Search results for "haavoittuvuus"
showing 10 items of 38 documents
Social vulnerability to climate policies: Building a matrix to assess policy impacts on well-being
2021
In this article, we address the social vulnerability of people to climate mitigation policies and contribute to assessing the social impacts of climate policies by introducing a matrix tool for conducting vulnerability assessments and participatory climate policy planning. The matrix serves as a methodological tool for identifying social groups in their social spaces. First, we lay the foundation for the matrix by linking social vulnerability to equality and justice, demonstrating the importance of addressing social vulnerability in climate policy design and research. Next, we introduce the ways in which social vulnerability has been addressed in the integration of social and climate policy…
Habitat associations drive species vulnerability to climate change in boreal forests
2016
Species climate change vulnerability, their predisposition to be adversely affected, has been assessed for a limited portion of biodiversity. Our knowledge of climate change impacts is often based only on exposure, the magnitude of climatic variation in the area occupied by the species, even if species sensitivity, the species ability to tolerate climatic variations determined by traits, plays a key role in determining vulnerability. We analyse the role of species’ habitat associations, a proxy for sensitivity, in explaining vulnerability for two poorly-known but species-rich taxa in boreal forest, saproxylic beetles and fungi, using three IPCC emissions scenarios. Towards the end of the 21…
Tactics of invisibility : How people in vulnerable positions make datafied everyday life livable
2022
Various data platforms force the individual into constant presence and visibility. However, the ways in which datafied environments relate to experienced vulnerabilities in our everyday lives remain unclear. Through diaries produced by and interviews with participants from three groups who occupy presumably vulnerable positions and who currently live in Finland, we explore the ways in which people challenge expectations and prior assumptions related to forced visibility. Using the concept of tactics developed by de Certeau, we aim to understand how individuals make everyday surveillance culture livable through what we call tactics of invisibility. Based on our analysis, we identify three k…
Haavoittuvuuden kudelmat : digitaalinen subjekti ja haavoittuvuus datavetoista yhteiskuntaa käsittelevässä tutkimuskirjallisuudessa
2021
Artikkelissa tarkastellaan sitä, millaisia merkityksiä haavoittuvuudelle on annettu datavetoista yhteiskuntaa ja digitaalista subjektia koskevassa tutkimuskirjallisuudessa. Artikkeli perustuu kirjallisuuskatsaukseen, joka on tehty vuosina 2015–2020 ilmestyneistä haavoittuvuutta datafikaation kontekstissa käsittelevistä tieteellisistä julkaisuista. Kirjallisuushaut tehtiin yhteiskuntatieteiden alojen keskeisistä tietokannoista ja digitaalisista kirjastoista. Hakujen pohjalta tutkimuskirjallisuus järjestettiin neljään teemakokonaisuuteen: 1) datavalvonnan tuottamat haavoittuvuudet, 2) data tietämisen tapana ja osallisuutena, 3) digitaalisten subjektien kategorisointi ja näkyvyyden säätely sek…
"""Fluidity and flexibility of """"belonging"""": Uses of the concept in contemporary research"""
2016
Studies framing “belonging” as a key focus and a central concept of research have increased significantly in the 2000s. This article explores the dimensions of belonging as a scholarly concept. The investigation is based on a qualitative content analysis of articles published in academic journals covering a large number of different disciplines. The article poses and answers the following research questions: How is belonging understood and used in contemporary research? What added value does the concept bring to scholarly discussions? In the analysis, five topoi of conceptualizing belonging – spatiality, intersectionality, multiplicity, materiality, and non-belonging – were identified. Afte…
HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
2022
Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being an active area of research, prior work has mainly focused on vulnerability detection and exploitation, threat modelling, and protocol security. However, these methods are ineffective in preventing attacks against legacy and End-Of-Life devices that are already vulnerable. Current research mainly focuses on implementing and demonstrating the potential of malicious modifications. Hardening emerges as an effective solution to provide IoT devices with an additional layer of d…
Security Controls for Smart Buildings with Shared Space
2022
In this paper we consider cyber security requirements of the smart buildings. We identify cyber risks, threats, attack scenarios, security objectives and related security controls. The work was done as a part of a smart building design and construction work. From the controls identified w e concluded security practices for engineering-in smart buildings security. The paper provides an idea toward which system security engineers can strive in the basic design and implementation of the most critical components of the smart buildings. The intent of the concept is to help practitioners to avoid ad hoc approaches in the development of security mechanisms for smart buildings with shared space. pe…
Lua Code: Security Overview and Practical Approaches to Static Analysis
2017
Lua is an interpreted, cross-platform, embeddable, performant and low-footprint language. Lua's popularity is on the rise in the last couple of years. Simple design and efficient usage of resources combined with its performance make it attractive for production web applications even to big organizations such as Wikipedia, CloudFlare and GitHub. In addition to this, Lua is one of the preferred choices for programming embedded and IoT devices. This context allows to assume a large and growing Lua codebase yet to be assessed. This growing Lua codebase could be potentially driving production servers and extremely large number of devices, some perhaps with mission-critical function for example i…
Banks’ unfairness and the vulnerability of low-income unbanked consumers
2018
This paper’s objective was to explore low-income unbanked consumers’ perceptions of bank fairness and the way these perceptions were linked to consumer experiences of vulnerability. Qualitative data were used to analyse low-income consumers’ perceptions about banks’ services and communications. The study finds that although consumers’ financial inclusion is partially hindered by their personal circumstances, the perceived unfair treatment by banks has an even more negative impact on their financial inclusion. Low-income unbanked individuals report banks avoiding them, discriminating against them and impeding their financial inclusion. Banks’ perceived unfairness towards low-income consumers…
OWASP Top 10 -haavoittuvuuksien korjaaminen TIM-järjestelmästä
2015
Modernit web-sovellukset ovat monimutkaisia, minkä vuoksi ne voivat sisältää erilaisia haavoittuvuuksia. Jyväskylän yliopiston tietotekniikan laitoksella on kehitteillä The Interactive Material -järjestelmä, johon tallennetut dokumentit voivat sisältää interaktiivisia komponentteja ja jossa opiskelijat voivat esimerkiksi tehdä luentomonisteeseen omia muistiinpanojaan. Tutkielmassa käydään läpi web-sovellusten yleisimmät haavoittuvuudet OWASP-organisaation Top 10 -listan mukaan ja selvitetään, mitä näistä haavoittuvuuksista TIM-järjestelmän nykyisessä versiossa on ja kuinka ne voidaan järkevästi korjata. Haavoittuvuuskartoituksessa sovelletaan sekä penetraatiotestausta että lähdekoodin syste…