Search results for "turvallisuus"
showing 10 items of 285 documents
Flying-Related Concerns among Airline Customers in Finland and Sweden during COVID-19
2022
COVID-19 hit the global economy hard in early 2020, and airline industry was among the biggest commercial victims. Governments closed borders, the virus scared off travelers and the aircraft stayed on the ground to a large extent. The forecasted record year turned out to be the worst in the history of aviation. This study focused on the concerns of airline customers and analyzed the differences between the customer behavior in two focus markets, Finland and Sweden. The article is based on a questionnaire and the answers of 2004 airline customers. The results show that even though the overall COVID-19 strategy was very different between the focus markets, the same concerns still arose. The m…
Alkoholinkäytön aiheuttama liikennekuoleman riski Suomessa
2023
Tässä tutkimuksessa analysoidaan juopumuksen asteen vaikutusta kuolemaan johtavan liikenneonnettomuuden riskiin moderneilla tilastollisilla menetelmillä. Tutkimuksen pääaineistona ovat vuosina 2005–2014 Suomessa tapahtuneet kuolemaan johtaneet moottoriajoneuvo-onnettomuudet, joissa oli mukana henkilöauto aiheuttajana tai muuna osallisena. Pääaineistoa täydennetään ratsiatutkimuksista julkaistuilla tilastoilla. Keskeisiä käytettyjä mittareita ovat riskisuhde sekä vakioitu riskisuhde, josta on poistettu sekoittavien muuttujien vaikutusta. Tutkimuksen ensimmäisenä tavoitteena on selvittää, miten pieni veren alkoholipitoisuus alkaa lisätä liikenneonnettomuuden riskiä, ja toisena tavoitteena on …
Suomi ja kriittisen militarismitutkimuksen tarve
2021
Esittelemme kriittistä militarismitutkimusta (engl. Critical Mfilitary Studies) ja tutkimuksellisia näkökulmia suomalaiseen militarismiin ja militarisaatioon. Pohdimme, millaisia ilmentymiä militarismi ja militarisaatio saavat Suomessa, ja hahmottelemme mahdollisia tulevan tutkimuksen suuntia. Pyrimme herättämään keskustelua suomalaisen yhteiskunnan militarisaatiosta, sotilaallisen vallan koskemattomuudesta sekä ekseptionalistisesta asemasta suomalaisessa yhteiskunnassa. Tuomme esiin tarvetta kriittiselle militarismitutkimukselle avoimemman ja monipuolisemman sotilaallista valtaa koskevan keskustelun ja tutkimuksen edistämiseksi. Esittelemme lyhyesti kansainvälisen tutkimuksen kenttää, ja t…
Knowledge Discovery from Network Logs
2015
Modern communications networks are complex systems, which facilitates malicious behavior. Dynamic web services are vulnerable to unknown intrusions, but traditional cyber security measures are based on fingerprinting. Anomaly detection differs from fingerprinting in that it finds events that differ from the baseline traffic. The anomaly detection methodology can be modelled with the knowledge discovery process. Knowledge discovery is a high-level term for the whole process of deriving actionable knowledge from databases. This article presents the theory behind this approach, and showcases research that has produced network log analysis tools and methods. peerReviewed
Disparities in nutritional adequacy of diets between different socioeconomic groups of Finnish adults
2022
Information on dietary adequacy is needed to assess food and nutrition security in a modern society, especially in the transition towards climate-friendly food systems. In this study, differences in the nutritional adequacy of diets among Finnish adults were evaluated in population groups of different education, income and urbanisation levels. The study used data from the FinDiet 2017 Survey (n = 1655, 18–74 years). Modelled usual intakes of foods and nutrients were evaluated relative to food-based dietary guidelines issued by the National Nutrition Council of Finland (FNNC) and with respect to nutrient adequacy following the Nordic Nutrition Recommendations and FNNC. For about half of the …
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…
Protocol for developing a mental imagery intervention: a randomised controlled trial testing a novel implementation imagery e-health intervention to …
2019
IntroductionDrowning due to driving into floodwater accounts for a significant proportion of all deaths by drowning. Despite awareness campaigns such as 'If it's flooded, forget it', people continue to drive into floodwater. This causes loss of life, risk to rescuers and damage to vehicles. The aim of this study was to develop and evaluate an online e-health intervention to promote safe driving behaviour during flood events.Methods and analysisThe study will use a 2×3 randomised controlled trial in which participants are randomised into one of two conditions: (1) education about the risks of driving into floodwater or (2) education about the risks of driving into floodwater plus a theory-ba…
Hypervisor-assisted dynamic malware analysis
2021
AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
Improving Password Memorability, While Not Inconveniencing the User
2019
Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental groups). Ps…