Filters
total: 2003
-
Catalog
- Publications 1412 available results
- Journals 325 available results
- Conferences 81 available results
- Publishing Houses 1 available results
- People 85 available results
- Projects 12 available results
- Research Teams 1 available results
- e-Learning Courses 33 available results
- Events 3 available results
- Open Research Data 50 available results
displaying 1000 best results Help
Search results for: THREATS OF PUBLIC SECURITY
-
Functional safety and security assessment of the control and protection systems
PublicationW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Identification of Public Service Logic (PSL) and Public Service Motivation (PSM) elements in Open Government Data (OGD) initiatives
PublicationWhile previous research on Open Government Data (OGD) has primarily focused on reuse and adoption, this study aims to explore the implications of the Public Service Logic (PSL) and Public Service Motivation (PSM) dimensions in the context of OGD initiatives. This study is contextualized in Tanzania wherein the OGD initiatives are at an evolving stage. For the present study, the perspectives of the 15 public officials involved in...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Public relations - czy to się sprawdzi?
PublicationKsiążka jest analizą najczęstrzych problemów związanych z prowadzeniem działań public relations, ilustrowaną rysunkami Zbigniewa Jujki. Książka zawiera też słownki PR.
-
Looking for New Ideas of Public Space – Public Space Projects in Gdansk Reinforced by Art Activities
PublicationRevitalization of public open spaces is a complex enterprise in Poland in terms of the art, cultural andinformation aspects of this process. Simultaneously the public space should play an important role whenbuilding the quality of revitalization programs and the quality of city development. The new art and culturalactivities are the revitalization tools, which are also the good examples of bottom up ideas helping to start aprocess...
-
Promocja biblioteki i public relations
PublicationW artykule omówiono problematykę promocji, kreowania wizerunku i public relations bibliotek. W opracowaniu przedstawiono organizowanie działalności promocyjnej na przykładzie pracy zespołu ds. promocji Biblioteki Politechniki Gdańskiej.
-
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublicationIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Public relations - refleksje prawie filozoficzne
PublicationArtykuł podejmuje próbę całościowej analizy zjawiska tak bardzo rozpowszechnionego w ostatnich latach w Polsce, nazywanego potocznie czarnym public relations. W artykule przedstawiono nie tylko różne znaczenia tego pojęcia, sytuacje, w których ten rodzaj działalności jest najczęściej stosowany, ale też stosowane na świecie nazwy dla tego rodzaju działań.Artykuł podejmuje próbę całościowej analizy zjawiska tak bardzo rozpowszechnionego...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Public relations w organizacji - Nowy
e-Learning Courses -
Assessing the Risk in Urban Public Transport for Epidemiologic Factors
PublicationPandemics have presented new challenges for public transport organisers and operators. New diseases (e.g., influenza H1N1, severe acute respiratory syndrome—SARS, as well as, more recently, SARS-CoV-2) increase the need for new protection measures to prevent epidemic outbreaks in public transport infrastructure. The authors’ goal is to present a set of actions in the area of public transport that are adjusted to different levels...
-
Travel Time of Public Transport Vehicles Estimation
PublicationEffective prediction of speed is central to advanced traveler information and transportation management systems. The speed of public transport vehicles is affected by many external factors including traffic volume, organization and infrastructure. The literature presents methods for estimating travel time on sections of a transport network and vehicle arrival at stops, often making use of the AVL (automatic vehicle location). The...
-
Investigation of noise threats and their impact on hearing in selected schools - a pilot study.
PublicationNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
PHONEME DISTORTION IN PUBLIC ADDRESS SYSTEMS
PublicationThe quality of voice messages in speech reinforcement and public address systems is often poor. The sound engineering projects of such systems take care of sound intensity and possible reverberation phenomena in public space without, however, considering the influence of acoustic interference related to the number and distribution of loudspeakers. This paper presents the results of measurements and numerical simulations of the...
-
Public relations jako funkcja zarządzania.
PublicationArtykuł w książce.Artykuł pokazuje ważną rolę działań public relations w każdym przedsiębiorstwie/organizacji, sytuując te działania w sferze zarządzania. artykułm pokazuje strategiczną funkcję działań PR, jako prac związanych z kreowaniem - komunikowaniem dobrej reputacji, opinii.
-
Malware - a survey on threats and mitigation techniques
PublicationThis paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...
-
ChatGPT - opportunities or threats in the educational process
Publication -
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Automatic sound recognition for security purposes
PublicationIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
A sense of security and freedom in a residential environment
PublicationThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Distinctive facades of commercial buildings and the quality of public space,
PublicationMutual relations between the retail center and public spaces of the city are varied. They depend on the type and size of the commercial structure. Other ones are for multifunctional shopping centers and other for high streets. In megastores and shopping malls the essential for their functioning is their interior and entrance, which is sometimes the only place of interpenetration of the commercial structure with the surrounding...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublicationThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publication[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Solar-wind system for lightning of public areas
PublicationSolar-wind system was developed for illumination of public large areas. The energy of this system becomes from renewable sources. Furthermore, they are relatively inexpensive, and the production of pollutants or greenhouse gases are reduced.
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Security information sharing for smart grids: Developing the right data model
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Security of export transactions in the offer of leading banks on the Polish market
PublicationThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
Etyka w zawodzie specjalistów public relations
PublicationKsiążka traktuje o zasadach,wartościach, normach, dylematach etycznych w zawodzie specjalisty PR, analizuje również rolę instytucji i dokumentów, które mogą pomóc w wyborach, podejmowanych decyzjach w pracy public relations.
-
Public relations uczelni: kreowanie tożsamości wizualnej
PublicationPraca jest analizą podstawowych, najczęściej popełnianych błędów, w procesie kreowania tożsamości wizualnej przez uczelnie polskie. Praca jednocześnie podkreśla rangę umiejętnie wykreowanej i stosowanej tożsamości wizualnej jako jednego z elementów public relations.
-
Role of public space in designing complex urban structures
PublicationThe aim of this article is to present the main assumptions about design studios as held in the Faculty of Architecture at Gdańsk University of Technology (FA-GUT), Gdańsk, Poland, adapted to the development of key competencies in the urban planning of complex urban structures. One of these competencies is the design of public spaces. The main goal of the studios was to deliver knowledge of the role of public spaces in the design...
-
Karta Przejrzystości Mediów - Public Relations a dziennikarstwo.
PublicationArtykuł zawiera analizę nowo powstałego zbioru zasad regulujących pracę dziennikarz - Charter on Media Transparency, wskazującego na najczęściej występujące naruszenia norm moralnych w tym zawodzie i ich przyczyny, ze szczególnym uwzględnieniem relacji: dziennikarz - specjalista public relations.
-
Piotr Szczuko dr hab. inż.
PeoplePiotr Szczuko received his M.Sc. degree in 2002. His thesis was dedicated to examination of correlation phenomena between perception of sound and vision for surround sound and digital image. He finished Ph.D. studies in 2007 and one year later completed a dissertation "Application of Fuzzy Rules in Computer Character Animation" that received award of Prime Minister of Poland. His interests include: processing of audio and video, computer...
-
Module of priorities for public transport vehicles in the TRISTAR system
PublicationOne of the most important elements of the intelligent traffic control systems is the ability to control movement in such a way as to privilege the selected users movement, in particular public transport vehicles. Implemented at the Tri-City the TRISTAR system will also have a module for prioritizing public transport vehicles. The article presents a characteristics of the priority action system: the way of communication with the...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
On UMTS security.
PublicationW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
SKYSCRAPER'S PUBLIC AREAS: THE IMPACT ON SPACE AND SOCIAL LIFE
PublicationIn recent years, more careful consideration is taken into social issues of designing skyscrapers by humanizing adherent internal and external public areas. Case studies of The Shard (London: 2012), 122 Leadenhall Street (London: 2014), 20 Fenchurch Street (London: 2014), Heron Tower (London: 2011), Tower 25 (Nicosia: 2013), Zoofenster (Berlin: 2012), DNB House (Oslo: 2012), Centrum Biurowe Neptun (Gdansk, 2014), Skytower (Wroclaw:...
-
Civilization Threats and Sustainable Development -2022/23
e-Learning Courses -
Civilization Threats and Sustainable Development 23/24
e-Learning Courses -
The Efficiency of Public and Private Higher Education Institutions in Poland
PublicationChanges introduced to Poland’s education system in 2011 and 2014 amid efforts to adjust it to the needs of the labour market had an effect on the country’s institutions of higher learning. This paper provides an analysis of the efficiency of public and private Polish universities and examines the impact of selected factors in the years that followed. To estimate this efficiency, a Banker, Charnes and Cooper (BCC) model of the...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Public Lighting in a Context of Regeneration Processes in Polish Cities
PublicationThe purpose of this paper is to reflect on the role of electric lighting design in urban regeneration processes. The landscape of the modern city is the result of an accumulation of the various physical, economic, social and cultural layers over the centuries. Urban lighting may be described as one of the physical layers which due recent developments in the technology of efficient light sources overcomes a major evolution. With...
-
Software modules and application layer's security structure of RSMAD
PublicationThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Internal Security
Journals -
Health by Art: the Remedial Role of Artistic Installations in Public Space
PublicationDesigning public spaces has become one of the most relevant issues in contemporary cities thanks to their integrating and inclusionary character. Public spaces are playing a far more important role in promoting a healthy lifestyle and encouraging us to do different activities. Therefore, contemporary public spaces should enhance creativity, stimulate physical activity and influence mental health. The methodology used in the research...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublicationThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...