Search results for "Vulnerability."
showing 10 items of 397 documents
The importance of Culture and Context in Disaster Risk Reduction : A Case Study of Women in Batticaloa`s Perceptions on Vulnerability to Natural Disa…
2018
Master's thesis Global development and planning UT505 - University of Agder 2018 The aim of this thesis has been to assess perceptions on vulnerability to natural disasters and disaster risk reduction efforts among women in Batticaloa district, Sri Lanka. Batticaloa is one of the poorest districts in Sri-Lanka with vulnerabilities linked to linked to several factors; the impact of the war, the tsunami, and water related climate variability which again affects health and safety, water resources, agriculture and fisheries, access to services and livelihood/economic development of families and communities (Humanity & Inclusion, n. d.). Disasters are often considered the “antithesis of human de…
Life of a Fatso : Young, Fat and Vulnerable in a Scandinavian Society of Perfection
2020
This chapter offers a close reading of the young adult novel Miss by Synne Sun Loes (2017). The story is about 16-year-old Ea who is at the point of dropping out of school. The title carries a double reference—on the one hand, to Ea’s feeling of being a mis(s)fit and, on the other hand, to her critique of her best friend turning into a ‘Little Miss Perfect’. The analysis discusses two main questions: What has made this teenager from a well-off family so vulnerable? and How is her resistance expressed? The analysis explores how Ea positions herself as an outsider through bodily and social protest, making her both vulnerable and strong, and discusses this in relation to Judith Butler’s (2016)…
Pattern recognition based authentication in mobile and wireless systems
2008
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad During last several decades’ mobile communication has aimed a dramatically development, and brought remarkable change of people’s life. Mobile communication offer wireless connectivity that enables mobility and computing in dynamic communication environments. The market demands driving the mobile communication technology development fast ever. Numbers of communication systems have been developed and numerous service providers and equipment vendors entered this market. Therefore many new advance techniques have been introduced into it which gives subscriber a larger bandwidth, more powerful proces…
Securing Assets with RFID
2008
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
A roadmap towards improving managed security services from a privacy perspective
2014
Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…
Secure Group Communication Using Fractional Public Keys
2010
Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…
Managing Emerging Information Security Risks during Transitions to Integrated Operations
2010
Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…
El Dret a la Ciutat des de l'exclusió residencial: l'evolució dels barris vulnerables de la Comunitat Valenciana
2019
El derecho a la ciudad fue un concepto empleado por primera vez por Lefebvre (1968) entendido como aquel derecho de la ciudadanía a constituir ciudades que respondan a las necesidades humanas. De este modo, las necesidades de una ciudad no son más que la manifestación expresa de las necesidades colectivas de sus residentes reflejadas en el espacio urbano y comunitario (Caravantes, 2018). A las necesidades colectivas cabe sumársele las necesidades específicas de las personas que forman parte activa e integrante de las ciudades. La concentración de tales necesidades, así como de fenómenos vinculados al ámbito residencial conllevan a la “acumulación de clases desfavorecidas en las ciudades” (S…
Social Justice and Financial Capitalism: Some Notions on Risks, Hierarchies, and Value
2018
The recurring financial crises and intensive financialisation force a reconsideration of theories of justice. This article analyses financial capitalism as an ideal-type. In ideal-typical financial capitalism, risks and positions of vulnerability take a pronounced role in the determination of social positions. Risks also come in a specific ontological form. Further, the analysis extends to the production of value in financial capitalism and its relation to a particular logic of determining social positions. The article discusses, how should theories of justice be updated to accommodate this particular ontology of risks. This requires also making a distinction between explicit and implicit p…