Search results for "valvonta"
showing 10 items of 86 documents
Anomaly detection approach to keystroke dynamics based user authentication
2017
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…
Video Streaming and Internalized Surveillance
2018
This paper aims to develop knowledge about the complicated ways in which the modern individual uses surveillance (techniques) and the ways surveillance uses the individual. My observational analysis of a videostreaming community reveals the central role that surveillance plays in participating and becoming visible in an online environment. The results show that through disciplinary and lateral surveillance, participants produced context-defined I-narrations and formed themselves following the normative judgment of the environment. The same mechanism may be observed in other videostreaming social media environments and the modern social media-saturated society in general. This is an inconspi…
End-users Co-create Shared Information for a More Complete Real-time Maritime Picture
2017
European Union Member States are working towards an integrated maritime surveillance and deeper information sharing and implementation of Common Information Sharing Environment. Value networks aiming at co-creation, need active facilitation, and relevant platforms for open cooperation. This study analysed scenario analytics, and narrative documents from projects CoopP, CISE, and MARISA by using a Data Extraction Table to classify both objects and phenomenon relevant to European maritime information sharing systems. The object and phenomenon rows are grouped under a European Coast Guard Functions, CGFs framework, to better understand their occurrence and interdependencies. This paper finds t…
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications
2022
The increased, widespread, unwarranted, and unaccountable use of Closed-Circuit TeleVision (CCTV) cameras globally has raised concerns about privacy risks for the last several decades. Recent technological advances implemented in CCTV cameras, such as Artificial Intelligence (AI)-based facial recognition and Internet of Things (IoT) connectivity, fuel further concerns among privacy advocates. Machine learning and computer vision automated solutions may prove necessary and efficient to assist CCTV forensics of various types. In this paper, we introduce and release the first and only computer vision models are compatible with Microsoft common object in context (MS COCO) and capable of accurately…
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications
2022
It is estimated that over 1 billion Closed-Circuit Television (CCTV) cameras are operational worldwide. The advertised main benefits of CCTV cameras have always been the same; physical security, safety, and crime deterrence. The current scale and rate of deployment of CCTV cameras bring additional research and technical challenges for CCTV forensics as well, as for privacy enhancements. This paper presents the first end-to-end system for CCTV forensics and feasible privacy-enhancing applications such as exposure measurement, CCTV route recovery, CCTV-aware routing/navigation, and crowd-sourcing. For this, we developed and evaluated four complex and distinct modules (CCTVCV [1], OSRM-CCTV [2],…
Sarbanes-Oxley lain vaikutukset suomalaiseen tilintarkastukseen
2005
Luottamuksesta kiinni : ammattiyhdistysliike ja työorganisaation suorituskyky
1998
Employee personal Internet usage in the workplace
2016
Information technology (IT) devices connected to the Internet, such as computers, tablets, and smartphones, have become pervasive in the workplace. These IT devices have greatly facilitated the performance of job tasks for employees. At the same time, employees are increasingly using these technologies for non-work-related purposes during office hours, which is called personal Internet usage in the workplace (PIU). Examples of PIU include, but are not limited to, checking and sending non-work-related emails, surfing news sites, visiting social network sites, e-banking, stock trading, and online shopping, chatting, and gaming. Previous studies on PIU present two schools of thought on PIU out…
Posted work and deterritorialization in the European Union: a study of the German construction and meat industry
2015
Mobiliteit en burgerschaprechten binnen de Europese Unie beïnvloeden de levens van miljoenen mensen in de EU op een positieve manier. In Posted Work and Deterritorialization in the European Union betoogt Ines Wagner echter dat de dynamiek van intra-Europese arbeidsmigratie ook een hypermobiele onderklasse van arbeiders in precaire, slecht betaald werk creëert. Dit komt voornamelijk doordat tewerkstellingsstructuren transnationaliseren, terwijl beleidsinstrumenten en kiesdistricten territoriaal geregeld blijven. Wagner’s conclusies zijn gebaseerd op kwalitatief onderzoek naar detachering in de Duitse politieke economie. Gedetacheerde werknemers zijn arbeidsmigranten die door hun werkgever ti…