Filtry
wszystkich: 18422
-
Katalog
- Publikacje 15274 wyników po odfiltrowaniu
- Czasopisma 935 wyników po odfiltrowaniu
- Konferencje 182 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 459 wyników po odfiltrowaniu
- Wynalazki 4 wyników po odfiltrowaniu
- Projekty 45 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 2 wyników po odfiltrowaniu
- Aparatura Badawcza 8 wyników po odfiltrowaniu
- Kursy Online 555 wyników po odfiltrowaniu
- Wydarzenia 50 wyników po odfiltrowaniu
- Dane Badawcze 906 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
Brain Fog and Quality of Life at Work in Non-Hospitalized Patients after COVID-19
Publikacja -
Social support against depression in young adults’ group during COVID-19 pandemic.
Publikacja -
Vaccine versus infection – COVID-19-related loss of training time in elite athletes
Publikacja -
Mental health predictors of medical staff in the early stage of COVID-19 pandemic in Poland.
Publikacja -
Theoretical Investigation of the Coronavirus SARS-CoV-2 (COVID-19) Infection Mechanism and Selectivity
Publikacja -
COVID-19 in Patients with Atopic Dermatitis Treated with Dupilumab: Three Cases and a Literature Review
Publikacja -
COVID-19-Associated Pulmonary Aspergillosis in Intensive Care Unit Patients from Poland
Publikacja -
Zmiany przestrzenne w miastach wywołane pandemią COVID-19 a przestrzenny wymiar rewitalizacji.
Publikacja -
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublikacjaDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
Faculty of Management Working Paper Series
Czasopisma -
Areas of research in maritime security
PublikacjaW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
Piotr Krajewski dr
OsobyPiotr Krajewski pracuje jako starszy bibliotekarz w Bibliotece Politechniki Gdańskiej. Jako pracownik Sekcji Informacji Naukowo-Technicznej skupia się przede wszystkim na zagadnieniach związanych z ruchem Open Access oraz rolą repozytoriów instytucjonalnych w jego rozwoju. Jest także autorem artykułów poruszających kwestie standaryzacji statystyk wykorzystania zasobów elektronicznych jak również problematykę „drapieżnych wydawców”....
-
Determining and verifying the safety integrity level with security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
Enhancing Business Process Management Through Nature Assessment: Development and Deployment of the Business Process Nature Assessment Tool
PublikacjaIn contemporary business landscapes, the diverse nature of processes necessitates a thor-ough assessment before implementing Business Process Management (BPM). However, conducting such assessments can be arduous, particularly for small and medium-sized en-terprises. This study aims to address this challenge by developing and showcasing the utility of an online tool based on the Business Process Nature Assessment Framework (BPNAF)....
-
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublikacjaCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublikacjaIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Student model representation for pedagogical virtual mentors
PublikacjaThe paper concerns technological aspects of virtual mentors construction, especially concentrating on the student model representation. The article distinguishes several types of information that is gathered by the pedagogical agents and other educational platforms, including student knowledge model, student progress tracking, interaction process patterns and learner preferences. A set of technologies used for the student model...
-
Entrepreneurial Failure: A Synthesis and Conceptual Framework of its Effects
Publikacja -
ESH Position Paper
Publikacja -
LSP Journal - Language for special purposes, professional communication, knowledge management and cognition (former title: LSP and Professional Communication)
Czasopisma -
Justyna Martyniuk-Pęczek dr hab. inż. arch.
OsobyJustyna Martyniuk-Pęczek, dr hab. inż. arch., urbanista, architekt światła. Doktor habilitowany nauk technicznych w dyscyplinie architektura i urbanistyka, z dodatkową specjalnością architektonicznego projektowania światłem. Podstawowym obszarem jej zainteresowań naukowych jest urbanistyka, w obrębie której skoncentrowała się na trzech nurtach badawczych, a mianowicie: Problemy kształtowania współczesnych przestrzeni publicznych,...
-
Security Assessment of a Turbo-Gas Power Plant
PublikacjaCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
The Analysis of Vodka: A Review Paper
PublikacjaVodka is the most popular alcoholic beverage in Poland, Russia and other Eastern European countries, made from ethyl alcohol of agricultural origin that has been produced via fermentation of potatoes, grains or other agricultural products. Despite distillation and multiple filtering, it is not possible to produce 100 % ethanol. The solution with a minimum ethanol content of 96 %, which is used to produce vodkas, also contains trace amounts...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublikacjaCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Experience-Driven Model of Decision-Making Processes in Project Teams
PublikacjaThis article presents a model of decision-making processes in project teams. Project teams constitute a specific type of organization appointed to implement a project. Decisions made by project teams result from the methods of project management and best management practices. The authors have undertaken the task of formalizing these processes using the classical method of constructing decision trees. It has been established that...
-
Don't forget the dark side of green transformation
PublikacjaDesign/methodology/approach – The study is a continuation of the research by Durst and Zieba (2019) related to knowledge risks and their potential outcomes. This present study makes an update on the literature on knowledge risks and green transformation and describes knowledge risks that can be faced in this process. Originality/value – The paper offers new insights for researchers dealing with the topic of knowledge risks in...
-
Use of structural equation modeling in quantitative research in the field of management and economics: A bibliometric analysis in the systematic literature review
PublikacjaPURPOSE: This paper aims to provide a comprehensive review of scholarly research focusing on using quantitative methods and particularly structural equation modeling (SEM) in management and economics studies, as well as provide a bibliometric agenda including the time horizon of individual publications, the highest citation rate, geographic and industry areas, methodological context, and keywords. METHODOLOGY: A systematic literature...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Baltic Smart Asset Management - Training Module
Kursy OnlineBaltic Smart Asset Management is an international project co-financed by the funds from Interreg South Baltic Programme 2014-2020. The aim of the project is to develop methods, transnational collaboration processes and knowledge about Smart Asset Management (SAM) for District Heating (DH) sector. The training module will help to spread the professional knowledge on new solutions and applications of SAM methods to promote data-driven...
-
Public Finance in Poland in a COVID Fog: A Look Through the Lens of Fiscal Transparency and Accountability
PublikacjaAbstract. Goal– The aim of the article is to identify dysfunctional phenomena (implementation of specific mechanisms/solutions and actions taken), generating increased opacity and limit the responsibility/accountability of public f inance in Poland, exacerbated by the COVID-19 crisis. Methods– descriptive analysis, comparative analysis and financial analysis methods were used. Results– fiscal transparency and accountability in...
-
Risk management model of winter navigation operations
Publikacja -
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Automatic sound recognition for security purposes
PublikacjaIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublikacjaModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Rapid Antenna Optimization with Restricted Sensitivity Updates by Automated Dominant Direction Identification
PublikacjaMeticulous tuning of geometry parameters turns pivotal in improving performance of antenna systems. It is more and more often realized using formal optimization methods, which is demonstrably the most efficient way of handling multiple design variables, objectives, and constraints. Although in some cases a need for launching global search arises, a typical design scenario only requires local optimization, especially when a decent...
-
Energy Security of Polish Consumers in 2004-2021
PublikacjaTheoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...
-
Volatility in International Sovereign Bond Markets: The role of government policy responses to the COVID-19 pandemic
Publikacja -
Predictors of Psychological Distress across Three Time Periods during the COVID-19 Pandemic in Poland
Publikacja -
Remote and on-site work stress severity during the COVID-19 pandemic: comparison and selected conditions
Publikacja -
Abilities, Motivations, and Opportunities of Furloughed Employees in the Context of Covid-19: Preliminary Evidence From the UK
Publikacja -
COVID-19-Associated Mucormycosis (CAM): Case-Series and Global Analysis of Mortality Risk Factors
Publikacja -
When to Resume Bariatric Surgery after COVID-19 Pandemic? – Results of Patients’ and Surgeons’ Survey.
Publikacja -
Impact of the COVID-19 Pandemic on the Patient’s Decision about Bariatric Surgery: Results of a National Survey
Publikacja -
When to resume bariatric surgery after COVID-19 pandemic?: results of patients’ and surgeons’ survey
Publikacja -
The ChoCO-W prospective observational global study: Does COVID-19 increase gangrenous cholecystitis?
Publikacja -
Diversity of Students’ Unethical Behaviors in Online Learning Amid COVID-19 Pandemic: An Exploratory Analysis
Publikacja