Academic literature on the topic 'Security Control Deficiency'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Control Deficiency.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Control Deficiency"

1

Prebilič, Vladimir. "Water (in) security – modern security paradigm." Journal of Geography, Politics and Society 9, no. 2 (June 30, 2019): 1–9. http://dx.doi.org/10.26881/jpgs.2019.2.01.

Full text
Abstract:
Water. In the existence and activities of each individual it is water that (un) consciously essentially defines them. Therefore, water is called the source of life, but nowadays we know it under the new concept: blue gold. The reason for such a modern understanding of the role of water lies in the increasing limitations of access to sufficient quantities, which first results in water stress – the situation where needs remain unmet, but water scarcity does not yet interfere with the foundations of the activities of societies. Water stress is thus the first form of threat to water security, especially when deficiency destroys all basic social systems that cannot function without water. The question of the role of water between them is increasingly being raised, as the operation of one system in the area of water consumption or management can mean interfering with the water potential of another system. This confronts us with the effect of the definite quantities of water, although countries with ample water resources and quantity (still) often do not understand or perceive it. Of course, this does not mean that the debate is not necessary; it is, conversely, necessary, and it is only in this way that it is possible to prevent or at least control the situation in which many countries around the world have found themselves and there is a total lack of water resources in the most existential aspects. Under these conditions, water security has become the most essential element of national security of these countries and thus a potential weak link in ensuring security.
APA, Harvard, Vancouver, ISO, and other styles
2

Pasricha, Sant-Rayn, Hal Drakesmith, James Black, David Hipgrave, and Beverley-Ann Biggs. "Control of iron deficiency anemia in low- and middle-income countries." Blood 121, no. 14 (April 4, 2013): 2607–17. http://dx.doi.org/10.1182/blood-2012-09-453522.

Full text
Abstract:
Abstract Despite worldwide economic and scientific development, more than a quarter of the world’s population remains anemic, and about half of this burden is a result of iron deficiency anemia (IDA). IDA is most prevalent among preschool children and women. Among women, iron supplementation improves physical and cognitive performance, work productivity, and well-being, and iron during pregnancy improves maternal, neonatal, infant, and even long-term child outcomes. Among children, iron may improve cognitive, psychomotor, and physical development, but the evidence for this is more limited. Strategies to control IDA include daily and intermittent iron supplementation, home fortification with micronutrient powders, fortification of staple foods and condiments, and activities to improve food security and dietary diversity. The safety of routine iron supplementation in settings where infectious diseases, particularly malaria, are endemic remains uncertain. The World Health Organization is revising global guidelines for controlling IDA. Implementation of anemia control programs in developing countries requires careful baseline epidemiologic evaluation, selection of appropriate interventions that suit the population, and ongoing monitoring to ensure safety and effectiveness. This review provides an overview and an approach for the implementation of public health interventions for controlling IDA in low- and middle-income countries, with an emphasis on current evidence-based recommendations.
APA, Harvard, Vancouver, ISO, and other styles
3

Wright, Timothy, and Greg Madey. "Discretionary Access Controls for a Collaborative Virtual Environment." International Journal of Virtual Reality 9, no. 1 (January 1, 2010): 61–71. http://dx.doi.org/10.20870/ijvr.2010.9.1.2763.

Full text
Abstract:
As collaborative virtual environments (CVEs) are more widely used, participant access to CVE objects and information becomes a significant concern. In virtual reality games, storefronts, classrooms, and laboratories, for example, the need to control access to spaces and objects is integral to the security of activities taking place there. However, limited access controls are typically available in CVEs. Often, such controls are course-grained, only protecting against movements by unauthorized participants into specific areas. In answer to this deficiency, we offer a discretionary access control (DAC) system based on traditional concepts of users and groups, and tailored to the needs of a CVE. Our system, called WonderDAC, includes the ability to restrict movement into areas, as well as control interactions with objects. A basic WonderDAC prototype has been implemented within the Project Wonderland CVE.
APA, Harvard, Vancouver, ISO, and other styles
4

Wan Ali, Wan Nor Ashiqin, Abidah Mat Taib, and Syed Zulkarnain Syed Idrus. "I6-FPS: Automating the ICMPv6 Filtering Rules." MATEC Web of Conferences 150 (2018): 06001. http://dx.doi.org/10.1051/matecconf/201815006001.

Full text
Abstract:
Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, ICMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. While conducting the attack scenarios testing, IPv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6 filtering rules (ip6table). I6-FPS is used to automate and simplify the writing of ip6table and it was developed using PHP5 and Shell script languages. This research revealed that I6-FPS is significant in the initial phase of securing IPv6 deployment as well as focusing on the ICMPv6 filtering rules. The I6-FPS has the potential to be enhanced and developed over time by including more functions to that system in generating specific filtering ip6table rules.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Heng, Zhiping Cai, Qiang Liu, Qingjun Xiao, Yangyang Li, and Chak Fone Cheang. "A Survey on Security-Aware Measurement in SDN." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/2459154.

Full text
Abstract:
Software-defined networking (SDN) is one of the most prevailing networking paradigms in current and next-generation networks. Basically, the highly featured separation of control and data planes makes SDN a proper solution towards many practical problems that challenge legacy networks, for example, energy efficiency, dynamic network configuration, agile network measurement, and flexible network deployment. Although the SDN and its applications have been extensively studied for several years, the research of SDN security is still in its infancy. Typically, the SDN suffers from architecture defect and OpenFlow protocol loopholes such as single controller problem, deficiency of communication verification, and network resources constraint. Hence, network measurement is a fundamental technique of protecting SDN against the above security threats. Specifically, network measurement aims to understand and quantify a variety of network behaviors to facilitate network management and monitoring, anomaly detection, network troubleshooting, and the establishment of security mechanisms. In this paper, we present a systematic survey on security-aware measurement technology in SDN. In particular, we first review the basic architecture of SDN and corresponding security challenges. Then, we investigate two performance measurement techniques in SDN, namely, link latency and available bandwidth measurements. After that, we further provide a general overview of topology measurement in SDN including intradomain and interdomain topology discovering techniques. Finally, we list three interesting future directions of security-aware measurement in SDN followed by giving conclusion remarks.
APA, Harvard, Vancouver, ISO, and other styles
6

Bayoumi, Imaan, Patricia C. Parkin, Catherine S. Birken, Jonathon L. Maguire, and Cornelia M. Borkhoff. "116 Association between family income, risk for food insecurity and iron deficiency in healthy young Canadian children." Paediatrics & Child Health 25, Supplement_2 (August 2020): e48-e48. http://dx.doi.org/10.1093/pch/pxaa068.115.

Full text
Abstract:
Abstract Background Iron deficiency peaks in prevalence (12% or higher) in early childhood and has been associated with poor developmental outcomes. Previous research examining associations between income and food insecurity (FI) with iron deficiency has been inconsistent and most did not measure iron status directly using serum ferritin or control for potential confounding variables. Objectives To examine the independent effects of family income and family risk for FI on iron status in healthy young children attending primary care. Design/Methods Healthy children ages 12–29 months were included in a cross-sectional analysis. Family income and risk for FI were collected from parents through self-reported questionnaires. Children with an affirmative response to the 1-item FI screen on the NutriSTEP (a validated screening tool of nutritional risk) or to at least one of the 2 items on the 2-item FI screen based on the 18-item Household Food Security Survey were categorized as a family at risk for FI. Iron status was assessed by serum ferritin. Children with C-reactive protein (CRP) >5 mg/L were excluded. Multivariable logistic regression analyses were used to examine the associations between both family income and family risk for FI with iron deficiency (serum ferritin <12µg/L) and IDA (serum ferritin <12 µg/L and hemoglobin <110 g/L), adjusting for age, sex, birthweight, zBMI, CRP, breastfeeding duration, bottle use, cow’s milk intake, formula feeding in the first year. Results Of 1245 children included, 131 (10.5%) of children were from households with a family income of <$40,000, 77 (6.2%) children were from families at risk for FI, 15% had iron deficiency, and 5% had IDA. The odds of children with a family income of <$40,000 having iron deficiency was 3 times (95% CI: 1.75, 5.26; P<0.0001) and having IDA was 4 times (95% CI: 1.71, 9.25; P=0.001) that for children in the highest family income group. Fully adjusted logistic regression showed weak evidence of a decreased odds of iron deficiency among children in families at risk for FI (OR 0.44, 95% CI: 0.19, 1.04; P=0.06) than all other children, and no association with IDA (OR 0.18, 95% CI: 0.02, 1.38; P=0.10). Conclusion A low family income of <$40,000 was associated with an increased risk for iron deficiency and IDA in young children. Risk for FI was not a risk factor for iron deficiency or IDA. Targeting income security may be more effective than targeting access to food to reduce health inequities in iron deficiency.
APA, Harvard, Vancouver, ISO, and other styles
7

Azeem, Omar, Mujtaba Ali, Ghulam Abbas, Muhammad Uzair, Ayman Qahmash, Abdulmohsen Algarni, and Mohammad Rashid Hussain. "A Comprehensive Review on Integration Challenges, Optimization Techniques and Control Strategies of Hybrid AC/DC Microgrid." Applied Sciences 11, no. 14 (July 6, 2021): 6242. http://dx.doi.org/10.3390/app11146242.

Full text
Abstract:
The depletion of natural resources and the intermittence of renewable energy resources have pressed the need for a hybrid microgrid, combining the benefits of both AC and DC microgrids, minimizing the overall deficiency shortcomings and increasing the reliability of the system. The hybrid microgrid also supports the decentralized grid control structure, aligning with the current scattered and concentrated load scenarios. Hence, there is an increasing need to explore and reveal the integration, optimization, and control strategies regarding the hybrid microgrid. A comprehensive study of hybrid microgrid’s performance parameters, efficiency, reliability, security, design flexibility, and cost-effectiveness is required. This paper discusses major issues regarding the hybrid microgrids, the integration of AC and DC microgrids, their security and reliability, the optimization of power generation and load management in different scenarios, the efficient management regarding uncertainty for renewable energy resources, the optimal placement of feeders, and the cost-effective control methodologies for the hybrid microgrid. The major research areas are briefly explained, aiming to find the research gap that can further improve the performance of the grid. In light of the recent trends in research, novel strategies are proposed that are found most effective and cost-friendly regarding the hybrid microgrid. This paper will serve as a baseline for future research, comparative analysis, and further development of novel techniques regarding hybrid microgrids.
APA, Harvard, Vancouver, ISO, and other styles
8

Saleh, Ashraf, Odai Enaizan, Bilal Eneizan, Lu’ay Al-Mu’ani, Ahmad Al-Radaideh, and Feras Hanandeh. "A Hybrid SEM and Neural Network Approach to Understand and Predict the Determinants of Consumers’ Acceptance and Usage of Mobile-Commerce Application." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 21 (November 15, 2022): 125–52. http://dx.doi.org/10.3991/ijim.v16i21.31815.

Full text
Abstract:
The growth of mobile commerce marketplaces worldwide has been boosted by modern advances in digital technology. However, Privacy and security are still concern in m-commerce application. Since the previous study has researched the link between security and privacy and purpose to use, the factors that influence the formation of privacy and security in m-commerce are mostly unidentified. On the basis of UTAUT2, this study investigates the factors of security and privacy effecting mobile commerce acceptance. A hybrid SEM-ANN method was utilized to identify non-linear and compensatory interactions. Compensatory and Linear models are based on the idea that a deficiency in one component might also be compensated for by other variables. Linear and Non-compensatory models, on the other hand, seem to overcomplicate buyer decision mechanisms. Survey criteria have been conducted to obtain 890 mobile commerce consumer’s datasets utilizing an application on m-commerce. The following are the results. (1) M-commerce acceptability and use were positively influenced by five determinants (Security, performance expectancy, effort expectancy, habit, and price value). (2) Un-authorization, Error, secondary usage, collection, control, and awareness were all shown to directly and significantly negatively impact M-COMMERCE acceptance and use. (3) Three additional variables (social influence, hedonic motivation, and facilitating conditions) did not affect customers' intentions to use m-commerce applications in Jordan. In m-commerce, the integrated model expects a 45% percent increase in security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Jing, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, and Debiao He. "Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid." ACM Transactions on Sensor Networks 17, no. 3 (June 21, 2021): 1–25. http://dx.doi.org/10.1145/3440249.

Full text
Abstract:
Internet of Things (IoT)-enabled smart grids can achieve more reliable and high-frequency data collection and transmission compared with existing grids. However, this frequent data processing may consume a lot of bandwidth, and even put the user’s privacy at risk. Although many privacy-preserving data aggregation schemes have been proposed to solve the problem, they still suffer from some security weaknesses or performance deficiency, such as lack of satisfactory data confidentiality and resistance to malicious data mining attack. To address these issues, we propose a novel privacy-preserving data aggregation scheme (called PDAM) for IoT-enabled smart grids, which can support efficient data source authentication and integrity checking, secure dynamic user join and exit. Unlike existing schemes, the PDAM is resilient to the malicious data mining attack launched by internal or external attackers and can achieve perfect data confidentiality against not only a malicious aggregator but also a curious control center for an authorized user. The detailed security and performance analysis show that our proposed PDAM can satisfy several well-known security properties and desirable efficiency for a smart grid system. Moreover, the comparative studies and experiments demonstrate that the PDAM is superior to other recently proposed works in terms of both security and performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Sennikov, M. N., and G. E. Omarova. "Ensuring Food Security of Kazakhstan by the Integrated Water Resources Management." Post-Soviet Issues 5, no. 3 (August 24, 2018): 268–83. http://dx.doi.org/10.24975/2313-8920-2018-5-3-268-283.

Full text
Abstract:
One of the main objectives of the states located in the territory of arid regions is the timely obtaining solid and exhaustive data, the forecasts connected with the climatic phenomena, allowing to provide the timely organization of works on safety and prevention of possible damage to agriculture and in general all national economy. This task can be solved only in the presence of well adjusted, system of collecting, processing and implementation of information. For ensuring food security of the country it is necessary to provide the integrated control system of water resources at timely coordination of all stages of regulation on the basis of multiplefactor monitoring of indicators.The increasing deficiency of water resources in basins of the cross-border rivers of the arid region of the republic demands introduction of the new scheme of management which would allow their use in the conditions of limitation.Due to the formation of the new independent states need of improvement of the existing organizational forms of ownership and water resources management of the cross-border rivers which will be proved on rules of international law and the best practice of cooperation pools when sharing taking into account the interests of the adjacent countries of the region is caused. The main priority direction of the arid region of the republic is development of long-term programs, proved on a package of measures and actions for water economy, maintaining her quality and increase in an ecological situation of water management systems.Now each country develops own strategies of water use which leads to strengthening of the competition for water, sharpening of deficiency of water and environmental problems, both on interstate, and at the regional level. Further, the issue of ensuring food security in the conditions of impact of climate change on agriculture is resolved. The existing risks connected with climate changes and ways of adaptation of agricultural production have been defined.The main national policy of the republic is aimed at ensuring the food security with the balance of production. Considering features of the region and the available restrictions as: existence of the irrigated lands, their efficiency, limitation of water resources and their effective use has to be proved on universal introduction of water-conservation technologies of irrigation when carrying out complex reconstruction of irrigating systems and the principles of the integrated use of water resources.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security Control Deficiency"

1

Office, General Accounting. Defense inventory: Navy spare parts quality deficiency reporting program needs improvement : report to congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Office, General Accounting. Defense inventory: Navy spare parts quality deficiency reporting program needs improvement : report to congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Office, General Accounting. Defense inventory: Navy spare parts quality deficiency reporting program needs improvement : report to congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security Control Deficiency"

1

Calayugan, Mark Ian C., B. P. Mallikarjuna Swamy, Chau Thanh Nha, Alvin D. Palanog, Partha S. Biswas, Gwen Iris Descalsota-Empleo, Yin Myat Myat Min, and Mary Ann Inabangan-Asilo. "Zinc-Biofortified Rice: A Sustainable Food-Based Product for Fighting Zinc Malnutrition." In Rice Improvement, 449–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66530-2_13.

Full text
Abstract:
AbstractThe lack of dietary diversity among poor communities has led to nutritional consequences, particularly zinc deficiency. An adequate intake of mineral- and vitamin-rich food is necessary for achieving and maintaining good health. Zinc is one of the micronutrients considered essential to improve human health and decrease the risk of malnutrition. Biofortification of rice through breeding is a cost-effective and sustainable strategy to solve micronutrient malnutrition. The Biofortification Priority Index prepared by HarvestPlus clearly identified several countries in Asia with an immediate need for Zn biofortification. The International Rice Research Institute (IRRI) and its national partners in target countries are making efforts to develop Zn-biofortified rice varieties. The first set of high-Zn rice varieties has been released for commercial cultivation in Bangladesh, India, the Philippines, and Indonesia. Efforts have begun to mainstream grain Zn to ensure that the Zn trait becomes an integral part of future varieties. Huge scope exists to apply advanced genomics technologies such as genomic selection and genome editing to speed up high-Zn varietal development. An efficient rice value chain for Zn-biofortified varieties, quality control, and promotion are essential for successful adoption and consumption. The development of next-generation high-Zn rice varieties with higher grain-Zn content, stacking of multiple nutrients, along with good grain quality and acceptable agronomic traits has to be fast-tracked. Healthier rice has a large demand from all stakeholders, so we need to keep up the pace of developing nutritious rice to meet the demand and to achieve nutritional security.
APA, Harvard, Vancouver, ISO, and other styles
2

Barkakati, Nabajyoti, and Gregory C. Wilshusen. "Deficient ICT Controls Jeopardize Systems Supporting the Electric Grid: A Case Study." In Securing Electricity Supply in the Cyber Age, 129–42. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3594-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Altman, Jon, and Francis Markham. "Disruption as Reprieve?" In Beyond Global Food Supply Chains, 125–37. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3155-0_10.

Full text
Abstract:
AbstractIt is a truism that the impacts of any crisis always fall unevenly. In this chapter, we focus on the experience of COVID-19 by a particular population group, Indigenous Australians living in extremely remote circumstances. Here key responses to the disruption wrought by the pandemic have paradoxically registered as reprieve. In Australia, remote-living Indigenous peoples live in deep poverty and were anticipated to be highly vulnerable to food insecurity and supply chain disruption. Surprisingly, the pandemic served to disrupt in other ways. The hegemonic characterization of welfare-dependent Indigenous peoples as morally deficient subjects in need of discipline and control could not be sustained as the country “locked down” and over a million others became “welfare dependent” overnight. Unemployment benefits were temporarily doubled, and onerous work-for-the-dole mutual obligations eased. This essay explores potential positive changes to systems of food provisioning caused by government responses to COVID-19. The remote food security “crisis” is shown to be mainly an artefact of government policies designed to punish the poor and push unemployed remote-community residents into jobs. We propose permanent reform to the social security system that will enhance food security and liberate Indigenous peoples to more effectively self-provision and exercise “food sovereignty”.
APA, Harvard, Vancouver, ISO, and other styles
4

Kausalye, Shekhar S., and Sanjeev Kumar Sharma. "Data Confidentiality in Cloud Storage. A Survey." In Recent Trends in Intensive Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210257.

Full text
Abstract:
In cloud computing security, privacy and data confidentiality plays important role when popularity in terms of cloud computing services is consider. Till now there are various schemes, protocols and architecture for cloud computing privacy and data protection are proposed which are based on data confidentiality, cryptographic solution, cipher text blocks, various transforms, symmetric encryption schemes, attribute-based encryption, trust and reputation, access control, etc., but they are scattered and lacking uniformity without proper security logic. This paper systematically reviews as well as analyze research done in this relevant area. First various shortcomings in cloud computing, architectures, framework and schemes proposed for data confidentiality will be discussed; then existing cryptographic schemes, encryption functions, linear transform, grid storage system, key exposure, secret sharing, AONT (All or Nothing Transform), dispersed storage, trust, block encryption mechanism, attribute-based encryption, access control will be discussed; thirdly propose future direction with research challenges for data confidentiality in cloud computing; finally focus is on concern data confidentiality scheme to overcome the technical deficiency and existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
5

Ali, Abdu Seid. "The Viability of Establishing Capital Market in Developing Countries." In Advances in Religious and Cultural Studies, 355–72. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0148-0.ch025.

Full text
Abstract:
The outlook concerning worthiness and significance of establishment of stock market to nations in general, to developing nations in particular, have assorted to a great extent over time. Developing countries are trying towards improving and stepping up financial systems, by way of amplifying their security markets in order to perk up their ability to bring together resources to economy and fruitfully allot them to highly productive segments of the economy. This paper attempts to examine the feasibility of launching a stock market in Ethiopia. Regulatory framework, financial sector development and privatization and private sector development have been covered to analyze practicability of organizing “capital market”. The regulatory framework at hand is not adequate to establish a stock market and despite the boom in privatization, the country's huge companies still remain under control of the state. Nonetheless, it has been jeopardized by deficiency of financial liberalization and dominance of state banks.
APA, Harvard, Vancouver, ISO, and other styles
6

Pacheco-Pumaleque, Liz, Alex Pacheco-Pumaleque, Edwin A. Vegas-Gallo, and Rosario Pariona-Luque. "Teleworking and Information Security Management in Commercial Sector Companies." In Practice, Progress, and Proficiency in Sustainability, 553–62. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-8482-8.ch032.

Full text
Abstract:
Currently, working conditions have been evolving continuously, which makes it necessary to incorporate teleworking as a means of support to fulfill the tasks entrusted. However, this type of employment brings with it vulnerabilities within companies that are not prepared for such a situation. For this reason, a teleworking model is proposed to improve the management of information security in organizations in the commercial sector. This research is of a basic type with a non-experimental design and correlational level, with a quantitative approach, the survey technique, and a questionnaire was used as an instrument that was applied to 70 workers in the commerce sector. The results show that 54.29% consider the organizational change in companies as deficient, 62.86% indicate the use of technologies as deficient, and 84.29% consider that the level of confidentiality of the information is regular. These results reflect that information security management must be implemented to provide greater reliability, integrity, productivity, control, and protection to teleworking processes.
APA, Harvard, Vancouver, ISO, and other styles
7

Ding, Amy Wenxuan. "Incident Commander." In Social Computing in Homeland Security, 102–13. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-228-2.ch007.

Full text
Abstract:
In natural or human-induced emergencies, decisions made during the very first minutes and hours are critical to successful damage control, the prevention of casualties and structural losses, and ultimately the overall resolution of the disaster (Asaeda, 2002; Aylwin et al., 2006). In the Three Mile Island nuclear accident, for example, the response efforts in the early stages included a serious mistake; as many investigations have noted, without this mistake, Three Mile Island would have been limited to a relatively insignificant incident (The President’s Commission Report, 1980). However, the initial information in emergency situations often is unclear and limited, which can lead to different interpretations of the problem. During the first few minutes of the Three Mile Island nuclear accident, more than 100 alarms went off, and there was no system for suppressing the unimportant signals so that operators could concentrate on the significant ones. That is, the information was not presented in a clear or sufficiently understandable manner. Although warnings displayed the pressure and temperature within the eactor coolant system, there was no direct indication that the combination of pressure and temperature would mean that the cooling water was turning into steam. Rather than adding cooling water then, the operators (or those who supervised them) turned off the pumps—a seriously poor decision. Obviously, understanding differences makes a difference. Different response methods may result in different resolutions, and a deficient response may increase losses.
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Aman, Nishant Raj Kapoor, Harish C. Arora, and Ashok Kumar. "Smart Transportation Systems: Recent Developments, Current Challenges and Opportunities." In Artificial Intelligence for Smart Cities and Villages: Advanced Technologies, Development, and Challenges, 116–43. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9789815049251122010010.

Full text
Abstract:
The advancements in smart city technologies have shown great potential to ease traffic congestion. Although, Intelligent Transportation Systems (ITS) were initiated in the late 1960s and early 1970s with the aim of developing ITS to enhance the safety and security of both the vehicle as well as citizens in all kinds of traffic conditions, unprecedented surge in population density, narrow roads, and loanable vehicles exacerbate the traffic conditions, pollution, and accidents in major cities. Smart Transportation System (STS) is the only solution for these conditions along with achieving sustainability in smart cities and smart villages. Numerous integrated technologies developed under ITS to resolve traffic-related issues are based on sensors, Artificial Intelligence (AI), Internet of Things, Cloud Computing and Big-Data, etc. This piece of knowledge only focused on the AI techniques. This chapter focuses on the scope of ITS in solving the challenges faced by cities not only in terms of mobility and security, smart mobility methodologies, sustainable sources of energy for smart transportation and smart traffic signals, but also to solve the traffic congestion and road accidents, which occur due to human-related factors (loss of control, limited sight distance, and tiredness, etc.), vehicle-related factors (brake failure, wear & tear of parts etc.) and traffic management related factors (improper design, deficient signaling system, sluggish maintenance process, etc.). This chapter covers a case study of Indian cities to reduce traffic congestion, avoid accidents and manage the transportation systems in a much better way by using STS technologies.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Control Deficiency"

1

Chowdhury, Omar. "How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security." In SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3205977.3206002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Iba, Kenichiro, Kenichiro Iba, Takuya Ishikawa, Takuya Ishikawa, Keizo Negi, and Keizo Negi. "NEW DIRECTION FOR ENVIRONMENTAL WATER MANAGEMENT IN THE SETO INLAND SEA." In Managing risks to coastal regions and communities in a changing world. Academus Publishing, 2017. http://dx.doi.org/10.31519/conferencearticle_5b1b941221ab90.64815034.

Full text
Abstract:
The Seto Inland Sea, the largest enclosed sea in Japan, has unrivalled beauty of archipelago and abundant nature under temperate climate with light rain falls, and the people has been benefitted from the sea ever since the early times. We however experienced sever water pollution problems caused by rapid industrialization and the loss of seaweed bed and tidal flat due to reclamation projects particularly in the period of the high economic growth in 1960s. To resolve these issues, we have carried out water quality improvement programs including reduction of pollutant load based upon the Water Pollution Control Law and the Law concerning Special Measures for Conservation of the Environment of the Seto Inland Sea. As a result, water quality has improved as compared with Tokyo Bay and other enclosed seas. However, there are still severe problems including the occurrence of red tide and oxygen deficient water mass in some areas in the Seto Inland Sea. Securing the bio-diversity, bio-productivity and smooth nutrient circulation are also important. Under these situations, the Law and the Basic Plan for Conservation of the Environment of the Seto Inland Sea were revised in 2015. With these law and plan, it has been made clear that our principal objective is to make the Seto Inland Sea a “Bountiful Sea” through conservation of water quality with bio-diversity and bio-productivity. Also the importance to implement environmental measures corresponding local differences in the respective region and seasonality were indicated. In order to actualize “the Beautiful and Bountiful Seto Inland Sea”, we need to implement environmental water management as follows. 1. Environmental conservation, restoration and creation of coastal areas. 2. Conservation and management of water quality. 3. Conservation of natural and cultural landscapes. 4. Sustainable utilization of fishery resources. Ministry of the Environment, Japan will continue to conduct corresponding programs based on scientific survey and evaluation on conservation/restoration of seaweed bed, tidal flat, smooth circulation of nutrients.
APA, Harvard, Vancouver, ISO, and other styles
3

Iba, Kenichiro, Kenichiro Iba, Takuya Ishikawa, Takuya Ishikawa, Keizo Negi, and Keizo Negi. "NEW DIRECTION FOR ENVIRONMENTAL WATER MANAGEMENT IN THE SETO INLAND SEA." In Managing risks to coastal regions and communities in a changing world. Academus Publishing, 2017. http://dx.doi.org/10.21610/conferencearticle_58b4316136b08.

Full text
Abstract:
The Seto Inland Sea, the largest enclosed sea in Japan, has unrivalled beauty of archipelago and abundant nature under temperate climate with light rain falls, and the people has been benefitted from the sea ever since the early times. We however experienced sever water pollution problems caused by rapid industrialization and the loss of seaweed bed and tidal flat due to reclamation projects particularly in the period of the high economic growth in 1960s. To resolve these issues, we have carried out water quality improvement programs including reduction of pollutant load based upon the Water Pollution Control Law and the Law concerning Special Measures for Conservation of the Environment of the Seto Inland Sea. As a result, water quality has improved as compared with Tokyo Bay and other enclosed seas. However, there are still severe problems including the occurrence of red tide and oxygen deficient water mass in some areas in the Seto Inland Sea. Securing the bio-diversity, bio-productivity and smooth nutrient circulation are also important. Under these situations, the Law and the Basic Plan for Conservation of the Environment of the Seto Inland Sea were revised in 2015. With these law and plan, it has been made clear that our principal objective is to make the Seto Inland Sea a “Bountiful Sea” through conservation of water quality with bio-diversity and bio-productivity. Also the importance to implement environmental measures corresponding local differences in the respective region and seasonality were indicated. In order to actualize “the Beautiful and Bountiful Seto Inland Sea”, we need to implement environmental water management as follows. 1. Environmental conservation, restoration and creation of coastal areas. 2. Conservation and management of water quality. 3. Conservation of natural and cultural landscapes. 4. Sustainable utilization of fishery resources. Ministry of the Environment, Japan will continue to conduct corresponding programs based on scientific survey and evaluation on conservation/restoration of seaweed bed, tidal flat, smooth circulation of nutrients.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography