analysiSmart meterDistributed computingpattern clusteringC.2 COMPUTER-COMMUNICATION NETWORKSSmart gridelectricity supply industryComputer securitycomputer.software_genreCOMPUTER-COMMUNICATION NETWORKSElectricityClustering algorithmProfiling (information science)Metering modemart meterIndexeArchitectureCluster analysisgas industrydata privacybusiness.industrySettore ING-INF/03 - TelecomunicazioniComplexity theoryreal gas consumption dataVectorsA sharehigh-frequency metering datamultiparty meteringInformation sensitivityynthetic electricity consumption dataCryptographyprivacy-preserving profiling schemeprivacy-preserving analysibusinesscomputeruser profiling clustering mechanismMulti-Party Metering
researchProduct

Cross-lagged associations between perceived external employability, job insecurity, and exhaustion: Testing gain and loss spirals according to the Co…

2012

Summary This study investigates perceived external employability (PEE) as a personal resource in relation to job insecurity and exhaustion. We advance the idea that PEE may reduce feelings of job insecurity and, through felt job insecurity, also exhaustion. That is, we probe the paths from PEE to job insecurity and from job insecurity to exhaustion. We furthermore account for possible reversed causality, so that exhaustion  felt job insecurity and felt job insecurity  PEE. This aligns with insights from the Conservation of Resources Theory, which is built on the assumption of resource caravans passageways and associated gain and loss spirals. We based the results on a sample of 1314 workers…

Organizational Behavior and Human Resource ManagementComputingMilieux_THECOMPUTINGPROFESSIONSociology and Political Sciencemedia_common.quotation_subjectJob attitudeBurnoutEmployabilityCausalityJob securityComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSFeelingOrganizational behaviorOccupational stressHardware_ARITHMETICANDLOGICSTRUCTURESPsychologySocial psychologyGeneral PsychologyApplied Psychologymedia_commonJournal of Organizational Behavior
researchProduct

Job preservation efforts: when does job insecurity prompt performance?

2020

PurposeWhile job insecurity generally impedes performance, there may be circumstances under which it can prompt performance. The purpose of this paper is to examine a specific situation (reorganization) in which job insecurity may prompt task and contextual performance. The authors propose that performance can represent a job preservation strategy, to which employees may only resort when supervisor-issued ratings of performance are instrumental toward securing one’s job. The authors hypothesize that because of this instrumentality, job insecurity will motivate employees’ performance only when they have low intrinsic motivation, and only when they perceive high distributive justice.Design/me…

Organizational Behavior and Human Resource ManagementCoping (psychology)media_common.quotation_subject:PSICOLOGÍA [UNESCO]050109 social psychologyUNESCO::PSICOLOGÍAOriginality0502 economics and business0501 psychology and cognitive sciencesDistributive justiceOrganizational Citizenship Behaviourmedia_commonOrganizational citizenship behaviorContextual performanceWork MotivationJob insecurityComputingMilieux_THECOMPUTINGPROFESSION05 social sciencesSurvey researchTreball Aspectes psicològicsOrganiational JusticeProcediment del treballJob Perservation EffortsCausal inferencePsychologySocial psychology050203 business & managementSocial Sciences (miscellaneous)
researchProduct

Hedging foreign exchange rate risk: Multi-currency diversification

2016

Abstract This article proposes a multi-currency cross-hedging strategy that minimizes the exchange risk. The use of derivatives in small and medium-sized enterprises (SMEs) is not common but, despite its complexity, can be interesting for those with international activities. In particular, the reduction in the exchange risk borne through the use of natural multi-currency cross-hedging is measured, considering Conditional Value-at-Risk (CVaR) and Value-at-Risk (VaR) for measuring market risk instead of the variance. CVaR is minimized using linear programmes, while a multiobjective genetic algorithm is designed for minimizing VaR, considering two scenarios for each currency. The results obtai…

Organizational Behavior and Human Resource ManagementEconomicsFinancial economicsStrategy and Management0211 other engineering and technologiesDiversification (finance)02 engineering and technologyConditional Value-at-Riskddc:6500502 economics and businessEconometricsEconomicsBusinessG32G11Business and International ManagementHedge (finance)Rate riskMarketing021110 strategic defence & security studiesCVAR05 social sciencesValue-at-RiskBusiness FinanceManagementExpected shortfallC63Market riskCurrencyTourism Leisure and Hospitality ManagementMulti-currency diversificationMultiobjective genetic algorithm050211 marketingFinanceValue at riskCross-hedgingEuropean Journal of Management and Business Economics
researchProduct