Search results for "Security"

showing 10 items of 1693 documents

The Power of Literature to Decipher the Archetype of Lone-Wolf

2021

The Soviet Union collapse marked the end of the Cold War and the rise of the US as the only superpower, at least until 9/11, a foundational event where four civil aeroplanes were directed against the commercial and military hallmarks of the most powerful nation. Terrorism and the so-called War on Terror characterized the turn of a bloody century whose legacy remains to date. The chapter explores the dilemmas of lone-wolf terrorism from the lens of literature as well as cultural theory. The authors hold the thesis that terrorism activates some long-dormant narrative forged in the colonial period respecting to the “non-Western other.” Having said this, the chapter dissects the plot of some no…

Power (social and political)021110 strategic defence & security studiesHistory05 social sciencesLone wolf0211 other engineering and technologiesDECIPHER050109 social psychology0501 psychology and cognitive sciences02 engineering and technologyArchetypeGenealogy
researchProduct

Securitizing images: The female body and the war in Afghanistan

2012

Referring to the recent ‘visual turn’ in Critical Security Studies, the aim of this article is threefold. First, by taking the concept of visual securitization one step further, we intend to theorize the image as an iconic act understood as an act of showing and seeing. This turn to the performativity of the visual directs our attention to the securitizing power of images. Second, this article addresses the methodological challenges of analysing images and introduces an iconological approach. Iconology enables the systematic interpretation of images as images by also taking their social embeddedness into account. In the third part of this article we apply this theoretical and methodologica…

Power (social and political)Critical security studiesAfghanSociology and Political ScienceEmbeddednessAestheticsInterpretation (philosophy)Political Science and International RelationsPerformativityIconologyHeadlineSociologySocial scienceEuropean Journal of International Relations
researchProduct

Characteristic time scale of auroral electrojet data

1994

The structure function of the AE time series shows that the AE time series is self-affine such that the scaling exponent changes at the time scale of approximately 113 (±9) minutes. Autocorrelation function is shown to have scaling properties similar to those of the structure function. From this result it can be deduced that the time scale at which the scaling properties of the AE data change should equal the typical autocorrelation time of these data. We find the typical autocorrelation time of the AE data is 118 (±9) minutes. The characteristic time scale of the AE data appears as a spectral break in their power spectrum at a period of about twice the autocorrelation time.

Power seriesPhysicsSeries (mathematics)MeteorologyScale (ratio)AutocorrelationSpectral densityElectrojetComputational physicsComputer Science::Hardware ArchitectureGeophysicsGeneral Earth and Planetary SciencesTime seriesScalingComputer Science::Cryptography and SecurityGeophysical Research Letters
researchProduct

A novel scheme for privacy preserving in RBAC

2013

Role Based Access Control (RBAC) Model has been proved to be quite useful and has drawn a lot of research interest over the last fifteen years. In this paper we discuss general context-aware RBAC model. We analyze potential privacy threats associated with use of context-aware RBAC and propose a novel scheme that provides privacy-preserving for access models based on RBAC.

Privacy preservingScheme (programming language)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSInformation privacySoftware_OPERATINGSYSTEMSComputer scienceAuthorizationRole-based access controlComputer securitycomputer.software_genrecomputercomputer.programming_language2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)
researchProduct

The Politics of Privacy - a Useful Tautology

2020

While communication and media studies tend to define privacy with reference to data security, current processes of datafication and commodification substantially transform ways of how people act in increasingly dense communicative networks. This begs for advancing research on the flow of individual and organizational information considering its relational, contextual and, in consequence, political dimensions. Privacy, understood as the control over the flow of individual or group information in relation to communicative actions of others, frames the articles assembled in this thematic issue. These contributions focus on theoretical challenges of contemporary communication and media privacy …

Privatsphärepolitical factorspolitische FaktorenKommunikationsforschungagency; datafication; media practicesMedienkulturInternet privacymedia practicesData security050801 communication & media studiesMedia Politics Information Politics Media LawprivacyMedienpolitik Informationspolitik Medienrechtddc:070lcsh:Communication. Mass mediaPolitics0508 media and communications050602 political science & public administrationSociologydata securitydataficationNews media journalism publishingcommunication researchCommodificationDataficationbusiness.industryCommunication05 social sciencesTautology (grammar)data exchangelcsh:P87-960506 political scienceDatenaustauschagencymedia culturePublizistische Medien JournalismusVerlagswesenpoliticsbusinessDatensicherheit
researchProduct

Financial Evaluation of SLA-based VM Scheduling Strategies for Cloud Federations

2017

In recent years, cloud federations have gained popularity. Small as well as big cloud service providers (CSPs) join federations to reduce their costs, and also cloud management software like OpenStack offers support for federations. In a federation, individual CSPs cooperate such that they can move load to partner clouds at high peaks and possibly offer a wider range of services to their customers. Research in this area addresses the organization of such federations and strategies that CSPs can apply to increase their profit.In this paper we present the latest extensions to the FederatedCloudSim framework that considerably improve the simulation and evaluation of cloud federations. These si…

Process managementCloud managementComputer sciencebusiness.industry020206 networking & telecommunicationsCloud computingWorkload02 engineering and technologyComputer securitycomputer.software_genrePopularityScheduling (computing)Virtual machine0202 electrical engineering electronic engineering information engineeringRevenueCommon value auction020201 artificial intelligence & image processingbusinesscomputerProceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms - Crosscloud'17
researchProduct

Strategising IT service management through ITIL implementation: model and empirical test

2015

Research on the Information Technology Infrastructure Library (ITIL) lacks appropriate theories and models that capture the distinct characteristics and implications of the ITIL implementation practice. The purpose of this study is to close this gap. Based on a literature review, we develop and empirically validate a theoretical model: the ITIL Implementation Project Model. The model includes significant antecedents, which provide a foundation upon which an effective ITIL implementation project can be built, as well as the pertinent effects of implementing ITIL. The results contribute to the current research stream on the strategising of IT service management as well as to an improved under…

Process managementComputer sciencebusiness.industry05 social sciencesIT service managementIT portfolio management02 engineering and technologyGeneral Business Management and AccountingCapacity managementInformation Technology Infrastructure LibraryITIL security managementEmpirical researchFinancial management for IT services020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringIncident management (ITSM)business050203 business & managementTotal Quality Management & Business Excellence
researchProduct

Enterprise System Implementation in a Franchise Context: An Action Case Study

2015

Abstract This research paper reports on a study focusing on a franchise relationship that utilizes an enterprise system (ES) to optimize its supply chain. The ES is in its post-implementation phase; however, the franchisee has challenges with inventory management due to poor data quality, which causes problems with vendor analysis and revenue control. An action case study was carried out to identify and diagnose the source of the problem, and interventions were implemented and evaluated. The findings demonstrate that several of the challenges related to poor data quality in the supply chain were influenced by problems of a socio-technical character. These included a lack of understanding of…

Process managementERP post-implementationVendorComputer scienceSupply chainControl (management)Enterprise systemsContext (language use)Computer securitycomputer.software_genreopportunismEnterprise systemOpportunismRevenuedata qualityAction researchGeneral Environmental ScienceWorkaroundinterorganizational challengesfranchiseretailaction caseSCMaction researchData qualityGeneral Earth and Planetary SciencescomputerProcedia Computer Science
researchProduct

Cyber Situational Awareness in Critical Infrastructure Organizations

2021

The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running critical infrastructures and their cyber situational awareness (CSA). According to a common view, components of critical infrastructures become more complex and interdependent on each other and, as a consequence, ramifications of incidents multiply. In practice, the actions relate to developing better CSA and understanding of a critical infrastructure organization. The aim is to prepare for incidents and their management in a whole-of-society approach. The arrangement i…

Process managementNational securitySituation awarenessOperating modelcybersecurityProcess (engineering)business.industryturvallisuusympäristömedia_common.quotation_subjectInformation sharingtilannekuvaCritical infrastructureInterdependencesituational awarenesscritical infrastructureinformation sharingvital societal functionsBusinessinfrastruktuuritkansallinen turvallisuusResilience (network)kyberturvallisuusmedia_common
researchProduct

Method Framework for Developing Enterprise Architecture Security Principles

2019

Organizations need to consider many facets of information security in their daily operations – among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations’ core resources provoke new threats that can be difficult to anticipate. It has been argued that the security and privacy considerations should be embedded in all the areas of organizational activities instead of only relying technical security mechanisms provided by the underlying systems and software. Enterprise Architecture Management (EAM) offers a holistic approach for managing different dimensions of an organization, and can be conceived as a coherent and consistent set of principles tha…

Process managementlcsh:T58.5-58.64information securitylcsh:Information technologyComputer scienceEmerging technologiesenterprise architecture managementconstructive researchtietoturvapolitiikkaEnterprise architectureInformation securityyrityksetenterprise architecture principleBody of knowledgeinformation security policyConstructive researchEnterprise Architecture Management; Enterprise Architecture Principle; Information Security; Information Security Policy; Method Framework; Constructive ResearchEnterprise architecture managementGeneral Materials SciencekokonaisarkkitehtuuritietoturvaSet (psychology)Empirical evidencemethod frameworktietojärjestelmätComplex Systems Informatics and Modeling Quarterly
researchProduct