Search results for "Vulnerability."

showing 10 items of 397 documents

The importance of Culture and Context in Disaster Risk Reduction : A Case Study of Women in Batticaloa`s Perceptions on Vulnerability to Natural Disa…

2018

Master's thesis Global development and planning UT505 - University of Agder 2018 The aim of this thesis has been to assess perceptions on vulnerability to natural disasters and disaster risk reduction efforts among women in Batticaloa district, Sri Lanka. Batticaloa is one of the poorest districts in Sri-Lanka with vulnerabilities linked to linked to several factors; the impact of the war, the tsunami, and water related climate variability which again affects health and safety, water resources, agriculture and fisheries, access to services and livelihood/economic development of families and communities (Humanity & Inclusion, n. d.). Disasters are often considered the “antithesis of human de…

UT505CultureVulnerabilityNatural disastersContextHousingWomenVDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240::Offentlig og privat administrasjon: 242VDP::Samfunnsvitenskap: 200::Sosiologi: 220DRR
researchProduct

Life of a Fatso : Young, Fat and Vulnerable in a Scandinavian Society of Perfection

2020

This chapter offers a close reading of the young adult novel Miss by Synne Sun Loes (2017). The story is about 16-year-old Ea who is at the point of dropping out of school. The title carries a double reference—on the one hand, to Ea’s feeling of being a mis(s)fit and, on the other hand, to her critique of her best friend turning into a ‘Little Miss Perfect’. The analysis discusses two main questions: What has made this teenager from a well-off family so vulnerable? and How is her resistance expressed? The analysis explores how Ea positions herself as an outsider through bodily and social protest, making her both vulnerable and strong, and discusses this in relation to Judith Butler’s (2016)…

VDP::Humaniora: 000::Språkvitenskapelige fag: 010::Nordiske språk: 018FeelingPerfectionism (philosophy)media_common.quotation_subjectClose readingPerfectionVulnerabilityResistance (psychoanalysis)Gender studiesSociologyRelation (history of concept)Social protestmedia_common
researchProduct

Pattern recognition based authentication in mobile and wireless systems

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad During last several decades’ mobile communication has aimed a dramatically development, and brought remarkable change of people’s life. Mobile communication offer wireless connectivity that enables mobility and computing in dynamic communication environments. The market demands driving the mobile communication technology development fast ever. Numbers of communication systems have been developed and numerous service providers and equipment vendors entered this market. Therefore many new advance techniques have been introduced into it which gives subscriber a larger bandwidth, more powerful proces…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Securing Assets with RFID

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct

A roadmap towards improving managed security services from a privacy perspective

2014

Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacymanaged security servicesPrivacy by Designbusiness.industryComputer scienceDigital forensicsBig dataethical awarenesssecurityIntrusion detection systemLibrary and Information SciencesprivacyComputer securitycomputer.software_genreComputer Science ApplicationsOutsourcingInformation sensitivityintrusion detection and prevention systemsoutsourcingbusinesscomputerRegister of data controllersEthics and Information Technology
researchProduct

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct

Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010

Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424business.industryControl (management)Information securityIntegrated operationsComputer securitycomputer.software_genreInvestment (macroeconomics)System dynamicsRisk analysis (engineering)Information and Communications TechnologybusinesscomputerRisk managementVulnerability (computing)2010 43rd Hawaii International Conference on System Sciences
researchProduct

El Dret a la Ciutat des de l'exclusió residencial: l'evolució dels barris vulnerables de la Comunitat Valenciana

2019

El derecho a la ciudad fue un concepto empleado por primera vez por Lefebvre (1968) entendido como aquel derecho de la ciudadanía a constituir ciudades que respondan a las necesidades humanas. De este modo, las necesidades de una ciudad no son más que la manifestación expresa de las necesidades colectivas de sus residentes reflejadas en el espacio urbano y comunitario (Caravantes, 2018). A las necesidades colectivas cabe sumársele las necesidades específicas de las personas que forman parte activa e integrante de las ciudades. La concentración de tales necesidades, así como de fenómenos vinculados al ámbito residencial conllevan a la “acumulación de clases desfavorecidas en las ciudades” (S…

Valencian regionPobresa -- País Valencià:Urbanisme [Àrees temàtiques de la UPC]Vulnerabilitat urbanaDerecho a la ciudadUrban vulnerabilityVulnerable neighborhoodsVulnerabilidad urbanaComunitat ValencianaPoverty -- Spain -- Valencia (Province)Dret a la ciutatBarrios vulnerablesRight to the cityBarris vulnerablesSociology Urban -- Spain -- Valencia (Province)Comunidad ValencianaSociologia urbana -- País ValenciàXIII CTV 2019 Proceedings: XIII International Conference on Virtual Cityand Territory: “Challenges and paradigms of the contemporary city”: UPC, Barcelona, October 2-4, 2019
researchProduct

Social Justice and Financial Capitalism: Some Notions on Risks, Hierarchies, and Value

2018

The recurring financial crises and intensive financialisation force a reconsideration of theories of justice. This article analyses financial capitalism as an ideal-type. In ideal-typical financial capitalism, risks and positions of vulnerability take a pronounced role in the determination of social positions. Risks also come in a specific ontological form. Further, the analysis extends to the production of value in financial capitalism and its relation to a particular logic of determining social positions. The article discusses, how should theories of justice be updated to accommodate this particular ontology of risks. This requires also making a distinction between explicit and implicit p…

Value (ethics)Financekapitalismibusiness.industryeconomic crisesVulnerabilityta5142taloudelliset kriisitCapitalismsosiaalinen oikeudenmukaisuusSocial justiceEconomic Justicesocial justiceEconomicsOntologyProduction (economics)capitalismRelation (history of concept)businessrisksriskitStudies in Social and Political Thought
researchProduct