Search results for: THREATS OF PUBLIC SECURITY - Bridge of Knowledge

Search

Search results for: THREATS OF PUBLIC SECURITY

Search results for: THREATS OF PUBLIC SECURITY

  • Possibilities for Developing Electromobility by Using Autonomously Powered Trolleybuses Based on the Example of Gdynia

    Publication

    - ENERGIES - Year 2021

    Trolleybus transport refers to contemporary challenges related to a reduction in emissions of greenhouse gases and CO2 into the atmosphere formulated by international institutions, such as the United Nations, the Organisation for Security and Co-operation in Europe, or the European Union. Departure from fossil fuels in urban transport is one of the key challenges for the coming years. Trolleybuses are an important tool in this...

    Full text available to download

  • The effect of environmental turbulence on cyber security risk management and organizational resilience

    Publication

    - COMPUTERS & SECURITY - Year 2024

    Even though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...

    Full text available to download

  • Information Systems Security 2023/2024

    e-Learning Courses
    • B. Czaplewski

    The e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).

  • PUBLIC SPEAKING

    e-Learning Courses
    • U. Kamińska
    • J. Wielgus

  • Public relations w społeczeństwie

    Publication

    - Year 2020

    W artykule stawiam tezę – powtarzając za „„Standardami profesjonalnych public relations”- o konieczności wysuwania na plan pierwszy - we wszelkich działaniach w obszarze public relations - ich zgodności z wartościami i normami etycznymi, ponieważ wszelkie działania public relations są nie tylko realizowane w przestrzeni społecznej, ale mają istotny wpływ na kształt, kondycję społeczeństwa, również na budowę demokracji i społeczeństwa...

  • Standardy Profesjonalnego Public Relations

    Publication
    • J. Barlik
    • E. Hope
    • J. Olędzki
    • K. Wojcik

    - Year 2020

    " Standardy przedstawiają wartości i pryncypia uzasadniające konieczność dokonywania odpowiednich wyborów. Public relations ma godzić interesy zleceniodawców, przedstawicieli mediów i różnych grup społeczeństwa, a przy tym pozostawać w zgodzie z normami etycznymi i odwoływać się do takich wartości jak szacunek, godność, rzetelność, uczciwość, prawda, wiarygodność, niezależność, lojalność i zaufanie. Opracowanie "Standardów profesjonalnego...

    Full text to download in external service

  • Calibration of acoustic vector sensor based on MEMS microphones for DOA estimation

    Publication

    A procedure of calibration of a custom 3D acoustic vector sensor (AVS) for the purpose of direction of arrival (DoA) estimation, is presented and validated in the paper. AVS devices working on a p-p principle may be constructed from standard pressure sensors and a signal processing system. However, in order to ensure accurate DoA estimation, each sensor needs to be calibrated. The proposed algorithm divides the calibration process...

    Full text to download in external service

  • Data Model Development for Security Information Sharing in Smart Grids

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text available to download

  • EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY

    Publication
    • H. Dźwigoł
    • M. Dźwigoł–Barosz
    • Z. Zhyvko
    • R. Miśkiewicz
    • H. Pushak
    • R. Miskiewicz

    - Journal of Security and Sustainability Issues - Year 2019

    Full text to download in external service

  • Operating system security by integrity checking and recovery using write-protected storage

    The paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...

    Full text available to download

  • External Security Strategies of Belarus

    Under President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...

    Full text available to download

  • Ukraine’s Energy Security in Strategies

    During the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...

    Full text available to download

  • Security Mechanisms in the Comcute System

    Publication

    - Year 2012

    The aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Rafał Leszczyna dr hab. inż.

    Dr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...

  • Universal and contextualized public services: Digital public service innovation framework

    Publication

    - GOVERNMENT INFORMATION QUARTERLY - Year 2016

    In view of the rising social and economic inequalities, public service delivery should be both universal, i.e. independent of the recipients' social or economic status, and contextualized, i.e. able to compensate for different local needs and conditions. Reconciling both properties requires various forms of innovations, chief among them innovations in digital public services. Building upon the four-stage model underpinning the...

    Full text to download in external service

  • Security and Defence Quarterly

    Journals

    ISSN: 2300-8741 , eISSN: 2544-994X

  • Extendable Safety and Security Ontology

    Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...

    Full text available to download

  • Areas of research in maritime security

    Publication

    - Year 2006

    W referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.

  • An integrated framework for security protocol analysis

    Publication

    - Year 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Etyczność działań w public relations - między amoralizmem a kazuistyką

    Publication

    Artykuł jest refleksją filozoficzną dotyczącą problemów moralnych public relations i dziennikarstwa. Autorka stawia w nim tezę, że dziennikarze i specjaliści public relations – wykonując profesje, których fundamentem jest informacja, komunikacja i zaufanie społeczne - współcześnie bardzo wiele swoich działań wyłączają ze sfery tych, które mogłyby być oceniane z punktu widzenia moralności. Uznają też, że ocenie etycznej można...

    Full text available to download

  • Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings

    Publication

    The stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...

    Full text to download in external service

  • LIGHT POLLUTION IN THE CONTEXT OF THREATS TO THE WILDLIFE CORRIDORS

    Publication

    - Year 2016

    Access to remote sensing night-time imagery allows for modeling of light pollution Increasingly, data on the propagation of artificial light are a source of interesting information for different fields of science and affect the planning of economic development. The article presents the problem of light pollution in the context of threats to the wildlife corridors in Poland. Wildlife corridors are areas that allow safe migration...

    Full text to download in external service

  • Public Spaces - Coexistence and Participation

    Publication

    The paper is an attempt to answer two questions: (1) how to develop positive social relations and citizenship among residents of cities in Poland and (2) howsuitable shaping of public space affects the activation and integration of local residents.The specificity of the post-war process of urbanization in Poland - a country traditionally agricultural - was its political dimension (forced 'nationalisation' of agriculture and industrialization...

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Full text to download in external service

  • Resilience and Security in Software Defined Networking

    Publication
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Year 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Full text to download in external service

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Full text available to download

  • Civilization Threats and Sustainable Development

    e-Learning Courses
    • C. Jungnickel

  • The Sense of Security of the Prison Service Offi cers

    Publication

    Full text to download in external service

  • Investigation of Noise Threats and Their Impact on Hearing in Selected Schools

    Publication

    - Year 2006

    Noise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...

    Full text to download in external service

  • Integrated functional safety and cyber security analysis

    Publication

    - IFAC-PapersOnLine - Year 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Full text available to download

  • Security ontology construction and integration

    Publication

    - Year 2011

    There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...

  • Determining and verifying the safety integrity level with security aspects

    Publication

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Full text to download in external service

  • Wireless systems of threats monitoring

    Publication
    • R. Katulski
    • J. Stefanski
    • J. Sadowski
    • S. Ambroziak

    - Year 2010

    Full text to download in external service

  • Wireless Systems of Threats Monitoring

    Publication

    - Year 2011

    Full text to download in external service

  • Wireless systems of threats monitoring

    Publication
    • J. Ryszard
    • S. Jacek
    • S. Jaroslaw
    • J. Slawomir
    • N. Jacek
    • W. Waldemar

    - Year 2010

    Full text to download in external service

  • Wireless systems of threats monitoring

    Publication
    • J. Ryszard
    • S. Jacek
    • S. Jaroslaw
    • J. Slawomir
    • N. Jacek
    • W. Waldemar

    - Year 2010

    Full text to download in external service

  • Digital Threats: Research and Practice

    Journals

    eISSN: 2576-5337

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publication

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Full text to download in external service

  • Public relations w działalności szkoły

    Publication

    - Year 2005

    Treść rozdziału X książki, przygotowanej pod redakcją Ewy Hope, "Public relations instytucji użyteczności publicznej" obejmuje zagadnienia związane z potrzebami współczesnej szkoły w zakresie przekazu informacji i komunikowania się z zewnętrznym otoczeniem szkoły - środowiskiem społecznym. Praktyka życia codziennego szkoły, placówki oświatowej pokazuje jak celowym zbiegiem kierowniczym jest stosowanie działań public relations....

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Full text available to download

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publication

    - Year 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publication

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Public relations w służbie demokracji

    Publication

    - Year 2008

    Artykuł pokazuje, jak realizowanie zasad demokracji jest warunkowane stosowaniem narzędzi public relations. Wolność wypowiedzi, możliwość współdecydowania o przyszłości społeczeństwa, udział w wyborach to działania charakterystyczne dla krajów demokratycznych, a urzeczywistnianie ich jest możliwe dzięki i poprzez profesjonalne PR. Historia demokracji pokazuje również, że prowadzenie działań PR jest możliwe tylko w ustroju...

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publication

    - Year 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • Functional safety and security assessment of the control and protection systems

    Publication

    - Year 2006

    W artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Full text available to download