Academic literature on the topic 'Security e safety e disabilità'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security e safety e disabilità.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security e safety e disabilità"
Boardman, Jed. "Dismantling the social safety net: social security reforms, disability and mental health conditions." BJPsych Bulletin 44, no. 5 (July 17, 2020): 208–12. http://dx.doi.org/10.1192/bjb.2020.79.
Full textPurnomo, Agung, Yuly Peristiowati, and Agusta Dian Elina. "Dimension of Patient Safety Culture." Interdisciplinary Social Studies 1, no. 3 (December 20, 2021): 193–202. http://dx.doi.org/10.55324/iss.v1i3.35.
Full textMiller, John. "Resuscitating Private Social Security Accounts: Countering Inequality With Panic and Prevarication." NEW SOLUTIONS: A Journal of Environmental and Occupational Health Policy 30, no. 1 (February 3, 2020): 52–56. http://dx.doi.org/10.1177/1048291120905081.
Full textPrakoso, Gilang Dwi, and Mohammad Zainal Fatah. "ANALISIS PENGARUH SIKAP, KONTROL PERILAKU, DAN NORMA SUBJEKTIF TERHADAP PERILAKU SAFETY." Jurnal PROMKES 5, no. 2 (February 26, 2018): 193. http://dx.doi.org/10.20473/jpk.v5.i2.2017.193-204.
Full textOlney, Marjorie F. "Caught in a Social Safety Net: Perspectives of Recipients of Social Security Disability Programs on Employment." Journal of Applied Rehabilitation Counseling 38, no. 2 (June 1, 2007): 5–13. http://dx.doi.org/10.1891/0047-2220.38.2.5.
Full textJosé G. Hernández R., María J. García G., and Gilberto J. Hernández G. "Safety and Attention of Passengers With Disabilities Who Travel by Train." International Journal of Sustainable Entrepreneurship and Corporate Social Responsibility 7, no. 1 (January 2022): 1–16. http://dx.doi.org/10.4018/ijsecsr.287867.
Full textBarreto de Miranda, Cristiano, Amanda Gonçalves Simões, João Silvestre Silva-Junior, and Frida Marina Fischer. "Temporal trend of social security disability benefits due to musculoskeletal disorders from 2008 to 2018 in Brazil." Safety and Health at Work 13 (January 2022): S152. http://dx.doi.org/10.1016/j.shaw.2021.12.1227.
Full textDaigle, Megan, Sarah Martin, and Henri Myrttinen. "‘Stranger Danger’ and the Gendered/Racialised Construction of Threats in Humanitarianism." Journal of Humanitarian Affairs 2, no. 3 (September 1, 2020): 4–13. http://dx.doi.org/10.7227/jha.047.
Full textAri, Ajeni, Maria Chiara Leva, Lorraine D’Arcy, and Mary Kinahan. "Fairness and Inclusion for Users of Surface Transport—An Exploratory Thematic Study for Irish Users." Sustainability 14, no. 11 (May 25, 2022): 6480. http://dx.doi.org/10.3390/su14116480.
Full textWillets, Laura, Paul Mooney, and Nicholas Blagden. "Social climate in Learning Disability services." Journal of Intellectual Disabilities and Offending Behaviour 5, no. 1 (March 4, 2014): 24–37. http://dx.doi.org/10.1108/jidob-10-2013-0025.
Full textDissertations / Theses on the topic "Security e safety e disabilità"
Simpson, Andrew C. "Safety through security." Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Full textCarter, R. A. "Fire Safety and Security in Schools." University of Canterbury. Civil Engineering, 1999. http://hdl.handle.net/10092/8255.
Full textSajjad, Imran. "Autonomous Highway Systems Safety and Security." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.
Full textÅkerberg, Johan. "On Security in Safety-Critical Process Control." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Full textThis Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.
The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.
The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.
In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of Security Modules in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.
Åkerberg, Johan. "On security in safety-critical process control /." Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Full textNyström, Oskar. "FIRE SAFETY AND EVACUATION SECURITY IN WIND TURBINES." Thesis, Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83289.
Full textMatović, Aleksandar. "CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320.
Full textMeyers, Tommey H. "Safety risk management for Homeland Defense and Security responders." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMeyers.pdf.
Full textThesis Advisor(s): Paul Pitman. Includes bibliographical references (p.55-59). Also available online.
Nkwantabisa, Godfrey K. "The United States Army food safety, security, and protection system." Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/975.
Full textAbdo, Houssein. "Dealing with uncertainty in risk analysis : combining safety and security." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT113/document.
Full textRisk analysis is a critical part for regulatory decision-making related to high-risk risk industries. A systematic risk analysis is made up of three steps: (i) identifying the undesirable risk scenarios. A risk scenario is characterized by referencing to the potential event with its causes and consequences. (ii) Estimating the likelihood of occurrence of risk scenarios. (iii) Calculating the effect of consequences of the identified risk scenarios. Likelihood and effect analysis are carried out with the help of models that depend on several number of input parameters.However, the trustworthiness of risk analysis is limited when inaccuracies in the results can occur, and are due to various sources of uncertainty. Parameter, model and completeness uncertainties are the main sources of uncertainty. Parameter uncertainty arises from the inability to set exact values for certain input parameters used for likelihood and severity analysis. Completeness uncertainty originates from not considering all contributions to risk in the identification process (some initiating events are ignored). Model uncertainty is not considered in this work.The INERIS (French National Institute for Industrial Environment and Risks) has developed an interval semi-quantitative approach that uses both quantitative information if available or qualitative information if not. However, this interval semi-quantitative approach has some drawbacks due to parameter uncertainty.Information regarding model parameters used for effect analysis is often incomplete, vague, imprecise or subjective. Moreover, some of the parameters may be random in nature and have different values. This leads to two different types of parameter uncertainty that need to be accounted for an accurate risk analysis and effective decision-making. Aleatoric uncertainty arises from randomness due to natural variability resulting from the variation of a value in time. Or epistemic uncertainty caused by the lack of information resulting, for example, from measurement errors, subjectivity expert judgment or incompleteness.Moreover, the identification step is incomplete where only safety related scenarios caused by accidental events are considered. The introduction of connected systems and digital technology in process industries creates new cyber-security threats that can lead to undesirable safety accidents. These cyber-security related events should be considered during industrial risk analysis.This research aims to develop uncertainty analysis methodologies to treat uncertainty in the INERIS risk analysis process. In other words, to analyze uncertainty in likelihood analysis, effect analysis and the identification step.In this work, we propose a fuzzy semi-quantitative approach to deal with parameter uncertainty in the likelihood analysis step. We handle the limits of the interval semi-quantitative approach by introducing the concept of fuzzy numbers instead of intervals. Fuzzy numbers are used to represent subjectivity in expert judgments (qualitative data) and covers uncertainty in the quantitative data if this data exists.A hybrid methodology that treat each cause of parameter uncertainty in effect analysis with the right theory is developed. Probability theory is used to represent variability, fuzzy numbers are used to represent imprecision and evidence theory is used to represent vagueness, incompleteness and the lack of consensus.A new risk identification methodology that considers safety and security together during industrial risk analysis is developed. This approach combines Bow-Tie Analysis (BTA), commonly used for safety analysis, with a new extended version of Attack Tree Analysis (ATA), introduced for security analysis of industrial control systems. The combined use of AT-BT provides an exhaustive representation of risk scenarios in terms of safety and security
Books on the topic "Security e safety e disabilità"
Joseph, Carmel. Safety and security. Johannseburg: Friedrich Ebert Stiftung, South Africa Office, 2002.
Find full textBooks, Time-Life, ed. Home safety & security. Alexandria, Va: Time-Life Books, 1990.
Find full textPoynton, Deborah. Safety and security. Cape Town: Michael Stevenson, 2006.
Find full textCheng, Jieren, Xiangyan Tang, and Xiaozhang Liu, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73671-2.
Full textBabalola, Olubukola Oluranti, ed. Food Security and Safety. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-50672-8.
Full textMeng, Weizhi, and Mauro Conti, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94029-4.
Full textChen, Xiaofeng, Jian Shen, and Willy Susilo, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18067-5.
Full textVaidya, Jaideep, Xiao Zhang, and Jin Li, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5.
Full textVaidya, Jaideep, Xiao Zhang, and Jin Li, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8.
Full textCastiglione, Arcangelo, Florin Pop, Massimo Ficco, and Francesco Palmieri, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01689-0.
Full textBook chapters on the topic "Security e safety e disabilità"
M'hamed, Abdallah. "Safety, Security, Privacy and Trust Issues." In The Engineering Handbook of Smart Technology for Aging, Disability, and Independence, 619–29. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2008. http://dx.doi.org/10.1002/9780470379424.ch33.
Full textSuojanen, Ilona, and Neil Thin. "Positive Safety." In International Security Management, 29–41. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42523-4_3.
Full textHearn, Keith, and Jennifer Murray. "Safety and security." In Barcraft, 84–89. London: Macmillan Education UK, 1990. http://dx.doi.org/10.1007/978-1-349-10170-2_9.
Full textPaul, Valerie, and Christine Jones. "Safety and Security." In Housecraft, 106–19. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-10172-6_8.
Full textHayter, Roy. "Safety and security." In Food and Drink Service, 13–16. London: Macmillan Education UK, 1993. http://dx.doi.org/10.1007/978-1-349-80473-3_3.
Full textSmith, Mary S. "Security and Safety." In Parking Structures, 114–35. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-4684-9922-3_4.
Full textSerpanos, Dimitrios, and Marilyn Wolf. "Security and Safety." In Internet-of-Things (IoT) Systems, 55–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69715-4_6.
Full textChun, Julia, Tyler Tingley, and William Lidwell. "Safety and Security." In The Elements of Education for School Leaders, 82–83. New York: Routledge, 2022. http://dx.doi.org/10.4324/9780429321641-41.
Full textVardon-Smith, Garry M., Kenneth I. Roberts, Kenneth I. Roberts, and Bob Mark. "Safety and Security." In Conflict and Catastrophe Medicine, 287–314. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-352-1_19.
Full textEckert, Claudia, and Michael Waidner. "Safety and Security." In Digital Transformation, 265–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58134-6_16.
Full textConference papers on the topic "Security e safety e disabilità"
Burton, Simon, Jürgen Likkei, Priyamvadha Vembar, and Marko Wolf. "Automotive functional safety = safety + security." In the First International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2490428.2490449.
Full textDutta, Raj Gautam, Feng Yu, Teng Zhang, Yaodan Hu, and Yier Jin. "Security for safety." In ICCAD '18: IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3240765.3243496.
Full textCancelier, Julien, Sébastien Faux, Alexandre Gouin, and Michel Dufresne. "Convergence Safety Security." In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61830.
Full text"Session safety & security." In 2008 IEEE International Workshop on Factory Communication Systems. IEEE, 2008. http://dx.doi.org/10.1109/wfcs.2008.4638779.
Full textTiwari, Ashish, Bruno Dutertre, Dejan Jovanović, Thomas de Candia, Patrick D. Lincoln, John Rushby, Dorsa Sadigh, and Sanjit Seshia. "Safety envelope for security." In HiCoNS '14: 3rd International Conference on High Confidence Networked Systems. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2566468.2566483.
Full textWhite, Phil. "Improving Maritime and Port Security." In Passenger Ship Safety. RINA, 2003. http://dx.doi.org/10.3940/rina.pass.2003.12.
Full textKrumov, Assen V. "Software Reliability, Safety and Security." In Third IEEE Workshop on Intelligent Data Acquisition and Advanced Computer Syetems: Technology and Applications. IEEE, 2005. http://dx.doi.org/10.1109/idaacs.2005.283017.
Full textSimmerman, Jeff. "Security and Safety Are Sisters." In SPE Americas E&P Health, Safety, Security, and Environmental Conference. Society of Petroleum Engineers, 2011. http://dx.doi.org/10.2118/141051-ms.
Full textHickey, James A., and William Carman. "Safety, security and theft issues." In 2016 Down to Earth Conference (DTEC). IEEE, 2016. http://dx.doi.org/10.1109/dtec.2016.7731294.
Full textRomanski, G. "Combined safety and security certification." In 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012. Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1511.
Full textReports on the topic "Security e safety e disabilità"
Harper, S. L., R. Schnitter, A. Fazil, M. Fleury, J. Ford, N. King, A. Lesnikowski, et al. Food safety and security. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/329534.
Full textBriscoe, G., R. Nertney, and D. Riffe. Safety considerations for security programs. Office of Scientific and Technical Information (OSTI), February 1987. http://dx.doi.org/10.2172/6686554.
Full textGoldschlag, David, Carl Landwehr, and Michael Reed. Chapter 17. Agent Safety and Security. Fort Belvoir, VA: Defense Technical Information Center, January 1996. http://dx.doi.org/10.21236/ada465298.
Full textReiss, Peter T. Airline Safety & Security: An International Perspective. Fort Belvoir, VA: Defense Technical Information Center, October 1997. http://dx.doi.org/10.21236/ada351545.
Full textUecker, Norma J., and Michael J. Schwartz. Office of Health, Safety and Security, Office of Security Policy FY 2013 Accomplishments. Office of Scientific and Technical Information (OSTI), October 2013. http://dx.doi.org/10.2172/1105101.
Full textOgata, Michael, Barbara Guttman, and Nelson Hastings. Public Safety Mobile Application Security Requirements Workshop Summary. National Institute of Standards and Technology, January 2015. http://dx.doi.org/10.6028/nist.ir.8018.
Full textFiresmith, Donald G. Common Concepts Underlying Safety Security and Survivability Engineering. Fort Belvoir, VA: Defense Technical Information Center, December 2003. http://dx.doi.org/10.21236/ada421683.
Full textSievers, Cindy S. Worker Safety and Security Teams Team Member Handbook. Office of Scientific and Technical Information (OSTI), June 2012. http://dx.doi.org/10.2172/1043505.
Full textLeach, Janice, Mark K. Snell, R. Pratt, and S. Sandoval. Leveraging Safety Programs to Improve and Support Security Programs. Office of Scientific and Technical Information (OSTI), October 2015. http://dx.doi.org/10.2172/1226427.
Full textChoong, Yee-Yin, Joshua M. Franklin, and Kristen K. Greene. Usability and Security Considerations for Public Safety Mobile Authentication. National Institute of Standards and Technology, July 2016. http://dx.doi.org/10.6028/nist.ir.8080.
Full text