Search results for "turvallisuus"

showing 10 items of 285 documents

Flying-Related Concerns among Airline Customers in Finland and Sweden during COVID-19

2022

COVID-19 hit the global economy hard in early 2020, and airline industry was among the biggest commercial victims. Governments closed borders, the virus scared off travelers and the aircraft stayed on the ground to a large extent. The forecasted record year turned out to be the worst in the history of aviation. This study focused on the concerns of airline customers and analyzed the differences between the customer behavior in two focus markets, Finland and Sweden. The article is based on a questionnaire and the answers of 2004 airline customers. The results show that even though the overall COVID-19 strategy was very different between the focus markets, the same concerns still arose. The m…

212 Civil and construction engineeringRenewable Energy Sustainability and the EnvironmentGeography Planning and Developmentpassenger concernsCOVID-19 concernsCOVID-19512 Business and managementkaranteeniterveysturvallisuushuolestuneisuusBuilding and ConstructionilmastonmuutoksetManagement Monitoring Policy and Lawpandemiatmatkustajatilmailualalentomatkailuairline customers; COVID-19 concerns; passenger concernsrajoituksetairline customers
researchProduct

Alkoholinkäytön aiheuttama liikennekuoleman riski Suomessa

2023

Tässä tutkimuksessa analysoidaan juopumuksen asteen vaikutusta kuolemaan johtavan liikenneonnettomuuden riskiin moderneilla tilastollisilla menetelmillä. Tutkimuksen pääaineistona ovat vuosina 2005–2014 Suomessa tapahtuneet kuolemaan johtaneet moottoriajoneuvo-onnettomuudet, joissa oli mukana henkilöauto aiheuttajana tai muuna osallisena. Pääaineistoa täydennetään ratsiatutkimuksista julkaistuilla tilastoilla. Keskeisiä käytettyjä mittareita ovat riskisuhde sekä vakioitu riskisuhde, josta on poistettu sekoittavien muuttujien vaikutusta. Tutkimuksen ensimmäisenä tavoitteena on selvittää, miten pieni veren alkoholipitoisuus alkaa lisätä liikenneonnettomuuden riskiä, ja toisena tavoitteena on …

3142 Kansanterveystiede ympäristö ja työterveys112 Tilastotiedeliikennejuopumusliikenneturvallisuusliikenneonnettomuudetalkoholinkäyttöalkoholi (päihteet)riskitliikennekuolemat
researchProduct

Suomi ja kriittisen militarismitutkimuksen tarve

2021

Esittelemme kriittistä militarismitutkimusta (engl. Critical Mfilitary Studies) ja tutkimuksellisia näkökulmia suomalaiseen militarismiin ja militarisaatioon. Pohdimme, millaisia ilmentymiä militarismi ja militarisaatio saavat Suomessa, ja hahmottelemme mahdollisia tulevan tutkimuksen suuntia. Pyrimme herättämään keskustelua suomalaisen yhteiskunnan militarisaatiosta, sotilaallisen vallan koskemattomuudesta sekä ekseptionalistisesta asemasta suomalaisessa yhteiskunnassa. Tuomme esiin tarvetta kriittiselle militarismitutkimukselle avoimemman ja monipuolisemman sotilaallista valtaa koskevan keskustelun ja tutkimuksen edistämiseksi. Esittelemme lyhyesti kansainvälisen tutkimuksen kenttää, ja t…

5171 Valtio-oppisukupuolentutkimusmaanpuolustuseducationmilitarismirauhantutkimussosiaaliset normitsodankäyntiposthumanismiSuomicritical military studieskriittinen teoriavaltarakenteetturvallisuuspolitiikka
researchProduct

Knowledge Discovery from Network Logs

2015

Modern communications networks are complex systems, which facilitates malicious behavior. Dynamic web services are vulnerable to unknown intrusions, but traditional cyber security measures are based on fingerprinting. Anomaly detection differs from fingerprinting in that it finds events that differ from the baseline traffic. The anomaly detection methodology can be modelled with the knowledge discovery process. Knowledge discovery is a high-level term for the whole process of deriving actionable knowledge from databases. This article presents the theory behind this approach, and showcases research that has produced network log analysis tools and methods. peerReviewed

Actionable knowledgeKnowledge extractionComputer scienceProcess (engineering)cyber securityComplex systemAnomaly detectionDynamic web pageBaseline (configuration management)kyberturvallisuusData scienceTerm (time)
researchProduct

Disparities in nutritional adequacy of diets between different socioeconomic groups of Finnish adults

2022

Information on dietary adequacy is needed to assess food and nutrition security in a modern society, especially in the transition towards climate-friendly food systems. In this study, differences in the nutritional adequacy of diets among Finnish adults were evaluated in population groups of different education, income and urbanisation levels. The study used data from the FinDiet 2017 Survey (n = 1655, 18–74 years). Modelled usual intakes of foods and nutrients were evaluated relative to food-based dietary guidelines issued by the National Nutrition Council of Finland (FNNC) and with respect to nutrient adequacy following the Nordic Nutrition Recommendations and FNNC. For about half of the …

Adultkestävä kulutustulotusual intake modellingmacronutrientsruokavaliotravinteetravitsemussuosituksetsosioekonominen asemaEatingSuomiHumansravintoaineetFinlandsosioekonomiset tekijätdietary guidelinesNutrition and Dieteticsruokajärjestelmätsocioeconomic differencesurbanisationturvallisuusNutritional Requirementsruokavaliodietary recommendationsdietary intake; socioeconomic differences; urbanisation; 24 h dietary recall; usual intake modelling; dietary guidelines; dietary recommendations; macronutrients; micronutrients; climate-friendlyNutrition Surveysclimate-friendlyterveellisyysDietSocioeconomic FactorskoulutusmicronutrientseriarvoisuusFemalekaupungistuminendietary intakeravitsemus24 h dietary recallFood Science
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

Protocol for developing a mental imagery intervention: a randomised controlled trial testing a novel implementation imagery e-health intervention to …

2019

IntroductionDrowning due to driving into floodwater accounts for a significant proportion of all deaths by drowning. Despite awareness campaigns such as 'If it's flooded, forget it', people continue to drive into floodwater. This causes loss of life, risk to rescuers and damage to vehicles. The aim of this study was to develop and evaluate an online e-health intervention to promote safe driving behaviour during flood events.Methods and analysisThe study will use a 2×3 randomised controlled trial in which participants are randomised into one of two conditions: (1) education about the risks of driving into floodwater or (2) education about the risks of driving into floodwater plus a theory-ba…

Automobile Drivingsocial-cognitive theoriesflooded waterwaysClinical Sciencesdriver behaviourIntentionriskikäyttäytyminenRisk-TakingmielikuvaharjoitteludrivingHumansImageryliikenneturvallisuusteleterveydenhuoltoturvallisuuskasvatusRandomized Controlled Trials as Topicmental imagerywater safetyOther Medical and Health Sciencesdrowningrandomised controlled trial testingliikennekäyttäytyminentulvatTelemedicineFloodsPsychotherapyPublic Health and Health Servicesmental imagery interventione-health intervention
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental groups). Ps…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSpassword securitypassword security behaviorturvallisuuspassword memorabilityuser conveniencemuistaminensalasanatkäyttäjäkokemuspassword verificationtoisto
researchProduct