Search results for "struktuurit"
showing 10 items of 22 documents
Enhancing the European Cyber Threat Prevention Mechanism
2021
This research will determine how it is possible to implement the national cyber threat prevention system into the EU level Early Warning System. Decision makers have recognized that the lack of cooperation between EU member countries affects public safety at the international level. Separate operational functions and procedures between national cyber situation centers create challenges. One main problem is that the European Union does not have a common cyber ecosystem concerning intrusion detection systems for cyber threats. Also, privacy and citizens’ security as topics are set against each other. The research will comprise a new database for the ECHO Early Warning System concept.
Cyber Situational Awareness in Critical Infrastructure Organizations
2021
The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running critical infrastructures and their cyber situational awareness (CSA). According to a common view, components of critical infrastructures become more complex and interdependent on each other and, as a consequence, ramifications of incidents multiply. In practice, the actions relate to developing better CSA and understanding of a critical infrastructure organization. The aim is to prepare for incidents and their management in a whole-of-society approach. The arrangement i…
Protecting the besieged cyber fortress : Russia’s response to cyber threats
2019
The Information Security Doctrine of the Russian Federation (RF) defines the threat to information security as a complex of actions and factors that represent a danger to Russia in the information space. These threats can be information-psychological (i.e., when the adversary tries to influence a person’s mind) or information-technical (i.e., when the object of influence is the information infrastructure). The information infrastructure of the RF is a combination of information systems, websites, and communication networks located in the territory of the RF, or those used as part of international treaties signed by the RF. A cyber threat is an illegal penetration or threat of penetration by…
Struktuurit ja pelit kielenoppimisen alkuvaiheen tukena
2019
Vastaantulo-hankkeessa on perehdytty kielenoppimisen alkuvaiheeseen ja suullisen kielitaidon kehittymiseen valmistavassa opetuksessa. Oppilaan aloittaessa koulunkäynnin uudella kielellä, on kielenoppimisen kannalta merkityksellistä päästä osallistumaan vuorovaikutukseen luokkatovereiden ja opettajien kanssa sekä oppia vuorovaikutuksessa relevanttia, autenttista ja merkityksellistä kieltä. Tässä artikkelissa tarkastelen struktuurien ja vuorovaikutukseen ohjaavien pelien merkitystä kielenoppimisen alkuvaiheessa olevan oppijan suullisen kielitaidon kehittymisen kannalta. Tarkastelu pohjautuu Vastaantulossa alakoulun valmistavan opetuksen ryhmässä kuvattuun videomateriaaliin sekä pro gradu -tut…
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
Environmental Features Associated With Older Adults' Physical Activity in Different Types of Urban Neighborhoods.
2020
The authors studied associations of nature- and infrastructure-based features with physical activity (PA) in different urban neighborhood types; 848 community-dwelling people aged 75–90 years reported PA and three perceived nature-based destinations and seven infrastructure-based features as outdoor mobility facilitators. Neighborhood type was defined using a geographic information system based on proximity to central service areas and residential density (city center, subcenter, and dense and dispersed areas outside centers). PA was higher in dense areas and the city center. Binary logistic regression showed that perceiving nature-based destinations increased the odds for higher PA in the …
Assessment of Cybersecurity Risks: Maritime Automated Piloting Process
2022
A modern society is a combination of several critical infrastructures, of which international and national maritime transportation systems are essential parts. Digitalization makes it possible to increase levels of autonomy in maritime systems. It also means fully existing cyberenvironments in maritime processes. In cyberenvironments, it is crucial there is trustable information communication between system elements of the process, alongside the usability, reliability, and integrity of systems data in the operating environment. In order to develop maritime autonomy in Finland the Sea4Value / Fairway (S4VF) research program has been developed. At the first stage of the program, the main goal…
Cyber deterrence and Russia’s active cyber defense
2020
Effects of cyber domain in crisis management
2019
There is fundamental need in EU-level to develop common alarm procedures and emergency response models with preventive functions which work well from local to national level and from national to international level. European Public Protection and Disaster Relief (PPDR) services such as law enforcement, firefighting, emergency medical and disaster recovery services have recognized that lack of interoperability of technical systems limits cooperation between the PPDR authorities. Also, the military (MIL) and critical infrastructure protection (CIP) faces similar challenges. Recent major accidents have indicated that lack of human resources affects to disaster recovery. PPDR-actors cannot star…
Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases
2012
The advent of the smart phone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and increasingly complex networks, jointly forming digital infrastructures. The multi-faceted and relational character of such digital infrastructures raises issues around how change and control can be conceptualized and understood. We discuss how change and control are paradoxically related in digital infrastructures and how they affect the evolution of such infrastructures. We examine these paradoxes by examining the change in, and competition between, two mobile operating systems: Apple's iOS and Google's Android a…