Filters
total: 18422
-
Catalog
- Publications 15274 available results
- Journals 935 available results
- Conferences 182 available results
- Publishing Houses 1 available results
- People 459 available results
- Inventions 4 available results
- Projects 45 available results
- Laboratories 1 available results
- Research Teams 2 available results
- Research Equipment 8 available results
- e-Learning Courses 555 available results
- Events 50 available results
- Open Research Data 906 available results
displaying 1000 best results Help
Search results for: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
Clinical Training during the COVID-19 Pandemic: Experiences of Nursing Students and Implications for Education
Publication -
THE SELECTION OF STRESS COPING STRATEGIES BY UNIVERSITY STUDENTS BASED ON PRIOR COVID-19 EXPOSURE
Publication -
Strategies for Coping With Stress Used by Nurses in Poland and Belarus During the COVID-19 Pandemic
Publication -
Stock market reactions under the shadow of the COVID-19 pandemic: Evidence from China
Publication -
Term spreads and the COVID-19 pandemic: Evidence from international sovereign bond markets
Publication -
Zmiany przestrzenne w miastach wywołane pandemią COVID-19 a przestrzenny wymiar rewitalizacji.
Publication -
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublicationDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
A Quality Model for UML tools
PublicationJakość narzędzi UML wpływa na efektywność wykonywania zadań związanych z modelowaniem systemów w procesie wytwarzania oprogramowania. Celem badań prezentowanych w tym referacie jest wyodrębnienie kryteriów jakości narzędzi UML. Omówiono rolę narzędzi UML w projekcie informatycznym, a następnie zaprezentowano szereg kryteriów jakości narzędzi UML wraz z aspektami oceny oraz opisem ankiety, która służy do oceny narzędzi względem...
-
The elasto-viscoplstic Chaboche model
PublicationW artykule przedstawiono rozwoj i numeryczną aplikacje sprężysto-lepkoplastycznego modelu Chabocha. Przedstawione są także szczegółowe opisy kilkunastu wariantów modelu Chaboche'a wraz z parametrami materiałowymi.
-
Areas of research in maritime security
PublicationW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
Piotr Krajewski dr
PeoplePiotr Krajewski is a librarian at the Library of Gdańsk University of Technology (GUT) and a PhD student at the Medical University of Gdańsk. His research interests focus on the standardization of the e-resources usage data and Open Access publishing, especially the role of institutional repositories in the development of the OA initiative and the phenomenon of “predatory publishers”. He works at Scientific and Technical Information...
-
Determining and verifying the safety integrity level with security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
Enhancing Business Process Management Through Nature Assessment: Development and Deployment of the Business Process Nature Assessment Tool
PublicationIn contemporary business landscapes, the diverse nature of processes necessitates a thor-ough assessment before implementing Business Process Management (BPM). However, conducting such assessments can be arduous, particularly for small and medium-sized en-terprises. This study aims to address this challenge by developing and showcasing the utility of an online tool based on the Business Process Nature Assessment Framework (BPNAF)....
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublicationIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Entrepreneurial Failure: A Synthesis and Conceptual Framework of its Effects
Publication -
ESH Position Paper
Publication -
Justyna Martyniuk-Pęczek dr hab. inż. arch.
PeopleJustyna Martyniuk-Peczek, Ph.D., D.Sc. Associate Professor Department of Urban Design and Regional Planning, Faculty of Architecture Gdansk University of Technology My academic and research activity has been concentrated around one specialty — urban planning, however it involves an interdisciplinary reference to other fields, such as lighting and the science of management. In terms of quantity, my academic work...
-
Student model representation for pedagogical virtual mentors
PublicationThe paper concerns technological aspects of virtual mentors construction, especially concentrating on the student model representation. The article distinguishes several types of information that is gathered by the pedagogical agents and other educational platforms, including student knowledge model, student progress tracking, interaction process patterns and learner preferences. A set of technologies used for the student model...
-
Security Assessment of a Turbo-Gas Power Plant
PublicationCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
LSP Journal - Language for special purposes, professional communication, knowledge management and cognition (former title: LSP and Professional Communication)
Journals -
The Analysis of Vodka: A Review Paper
PublicationVodka is the most popular alcoholic beverage in Poland, Russia and other Eastern European countries, made from ethyl alcohol of agricultural origin that has been produced via fermentation of potatoes, grains or other agricultural products. Despite distillation and multiple filtering, it is not possible to produce 100 % ethanol. The solution with a minimum ethanol content of 96 %, which is used to produce vodkas, also contains trace amounts...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublicationCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Don't forget the dark side of green transformation
PublicationDesign/methodology/approach – The study is a continuation of the research by Durst and Zieba (2019) related to knowledge risks and their potential outcomes. This present study makes an update on the literature on knowledge risks and green transformation and describes knowledge risks that can be faced in this process. Originality/value – The paper offers new insights for researchers dealing with the topic of knowledge risks in...
-
Use of structural equation modeling in quantitative research in the field of management and economics: A bibliometric analysis in the systematic literature review
PublicationPURPOSE: This paper aims to provide a comprehensive review of scholarly research focusing on using quantitative methods and particularly structural equation modeling (SEM) in management and economics studies, as well as provide a bibliometric agenda including the time horizon of individual publications, the highest citation rate, geographic and industry areas, methodological context, and keywords. METHODOLOGY: A systematic literature...
-
Experience-Driven Model of Decision-Making Processes in Project Teams
PublicationThis article presents a model of decision-making processes in project teams. Project teams constitute a specific type of organization appointed to implement a project. Decisions made by project teams result from the methods of project management and best management practices. The authors have undertaken the task of formalizing these processes using the classical method of constructing decision trees. It has been established that...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Baltic Smart Asset Management - Training Module
e-Learning CoursesBaltic Smart Asset Management is an international project co-financed by the funds from Interreg South Baltic Programme 2014-2020. The aim of the project is to develop methods, transnational collaboration processes and knowledge about Smart Asset Management (SAM) for District Heating (DH) sector. The training module will help to spread the professional knowledge on new solutions and applications of SAM methods to promote data-driven...
-
Faculty of Management Working Paper Series
Journals -
Public Finance in Poland in a COVID Fog: A Look Through the Lens of Fiscal Transparency and Accountability
PublicationAbstract. Goal– The aim of the article is to identify dysfunctional phenomena (implementation of specific mechanisms/solutions and actions taken), generating increased opacity and limit the responsibility/accountability of public f inance in Poland, exacerbated by the COVID-19 crisis. Methods– descriptive analysis, comparative analysis and financial analysis methods were used. Results– fiscal transparency and accountability in...
-
Security aspects in functional safety analysis
PublicationA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Risk management model of winter navigation operations
Publication -
Automatic sound recognition for security purposes
PublicationIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Rapid Antenna Optimization with Restricted Sensitivity Updates by Automated Dominant Direction Identification
PublicationMeticulous tuning of geometry parameters turns pivotal in improving performance of antenna systems. It is more and more often realized using formal optimization methods, which is demonstrably the most efficient way of handling multiple design variables, objectives, and constraints. Although in some cases a need for launching global search arises, a typical design scenario only requires local optimization, especially when a decent...
-
Energy Security of Polish Consumers in 2004-2021
PublicationTheoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...
-
Abilities, Motivations, and Opportunities of Furloughed Employees in the Context of Covid-19: Preliminary Evidence From the UK
Publication -
COVID-19-Associated Mucormycosis (CAM): Case-Series and Global Analysis of Mortality Risk Factors
Publication -
Diversity of Students’ Unethical Behaviors in Online Learning Amid COVID-19 Pandemic: An Exploratory Analysis
Publication -
The Impact of the COVID-19 Pandemic on Poles’ Nutritional and Health Behaviour and Quality of Life—A Pilot Study
Publication -
Associations of Nutritional Behavior and Gut Microbiota with the Risk of COVID-19 in Healthy Young Adults in Poland
Publication -
Small-lot Production with Additive Production Using Reverse Logistics and IT Solutions in COVID-19 Era
Publication -
The case of fatal acute hemorrhagic necrotizing encephalitis in a two-month-old boy with Covid-19.
Publication -
Sex-related patient-reported brain fog symptoms in non-hospitalised COVID-19 patients
Publication -
Use of technology by people with dementia and informal carers during COVID‐19: A cross‐country comparison
Publication -
The use of technology by people with dementia and informal carers during COVID-19: a cross-country comparison
Publication