Search results for: THREATS OF PUBLIC SECURITY - Bridge of Knowledge

Search

Search results for: THREATS OF PUBLIC SECURITY

Search results for: THREATS OF PUBLIC SECURITY

  • Functional safety and security assessment of the control and protection systems

    Publication

    - Year 2006

    W artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.

  • Identification of Public Service Logic (PSL) and Public Service Motivation (PSM) elements in Open Government Data (OGD) initiatives

    Publication
    • F. Ishengoma
    • S. Deo
    • R. Gouvêa
    • G. C. Wiedenhöft
    • R. Matheus
    • C. H. Alexopoulos
    • N. Rizun
    • S. Saxena

    - Electronic Journal of Information Systems in Developing Countries - Year 2024

    While previous research on Open Government Data (OGD) has primarily focused on reuse and adoption, this study aims to explore the implications of the Public Service Logic (PSL) and Public Service Motivation (PSM) dimensions in the context of OGD initiatives. This study is contextualized in Tanzania wherein the OGD initiatives are at an evolving stage. For the present study, the perspectives of the 15 public officials involved in...

    Full text to download in external service

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Full text available to download

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • Public relations - czy to się sprawdzi?

    Publication

    - Year 2004

    Książka jest analizą najczęstrzych problemów związanych z prowadzeniem działań public relations, ilustrowaną rysunkami Zbigniewa Jujki. Książka zawiera też słownki PR.

  • Looking for New Ideas of Public Space – Public Space Projects in Gdansk Reinforced by Art Activities

    Publication

    - Year 2012

    Revitalization of public open spaces is a complex enterprise in Poland in terms of the art, cultural andinformation aspects of this process. Simultaneously the public space should play an important role whenbuilding the quality of revitalization programs and the quality of city development. The new art and culturalactivities are the revitalization tools, which are also the good examples of bottom up ideas helping to start aprocess...

    Full text to download in external service

  • Promocja biblioteki i public relations

    Publication

    - Year 2019

    W artykule omówiono problematykę promocji, kreowania wizerunku i public relations bibliotek. W opracowaniu przedstawiono organizowanie działalności promocyjnej na przykładzie pracy zespołu ds. promocji Biblioteki Politechniki Gdańskiej.

    Full text available to download

  • A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2019

    In this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...

    Full text to download in external service

  • Public relations - refleksje prawie filozoficzne

    Publication

    - Year 2005

    Artykuł podejmuje próbę całościowej analizy zjawiska tak bardzo rozpowszechnionego w ostatnich latach w Polsce, nazywanego potocznie czarnym public relations. W artykule przedstawiono nie tylko różne znaczenia tego pojęcia, sytuacje, w których ten rodzaj działalności jest najczęściej stosowany, ale też stosowane na świecie nazwy dla tego rodzaju działań.Artykuł podejmuje próbę całościowej analizy zjawiska tak bardzo rozpowszechnionego...

  • Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs

    Publication

    - IEEE COMMUNICATIONS LETTERS - Year 2017

    In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...

    Full text available to download

  • Public relations w organizacji - Nowy

    e-Learning Courses
    • E. Hope

  • Assessing the Risk in Urban Public Transport for Epidemiologic Factors

    Pandemics have presented new challenges for public transport organisers and operators. New diseases (e.g., influenza H1N1, severe acute respiratory syndrome—SARS, as well as, more recently, SARS-CoV-2) increase the need for new protection measures to prevent epidemic outbreaks in public transport infrastructure. The authors’ goal is to present a set of actions in the area of public transport that are adjusted to different levels...

    Full text available to download

  • Travel Time of Public Transport Vehicles Estimation

    Effective prediction of speed is central to advanced traveler information and transportation management systems. The speed of public transport vehicles is affected by many external factors including traffic volume, organization and infrastructure. The literature presents methods for estimating travel time on sections of a transport network and vehicle arrival at stops, often making use of the AVL (automatic vehicle location). The...

    Full text to download in external service

  • Investigation of noise threats and their impact on hearing in selected schools - a pilot study.

    Publication

    Noise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...

    Full text available to download

  • PHONEME DISTORTION IN PUBLIC ADDRESS SYSTEMS

    Publication

    - Year 2015

    The quality of voice messages in speech reinforcement and public address systems is often poor. The sound engineering projects of such systems take care of sound intensity and possible reverberation phenomena in public space without, however, considering the influence of acoustic interference related to the number and distribution of loudspeakers. This paper presents the results of measurements and numerical simulations of the...

  • Public relations jako funkcja zarządzania.

    Publication

    - Year 2004

    Artykuł w książce.Artykuł pokazuje ważną rolę działań public relations w każdym przedsiębiorstwie/organizacji, sytuując te działania w sferze zarządzania. artykułm pokazuje strategiczną funkcję działań PR, jako prac związanych z kreowaniem - komunikowaniem dobrej reputacji, opinii.

  • Malware - a survey on threats and mitigation techniques

    Publication

    - Year 2015

    This paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...

  • ChatGPT - opportunities or threats in the educational process

    Publication
    • A. Ubowska
    • T. Królikowski

    - Procedia Computer Science - Year 2023

    Full text to download in external service

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Full text available to download

  • Automatic sound recognition for security purposes

    Publication

    - Year 2008

    In the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...

  • A sense of security and freedom in a residential environment

    The article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...

    Full text available to download

  • Distinctive facades of commercial buildings and the quality of public space,

    Publication

    Mutual relations between the retail center and public spaces of the city are varied. They depend on the type and size of the commercial structure. Other ones are for multifunctional shopping centers and other for high streets. In megastores and shopping malls the essential for their functioning is their interior and entrance, which is sometimes the only place of interpenetration of the commercial structure with the surrounding...

  • Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

    Publication

    - Year 2013

    The chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...

    Full text to download in external service

  • SDN testbed for validation of cross-layer data-centric security policies

    Publication

    - Year 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Full text to download in external service

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publication

    - SENSORS - Year 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Full text available to download

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publication

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Full text to download in external service

  • Towards systemic functional safety and security management in hazardous plants

    The aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...

  • Solar-wind system for lightning of public areas

    Publication

    - Year 2011

    Solar-wind system was developed for illumination of public large areas. The energy of this system becomes from renewable sources. Furthermore, they are relatively inexpensive, and the production of pollutants or greenhouse gases are reduced.

  • Integrated safety and security analysis of hazardous plants and systems of critical infrastructure

    This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...

    Full text to download in external service

  • Security information sharing for smart grids: Developing the right data model

    Publication

    - Year 2014

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text to download in external service

  • Security of export transactions in the offer of leading banks on the Polish market

    Publication

    - Year 2018

    The following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...

  • Etyka w zawodzie specjalistów public relations

    Publication

    - Year 2013

    Książka traktuje o zasadach,wartościach, normach, dylematach etycznych w zawodzie specjalisty PR, analizuje również rolę instytucji i dokumentów, które mogą pomóc w wyborach, podejmowanych decyzjach w pracy public relations.

  • Public relations uczelni: kreowanie tożsamości wizualnej

    Publication

    - Year 2003

    Praca jest analizą podstawowych, najczęściej popełnianych błędów, w procesie kreowania tożsamości wizualnej przez uczelnie polskie. Praca jednocześnie podkreśla rangę umiejętnie wykreowanej i stosowanej tożsamości wizualnej jako jednego z elementów public relations.

  • Role of public space in designing complex urban structures

    The aim of this article is to present the main assumptions about design studios as held in the Faculty of Architecture at Gdańsk University of Technology (FA-GUT), Gdańsk, Poland, adapted to the development of key competencies in the urban planning of complex urban structures. One of these competencies is the design of public spaces. The main goal of the studios was to deliver knowledge of the role of public spaces in the design...

    Full text available to download

  • Karta Przejrzystości Mediów - Public Relations a dziennikarstwo.

    Artykuł zawiera analizę nowo powstałego zbioru zasad regulujących pracę dziennikarz - Charter on Media Transparency, wskazującego na najczęściej występujące naruszenia norm moralnych w tym zawodzie i ich przyczyny, ze szczególnym uwzględnieniem relacji: dziennikarz - specjalista public relations.

  • Piotr Szczuko dr hab. inż.

    Piotr Szczuko received his M.Sc. degree in 2002. His thesis was dedicated to examination of correlation phenomena between perception of sound and vision for surround sound and digital image. He finished Ph.D. studies in 2007 and one year later completed a dissertation "Application of Fuzzy Rules in Computer Character Animation" that received award of Prime Minister of Poland. His interests include: processing of audio and video, computer...

  • Module of priorities for public transport vehicles in the TRISTAR system

    Publication

    One of the most important elements of the intelligent traffic control systems is the ability to control movement in such a way as to privilege the selected users movement, in particular public transport vehicles. Implemented at the Tri-City the TRISTAR system will also have a module for prioritizing public transport vehicles. The article presents a characteristics of the priority action system: the way of communication with the...

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Full text available to download

  • On UMTS security.

    Publication

    - Year 2004

    W artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.

  • SKYSCRAPER'S PUBLIC AREAS: THE IMPACT ON SPACE AND SOCIAL LIFE

    Publication

    - Year 2015

    In recent years, more careful consideration is taken into social issues of designing skyscrapers by humanizing adherent internal and external public areas. Case studies of The Shard (London: 2012), 122 Leadenhall Street (London: 2014), 20 Fenchurch Street (London: 2014), Heron Tower (London: 2011), Tower 25 (Nicosia: 2013), Zoofenster (Berlin: 2012), DNB House (Oslo: 2012), Centrum Biurowe Neptun (Gdansk, 2014), Skytower (Wroclaw:...

    Full text to download in external service

  • Civilization Threats and Sustainable Development -2022/23

    e-Learning Courses
    • C. Jungnickel

  • Civilization Threats and Sustainable Development 23/24

    e-Learning Courses
    • C. Jungnickel

  • The Efficiency of Public and Private Higher Education Institutions in Poland

    Publication

    Changes introduced to Poland’s education system in 2011 and 2014 amid efforts to adjust it to the needs of the labour market had an effect on the country’s institutions of higher learning. This paper provides an analysis of the efficiency of public and private Polish universities and examines the impact of selected factors in the years that followed. To estimate this efficiency, a Banker, Charnes and Cooper (BCC) model of the...

    Full text to download in external service

  • Security Requirements and Controls for Incident Information Sharing in the Polish Power System

    Publication

    Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...

    Full text to download in external service

  • Public Lighting in a Context of Regeneration Processes in Polish Cities

    Publication

    The purpose of this paper is to reflect on the role of electric lighting design in urban regeneration processes. The landscape of the modern city is the result of an accumulation of the various physical, economic, social and cultural layers over the centuries. Urban lighting may be described as one of the physical layers which due recent developments in the technology of efficient light sources overcomes a major evolution. With...

  • Software modules and application layer's security structure of RSMAD

    Publication

    The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...

  • Internal Security

    Journals

    ISSN: 2080-5268

  • Health by Art: the Remedial Role of Artistic Installations in Public Space

    Publication

    Designing public spaces has become one of the most relevant issues in contemporary cities thanks to their integrating and inclusionary character. Public spaces are playing a far more important role in promoting a healthy lifestyle and encouraging us to do different activities. Therefore, contemporary public spaces should enhance creativity, stimulate physical activity and influence mental health. The methodology used in the research...

    Full text to download in external service

  • Integrated approach for functional safety and cyber security management in maritime critical infrastructures

    The work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...

    Full text available to download