Filtry
wszystkich: 319
-
Katalog
- Publikacje 284 wyników po odfiltrowaniu
- Czasopisma 23 wyników po odfiltrowaniu
- Konferencje 1 wyników po odfiltrowaniu
- Osoby 5 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 2 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 2 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: SECURITY, EVIDENCE BASED ARGUMENTS
-
Shadow Economy in Poland Recent Evidence Based on Survey Data
PublikacjaThe book provides an estimate of the size of the shadow economy in Poland. Using analogous data, it traces core determinants of the existence of the shadow economy in Poland. It compares results with neighbouring countries, and if possible, the remaining Central-Eastern economies. The book tells why the problem of the unreported economic activity matters; it presents the problem from different angles―economic, social and institutional....
-
Towards an evidence-based probabilistic risk model for ship-grounding accidents
Publikacja -
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublikacjaIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublikacjaThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
Enhancing Economic Development Through ICT-Based Governance: Evidence for Developing Countries
Publikacjahis shows novel empirical evidence on how e-government solutions enhance the emergence of inclusive societies, increase institutional quality, and through that channels dynamize economic development in developing countries. With this aim we examine digital development inequalities adopting 2 core ICT indicators: mobile cellular telephony and Internet users; and gross per capita income and Human Development Index to show the level...
-
Dynamics of productivity in higher education: cross-european evidence based on bootstrapped Malmquist indices
PublikacjaAbstract This study examines patterns of productivitychange in a large set of 266 public higher educationinstitutions (HEIs) in 7 European countries across the timeperiod 2001-2005. We adopt consistent bootstrap estimationprocedures to obtain confidence intervals for Malmquistindices of HEI productivity and their components.Consequently, we are able to assess the statistical significanceof changes in HEI productivity, efficiency...
-
Taxonomic Position and Phylogeny of the Genus Vargasiella (Orchidaceae, Vandoideae) Based on Molecular and Morphological Evidence
Publikacja -
Dynamics of productivity in higher education. Cross-European evidence based on bootstrapped Malmquist indices
PublikacjaThis study presents patterns of productivity change in a large set of 266 public higher education institutions (HEIs) from 7 European countries across the time period 2001-2005. We adopt consistent bootstrap estimation procedures to obtain confidence intervals for Malmquist indices of HEI productivity and their components. Consequently, we are able to assess statistical significance of the changes in HEIs' productivity, efficiency...
-
Aleksandra Parteka dr hab. inż.
OsobyAbout me: I am an associate professor and head of doctoral studies at the Faculty of Management and Economics, Gdansk University of Technology (GdanskTech, Poland). I got my MSc degree in Economics from Gdansk University of Technology (2003) and Universita’ Politecnica delle Marche (2005), as well as MA degree in Contemporary European Studies from Sussex University (2006, with distinction). I received my PhD in Economics...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublikacjaExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Assessing business process complexity based on textual data: Evidence from ITIL IT ticket processing
PublikacjaPurpose This study aims to draw the attention of business process management (BPM) research and practice to the textual data generated in the processes and the potential of meaningful insights extraction. The authors apply standard natural language processing (NLP) approaches to gain valuable knowledge in the form of business process (BP) complexity concept suggested in the study. It is built on the objective, subjective and meta-knowledge...
-
Evidence-Based Risk Management for Civil Engineering Projects Using Bayesian Belief Networks (BBN)
PublikacjaThe authors are seeking new methods for improving the efficiency of the investments associated with the maintenance and operation of existing civil engineering structures. It is demonstrated how the knowledge about the elements of construction and operation phases and their relationships, combined with monitoring data can be used for more effective management of the risks associated with civil engineering projects. The methodology...
-
Usability of accident and incident reports for evidence-based risk modeling – A case study on ship grounding reports
Publikacja -
Determinants of inward FDI into Visegrad countries: empirical evidence based on panel data for the years 2000–2012
Publikacja -
coMpliAnce with evideNce-based cliniCal guidelines in the managemenT of acute biliaRy pancreAtitis): The MANCTRA-1 international audit
Publikacja -
A comparative analysis of the effectiveness of corporate bankruptcy prediction models based on financial ratios: Evidence from Colombia, 2008 to 2015
PublikacjaLogit and discriminant analyses have been used for corporate bankruptcy prediction in several studies since the last century. In recent years there have been dozens of studies comparing the several models available, including the ones mentioned above and also probit, artificial neural networks, support vector machines, among others. For the first time for Colombia, this paper presents a comparative analysis of the effectiveness...
-
Reduced attention toward faces, intentionality and blame ascription in violent offenders and community‐based adults: Evidence from an eye‐tracking study
Publikacja -
Warstwowa ocena epidemiologiczna architektury zakładów opiekuńczo-leczniczych i zakładów gieriatycznych = Layer based epidemiological quality assessment of architecture of care security and geriatric wards
PublikacjaW artykule opisano możliwość wykorzystania autorskiej metody warstwowej oceny epidemiologicznej (WOE) do oceny potencjalnego ryzyka zakażeń w obiektach przeznaczonych dla osób starszych. Materiał i metody: W celu weryfikacji możliwości użycia metody WOE do oceny zagrożeń w zakresie bezpieczeństwa epidemiologicznego środowiska zbudowanego poddano analizie dostępne źródła literatury związane z obowiązującymi w Polsce wymaganiami...
-
Rafał Leszczyna dr hab. inż.
OsobyDr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...
-
In Vitro Antiproliferative and Antioxidant Effects of Extracts from Rubus caesius Leaves and Their Quality Evaluation
Publikacja -
Clinical Application of Bioextracts in Supporting the Reproductive System of Animals and Humans: Potential and Limitations
Publikacja -
Renoprotective and Cardioprotective Potential of Moricandia sinaica (Boiss.) against Carbon Tetrachloride-Induced Toxicity in Rats
Publikacja -
Evaluation of the Effect of Four Bioactive Compounds in Combination with Chemical Product against Two Spider Mites Tetranychus urticae and Eutetranychus orientalis(Acari: Tetranychidae)
Publikacja -
In Vivo Efficacy, Toxicity Assessment, and Elemental Analysis of Traditionally Used Polyherbal Recipe for Diarrhea
Publikacja -
Michal Piechowicz dr
OsobyAdjunct at the Department of European Studies at the Faculty of Political Science and Security Studies. Doctoral thesis defended in 2011. Author of publications in the field of European integration and security. Research interests focus on issues related to the decision-making processes and EU defense and security policy issues. I'm visiting the CEEs constantly. My ongoing and future-oriented goal is establishing research and trust-based...
-
Andrzej Chybicki dr inż.
OsobyZ wykształcenia informatyk, absolwent Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej, doktor nauk technicznych w dziedzinie informatyka specjalizujący się w przetwarzaniau danych przestrzennych w rozproszonych systemach informatycznych. Ukierunkowany na wykorzystywanie osiągnięć i wiedzy zakresu prowadzonych badań w przemyśle. Współpracował z szeregiem podmiotów przemysłu informatycznego, geodezyjnego...
-
On neutral differential equations and the monotone iterative method
PublikacjaThe application of the monotone iterative method to neutral differential equations with deviating arguments is considered in this paper. We formulate existence results giving sufficient conditions which guarantee that such problems have solutions. This approach is new and to the Authors' knowledge, this is the first paper when the monotone iterative method is applied to neutral first-order differential equations with deviating...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublikacjaIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Approaching Secure Industrial Control Systems
PublikacjaThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Integrated functional safety and cyber security analysis
PublikacjaThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
Sprawiedliwość agrarna Thomasa Paine’a i narodziny dyskursu egalitarnego
PublikacjaThomas Paine napisał Sprawiedliwość agrarną we Francji w roku 1796 w szczycie posttermidoriańskiego zamętu, krótko po wprowadzeniu Konstytucji Roku III. W swoim ostatnim wielkim pamflecie domaga się opodatkowania wielkich właścicieli ziemskich i pomoc biednym oraz wywłaszczonym. Artykuł krótko omawia propozycję Paine i analizuje jego strukturę argumentacyjną. Stawiam w niej tezę, że Paine nie do końca świadomie przechodzi od dowodu...
-
The evidence for the impact of policy on physical activity outcomes within the school setting: A systematic review
PublikacjaPurpose Despite the well-established health benefits of physical activity (PA) for young people (aged 4–19 years), most do not meet PA guidelines. Policies that support PA in schools may be promising, but their impact on PA behavior is poorly understood. The aim of this systematic review is to ascertain the level and type of evidence reported in the international scientific literature for policies within the school setting that...
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublikacjaIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Determining and verifying the safety integrity level with security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublikacjaIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Some Security Features of Selected IoT Platforms
PublikacjaIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
SDN testbed for validation of cross-layer data-centric security policies
PublikacjaSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
PublikacjaThis article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...
-
Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?
PublikacjaThis study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublikacjaRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublikacjaEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
A la recherche d’une coherence perdue – Possible Arguments for the Non-application of EU Law in Member States
PublikacjaThe European Union (EU) is an international organization which has a broad scope of competences that have been transferred to it by its Member States in the founding Treaties. The object of the article is to identify arguments raised, or that potentially might be raised, by national Constitutional Courts (and in the future possibly by other actors as well) to exclude in certain instances the application of EU law or EU jurisprudence...
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...