Siga este enlace para ver otros tipos de publicaciones sobre el tema: Security e safety e disabilità.

Tesis sobre el tema "Security e safety e disabilità"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "Security e safety e disabilità".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Simpson, Andrew C. "Safety through security". Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.

Texto completo
Resumen
In this thesis, we investigate the applicability of the process algebraic formal method Communicating Sequential Processes (CSP) [Hoa85] to the development and analysis of safetycritical systems. We also investigate how these tasks might be aided by mechanical verification, which is provided in the form of the proof tool Failures-Divergences Refinement (FDR) [Ros94]. Initially, we build upon the work of [RWW94, Ros95], in which CSP treatments of the security property of non-interference are described. We use one such formulation to define a property called protection, which unifies our views of safety and security. As well as applying protection to the analysis of safety-critical systems, we develop a proof system for this property, which in conjunction with the opportunity for automated analysis provided by FDR, enables us to apply the approach to problems of a sizable complexity. We then describe how FDR can be applied to the analysis of mutual exclusion, which is a specific form of non-interference. We investigate a number of well-known solutions to the problem, and illustrate how such mutual exclusion algorithms can be interpreted as CSP processes and verified with FDR. Furthermore, we develop a means of verifying the faulttolerance of such algorithms in terms of protection. In turn, mutual exclusion is used to describe safety properties of geographic data associated with Solid State Interlocking (SSI) railway signalling systems. We show how FDR can be used to describe these properties and model interlocking databases. The CSP approach to compositionality allows us to decompose such models, thus reducing the complexity of analysing safety invariants of SSI geographic data. As such, we describe how the mechanical verification of Solid State Interlocking geographic data, which was previously considered to be an intractable problem for the current generation of mechanical verification tools, is computationally feasible using FDR. Thus, the goals of this thesis are twofold. The first goal is to establish a formal encapsulation of a theory of safety-critical systems based upon the relationship which exists between safety and security. The second goal is to establish that CSP, together with FDR, can be applied to the modelling of Solid State Interlocking geographic databases. Furthermore, we shall attempt to demonstrate that such modelling can scale up to large-scale systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Carter, R. A. "Fire Safety and Security in Schools". University of Canterbury. Civil Engineering, 1999. http://hdl.handle.net/10092/8255.

Texto completo
Resumen
This report examines the historical and present situation in New Zealand regarding school fires and arson. The Ministry of Education has been installing combined security and smoke detection alarm system in schools since 1991 as a measure to protect schools from fire and arson. The costs and benefits of this system are compared to an automatic sprinkler system. The security and smoke detection alarm system provides early warning in the event of a fire. Since the installation of these systems there has been a reduction in the cost of fires. This system is relatively inexpensive compared to an automatic sprinkler system. An automatic sprinkler system provides not only a warning device but also a suppression mechanism that acts to extinguish or control the fire while it is still very small. Water is applied directly to the base of the fire resulting in very little fire damage compared to the major losses in a building protected with a security and smoke alarm detection system. The best strategy to further reduce fire losses in New Zealand schools is to progressively install automatic sprinkler systems in new and existing buildings.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Sajjad, Imran. "Autonomous Highway Systems Safety and Security". DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.

Texto completo
Resumen
Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, there are tools to assess the level of influence a possible attacker can have on such a system, which then describes the level of safety and security. An attacker might attempt to counter the benefits of automation by causing collisions and/or decreasing highway throughput. These strings (platoons) of automated vehicles will rely on control algorithms to maintain required distances from other cars and objects around them. The vehicle dynamics themselves and the controllers used will form the cyber-physical system and its response to an attacker can be assessed in the context of multiple interacting vehicles. While the vehicle dynamics play a pivotal role in the security of this system, the choice of controller can also be leveraged to enhance the safety of such a system. After knowledge of some attacker capabilities, adversarial-aware controllers can be designed to react to the presence of an attacker, adding an extra level of security. This work will attempt to address these issues in vehicular platooning. Firstly, a general analysis concerning the capabilities of possible attacks in terms of control system theory will be presented. Secondly, mitigation strategies to some of these attacks will be discussed. Finally, the results of an experimental validation of these mitigation strategies and their implications will be shown.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Åkerberg, Johan. "On Security in Safety-Critical Process Control". Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Texto completo
Resumen

This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.

The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.

The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.

In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of Security Modules in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.

Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Åkerberg, Johan. "On security in safety-critical process control /". Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Nyström, Oskar. "FIRE SAFETY AND EVACUATION SECURITY IN WIND TURBINES". Thesis, Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83289.

Texto completo
Resumen
I denna rapport sammanställs information om brandsäkerhet och utrymningssäkerhet i vindkraftverk för att dra slutsatser om hur säkerheten skulle kunna förbättras. Orsaken till att detta anses vara ett intressant område för studier är att det är en bransch som snabbt växer och som är extraordinärt ur en utrymningssynpunkt på grund av höjden på dagens kraftverk. Med hjälp av litteraturstudier, en enkät riktad till tekniker inom vindkraftsbransch och intervjuer av både personer inom bransch och från räddningsorganisationer så har information om ämnet samlats in. Med hjälp av personer med dessa mycket olika perspektiv på vindkraft och säkerhet så dras slutsatser om dagens läge och vad som skulle kunna förbättras ur en säkerhetskritisk synvinkel. Vid enkätstudien tillfrågades 32 personer som arbetar i vindkraftverk olika frågor som på ett eller annat sätt berör brand och säkerhet i deras arbetsmiljö. Resultaten från denna enkät tyder på att servicetekniker på kraftverken generellt sett känner sig förhållandevis trygga på sin arbetsplats, men tycker samtidigt att den går att förbättra ur en säkerhetsynpunkt. Något som tas upp är bland annat bristen på brandlarm och automatiska släcksystem i maskinhuset på kraftverken. Båda typer finns på en del kraftverk, men personal på anläggningarna vill i många fall se det på betydligt fler av verken. Utrymning verkar inte vara något som serviceteknikerna oroar sig för, men en rapport från Nanjing Tech Univeristy, RISE, Technical Univeristy of Denmark och Univeristy of Zilina tyder på att utrymning i händelse av brand kan vara problematiskt i vindkraftverk. I rapporten har linorna som är tänkt att användas som en del i utrymningen testats utifrån resultaten i en simulerad brand i maskinhuset. Vid simuleringen användes PyroSim för att simulera brandförlopp där temperaturer kunde tas fram vid olika tider. Dessa temperaturer och tider jämfördes sedan med antändningstemperatur för de linor som används vid utrymning. Resultatet visade att linorna antänds inom den tid som är tänkt för utrymning från vindkraftverket. Stämmer detta kan inte vinschning ses som en alternativ väg för utrymning i händelse av brand. Vid intervjustudien med räddningsorganisationer har fokus legat på släckning av vindkraftverk. De organisationer som deltagit har svarat väldigt lika på dessa frågor. På grund av höjden på kraftverken och den höga brandbelastning som oftast uppstår så har inga släckningsförsök vidtagits vid insatser i vindkraftverk. I stället har räddningsinsatserna fokuserats på att spärra av området kring kraftverket och försökt att minimera brandspridningen till omkringliggande område. Räddningsorganisationer med vindkraftsparker i sitt område verkar ha en god relation med ägare från branschen. Tillsammans utför de båda kontinuerligt övningar inom livräddning på kraftverken tillsammans med båda parter. Dessa övningar är dock inte på något sätt en förberedelse för livräddning vid brand i till exempel maskinhus, utan snarare fokuserade på livräddning vid annan olycka eller sjukdom. Slutsatserna från arbetet är att mer information skulle behövas för att helt kunna utvärdera om brandsäkerheten är tillräcklig i vindkraftverk. Den rapport från 2014 som visar på att utrustningen för vinschning ej tål brand är förvisso alarmerande, men enligt rapporten så krävs ytterligare undersökningar för att kunna dra några mer konkreta slutsatser. Mellan bransch och räddningsorganisationer tycks relationen vara god men de möjligheter som räddningsorganisationer har att släcka eller livrädda personer i brinnande kraftverk är mycket små. Detta medför att i princip allt ansvar inom brand- och utrymningssäkerhet ligger på branschen. Den mest uppenbara åtgärden skulle vara att ställa krav på installation av automatiska släcksystem och brandlarm. Detta är också det som många servicetekniker, vilka är den mest utsatta yrkesgruppen i sammanhanget, efterfrågar.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Matović, Aleksandar. "CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320.

Texto completo
Resumen
Security is widely recognized as an important property that is tightly interdependentwith safety in safety-critical systems. The goal of this thesis is to conduct case studies on the implications that security attacks may have on the safety of these systems.In these case studies, we formally model the design of a robot arm system, verify itssecurity against some potential attack scenarios, propose mitigation techniques andanalyze their effectiveness. In order to achieve a thorough knowledge about the current formal verification approaches and select a proper modeling language/tool, weconducted an extensive literature review. We performed this review following a wellknown approach proposed by Barbara Kitchenham. The procedure and outcomes ofthis review are detailed in this thesis. Based on the literature review, we chose TRebeca, (a timed extension of Rebeca), as the formal language to model the robot armsystem, attack scenarios and mitigation techniques. Rebeca is an actor-based modeling language with a Java-like syntax that is effectively used to model concurrent anddistributed systems. This language is supported by a full-featured IDE called Afra,which facilitates the development of (T)Rebeca models and verification of correctnessproperties (such as safety and security) on them. Among several functions providedby a robot arm system, we chose two important functions i.e., Stand Still Supervisionand Control Error Supervision, which we believe would be interesting for attackerstrying to get control over robot movements. In particular, attackers may maliciouslymanipulate the parameter values of these functions, which may lead to safety issues.In order to find suitable attack scenarios on these functions, we studied the mostimportant security protocols used in safety-critical industrial control systems. Weobserved that these systems are vulnerable to several attacks, and man-in-the-middleattack is among the most successful attacks on these systems. Based on this study,we devised two attack scenarios for each function and modeled them with TRebeca.To mitigate these attacks, we proposed a redundancy technique, whose effectivenesswas also assured by Afra.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Meyers, Tommey H. "Safety risk management for Homeland Defense and Security responders". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMeyers.pdf.

Texto completo
Resumen
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Paul Pitman. Includes bibliographical references (p.55-59). Also available online.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Nkwantabisa, Godfrey K. "The United States Army food safety, security, and protection system". Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/975.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Abdo, Houssein. "Dealing with uncertainty in risk analysis : combining safety and security". Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT113/document.

Texto completo
Resumen
L'analyse des risques est un élément essentiel pour la prise de décision réglementaire liée aux industries à haut risques. Une analyse systématique des risques se compose de trois étapes: (i) l’identification des scénarios indésirables de risque. (ii) l’estimation de la probabilité d'occurrence des scénarios des risques. (iii) le calcul d’effet des conséquences des scénarios de risque identifiés. L'analyse de la vraisemblance et de la gravité s'effectue à l'aide de modèles qui dépendent de plusieurs paramètres d'entrée. Cependant, la fiabilité de l'analyse de risque est limitée grâce à diverses sources d'incertitude. L’incertitude des paramètres, du modèle et d'incomplétude sont les principales sources d'incertitude. L’incertitude de paramètres découle de l'incapacité de définir des valeurs exactes à certains paramètres d'entrée utilisés pour l'analyse de la probabilité et de l’effet. L'incertitude de l’incomplétude provient de ne pas tenir compte de l’ensemble des contributions au risque dans le processus d'identification (certains événements initiateurs sont ignorés). L'incertitude du modèle n'est pas prise en compte dans ce travail. L'INERIS (Institut national de l'environnement industriel et des risques) a développé une approche semi-quantitative d'intervalle pour l’évaluation de la probabilité des risques qui utilise des informations quantitatives si disponibles ou des informations qualitatives, sinon. Cependant, cette approche semi-quantitative d'intervalle présente certains inconvénients en raison de l'incertitude des paramètres. L'information concernant les paramètres d’entrée des modèles d’effets est souvent incomplète, vague, imprécise ou subjective. En outre, certains paramètres peuvent être de nature aléatoire et ont des valeurs différentes. Cela conduit à deux différents types d'incertitude des paramètres. L'incertitude aléatoire dû à la variabilité naturelle. L’autre est l’incertitude épistémique, causée par le manque d'informations, par exemple, une imprécision de mesure. De plus, dans les méthodes d'analyse de risque actuelles, l'étape d'identification est incomplète. Juste les scénarios liés à la sûreté causés par des événements accidentels sont pris en compte durant l’analyse. L'introduction de systèmes connectés et de technologies numériques dans l’Industrie crée de nouvelles menaces de cyber-sécurité qui peuvent entraîner des accidents de sûreté indésirables. Ces événements liés à la cyber-sécurité doivent être pris en compte lors de l'analyse des risques industriels. Cette recherche vise à développer des méthodologies d'analyse d'incertitude pour traiter l'incertitude dans le processus d'analyse de risque de l’INERIS. En d'autres termes, analyser l'incertitude dans l'analyse de la probabilité, l'analyse des effets et l'étape d'identification. Dans ce travail, nous traitons les limites de l'approche semi-quantitative d'intervalle en introduisant la notion de nombres flous au lieu d'intervalles. Les nombres flous sont utilisés pour traiter l'incertitude dans les données d’entrée. Une méthodologie hybride qui traite chaque cause de l'incertitude des paramètres dans l'analyse des effets avec la bonne théorie est développée. La théorie de la probabilité est utilisée pour représenter la variabilité, les nombres flous sont utilisés pour représenter l'imprécision et la théorie d’évidence est utilisée pour représenter l'ignorance, l'incomplétude ou le manque de consensus. Une nouvelle méthodologie d'identification des risques qui considère la sûreté et la sécurité ensemble lors de l'analyse des risques industriels est développée. Cette approche combine Nœud-Papillon (BT), utilisé pour l'analyse de sûreté, avec une nouvelle version étendue de l’arbre d’attaque (AT), introduite pour l'analyse de cybersécurité des systèmes de contrôle industriel. L'utilisation combinée d'AT-BT fournit une représentation exhaustive des scénarios de risque en termes de sûreté et de sécurité
Risk analysis is a critical part for regulatory decision-making related to high-risk risk industries. A systematic risk analysis is made up of three steps: (i) identifying the undesirable risk scenarios. A risk scenario is characterized by referencing to the potential event with its causes and consequences. (ii) Estimating the likelihood of occurrence of risk scenarios. (iii) Calculating the effect of consequences of the identified risk scenarios. Likelihood and effect analysis are carried out with the help of models that depend on several number of input parameters.However, the trustworthiness of risk analysis is limited when inaccuracies in the results can occur, and are due to various sources of uncertainty. Parameter, model and completeness uncertainties are the main sources of uncertainty. Parameter uncertainty arises from the inability to set exact values for certain input parameters used for likelihood and severity analysis. Completeness uncertainty originates from not considering all contributions to risk in the identification process (some initiating events are ignored). Model uncertainty is not considered in this work.The INERIS (French National Institute for Industrial Environment and Risks) has developed an interval semi-quantitative approach that uses both quantitative information if available or qualitative information if not. However, this interval semi-quantitative approach has some drawbacks due to parameter uncertainty.Information regarding model parameters used for effect analysis is often incomplete, vague, imprecise or subjective. Moreover, some of the parameters may be random in nature and have different values. This leads to two different types of parameter uncertainty that need to be accounted for an accurate risk analysis and effective decision-making. Aleatoric uncertainty arises from randomness due to natural variability resulting from the variation of a value in time. Or epistemic uncertainty caused by the lack of information resulting, for example, from measurement errors, subjectivity expert judgment or incompleteness.Moreover, the identification step is incomplete where only safety related scenarios caused by accidental events are considered. The introduction of connected systems and digital technology in process industries creates new cyber-security threats that can lead to undesirable safety accidents. These cyber-security related events should be considered during industrial risk analysis.This research aims to develop uncertainty analysis methodologies to treat uncertainty in the INERIS risk analysis process. In other words, to analyze uncertainty in likelihood analysis, effect analysis and the identification step.In this work, we propose a fuzzy semi-quantitative approach to deal with parameter uncertainty in the likelihood analysis step. We handle the limits of the interval semi-quantitative approach by introducing the concept of fuzzy numbers instead of intervals. Fuzzy numbers are used to represent subjectivity in expert judgments (qualitative data) and covers uncertainty in the quantitative data if this data exists.A hybrid methodology that treat each cause of parameter uncertainty in effect analysis with the right theory is developed. Probability theory is used to represent variability, fuzzy numbers are used to represent imprecision and evidence theory is used to represent vagueness, incompleteness and the lack of consensus.A new risk identification methodology that considers safety and security together during industrial risk analysis is developed. This approach combines Bow-Tie Analysis (BTA), commonly used for safety analysis, with a new extended version of Attack Tree Analysis (ATA), introduced for security analysis of industrial control systems. The combined use of AT-BT provides an exhaustive representation of risk scenarios in terms of safety and security
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Bongiovanni, Ivano. "Assessing vulnerability to safety and security disruptions in Australian airports". Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/95964/1/Ivano_Bongiovanni_Thesis.pdf.

Texto completo
Resumen
In this thesis the potential determinants of organisational vulnerability are explored in Australian airports as complex sociotechnical systems. Findings of this qualitative study highlight that in spite of generally effective practices, attitudes and behaviors executed in the explored aerodromes, the interplay of specific individual, technological and organisational factors may have the potential to lead to sub-optimal performance. Findings of this study provide suggestions on areas for improvement in generally successful safety and security systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Rossi, Fabiana <1982&gt. "Safety, Security And safeguards In GEN IV sodium fast reactors". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/6836/1/Rossi_Fabiana_Tesi.pdf.

Texto completo
Resumen
This work presents first a study of the national and international laws in the fields of safety, security and safeguards. The international treaties and the recommendations issued by the IAEA as well as the national regulations in force in France, the United States and Italy are analyzed. As a result of this, a comparison among them is presented. Given the interest of the Japan Atomic Energy Agency for the aspects of criminal penalties and monetary, also the Japanese case is analyzed. The main part of this work was held at the JAEA in the field of proliferation resistance (PR) and physical protection (PP) of a GEN IV sodium fast reactor. For this purpose the design of the system is completed and the PR & PP methodology is applied to obtain data usable by designers for the improvement of the system itself. Due to the presence of sensitive data, not all the details can be disclosed. The reactor site of a hypothetical and commercial sodium-cooled fast neutron nuclear reactor system (SFR) is used as the target NES for the application of the methodology. The methodology is applied to all the PR and PP scenarios: diversion, misuse and breakout; theft and sabotage. The methodology is applied to the SFR to check if this system meets the target of PR and PP as described in the GIF goal; secondly, a comparison between the SFR and a LWR is performed to evaluate if and how it would be possible to improve the PR&PP of the SFR. The comparison is implemented according to the example development target: achieving PR&PP similar or superior to domestic and international ALWR. Three main actions were performed: implement the evaluation methodology; characterize the PR&PP for the nuclear energy system; identify recommendations for system designers through the comparison.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Rossi, Fabiana <1982&gt. "Safety, Security And safeguards In GEN IV sodium fast reactors". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/6836/.

Texto completo
Resumen
This work presents first a study of the national and international laws in the fields of safety, security and safeguards. The international treaties and the recommendations issued by the IAEA as well as the national regulations in force in France, the United States and Italy are analyzed. As a result of this, a comparison among them is presented. Given the interest of the Japan Atomic Energy Agency for the aspects of criminal penalties and monetary, also the Japanese case is analyzed. The main part of this work was held at the JAEA in the field of proliferation resistance (PR) and physical protection (PP) of a GEN IV sodium fast reactor. For this purpose the design of the system is completed and the PR & PP methodology is applied to obtain data usable by designers for the improvement of the system itself. Due to the presence of sensitive data, not all the details can be disclosed. The reactor site of a hypothetical and commercial sodium-cooled fast neutron nuclear reactor system (SFR) is used as the target NES for the application of the methodology. The methodology is applied to all the PR and PP scenarios: diversion, misuse and breakout; theft and sabotage. The methodology is applied to the SFR to check if this system meets the target of PR and PP as described in the GIF goal; secondly, a comparison between the SFR and a LWR is performed to evaluate if and how it would be possible to improve the PR&PP of the SFR. The comparison is implemented according to the example development target: achieving PR&PP similar or superior to domestic and international ALWR. Three main actions were performed: implement the evaluation methodology; characterize the PR&PP for the nuclear energy system; identify recommendations for system designers through the comparison.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Noonan, Daniel Richard. "Security through Design in the Public Environment". Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/51592.

Texto completo
Resumen
The following thesis project is an investigation in the topic of security through design. The study sought a site and program susceptible to attack in the public environment in order to design an appropriate response to the inherent tension from those attributes. The work represents an architectural reaction to the engineered assessments and solutions that permeate the post 9/11 world. The seemingly indiscriminate deployment of bollards, planters, and jersey barriers choke the representation of openness and freedom as well as the perception of safety from contemporary cities and buildings. My personal design approach attempts to re-present a constraint through the experience of a user to celebrate the inherent potential of that perceived limitation. The presented solution has embraced security and other "limiting" considerations in the dialogue of design beyond base utilitarian functions. Acknowledging "security through design" solutions in this context requires consideration of various building archetypes and particular sites as independent design variables. The vehicle for this research was found as an institute to counter terrorism located in the Washington D.C. region.
Master of Architecture
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Doyle, Maria. "FEELINGS OF SAFETY : Feelings of Safety In The Presence Of the Police, Security Guards and Police Volunteers". Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35885.

Texto completo
Resumen
Uniformed presences are thought to create feelings of safety in people. However, do different uniformed people contribute to the same amount of safety and are there differences dependent on the situation? The present study examined the association between various types of uniformed presence and people’s feelings of safety through a questionnaire among 352 respondents (18-86 years) (49.1 % women). The questionnaire contained pictures of relatively safe and unsafe situations with or without uniformed presence. The respondents estimated how safe they thought they would feel in these situations with and without two police officers, six police officers, a police car, two security guards, or two police volunteers. The results showed that uniformed presence does not increase feelings of safety in an already relatively safe situation, making patrol unnecessary. In relatively unsafe situations however, all types of uniformed presence increase feelings of safety. Foot patrolling police increased feelings of safety the most. Security guards and police volunteers created approximately the same amount of safety; making police volunteers a cost-effective alternative, although some situation, gender and age differences were found. All types of foot patrol were better than vehicle patrol (with some gender differences), making non-police groups an alternative to vehicle patrol.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Perez, Huertas Daniel. "Cyber-Security and Safety Analysis of Interconnected Water Tank Control Systems". Thesis, KTH, Reglerteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-55972.

Texto completo
Resumen
Over the last few years, wireless sensor networks have become an interesting tool for controlling processes. Their use in this field has significantly increased based on recent technological advances which permit higher computational power, smaller size and lower cost. This makes them very suitable for integration in large networks of hundreds of interconnected motes that work together being spread in huge areas. However, the wireless nature of these systems make them susceptible to remote attacks, for example by hackers. That is, the wireless devices can be externally manipulated to disturb the correct behavior of the process. In some critical facilities, such as, power plants, hospitals, factories using dangerous materials it is very important to ensure the resiliency and safety of the control system even if a hacker takes full control of some wireless nodes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Addy, Naa Adoley. "Aviation : the new order (deregulation, the environment, health, safety and security". Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32791.

Texto completo
Resumen
Various aspects of the airline industry will have to be considered. In determining what the way forward should be, the very essence of airline transport must be laid bare. The industry will have to be classified, does it qualify as a global public good, or is it a mixed public/private commodity? What are the ill effects that this good has yielded as its by products? The aviation industry as a branch of global transportation will be examined in order to classify it. Methods of managing public goods effectively will be briefly considered. Following this will be an analysis of aviation development, the events preceding and following deregulation, the most significant player in the aviation world. Various perspectives and forms of regulation will be considered. References will be made to strict government regulation, deregulation and self regulation. This will lead to a consideration of other matters pertinent to the aviation industry e.g. health, safety, security, environmental aspects and how these should be managed. (Abstract shortened by UMI.)
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Shajkovci, Ardian. "Radicalization and Safety and Security in the Balkans: An Ethnographic Study". ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1864.

Texto completo
Resumen
Much of the academic discussion on the topic of radicalization and terrorism in the Balkans has been centered on the conditions and the processes by which individuals become radicalized and indoctrinated, even to a point of engaging in violence. Comparatively speaking, this ethnographic research addressed the factors that prompt Kosovo's Muslim extremists, a small number of them engaged in the conflict, to disengage from terrorist groups fighting in the Syrian and the Iraq conflict. Data were collected from 12 government officials with direct knowledge on the issue of disengagement from terrorist groups in Iraq and Syria. Cognitive dissonance theory served as the theoretical framework for this ethnographic study, while the conceptual framework was built around social, psychological, and physical factors associated with disengagement from terrorism. Interviews served as primary methods of data collection. The content analysis technique was applied to identify emergent themes. The findings highlighted the crucial role of psychological and social factors in individuals' decision to abandon terrorist organizations engaged in the Iraq and the Syrian conflict. The findings also suggested that affecting ideological values of extremists or terrorist groups may not be sufficient. Recommendations include incorporating a combination of â??softâ?? and â??hardâ?? power measures in addressing the issue of disengagement from terrorist groups. The findings generated from this study may inform the development of more efficient counter-radicalization and counterterrorism policies in Kosovo and the Balkans in general. The findings may also add value to the global literature on disengagement from terrorism.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Lang, Martin. "Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems". Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18235.

Texto completo
Resumen
Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. As a solution for this,Ethernet was suggested. However, Ethernet is a ’best effort’ protocol which cannot be considered reliable. To solve that issue, specific implementations weredone to create Automotive Ethernet. However, the out-of-the-box vulnerabil-ities from Ethernet persist and need to be mitigated in a way that is suitableto the automotive domain. Objectives.This thesis investigates the vulnerabilities of Ethernet out-of-the-box and identify which vulnerabilities cause the largest threat in regard tothe safety of human lives and property. When such vulnerabilities are iden-tified, possible mitigation methods using security measures are investigated.Once two security measures are selected, an experiment is conducted to see ifthose can manage the latency requirements. Methods.To achieve the goals of this thesis, literature studies were conductedto learn of any vulnerabilities and possible mitigation. Then, those results areused in an OMNeT++experiment making it possible to record latency in a sim-ple automotive topology and then add the selected security measures to get atotal latency. This latency must be less than 10 ms to be considered safe in cars. Results. In the simulation, the baseline communication is found to take1.14957±0.02053 ms. When adding a security measure latency, the total dura-tion is found. For Hash-based Message Authentication Code (HMAC)-SecureHash Algorithm (SHA)-512 the total duration is 1.192274 ms using the up-per confidence interval. Elliptic Curve Digital Signature Algorithm (ECDSA)- ED25519 has the total latency of 3.108424 ms using the upper confidenceinterval. Conclusions. According to the results, both HMAC-SHA-512 and ECDSA- ED25519 are valid choices to implement as a integrity and authenticity secu-rity measure. However, these results are based on a simulation and should beverified using physical hardware to ensure that these measures are valid.
Bakgrund.Som en påföljd av den digitala eran, så har fordon blivit digitalis-erade i ett hastigt tempo. Självkörande bilar och kraftfulla infotainmentsys-tem är bara några få av förändringarna som sker med bilarna. Dessa systemkräver att mer information skickas genom fordonets nätverk. För att nå dessahastigheter föreslogs Ethernet. Dock så är Ethernet ett så kallat ’best-effort’protokoll, vilket inte kan garantera tillförlitlig leverans av meddelanden. För attlösa detta har speciella tillämpningar skett, vilket skapar Automotive Ethernet.Det finns fortfarande sårbarheterna av Ethernet kvar, och behöver hanteras föratt tillämpningen skall vara lämplig för fordonsindustrin. Syfte.Denna studie undersöker vilka sårbarheter som finns i Ethernet ’out-of-the-box’ och identifierar vilka sårbarheter som har värst konsekvenser urperspektivet säkerhet för människor och egendom. Två säkerhetsimplementa-tioner väljs ut för att se över vidare de kan användas för kommunikation i bilar. Metod.För att nå arbetets mål, så genomfördes en literaturstudie för attundersöka sårbarheter och potentiella motverkningar. Studiens resulat använ-des sedan i en simulering för att kunna mäta fördröjningen av en enkel topologii en OMNeT++miljö. Sedan addera den tiden med exekveringstiden för säker-hetsimplementationerna för att få en total fördröjning. Kommunikationstidenmåste vara mindre än 10 ms för att räknas som säker för bilar. Resultat.I simuleringen, så ger mätningarna en basal kommunikation på1.14957±0.02053 ms. När säkerhetsimplementationerna tillsätts så får manden totala kommunikationstiden. För HMAC-SHA-512 mäts den totala kom-munikationstiden till 1.192274 ms genom att använda den övre gränsen av kon-fidensintervallet. För ECDSA - ED25519 mäts tiden till 3.108424 ms. Slutsatser.Enligt resultaten så är både HMAC-SHA-512 och ECDSA - ED25519möjliga alternativ för integritets- och äkthetstillämpningar i fordorns kommu-nikation. Dessa resultaten är dock framtagna ur en simulering och bör verifierasmed hjälp av fysisk hårdvara så mätningarna är sanningsenliga.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

ROCCA, LUCA. "IEC 61850: a safety and security analysis in industrial multiprotocol networks". Doctoral thesis, Università degli studi di Genova, 2019. http://hdl.handle.net/11567/944847.

Texto completo
Resumen
Nowadays, Ethernet is the most popular technology in digital communication thanks to its flexibility and worldwide spread. This is the reason why the main industrial communication protocols today are based on Ethernet. Everybody says that Ethernet supports a large amount of different protocols, but only accurate laboratory tests can make this assumption true. Tests are performed on a hybrid network using three protocols: Profinet, IEC 61850 and TCP/IP. The combination of these three protocols represents an ideal industrial application where process automation, substation automation and general purpose data sharing interact. However, a shared network can be the cause of a drop in terms of safety and security in the industrial plant network. Safety has always played an important role in the life of human beings and the environment. The safety of process control systems is standardized in IEC 61508 and IEC 61784-3, but this is not the same in the area of substation automation system. Several tests are performed to prove if IEC 61850 (the standard protocol for substation automation) meets the requirements stated in IEC 61508 and if it can be used for safety-related functions. Security issues for industrial plants have become increasingly relevant during the past decade as the industry relied more and more on communication protocols. This work examines the security issues for IEC 61850 addressed by IEC 62351-6 providing a deepening for a secure GOOSE communication. The major issue implementing such a standard remains the computational power requested by the SHA algorithm in low-powered devices. As no manufacturer has made available a device implementing secure GOOSE communication yet, this solution is discussed only from a theoretical point of view. After that, it is presented a security test on the GOOSE communication during which the security issues of such a communication are exploited. This test aims to show what consequences may occur when a packet artfully created is injected within the IEC 61850 network. In the last part of this section, some countermeasures to mitigate such an issue are provided.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Al-Mulla, Khalil I. "Stress Reduction Strategies for Improving Private Security Officer Performance". Thesis, Walden University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13427945.

Texto completo
Resumen

The impact of occupational stress on employees' health and work performance costs U.S. companies $300 billion annually; work-related stress is an issue for private security organizations all over the world. The purpose of this single case study was to explore strategies private security organizational leaders used to mitigate private security officers' occupational stress. The study participants were 4 leaders of a private security organization in Bahrain who had a minimum of 5 years of experience in the private security field and had addressed occupational stress successfully. The human capital theory was the conceptual framework used for this study. Data were collected using semistructured interviews and review of archival documents. Yin's 5-step data analysis plan was applied to the data to generate 4 themes: private security occupational stressors, occupational stress reduction practices, leaders-officers open communication, and health protection policies. The identification and development of job stressor mitigation strategies has multiple implications for positive social change including protecting employees' well-being and increasing their working performance, productivity, and business success. Improving work performance and productivity produces opportunities for employment and supports economic growth and community goodwill. The practices of a successful organization positively influence the society by providing jobs and capital investments, which can improve the quality of life in the community.

Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Waters, Joanna. "Perceptions of personal safety on university campuses". Thesis, University of South Wales, 2006. https://pure.southwales.ac.uk/en/studentthesis/perceptions-of-personal-safety-on-university-campuses(34446044-5628-4879-903d-318cf291b304).html.

Texto completo
Resumen
Recent research in the United Kingdom has indicated that many students experience high levels of fear of crime and victimisation on university campuses. Furthermore, research has recognised that positive feelings of safety can be engendered through changes to the physical environment of the campus. However, existing campus safety research focuses predominantly on student vulnerability and relies typically on quantitative methodologies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Acharya, Gautam. "Legal aspects of aviation security measures taken at airports". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.

Texto completo
Resumen
Aviation and the internet are two conveniences without which the modern world would almost grind to a halt given our current dependence levels (on them). If both were to suddenly vanish, mankind would be thrown back to the late 19th century reminiscent of a world which was once a smaller place.
Aviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Tang, Man-chung y 鄧文聰. "A study of aviation security requirement for Hong Kong". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/199868.

Texto completo
Resumen
In view of the 911 terrorist incident plus various cases regarding undeclared dangerous goods were happened, tightening security measure on air cargo was adopted by different governments. Additional requirement of cargo screening would involve extra cost and thus the competitiveness of Hong Kong in the industry may weaken. Concern about that the compliance of new security requirement would affect Hong Kong economy and adversely affect the position of Hong Kong International Airport as an international air cargo hub. There are implications of the trend of having tightening of security measures on air cargo in Hong Kong. This study will examine the development of international air cargo security requirement, focusing on the potential solutions and cost implications for Hong Kong air cargo industry. It is expected that the research results will outline the practical solutions and provide a platform for further academic research analysis on providing recommendations to facilitate the aviation security requirement development in Hong Kong.
published_or_final_version
Transport Policy and Planning
Master
Master of Arts in Transport Policy and Planning
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Diepenbrock, Robert G. "Safety and security concerns: perceptions of preparedness of a rural school district". Diss., Wichita State University, 2010. http://hdl.handle.net/10057/3648.

Texto completo
Resumen
School safety and security continues to be a concern in schools throughout the world as it is not a matter of if, but when a crisis will occur. There is a large segment of the population that attends schools in rural settings making preparedness in rural schools a timely topic. The purpose of this study was to examine a Midwestern rural school district to learn the perceptions of how prepared the school‘s staff felt they were for a crisis situation and to compare their perceptions with local emergency responders. A theoretical framework of protection-motivation theory (PMT) was used throughout the study. PMT postulates when sufficient fear exists and a reasonable probability a catastrophic event could occur, then one is motivated toward protection. It was concluded that the school district was well prepared for crisis situations they have faced, but was not prepared for disasters the school district has not faced. The rural school district has an ―it won‘t happen here‖ attitude regarding safety and security and as a result, has not kept crisis plans, training, and drills updated. The last thorough update took place shortly after the Columbine school shooting and subsequently, fear of a similar attack motivated the district to update their comprehensive crisis plan at that time. As that fear has waned, so has the preparedness of the district.
Thesis (Ed.D.)--Wichita State University, College of Education, Dept. of Educational Leadership
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Foster, Nathalie Louise. "The application of software and safety engineering techniques to security protocol development". Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Chung, Jae-woo. "Will you help me : enhancing personal safety and security utilizing mobile phones". Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37389.

Texto completo
Resumen
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2006.
Includes bibliographical references (p. [109]-[110]).
This thesis describes the design and development of a system that is aimed for enhancing safety and security using cellular phones. This system has two main components: a master phone application to assist people who need to take care of their loved ones, and a slave phone application to provide help to care-recipients who need attention from their caregivers. This system applies location awareness (GPS), awareness of social activities (communication activity and proximity with close peers,) and peer-to-peer data communication as its core technologies. There are three sub-components that are implemented the system: First component is for providing a set of information in order to enhance awareness of crime around users' surrounding areas. This component is used to assess risk on users themselves as well as their property. The second component is a sub-system that is dedicated for detecting a possible abnormal transit behavior. Consequently, the system alerts this abnormality to both the system users and their caregivers. Third component detects nearby phone to cultivate social activities with the system user's peers.
(cont.) The purpose of finding contacts is to get remote help from friends of the care-recipients. All the functions provided by the system fall into the gray area in between the state in which care-recipients are completely safe, and that in which care-recipients had an accident severe enough to require help from authorities.
by Jae-woo Chung.
S.M.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Rishko, Andriy y Андрій Рішко. "Aviation safety provision in civil aviation". Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51123.

Texto completo
Resumen
1. ICAO Anual Report on "The State of Aviation Security in the World in 2019. URL: https://www.icao.int/safety/Documents/ICAO_SR_2019_final_web.pdf 2. Convention on International Civil Aviation. Chicago 1944 (ICAO Doc.7300). 3. Safety Guidelines for the Protection of Civil Aviation against Acts of Illegal Intrusion. (ICAO Doc 8973). 4. Moskalenko S.I. Problem of security of aviation security in Ukraine [Scientific article], Kiev, 2017. 3p. 5. Malyarchuk N.V. Homyachenko S.I. Ukraine Civil aviation: Problems of state regulation. URL: http://jrnl.nau.edu.ua/index.php/UV/article/download/8547/10386
The emergence of aviation as a distinguished, independent transport industry took place in the twenties of the twentieth century. However, in the second half of the twentieth century, the network of international air routes covered almost all countries of the world. Operations on modern air transport are characterized by mass (number of transport units and volumes), rhythmic (frequency of traffic units) and adequate complexity. In this regard, there is a need for a rigorous legal mechanism for carrying out air transportation, fixing the obligations and rights of the transport process participants and, most importantly, ensuring a reliable level of security. Aviation security as a scientific field is a relatively new aspect of scientific activity. Aviation security is a state of protection of the sector of civil aviation from threats of external factors associated with the implementation of acts of illegal intrusion. The basis of aviation security is a complex of organizational and legal, financial, technical and scientific-methodological measures that ensure the organization of civil security in the aviation at all its levels.
Виникнення авіації як видатної, незалежної транспортної галузі відбулося у двадцятих роках ХХ століття. Однак у другій половині ХХ століття мережа міжнародних повітряних маршрутів охопила майже всі країни світу. Операції на сучасному повітряному транспорті характеризуються масовістю (кількістю транспортних одиниць та обсягами), ритмічністю (частота одиниць руху) та достатньою складністю. У зв'язку з цим існує потреба у суворому правовому механізмі здійснення повітряних перевезень, фіксації обов'язків та прав учасників транспортного процесу та, що найголовніше, забезпечення надійного рівня безпеки. Авіаційна безпека як науковий напрямок є відносно новим аспектом наукової діяльності. Авіаційна безпека - це стан захисту сектору цивільної авіації від загроз зовнішніх факторів, пов’язаних з виконанням актів незаконного вторгнення. Основою авіаційної безпеки є комплекс організаційно-правових, фінансових, технічних та науково-методологічних заходів, що забезпечують організацію цивільної безпеки в авіації на всіх її рівнях.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Bukelwa, Ngoqo. "The establishment of a mobile phone information security culture: linking student awareness and behavioural intent". Thesis, University of Fort Hare, 2014. http://hdl.handle.net/10353/657.

Texto completo
Resumen
The information security behaviour of technology users has become an increasingly popular research area as security experts have come to recognise that while securing technology by means of firewalls, passwords and offsite backups is important, such security may be rendered ineffective if the technology users themselves are not information security conscious. The mobile phone has become a necessity for many students but, at the same time, it exposes them to security threats that may result in a loss of information. Students in developing countries are at a disadvantage because they have limited access to information relating to information security threats, unlike their counterparts in more developed societies who can readily access this information from sources like the Internet. The developmental environment is plagued with challenges like access to the Internet or limited access to computers. The poor security behaviour exhibited by student mobile phone users, which was confirmed by the findings of this study, is of particular interest in the university context as most undergraduate students are offered a computer-related course which covers certain information security-related principles. During the restructuring of the South African higher education system, smaller universities and technikons (polytechnics) were merged to form comprehensive universities. Thus, the resultant South African university landscape is made up of traditional and comprehensive universities as well as universities of technology. Ordinarily, one would expect university students to have similar profiles. However in the case of this study, the environment was a unique factor which had a direct impact on students’ learning experiences and learning outcomes. Mbeki (2004) refers to two economies within South Africa the first one is financially sound and globally integrated, and the other found in urban and rural areas consists of unemployed and unemployable people who do not benefit from progress in the first economy. Action research was the methodological approach which was chosen for the purposes of this study to collect the requisite data among a population of university students from the ‘second economy’. The study focuses on the relationship between awareness and behavioural intention in understanding mobile phone user information security behaviour. The study concludes by proposing a behaviour profile forecasting framework based on predefined security behavioural profiles. A key finding of this study is that the security behaviour exhibited by mobile phone users is influenced by a combination of information security awareness and information security behavioural intention, and not just information security awareness.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Broman, David. "Safety, Security, and Semantic Aspects of Equation-Based Object-Oriented Languages and Environments". Licentiate thesis, Linköping University, Linköping University, PELAB - Programming Environment Laboratory, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10134.

Texto completo
Resumen

During the last two decades, the interest for computer aided modeling and simulation of complex physical systems has witnessed a significant growth. The recent possibility to create acausal models, using components from different domains (e.g., electrical, mechanical, and hydraulic) enables new opportunities. Modelica is one of the most prominent equation-based object-oriented (EOO) languages that support such capabilities, including the ability to simulate both continuous- and discrete-time models, as well as mixed hybrid models. However, there are still many remaining challenges when it comes to language safety and simulation security. The problem area concerns detecting modeling errors at an early stage, so that faults can be isolated and resolved. Furthermore, to give guarantees for the absence of faults in models, the need for precise language specifications is vital, both regarding type systems and dynamic semantics.

This thesis includes five papers related to these topics. The first paper describes the informal concept of types in the Modelica language, and proposes a new concrete syntax for more precise type definitions. The second paper provides a new approach for detecting over- and under-constrained systems of equations in EOO languages, based on a concept called structural constraint delta. That approach makes use of type checking and a type inference algorithm. The third paper outlines a strategy for using abstract syntax as a middle-way between a formal and informal language specification. The fourth paper suggests and evaluates an approach for secure distributed co-simulation over wide area networks. The final paper outlines a new formal operational semantics for describing physical connections, which is based on the untyped lambda calculus. A kernel language is defined, in which real physical models are constructed and simulated.


Report code: LIU-TEK-LIC-2007:46. On the day of the defence date the status of article IV was: In Progress; The status of article V was: Manuscript.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Roni, Saouma. "Risk Management in the Swedish Hotel Industry : Managing Safety & Security Infra Hospitium". Thesis, Södertörns högskola, Institutionen för ekonomi och företagande, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-9940.

Texto completo
Resumen
The hotel industry prides itself in its welcoming attitude towards its guests by offering hospitality, comfort and privacy. At the same guest safety and security has been argued to be of primary concern in the industry. The aim of this thesis is a) to study how hoteliers develop and implement risk management plans and procedures to ensure safe hotel operations, and b) to study how it is possible to gap the bridge between providing hospitable services, which at the same time are safe and secure. A qualitative, cross-case study has been applied. The study builds on theories composed primarily of established step-by-step risk management processes. In-depth interviews were carried out with four managers at different hotels across Sweden. The study found that the hotel industry in Sweden lacks a common risk management framework for which to implement consistently and coherently. A common framework would enable hotels to embrace risk management and be able to utilize it in their operation. Furthermore, it was found that risk management ought to be integrated in all organizational activities and processes. It should not be an isolated event, but rather implemented on an on-going basis. It is imperative for hoteliers to realize that hospitality is not only related to offering qualitative services, but also that ensuring guests of their safety/security is a major part of the overall service. In addition, providing hospitable services that are safe at the same time necessitates that risk management is implemented consistently by regularly aiming to raise current standard. Hence, continuous improvement ought to be of fundamental importance in any organization that is fully committed to risk management. This thesis, therefore, suggests a model that interlinks risk- and quality management.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Heinrich, Markus [Verfasser], Max [Akademischer Betreuer] Mühlhäuser y Stefan [Akademischer Betreuer] Katzenbeisser. "Security Engineering in Safety-critical Railway Signalling / Markus Heinrich ; Max Mühlhäuser, Stefan Katzenbeisser". Darmstadt : Universitäts- und Landesbibliothek, 2021. http://d-nb.info/1226288804/34.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Appel, Matt Andrew. "Security Control Mechanism for Safety Critical Functions Operating on Automotive Controller Area Network". The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587645195243586.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Yehorova, Victoria y Вікторія Олександрівна Єгорова. "Controllers (PLC) safety (safety relay). Overview. Primary requirements. Features of the application". Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50754.

Texto completo
Resumen
1. When to use multi-function safety relays. URL: https://www.controleng.com/articles/when-to-use-multi-function-safety-relays/ (Last accessed: 18.01.2021). 2. Machine Safety Design: Safety Relays Versus a Single Safety Controller. URL: http://www.stitcs.com/en/Safety/Safety_Relay_vs_Safety_Controller.pdf (Last accessed: 18.01.2021). 3. Safety relay versus safety PLC: safety control architecture. URL: http://www.instrumentation.co.za/article.aspx?pklarticleid=2066 . (Last accessed: 18.01.2021). 4. Evolving from safety relays to safety PLCs. URL: https://www.processonline.com.au/content/safety/article/evolving-from-safety-relays-to-safety-plcs-1508069475 (Last accessed: 18.01.2021).
Many machines and robots require safety circuits to stop all or part of an operation in the event of an emergency event. These safety circuits are typically configured using safety relays, or a safety-rated programmable logic controller (PLC) or other safety-rated controller. One or more multi-function safety relays can often be used to replace many basic single-function safety relays, simplifying installations and saving money. In other cases, multi-function safety relays can be used instead of a safety-rated PLC, resulting in substantial savings while streamlining implementation and maintenance. Most safety relay designs have traditionally used safety relays constructed with internal electromechanical, forceguided relays. The key advantage here is voltage flexibility, as nearly any typical control voltage can be switched. Typical voltages include: 5 V DC,12 V DC, 24 V DC, 120 V AC and 230 V AC. The nominal current at 24 V DC is about 6 amps for a resistive-based load. Contrast this with a safety controller. A safety controller is a solid-state device. This means that its outputs are “transistorized” and only designed to switch 24 V DC at a typical maximum of 2 amps. If you plan on controlling a higher power relay or contactor, then these outputs will work fine. However, if you are using a safety relay to control the final load switching using voltages other than 24 V DC, then this is an important consideration. Safety controllers are typically modular, so safety I/O can be added. The safety I/O expansion modules are either solid-state or electromechanical. If safety controller expansion modules are needed, these costs will be an important consideration. Expansion modules can also be added to a safety relay system.
Багато машин і роботів потребують ланцюгів безпеки, щоб зупинити всю або частину операції у випадку надзвичайної події. Ці схеми безпеки зазвичай конфігуруються з використанням реле безпеки, або програмованого логічного контролера (PLC) з оцінкою безпеки або іншого контролера з оцінкою безпеки. Одне або кілька багатофункціональних реле безпеки часто можна використовувати для заміни багатьох основних однофункціональних реле безпеки, спрощуючи монтаж та заощаджуючи гроші. В інших випадках замість ПЛК із рейтингом безпеки можна використовувати багатофункціональні реле безпеки, що призводить до значної економії при спрощенні впровадження та технічного обслуговування. У більшості конструкцій реле безпеки традиційно використовуються реле безпеки, виготовлені з внутрішніми електромеханічними реле, що керуються силою. Ключовою перевагою тут є гнучкість напруги, оскільки майже будь-яка типова керуюча напруга може перемикатися. Типові напруги включають: 5 В постійного струму, 12 В постійного струму, 24 В постійного струму, 120 В змінного струму та 230 В змінного струму. Номінальний струм при 24 В постійного струму становить близько 6 ампер для резистивного навантаження. Порівняйте це з контролером безпеки. Контролер безпеки – це твердотільний пристрій. Це означає, що його виходи “транзисторовані” і призначені лише для перемикання 24 В постійного струму на типовий максимум 2 ампер. Якщо ви плануєте керувати реле або контактором більшої потужності, тоді ці виходи будуть працювати нормально. Однак, якщо ви використовуєте реле безпеки для управління кінцевим перемиканням навантаження з напругою, відмінною від 24 В постійного струму, то це є важливим фактором. Контролери безпеки, як правило, модульні, тому можна додати введення-виведення безпеки. Модулі розширення вводу-виводу безпеки є або твердотільними, або електромеханічними. Якщо потрібні модулі розширення контролера безпеки, ці витрати будуть важливим фактором. Модулі розширення також можуть бути додані до системи реле безпеки.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Moeller, David K. "A model for future military operations : the effect of state security and human security on strategy /". Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=9c267789-85b9-4963-9298-936e82991d13&rs=PublishedSearch.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Mauwa, Hope. "Information security awareness: generic content, tools and techniques". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/560.

Texto completo
Resumen
In today’s computing environment, awareness programmes play a much more important role in organizations’ complete information security programmes. Information security awareness programmes are there to change behaviour or reinforce good security practices, and provide a baseline of security knowledge for all information users. Security awareness is a learning process, which changes individual and organizational attitudes and perceptions so that the importance of security and the adverse consequences of its failure are realized. Therefore, with proper awareness, employees become the most effective layer in an organization’s security defence. With the important role that these awareness programmes play in organizations’ complete information security programmes, it is a must that all organizations that are serious about information security must implement it. But though awareness programmes have become increasing important, the level of awareness in most organizations is still low. It seems that the current approach of developing these programmes does not satisfy the needs of most organizations. Therefore, another approach, which tries to meet the needs of most organizations, is proposed in this project as part of the solution of raising the level of awareness programmes in organizations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Sadiq, Mazhar. "Modeling the Non-functional Requirements in the Context of Usability, Performance, Safety and Security". Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3246.

Texto completo
Resumen
Requirement engineering is the most significant part of the software development life cycle. Until now great emphasis has been put on the maturity of the functional requirements. But with the passage of time it reveals that the success of software development does not only pertain to the functional requirements rather non-functional requirements should also be taken into consideration. Among the non-functional requirements usability, performance, safety and security are considered important. Further it reveals that there exist so many modeling and testing techniques for functional requirements but the area of non-functional requirements is still deprived off. This is mainly due to difficulty, diversity in nature and hard to express for being domain-specific. Hence emphasis is put to the development of these models or testing techniques. While developing these models or testing techniques it is found that all the four areas of usability, performance, safety and security are not only closely related but rather depend on one another up to some extent. This meant that they all should be tackled while keeping into consideration of the related from among them. For the purpose it seemed necessary to collect in one artefact all the available modeling and testing techniques related to the four core areas of non-functional requirements may be collected and compared. This work at first provides an understanding of the problem domain while describing aspects of the non-functional requirements. Then possibly the available related models or testing techniques are collected and discussed. Finally in the last they are compared with respect to diversified aspects.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Salim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks". Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.

Texto completo
Resumen
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2014.
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
93
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 148-156).
If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eight breaches that each exposed over ten million identities. These breaches were recorded despite the fact that significant resources are expended, on managing cyber security risks each year by businesses and governments. The objective of this thesis was twofold. The first objective was to understand why traditional approaches for managing cyber security risks were not yielding desired results. Second, propose a new method for managing cyber security risks more effectively. The thesis investigated widely used approaches and standards, and puts forward a method based on the premise that traditional technology centric approaches have become ineffective on their own. This lack of efficacy can be attributed primarily to the fact that, Web 2.0 is a dynamic and a complex socio-technical system that is continuously evolving. This thesis proposes a new method for managing cyber security risks based on a model for accident or incident analysis, used in Systems Safety field. The model is called System-Theoretic Accident Model and Processes (STAMP). It is rooted in Systems Thinking and Systems Theory. Based on a case study specifically written for this thesis, the largest cyber-attack reported in 2007 on a major US based retailer, is analyzed using the STAMP model. The STAMP based analysis revealed insights both at systemic and detailed level, which otherwise would not be available, if traditional approaches were used for analysis. Further, STAMP generated specific recommendations for managing cyber security risks more effectively.
by Hamid M. Salim.
S.M. in Engineering and Management
S.M.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Ung, Shuen-Tai. "The development of safety and security assessment techniques and their application to port operations". Thesis, Liverpool John Moores University, 2007. http://researchonline.ljmu.ac.uk/5831/.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Viding, Emmie. "Does Your TV Spy on You? : The security, privacy and safety issues with IoT". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17985.

Texto completo
Resumen
The growth of Internet of Things is steadily increasing, both in Sweden and globally. This relative new technology improves the lives of many; but at the price of their security, privacy and safety. This thesis consists of a literature study and an online survey. It investigates what security, privacy and safety risks Internet of Things devices may bring, how aware people are about these risks, how the user can minimize the risk of being hacked or attacked and what manufacturers can do to make safer Internet of Thing devices. The survey was created based on the risks related to Internet of Things devices which was found during the literature study. It was possible to identify security, privacy and safety risks related to Internet of Things. It was also possible to find answers of how both users and manufacturers can protect their devices from being hacked. The survey showed that there was a correlation between how interested people are in technology and how aware they are of the risks with Internet of Things. Internet of Things can be used to do DDoS attacks, espionage and eavesdropping. People who are interested in technology tends to protect themselves more actively (by changing default password and updating the software) compared to those who are not interested.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Basu, Nandita. "Pedestrian route choice behaviour: Influences of built environment on route preference, safety and security". Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236797/1/Thesis_Nandita%2BBasu_24112022.pdf.

Texto completo
Resumen
Built environment factors influence pedestrian route choice behaviour, but their impact is not well known. This thesis investigates the influences of the built environment factors on walking route preference and safety. By using the ‘Physical Activity through Sustainable Transport Approaches’ framework, this research studied the perceptions and preferences of pedestrian route choice in a typical suburban environment in Australia through a stated preference survey. This thesis has established the interrelationship between safety, security, and built environment factors across men and women pedestrians. The findings highlight increasing land-use diversity and providing adequate trees may improve perceived safety and security among pedestrians.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

SELVATICI, Michele. "Introduction of wireless technology in agricultural and heavy duty vehicles: security and safety issues". Doctoral thesis, Università degli studi di Ferrara, 2018. http://hdl.handle.net/11392/2488003.

Texto completo
Resumen
Wireless technologies have, recently, been introduced in the agricultural vehicles and earth moving machines world. At present day they are used to publish data useful for fleet management, diagnosis and assistance. This introduction has opened a door, on vehicular networks, to the external world. This door, until this moment, has always been secured. In-vehicle networks, in fact, has always been considered intrinsically reliable thanks to the fact of being closed, because not accessible from remote and accessible with difficulties in local. The opening of this door goes to expose the network to cyber-security issues that will be analysed. A comparison will be performed between the need to be protected from external attacks and the requirements that will permit to the networks to continue to be used for safety critical applications. The conclusion of this comparison will be that CAN networks, as used at present day, will not be able to accomplish safety requirements, and, at the same time, the new-born security ones. For this reason a technological leap is necessary in vehicular networks of agricultural world. The successor, designated by several technical committees, is represented by Ethernet-based networks. However, considering the lifetime of agricultural machines, that is of 20-30 years, it will be necessary to have some generations of vehicles with a hybrid CAN/Ethernet network, before CAN network is completely replaced by Ethernet. For this purpose will be illustrated the development of a CAN/Ethernet gateway and, in particular, a TCP-IP/ISOBUS one, that will be able to be used to allow the interaction between the networks. The applications developed up to this moment with wireless technologies in agricultural field are not safety relevant, but the growing request will lead to their use also for applications with functional safety implications. A technology that is particularly attractive for the market is wireless sensor networks. It is not possible to adopt it as is, but it will be necessary to perform a deep study and adequate modifications with the purpose of allowing the compliance to main safety standards. Will be presented the analysis performed on both hardware and software architectures of WSN nodes and will be shown the first prototype realized of wireless node suitable for safety applications. In the end it will be debated the topic of gesture recognition used as HMI for safety relevant applications, analysing a demonstrative system realized using the afore mentioned prototype.
Le tecnologie wireless hanno, di recente, fatto il loro ingresso nel mondo dei mezzi agricoli e movimento terra. Al momento sono utilizzate in applicazioni che prevedono la pubblicazione di dati utili ai fini di gestione della flotta, diagnostica e assistenza. Questa introduzione ha fatto sì che venisse aperta, sulle reti veicolari, una porta verso il mondo esterno. Porta che, fino ad ora, era saldamente chiusa. Le reti veicolari, infatti, sono sempre state considerate intrinsecamente affidabili grazie a questa chiusura, in quanto non accessibili da remoto e difficilmente accessibili in locale. L’apertura di questa porta va ad esporre a problemi di cyber-security che verranno analizzati. Verranno confrontati i requisiti derivanti dalla necessità di proteggersi da attacchi esterni con quelli necessari alle reti per continuare a far girare applicazioni safety critical. La conclusione di questo confronto è che la rete CAN utilizzata oggi giorno, non riuscirà a continuare a sopperire ai requisiti di safety, iniziando, contemporaneamente, a sopperire ai neonati requisiti di security. Per questa ragione si rende necessario una salto tecnologico nelle reti veicolari del mondo agricultural. Il successore, designato da diversi comitati tecnici, è rappresentato da reti Ethernet. Tuttavia, considerato il tempo di vita dei mezzi agricoli che è di 20-30 anni, si pone la necessità di avere alcune generazioni di veicoli con rete ibrida CAN/Ethernet, prima che Ethernet soppianti completamente la rete CAN. A tal scopo viene illustrato lo sviluppo di un gateway CAN/Ethernet, e, in particolare, TCP-IP/ISOBUS, che potrà essere usato per consentire l’interazione tra le due reti. Le applicazioni fino ad ora sviluppate in ambito agricolo sfruttando tecnologie wireless non sono safety relevant, ma, la sempre crescente richiesta del wireless, porterà a rendere necessario il loro utilizzo anche in applicazioni con implicazioni di functional safety. Una tecnologia particolarmente appetitosa per il mercato è quella delle Wireless Sensor Networks. Non è possibile adottarla così com’è, ma è necessario effettuare un approfondito studio e delle accurate modifiche con lo scopo di permettere la rispondenza ai principali standard di safety. Verrà presentata l’analisi effettuata sulle architetture hardware e software dei nodi WSN e verrà mostrato il primo prototipo di nodo wireless adatto per applicazioni di safety. Verrà poi trattato il tema della gesture recognition come HMI per applicazioni safety relevant, analizzando un sistema dimostrativo realizzato sfruttando il suddetto prototipo.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

PUGLISI, DANIEL. "PREBREEDING OF MAIZE TRADITIONAL FARMERS¿ VARIETIES AND THEIR BIOFORTIFICATION FOR FOOD SAFETY AND SECURITY". Doctoral thesis, Università degli Studi di Milano, 2019. http://hdl.handle.net/2434/616805.

Texto completo
Resumen
Maize is the main cereal grain cultivated worldwide (Zea mays L. ssp. mays), and alone is responsible for providing 15% of the protein and 20% of the calories in the human diet supplying an energy density of 365 Kcal/100 g. Maize is a good source of starch and protein; it also provides lipids, macronutrients, micronutrients and fiber. Maize has a matrix rich in organic compounds and minerals with potential benefits to health. Human nutrition remains one of the main uses, being a staple food for poor populations and determining the selection of varieties for producing many typical dishes such as polenta in Italy and pap in South Africa. Maize still represents a staple food for many populations: maize tortillas provide about 50%-65% of human energy intake in Peru, Bolivia, and in rural areas of Mexico; in Africa are located 16 among the 22 countries in which corn represents the main source of energy in the diet. In Sub-Saharian countries, maize consumption is comparable to that of rice in Asia. In poor regions of the word nutrient deficiency (Zn, Fe and vitamin A) has a relevant role in child and adult mortality. In particular vitamin A deficiency ranks in top position among factors contributing to blindness, and affect cognitive development in children Thus, while productivity remains the major target for breeders, focusing on grain quality, could be reduced deficiencies of some minerals and provitamin A increasing the concentration of functional compounds and the nutritional value in particular for poor populations that use maize as staple food. Bio-fortification programs could be useful for rich countries where in the last years the attention for nutrigenomic and the demand of gluten-free, vegetarian, vegan and high nutritional value food is growing obtaining products with added value; but mainly for the poor countries where the main goal is to reduce the target population having low intake of these fundamental nutrients. Bio-fortification can use as source of genetic variability landraces and traditional farmers’ varieties. These important genetic sources with their inter-genotypic balance are well-known to have natural variation in important nutraceuticals, which has been lost in several years during the breeding of modern cultivars having a superior nutritional value. Furthermore, in low input system, they present yield stability in response to biotic and a-biotic stresses. In these cases, participatory breeding, involving gene banks and farmers, can have a significant and positive influence ameliorating some negative consequences of modern agriculture and conventional breeding. In order to explore and identify the genetic variability of Italian and European landraces and traditional farmers varieties and to use these in breeding programs, we performed a pre-breeding activity in collaboration with CREA. With this pre-breeding activity we demonstrated the nutritional superiority of ancient varieties if compared with modern hybrids. In particular Spinato di Gandino is the best variety for milling properties and for oil, protein, and total phosphorus content; Storo is the best variety for calorific value and for carotenoids and free phosphorus content, Nero Spinoso is an interesting variety for nutrient amount in general and mainly for phlobaphenes presence. From these varieties we started a bio-fortification program aimed to obtain new synthesis populations with high nutritional value. In particular we focused on Nero Spinoso. Thanks to the high phlobaphenes content and the good nutritional value Nero Spinoso could be considered as functional foods, able to increase the amount of antioxidants introduced in the diet in fact their high antioxidant power suggests effects similar to the ones of the anthocyanins. Moreover these molecules are thought to have an important role in plant’s resistance against different pathogens and are probably involved in flavonoids antifungal activity: phlobaphenes and other flavonoids are thought to harden maize pericarp, acting as a physical barrier against fungal infection and reducing the mycelial progress from a seed to another. For this reason we decided to recover a P1 gene and we introgressed it in different genetic backgrounds of high performance varities finding that P1 could be a regulator gene that leads to an increase of the pericarp thickness, a decrease of fumonisins accumulation and an increase of phlobaphenes concentration in varieties with the same genetic background that are different only for this allele. Starting from here we can enhance the production and cultivation of corn varieties rich in phlobaphenes in areas characterized by a humid and rainy climate. Our pre-breeding activity was carried out also in South Africa where maize us a staple food for the population. There we characterized from the phenotypical and nutritional points of view one white and one yellow South African landrace maize cultivar obtained directly from the farmers in the rural region of Qwa-Qwa (Free State Province). Our data show that there are no nutritional reasons to prefer the white variety for human consumption, with the exception of the large size of the seeds, which make them particularly adapted for milling. In collaboration with the Vaal University of Technology we started a bio-fortification program using the best European varieties in order to increase the nutritional value of the white variety. We will try to improve protein, Fe and carotenoids amount, contributing in this way to tackle the problem of malnutrition in South African rural areas.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Strohmeier, Martin. "Security in next generation air traffic communication networks". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:c5c61de4-ffef-479e-9f49-de38c2a8e9ec.

Texto completo
Resumen
A multitude of wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design and the evolution of wireless security in aviation did not keep up with the state of the art. Recent contributions from academic and hacking communities have exploited this inherent vulnerability and demonstrated attacks on some of these technologies. However, these inputs revealed that a large discrepancy between the security perspective and the point of view of the aviation community exists. In this thesis, we aim to bridge this gap and combine wireless security knowledge with the perspective of aviation professionals to improve the safety of air traffic communication networks. To achieve this, we develop a comprehensive new threat model and analyse potential vulnerabilities, attacks, and countermeasures. Since not all of the required aviation knowledge is codified in academic publications, we examine the relevant aviation standards and also survey 242 international aviation experts. Besides extracting their domain knowledge, we analyse the awareness of the aviation community concerning the security of their wireless systems and collect expert opinions on the potential impact of concrete attack scenarios using insecure technologies. Based on our analysis, we propose countermeasures to secure air traffic communication that work transparently alongside existing technologies. We discuss, implement, and evaluate three different approaches based on physical and data link layer information obtained from live aircraft. We show that our countermeasures are able to defend against the injection of false data into air traffic control systems and can significantly and immediately improve the security of air traffic communication networks under the existing real-world constraints. Finally, we analyse the privacy consequences of open air traffic control protocols. We examine sensitive aircraft movements to detect large-scale events in the real world and illustrate the futility of current attempts to maintain privacy for aircraft owners.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Åhlfeldt, Rose-Mharie. "Information Security in Distributed Healthcare : Exploring the Needs for Achieving Patient Safety and Patient Privacy". Doctoral thesis, Stockholm University, Department of Computer and Systems Sciences (together with KTH), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-7407.

Texto completo
Resumen

In healthcare, patient information is a critical factor. The right information at the right time is a necessity in order to provide the best possible care for a patient. Patient information must also be protected from unauthorized access in order to protect patient privacy. It is furthermore common for patients to visit more than one healthcare provider, which implies a need for cross border healthcare and continuity in the patient process.

This thesis is focused on information security in healthcare when patient information has to be managed and communicated between various healthcare actors and organizations. The work takes a practical approach with a set of investigations from different perspectives and with different professionals involved. Problems and needs have been identified, and a set of guidelines and recommendations has been suggested and developed in order to improve patient safety as well as patient privacy.

The results show that a comprehensive view of the entire area concerning patient information management between different healthcare actors is missing. Healthcare, as well as patient processes, have to be analyzed in order to gather knowledge needed for secure patient information management.

Furthermore, the results clearly show that there are deficiencies both at the technical and the administrative level of security in all investigated healthcare organizations.

The main contribution areas are: an increased understanding of information security by elaborating on the administrative part of information security, the identification of information security problems and needs in cross border healthcare, and a set of guidelines and recommendations in order to advance information security measures in healthcare.

Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Benner, Andrea, James McDonald y Abderrahim Sallak. "Towards a Sustainable Maritime Transport Corridor : How Could Security and Safety Help Attain This Goal ?" Thesis, Blekinge Tekniska Högskola, Avdelningen för maskinteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3207.

Texto completo
Resumen
In a fast moving world where maritime transport corridors play a major role in the movement of people and goods, there are significant sustainability issues with these operations. This paper considers the sustainability of these corridors and the contribution of security and safety measures to achieve sustainability. The research commences with a literature review and practitioner survey on sustainability, security and safety of maritime transport, then develops the analysis using the Framework for Strategic Sustainable Development (FSSD) and causal loop diagrams to analyze and evaluate measures and actions that could lead towards a sustainable maritime transport corridor - education and training, energy alternatives, waste management, dematerialization, efficient land and sea use, standardized operations between ports and community engagement. The Baltic Transport Corridor is used for analysis. Further recommendations are made in order to facilitate the path for future research and study.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Åhlfeldt, Rose-Mharie. "Information security in distributed healthcare : exploring the needs for achieving patient safety and patient privacy /". Kista : Department of Computer and Systems Sciences, Stockholm University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-7407.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Enoma, Norman Aghahowa. "Developing key performance indicators for airport safety and security : a study of three Scottish airports". Thesis, Heriot-Watt University, 2008. http://hdl.handle.net/10399/2147.

Texto completo
Resumen
This study focused on the role of Facilities Management (FM) in improving safety and security at the airport and the link between FM and design, so the greatest attention was paid to the safe and secure management of the facilities rather than customers or passengers. Data collection centred on the management and staff of the case study airport and experts in the field of facilities management and aviation with a focus upon safety and security. The study initially concentrated on the role of Facilities Management (FM) at the design stage and the implications for the management at the operations stage but later the research focus shifted to the role of FM in the management of the airport, in particular airport safety and security. In studying airports, all areas of the aerodrome and the facilities used by the airport and aircraft formed the central focus of the study. Off airport installations such as fuel depot, power station, aircraft waste facility were referred to where necessary when they impaired upon safety procedures. The philosophy of performance measurement was also a key focus of the research study; this study differs from previous studies, as it concentrates on looking at how FM impacts upon airport performance in relation to safety and security. The rationale behind the focus on Scottish airports was the logistics to accessing key people at each airport and collecting relevant data in conjunction with the belief that to some extent operating procedures will be similar across the world in terms of the security and safety function. A more international perspective is perhaps an additional research activity for the future and was outside the scope of the current project. The methodology for this study is a case study of three Scottish airports, which are owned and operated by the BAA Scotland (Glasgow, Edinburgh and Aberdeen international airports). Data was also collected from Civil Aviation Agency, analysed and presented in this study. Evidence in this thesis supports the conclusion that planning for airport safety and security is airport specific because no two airports are exactly the same; they differ in sizes, mode of operations, passenger type and flight destinations. In addition this is the very first survey that developed and tested a list of potential KPIs for airport safety and security, which forms part of the researchers’ original contribution to knowledge.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Letwaba, Joseph. "The safety and security of tourists with reference to the Sebideng District Municipality / J. Letwaba". Thesis, North-West University, 2008. http://hdl.handle.net/10394/2654.

Texto completo
Resumen
The government of South Africa in the White Paper on Tourism recognises the importance of attracting foreign investment in order to achieve the growth and development objectives of the tourism sector. Foreign investment will increase competition and improve standards as well as create employment and facilitate economic growth. The government should establish a climate of political stability, economic growth and profitability, and provide transparent, stable and consistent policies to attract foreign investment. Crime in South Africa is high and widely believed to restrain investment. The South African White Paper on Tourism has categorically and succinctly stipulated policy guidelines to ensure that tourists are maximally safe and secure. The traditional response to rising crime has been to devote more resources to law enforcement and to introduce tougher penalties in the hope of deterring offenders from committing further crimes. For the purpose of the study, the hypothesis was formulated that the safety and security policy for sustainable development does not necessarily provide a solution to crime and further proactive measures need to be implemented to promote tourism in Sedibeng District Municipality. This study will focus on; strategies for preventing crime in the Sedibeng District Municipality. It is recognised that such policies may need to go beyond the traditional concerns of the criminal justice system (i.e. police, the courts and prisons) if crime prevention is to be addressed in a comprehensive way. Combating crime has been tackled in various ways throughout the world, with some strategies being more successful than others. With the process of formulating a National Crime Prevention Strategy (NCPS) high on South Africa's agenda, the wealth of international experience in crime prevention cannot be ignored. Research, monitoring and objective evaluation of crime policies and programmes, aimed at ensuring that limited financial resources are used most effectively, is a significant contribution which criminologists can make to the policy-making process.
Thesis (M. Development and Management)--North-West University, Vaal Triangle Campus, 2009.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

MORTARI, Serena. "Sicurezza e disabilità nell'impresa: formazione e prevenzione. La strategia formativa della personalizzazione per una cultura della sicurezza inclusiva in azienda". Doctoral thesis, 2011. http://hdl.handle.net/11562/349447.

Texto completo
Resumen
Dall’analisi della letteratura emerge una grave lacuna: da quando è stato stabilito l’obbligo per le aziende di assumere persone con disabilità (L. 482/68 in seguito abrogata dalla 68/99), in Italia non si sono mai compiuti studi sulla gestione della sicurezza di questi lavoratori. All’estero le ricerche risultano scarse e frammentarie, nonostante si evidenzi una maggiore attenzione al tema. Il punto critico della gestione della sicurezza sul lavoro, con particolare riferimento alla questione di nostro interesse, è la mancanza di un approccio unitario e interdisciplinare alle due tematiche disabilità e sicurezza. In uno scenario in continuo mutamento da un punto di vista tecnologico e con l’emergere di nuovi aspetti della sicurezza come la privacy e la security, i datori di lavoro e i responsabili della sicurezza si trovano spesso impreparati all’inserimento di un lavoratore con disabilità per difficoltà sia organizzative che strutturali. La ricerca che viene presentata è suddivisa in due studi. L’obiettivo del primo studio è l’individuazione delle criticità della relazione disabilità - sicurezza sul lavoro; in particolare si intende rilevare in che modo le aziende osservano gli obblighi di accessibilità, di informazione e formazione, di valutazione del rischio e di gestione delle emergenze. Si è predisposta un’indagine conoscitiva con la somministrazione di questionari di tipo quanti-qualitativo rivolti ai lavoratori con disabilità e ai dirigenti d’azienda. Sono stati raccolti e analizzati complessivamente 118 questionari. Un ulteriore step della ricerca ha previsto la raccolta di 4 interviste semi – strutturate a lavoratori con disabilità che spontaneamente ci hanno contattato per avere maggiori informazioni e per dare la loro disponibilità per ulteriori indagini. Questo ci ha permesso di approfondire alcune tematiche emerse dai questionari come particolarmente interessanti. Per quanto riguarda il secondo studio l’obiettivo è verificare se la personalizzazione dell’intervento formativo per i lavoratori con disabilità e i responsabili della sicurezza è funzionale alla promozione della cultura della sicurezza in azienda in considerazione delle problematiche specifiche legate alla disabilità. Si è progettato e attivato un percorso formativo personalizzato per 4 lavoratori con disabilità e 3 dirigenti – responsabili della sicurezza. Si è compiuta un’attenta analisi aziendale studiando documenti come il DPS, il DVR e il Bilancio Sociale e si è fatto uso dello strumento dell’intervista semistrutturata e di un test di ingresso per individuare i bisogni formativi. La valutazione dei risultati dell’attività formativa è stata compiuta sia ex post con l’utilizzo di test di uscita e di interviste semistrutturate, sia in itinere per monitorare ed eventualmente ricalibrare il corso, utilizzando diari e momenti di discussione.
Analysing the existing literature on this subject a serious gap emerges: ever since the obligation for companies to employ people with disability was introduced in Italy (by Law no. 482/68, later revoked by Law no. 68/99), no studies on the management of these workers’ security & safety have been carried out. In other countries, although research on the same subject is limited and incomplete, the issue seems to draw more attention. The crucial point in managing workplace security & safety, with specific reference to our subject, is the lack of a unitary and interdisciplinary approach to both disability and security & safety. In an ever-changing technological scenario, and with new aspects to security & safety continuously emerging – such as privacy – employers and security & safety managers are often unprepared to employ a worker with disability due to both organizational and structural problems. This investigation is divided into two different studies. The aim of the former is to identify the critical points in the ‘disability-workplace safety & security’ relation. In particular, it intends to examine how companies meet their accessibility, information, training, risk assessment and emergency management obligations. To this end, a quantity-quality survey has been designed and administered to both workers with disability and company managers. 118 questionnaires were collected and analysed. Another step in the research included administering 4 semi-structured interviews to workers with disability who contacted us spontaneously for information and made themselves available for further investigations. This allowed us to deal more thoroughly with some issues that emerged from the questionnaires as particularly interesting. The second study’s aim is to check whether the customization of the training for workers with disability and security & safety managers is functional to the promotion of security & safety culture in the workplace as applied specifically to disability issues. A customized training course for 4 workers with disability and 3 security & safety managers was developed. A careful company analysis was performed, considering documents such as social accounting, risk assessment form and security policy document, and using tools like semi-structured interviews and entrance tests to identify the training needs. The evaluation of the training’s results was carried out both ex post, using exit tests and semi-structured interviews, and in itinere, to monitor and – if necessary – fine-tune the course, by using classroom journals and discussions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía