Results for 'security management'

1000+ found
Order:
  1.  18
    Context-aware security management system for pervasive computing environment.Seon-Ho Park, Young-Ju Han & Tai-Myoung Chung - 2007 - In D. C. Richardson B. Kokinov (ed.), Modeling and Using Context. Springer. pp. 384--396.
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  4
    The National Security Managers and the National Interest.Richard J. Barnet - 1971 - Politics and Society 1 (2):257-268.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  6
    Developing a theory-based information security management framework for human service organizations.Sameera Mubarak - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):254-271.
    Purpose This paper aims to identify organizations’ information security issues and to explore dynamic, organizational culture and contingency theories to develop an implementable framework for information security systems in human service organizations based soundly in theory and practice. Design/methodology/approach The paper includes a critical review of global information security management issues for HSOs and relevant multi-disciplinary organizational theories to address them. Findings Effective information security management can be particularly challenging to HSO because of their (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  22
    An assessment of policing and security management in post apartheid South Africa.T. Godwin, L. D. Gilbert & B. E. N. Thorn-Obtuya - 2011 - Sophia: An African Journal of Philosophy 11 (1).
  5. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  6.  33
    Securing Cisgendered Futures: Intersex Management under the “Disorders of Sex Development” Treatment Model.Catherine Clune-Taylor - 2019 - Hypatia 34 (4):690-712.
    In this critical, feminist account of the management of intersex conditions under 2006's controversial “Disorders of Sex Development” (DSD) treatment model, I argue that like the “Optimal Gender of Rearing” (OGR) treatment model it replaced, DSD aims at securing a cisgendered future for the intersex patient, referring to a normalized trajectory of development across the lifespan in which multiple sexed, gendered, and sexual characteristics remain in “coherent” alignment. I argue this by critically analyzing two ways that intersex management (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  15
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  9
    Management of Economic Security in the High-Tech Sector in the Context of Post-Pandemic Modernization.Andriy Shtangret, Nataliia Korogod, Sofia Bilous, Nataliia Hoi & Yurii Ratushniak - 2021 - Postmodern Openings 12 (2).
    The accelerated rates of scientific and technological progress and the intellectualization of the main factors of production play a leading role in ensuring the economic recovery of national economies, in particular in the conditions of the existence of today's post-pandemic consequences. The technological development of the leading countries of economic development poses difficult tasks for other participants in the world economic space to avoid a significant lag, especially in today's post-pandemic society. For the countries of Eastern Europe, this task is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Security and Policy Based Management-ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies.Kuong-Ho Liu Chen & Tzong-Jye Dow Liu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 197-208.
     
    Export citation  
     
    Bookmark  
  11.  11
    Risk management in digitalized educational environments: Teachers’ information security awareness levels.Hamza Fatih Sapanca & Sezer Kanbul - 2022 - Frontiers in Psychology 13.
    With the spread of Information and Communication Technologies tools and the Internet, Twenty first century technologies have significantly affected human life, and it has been desired to be obtained continuously. It has become challenging to protect information due to the increase in the methods by which malicious people can get information. As a result, it is crucial to determine people’s awareness levels by revealing the risks and threats to information security. In this context, a study was conducted to show (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  11
    Biopolitics and (in)security in Foucault: elements for a diagnosis of the management of the COVID-19 pandemic in Brazil.Daniel Verginelli Galantin & Thiago Fortes Ribas - 2022 - Revista de Filosofia Aurora 34 (61).
    Faced with the criticism of the biopolitical control exercised in the COVID-19 pandemic, we defend the importance of a re-examination of the foucauldian reflections so that the critical diagnoses of the present is accompanied by a careful analysis of the fields of force and knowledges in which such controls occur. Bearing in mind the correlation between security mechanisms and the management of insecurities, we argue that in the management of the pandemic by the brazilian executive government, the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki & Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  14.  7
    Benefits of farmer managed natural regeneration to food security in semi-arid Ghana.Seth Opoku Mensah, Suglo-Konbo Ibrahim, Brent Jacobs, Rebecca Cunningham, Derrick Owusu-Ansah & Evans Adjei - forthcoming - Agriculture and Human Values:1-17.
    Promoting Farmer Managed Natural Regeneration (FMNR) aims to increase the productive capacities of farmer households. Under FMNR, farmers select and manage natural regeneration on farmlands and keep them under production. While FMNR contributes to the wealth of farming communities, its contribution to household food security has rarely been researched. We, therefore, used a mixed-methods approach to address the research gap by measuring FMNR’s contribution to food security among farmer households in the Talensi district of Ghana. We adopted the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  8
    A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  21
    Anticipatory Governance in Biobanking: Security and Risk Management in Digital Health.Dagmar Rychnovská - 2021 - Science and Engineering Ethics 27 (3):1-18.
    Although big-data research has met with multiple controversies in diverse fields, political and security implications of big data in life sciences have received less attention. This paper explores how threats and risks are anticipated and acted on in biobanking, which builds research repositories for biomedical samples and data. Focusing on the biggest harmonisation cluster of biomedical research in Europe, BBMRI-ERIC, the paper analyses different logics of risk in the anticipatory discourse on biobanking. Based on document analysis, interviews with ELSI (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  43
    Gender, livestock assets, resource management, and food security: Lessons from the SR-CRSP. [REVIEW]Corinne Valdivia - 2001 - Agriculture and Human Values 18 (1):27-39.
    North Sumatra and West Java in Indonesia, the Andes of Bolivia and Peru, Western Province, the Coast and Machakos in Kenya, were Small Ruminant Collaborative Research Support Program (SR-CRSP) sites in which the role of small ruminants was studied and where technological interventions were designed. In all cases the target groups were poor rural households that could maintain sheep, goats, or South American camelids. The objective was to increase the welfare of families through the use of small ruminant technologies. Access (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  18.  21
    Intensification of Management of Economic Security of the Enterprise in the Post-Pandemic Space.Oleksandr Sylkin, Iryna Bosak, Viktoriia Homolska, Ihor Okhrimenko & Roman Andrushkiv - 2021 - Postmodern Openings 12 (1Sup1):302-312.
    Intensification of entrepreneurial activity in a post-pandemic space requires improved management both at the level of economic security and at the level of the entire enterprise. The expediency of the transition from the extensive type of development of the load management system is substantiated. The scientific approaches to the interpretation of the terms "intensification", "management" and "economic behaviour" are generalized. The attention is focused on the need to create a safe development environment for each enterprise. The (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  10
    Testimony on computer security before the U.S. senate Subcommittee on oversight of government management of the commmittee on governmental affairs.Susan Hubbell Nycum - 1984 - Acm Sigcas Computers and Society 13 (4, 1-3):2-4.
  21. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  22.  90
    Managing corporate ethics: learning from America's ethical companies how to supercharge business performance.Francis Joseph Aguilar - 1994 - New York: Oxford University Press.
    Managers often ask why their firm should have an ethics program, especially if no one has complained about unethical behavior. The pursuit of business ethics can cost money, they say. It can lose sales to less scrupulous competitors and can drain management time and energy. But as Harvard business professor Francis Aguilar points out, ethics scandals (such as over Beech-Nut's erzatz "apple juice" or Sears's padded car repair bills) can severely damage a firm, with punishing legal penalties, bad publicity, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  23. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  26
    Mitigating risks of digitalization through managed industrial security services.Christoph Jansen & Sabina Jeschke - 2018 - AI and Society 33 (2):163-173.
    Digitalization has become a cornerstone of competitiveness in the industrial arena, especially in the cases of small lot sizes with many variants in the goods produced. Managers of industrial facilities have to handle the complexity that comes along with Industry 4.0 in diverse dimensions to leverage the potentials of digitalization for their sites. This article describes major drivers of this complexity in current industrial automation to outline the environment of today’s challenges for managers of this technical transition—and shows how managed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper (...) countermeasures can be devised. Ontologies are instruments developed to address these conceptual clarification and terminological systematization issues. Over the years, several ontologies have been proposed in Risk Management and Security Engineering. However, as shown in recent literature, they fall short in many respects, including generality and expressivity - the latter impacting on their interoperability with related models. We propose a Reference Ontology for Security Engineering (ROSE) from a Risk Treatment perspective. Our proposal leverages on two existing Reference Ontologies: the Common Ontology of Value and Risk and a Reference Ontology of Prevention, both of which are grounded on the Unified Foundational Ontology (UFO). ROSE is employed for modeling and analysing some cases, in particular providing clarification to the semantically overloaded notion of Security Mechanism. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  10
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  30. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  43
    Management and Legal Issues Regarding Electronic Surveillance of Employees in the Workplace.David Halpern, Patrick J. Reville & Donald Grunewald - 2008 - Journal of Business Ethics 80 (2):175-180.
    Since the attack on the World Trade Center in New York, and on the Pentagon in the United States, concerns over security issues have been at an all-time high in this country. Both state and federal governments continue to discuss legislation on these issues amid much controversy. One key concern of both employers and employees is the extent that employers, espousing a "need to know" mentality, continue to expand their capability and implementation of surveillance of employees in the workplace. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  32.  7
    Managed care, medical privacy, and the paradigm of consent.Maxwell Gregg Bloche - 1997 - Kennedy Institute of Ethics Journal 7 (4):381-386.
    : The market success of managed health plans in the 1990s is bringing to medicine the easy availability of electronically stored information that is characteristic of the securities and consumer credit industries. Protection for medical confidentiality, however, has not kept pace with this information revolution. Employers, the managed care industry, and legal and ethics commentators frequently look to the concept of informed consent to justify particular uses of health information, but the elastic use of informed consent as a way of (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  33.  47
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  9
    Enhancing academic integrity in a UAE safety, security defence emergency management academy – the Covid- 19 response and beyond.Rami Al Sharefeen & Amanda Davies - 2022 - International Journal for Educational Integrity 18 (1).
    Globally, academic integrity and misconduct is a continuing conundrum for education institutions. Whilst the online delivery of education is not new, the onset of Covid-19 with accompanying health and safety limitations and the consequential rapid transition to emergency online delivery of education has, for many, exacerbated the need to focus on emerging potential for new forms of student academic misconduct i.e., e-dishonesty. This paper presents the strategies developed by a higher education institution specializing in university courses for safety and (...) professionals in the United Arab Emirates to address academic integrity during Covid-19 and beyond. The fundamental approach draws on lessons learnt from across the education community and focuses on engaging a comprehensive whole of Academy commitment to a high standard of academic integrity. The research investigated the outcomes of the academic integrity interventions in a total student population of 631. The early trending results of the strategies are encouraging, whilst monitoring of the ever-changing academic assessment landscape is pivotal to ensure these early trends are validated and sustained. The strategies developed and deployed by the Academy are replicable and offer a contribution to the demanding and complex challenge of establishing academic integrity within educational institutions across the world. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  2
    Common Foreign, Security, and Defense Policy.Ramses A. Wessel - 2015 - In Dennis Patterson (ed.), A Companion to European Union Law and International Law. Wiley-Blackwell. pp. 394–412.
    The Common Foreign and Security Policy (CFSP) objectives are an integral part of the overall objectives of the European Union and the policy area has developed from a purely intergovernmental form of cooperation in the days of the European political cooperation to an area in which the member states have increasingly accepted new forms of institutionalization. CFSP decisions are taken by the General Affairs Council, consisting of the ministers for foreign affairs of the member states. In spite of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  21
    Contextualizing Security Innovation: Responsible Research and Innovation at the Smart Border?Frederik C. Huettenrauch & Nina Klimburg-Witjes - 2021 - Science and Engineering Ethics 27 (1):1-19.
    Current European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  6
    Job Security and Organizational Citizenship Behaviors in Chinese Hybrid Employment Context: Organizational Identification Versus Psychological Contract Breach Perspective Differences Across Employment Status.Wenzhu Lu, Xiaolang Liu, Shanshi Liu & Chuanyan Qin - 2021 - Frontiers in Psychology 12.
    The goal of the present research was to identify the mechanism through which job security exerts its different effects on organizational citizenship behaviors among contract and permanent employees from social identity and social exchange perspectives. Our research suggests two distinct, yet related explanatory mechanisms: organizational identification and psychological contract breach, to extend the job security literature by examining whether psychological contract breach and organization identity complement each other and explaining the mechanism of different behaviors response to job (...) across employment status. Data were collected from 211 Chinese employees and 61 supervisory ratings of OCBs. Our results showed that relative to psychological contract breach, organizational identification plays a stronger mediating role in the association between job security and OCBs. Evidence from multi-group analyses also suggested employment status moderated the mediation mechanism of organizational identification between job security and OCB. Implications for job security and hybrid employment management are discussed. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Climate Change and Land: an IPCC special report on climate change, desertification, land degradation, sustainable land management, food security, and greenhouse gas fluxes in terrestrial ecosystems.P. R. Shukla, J. Skeg, E. Calvo Buendia, V. Masson-Delmotte, H.-O. Pörtner, D. C. Roberts, P. Zhai, R. Slade, S. Connors, S. van Diemen, M. Ferrat, E. Haughey, S. Luz, M. Pathak, J. Petzold, J. Portugal Pereira, P. Vyas, E. Huntley, K. Kissick, M. Belkacemi & J. Malley (eds.) - 2019
    No categories
     
    Export citation  
     
    Bookmark  
  39.  4
    Ontological security, existential anxiety and workplace privacy.William S. Brown - 2000 - Journal of Business Ethics 23 (1):61 - 65.
    The relationship of workers to management has traditionally been one of control. However, the introduction of increasingly sophisticated technology as a means of supervision in the modern workplace has dramatically altered the contours of this relationship, giving workers much less privacy and making workers much more visible than previously possible. The purpose of this paper is to examine the current state of technological control of workers and how it has altered the relationship of worker to organization, through the impact (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  78
    Securing singular thought about merely hypothetical entities.Greg Ackerman - 2016 - Philosophical Studies 173 (8):2193-2213.
    Although we are still in the dark when it comes to giving necessary and jointly sufficient criteria for what it takes to be thinking a singular thought, the paradigm cases are just ones where an agent is thinking about some particular object. When we erroneously think that Vulcan is a planet, our thought appears to be singular since it is, after all, about Vulcan. A promising way to explain this is to claim that there is something, a merely hypothetical entity, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43. A survey on the relationship between knowledge management, organizational health with personnel entrepreneurship in social security organization of iran.Karimzadeh Samad Nazem Fattah & Elham Ghaderi - 2011 - Social Research (Islamic Azad University Roudehen Branch) 3 (9):89-115.
     
    Export citation  
     
    Bookmark  
  44.  14
    Correlatives of Liberalism: Melville's Managers and the Microphysics of Security.J. Hole - 2015 - Télos 2015 (170):131-148.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Ontological Analysis and Redesign of Security Modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), The Practice of Enterprise Modeling - 15th IFIP WG 8.1 Working Conference, PoEM 2022. Springer. pp. 82-98.
    Enterprise Risk Management and security have become a fundamental part of Enterprise Architecture, so several frameworks and modeling languages have been designed to support the activities associated with these areas. Archi- Mate’s Risk and Security Overlay is one of such proposals, endorsed by The Open Group. We investigate the capabilities of the proposed security-related con- structs in ArchiMate with regard to the necessities of enterprise security modeling. Our analysis relies on a well-founded reference ontology of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  8
    Managed care under siege.Richard A. Epstein - 1999 - Journal of Medicine and Philosophy 24 (5):434 – 460.
    Managed Care Organizations (MCOs) are frequently criticized for their marketing mistakes. Often that criticism is leveled against an implicit benchmark of an ideal competitive market or an ideal system of government provision. But any accurate assessment in the choice of health care organizations always requires a comparative measure of error rates. These are high in the provision of health care, given the inherent uncertainties in both the cost and effectiveness of treatment. But the continuous and rapid evolution of private health (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  20
    WNN-Based Prediction of Security Situation Awareness for the Civil Aviation Network.Zhijun Wu, Shaopu Ma & Lan Ma - 2015 - Journal of Intelligent Systems 24 (1):55-67.
    The security of the civil aviation network is closely related to flight safety. Security situation prediction is the advanced stage of situational awareness in the civil aviation network. In this article, a prediction approach of security situations for the air traffic management network is proposed on the basis of the wavelet neural network. The proposed approach adopts the wavelet theory and neural network, combining a time-series forecasting method for the prediction of security situations in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  10
    Ecological Security Evaluation for Marine Ranching Based on the PLTS/ANP Method: A Case Study of Rongcheng.Yuan-Wei Du & Qiong Song - 2022 - Complexity 2022:1-16.
    The evaluation index system of ecological security of marine ranching is based on the assumption that there is independence among evaluation indexes in the existing studies, which ignores the complex interactive paths of marine ranching as an artificial ecosystem. In this study, the MRES evaluation network model that includes interdependent relationships is established based on the Driver-Pressure-State-Impact-Response model and the analytic network process method. Then, the probabilistic linguistic term sets and analytic network process methods are used to calculate the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  22
    Secure UAV-Based System to Detect Small Boats Using Neural Networks.Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo & Cándido Caballero-Gil - 2019 - Complexity 2019:1-11.
    This work presents a system to detect small boats to help tackle the problem of this type of perilous immigration. The proposal makes extensive use of emerging technologies like Unmanned Aerial Vehicles combined with a top-performing algorithm from the field of artificial intelligence known as Deep Learning through Convolutional Neural Networks. The use of this algorithm improves current detection systems based on image processing through the application of filters thanks to the fact that the network learns to distinguish the aforementioned (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  3
    Forecasting as a Precondition for Planning in Security.Oliver Bakreski - 2023 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 76 (1):433-443.
    Forecasting is an integral part of the planning process and analogously without forecasting we cannot even attempt to understand all the complexity of today’s world, the phenomena and processes that occur in it, the complexity of situations and systems if we do not face the need from their understanding and prediction. Analysing all aspects of forecasting is a very complex and difficult task, as it is characterized by great dynamism, complexity, and specificity. Therefore, the study of forecasting should primarily be (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000