Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY

Filtry

wszystkich: 1939
wybranych: 1385

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY

  • Universal and contextualized public services: Digital public service innovation framework

    Publikacja

    - GOVERNMENT INFORMATION QUARTERLY - Rok 2016

    In view of the rising social and economic inequalities, public service delivery should be both universal, i.e. independent of the recipients' social or economic status, and contextualized, i.e. able to compensate for different local needs and conditions. Reconciling both properties requires various forms of innovations, chief among them innovations in digital public services. Building upon the four-stage model underpinning the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Extendable Safety and Security Ontology

    Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...

    Pełny tekst do pobrania w portalu

  • Areas of research in maritime security

    Publikacja

    - Rok 2006

    W referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.

  • An integrated framework for security protocol analysis

    Publikacja

    - Rok 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Etyczność działań w public relations - między amoralizmem a kazuistyką

    Publikacja

    Artykuł jest refleksją filozoficzną dotyczącą problemów moralnych public relations i dziennikarstwa. Autorka stawia w nim tezę, że dziennikarze i specjaliści public relations – wykonując profesje, których fundamentem jest informacja, komunikacja i zaufanie społeczne - współcześnie bardzo wiele swoich działań wyłączają ze sfery tych, które mogłyby być oceniane z punktu widzenia moralności. Uznają też, że ocenie etycznej można...

    Pełny tekst do pobrania w portalu

  • Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings

    Publikacja

    The stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • LIGHT POLLUTION IN THE CONTEXT OF THREATS TO THE WILDLIFE CORRIDORS

    Publikacja

    - Rok 2016

    Access to remote sensing night-time imagery allows for modeling of light pollution Increasingly, data on the propagation of artificial light are a source of interesting information for different fields of science and affect the planning of economic development. The article presents the problem of light pollution in the context of threats to the wildlife corridors in Poland. Wildlife corridors are areas that allow safe migration...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Public Spaces - Coexistence and Participation

    Publikacja

    The paper is an attempt to answer two questions: (1) how to develop positive social relations and citizenship among residents of cities in Poland and (2) howsuitable shaping of public space affects the activation and integration of local residents.The specificity of the post-war process of urbanization in Poland - a country traditionally agricultural - was its political dimension (forced 'nationalisation' of agriculture and industrialization...

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Resilience and Security in Software Defined Networking

    Publikacja
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Rok 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Pełny tekst do pobrania w portalu

  • The Sense of Security of the Prison Service Offi cers

    Publikacja

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Investigation of Noise Threats and Their Impact on Hearing in Selected Schools

    Publikacja

    - Rok 2006

    Noise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated functional safety and cyber security analysis

    Publikacja

    - IFAC-PapersOnLine - Rok 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Pełny tekst do pobrania w portalu

  • Security ontology construction and integration

    Publikacja

    - Rok 2011

    There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...

  • Determining and verifying the safety integrity level with security aspects

    Publikacja

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Wireless systems of threats monitoring

    Publikacja
    • R. Katulski
    • J. Stefanski
    • J. Sadowski
    • S. Ambroziak

    - Rok 2010

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Wireless Systems of Threats Monitoring

    Publikacja

    - Rok 2011

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Wireless systems of threats monitoring

    Publikacja
    • J. Ryszard
    • S. Jacek
    • S. Jaroslaw
    • J. Slawomir
    • N. Jacek
    • W. Waldemar

    - Rok 2010

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Wireless systems of threats monitoring

    Publikacja
    • J. Ryszard
    • S. Jacek
    • S. Jaroslaw
    • J. Slawomir
    • N. Jacek
    • W. Waldemar

    - Rok 2010

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publikacja

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Public relations w działalności szkoły

    Publikacja

    - Rok 2005

    Treść rozdziału X książki, przygotowanej pod redakcją Ewy Hope, "Public relations instytucji użyteczności publicznej" obejmuje zagadnienia związane z potrzebami współczesnej szkoły w zakresie przekazu informacji i komunikowania się z zewnętrznym otoczeniem szkoły - środowiskiem społecznym. Praktyka życia codziennego szkoły, placówki oświatowej pokazuje jak celowym zbiegiem kierowniczym jest stosowanie działań public relations....

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Pełny tekst do pobrania w portalu

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publikacja

    - Rok 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publikacja

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Public relations w służbie demokracji

    Publikacja

    - Rok 2008

    Artykuł pokazuje, jak realizowanie zasad demokracji jest warunkowane stosowaniem narzędzi public relations. Wolność wypowiedzi, możliwość współdecydowania o przyszłości społeczeństwa, udział w wyborach to działania charakterystyczne dla krajów demokratycznych, a urzeczywistnianie ich jest możliwe dzięki i poprzez profesjonalne PR. Historia demokracji pokazuje również, że prowadzenie działań PR jest możliwe tylko w ustroju...

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publikacja

    - Rok 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Pełny tekst do pobrania w portalu

  • Functional safety and security assessment of the control and protection systems

    Publikacja

    - Rok 2006

    W artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Pełny tekst do pobrania w portalu

  • Identification of Public Service Logic (PSL) and Public Service Motivation (PSM) elements in Open Government Data (OGD) initiatives

    Publikacja
    • F. Ishengoma
    • S. Deo
    • R. Gouvêa
    • G. C. Wiedenhöft
    • R. Matheus
    • C. H. Alexopoulos
    • N. Rizun
    • S. Saxena

    - Electronic Journal of Information Systems in Developing Countries - Rok 2024

    While previous research on Open Government Data (OGD) has primarily focused on reuse and adoption, this study aims to explore the implications of the Public Service Logic (PSL) and Public Service Motivation (PSM) dimensions in the context of OGD initiatives. This study is contextualized in Tanzania wherein the OGD initiatives are at an evolving stage. For the present study, the perspectives of the 15 public officials involved in...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Public relations - czy to się sprawdzi?

    Publikacja

    - Rok 2004

    Książka jest analizą najczęstrzych problemów związanych z prowadzeniem działań public relations, ilustrowaną rysunkami Zbigniewa Jujki. Książka zawiera też słownki PR.

  • Looking for New Ideas of Public Space – Public Space Projects in Gdansk Reinforced by Art Activities

    Publikacja

    - Rok 2012

    Revitalization of public open spaces is a complex enterprise in Poland in terms of the art, cultural andinformation aspects of this process. Simultaneously the public space should play an important role whenbuilding the quality of revitalization programs and the quality of city development. The new art and culturalactivities are the revitalization tools, which are also the good examples of bottom up ideas helping to start aprocess...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2019

    In this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Promocja biblioteki i public relations

    Publikacja

    - Rok 2019

    W artykule omówiono problematykę promocji, kreowania wizerunku i public relations bibliotek. W opracowaniu przedstawiono organizowanie działalności promocyjnej na przykładzie pracy zespołu ds. promocji Biblioteki Politechniki Gdańskiej.

    Pełny tekst do pobrania w portalu

  • Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs

    Publikacja

    In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...

    Pełny tekst do pobrania w portalu

  • Public relations - refleksje prawie filozoficzne

    Publikacja

    - Rok 2005

    Artykuł podejmuje próbę całościowej analizy zjawiska tak bardzo rozpowszechnionego w ostatnich latach w Polsce, nazywanego potocznie czarnym public relations. W artykule przedstawiono nie tylko różne znaczenia tego pojęcia, sytuacje, w których ten rodzaj działalności jest najczęściej stosowany, ale też stosowane na świecie nazwy dla tego rodzaju działań.Artykuł podejmuje próbę całościowej analizy zjawiska tak bardzo rozpowszechnionego...

  • Investigation of noise threats and their impact on hearing in selected schools - a pilot study.

    Publikacja

    Noise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...

    Pełny tekst do pobrania w portalu

  • Assessing the Risk in Urban Public Transport for Epidemiologic Factors

    Pandemics have presented new challenges for public transport organisers and operators. New diseases (e.g., influenza H1N1, severe acute respiratory syndrome—SARS, as well as, more recently, SARS-CoV-2) increase the need for new protection measures to prevent epidemic outbreaks in public transport infrastructure. The authors’ goal is to present a set of actions in the area of public transport that are adjusted to different levels...

    Pełny tekst do pobrania w portalu

  • Travel Time of Public Transport Vehicles Estimation

    Effective prediction of speed is central to advanced traveler information and transportation management systems. The speed of public transport vehicles is affected by many external factors including traffic volume, organization and infrastructure. The literature presents methods for estimating travel time on sections of a transport network and vehicle arrival at stops, often making use of the AVL (automatic vehicle location). The...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • ChatGPT - opportunities or threats in the educational process

    Publikacja
    • A. Ubowska
    • T. Królikowski

    - Procedia Computer Science - Rok 2023

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Malware - a survey on threats and mitigation techniques

    Publikacja

    - Rok 2015

    This paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Pełny tekst do pobrania w portalu

  • PHONEME DISTORTION IN PUBLIC ADDRESS SYSTEMS

    Publikacja

    The quality of voice messages in speech reinforcement and public address systems is often poor. The sound engineering projects of such systems take care of sound intensity and possible reverberation phenomena in public space without, however, considering the influence of acoustic interference related to the number and distribution of loudspeakers. This paper presents the results of measurements and numerical simulations of the...

  • Public relations jako funkcja zarządzania.

    Publikacja

    - Rok 2004

    Artykuł w książce.Artykuł pokazuje ważną rolę działań public relations w każdym przedsiębiorstwie/organizacji, sytuując te działania w sferze zarządzania. artykułm pokazuje strategiczną funkcję działań PR, jako prac związanych z kreowaniem - komunikowaniem dobrej reputacji, opinii.

  • Automatic sound recognition for security purposes

    Publikacja

    - Rok 2008

    In the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...