Littérature scientifique sur le sujet « Security e safety e disabilità »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Security e safety e disabilità ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Security e safety e disabilità"
Boardman, Jed. « Dismantling the social safety net : social security reforms, disability and mental health conditions ». BJPsych Bulletin 44, no 5 (17 juillet 2020) : 208–12. http://dx.doi.org/10.1192/bjb.2020.79.
Texte intégralPurnomo, Agung, Yuly Peristiowati et Agusta Dian Elina. « Dimension of Patient Safety Culture ». Interdisciplinary Social Studies 1, no 3 (20 décembre 2021) : 193–202. http://dx.doi.org/10.55324/iss.v1i3.35.
Texte intégralMiller, John. « Resuscitating Private Social Security Accounts : Countering Inequality With Panic and Prevarication ». NEW SOLUTIONS : A Journal of Environmental and Occupational Health Policy 30, no 1 (3 février 2020) : 52–56. http://dx.doi.org/10.1177/1048291120905081.
Texte intégralPrakoso, Gilang Dwi, et Mohammad Zainal Fatah. « ANALISIS PENGARUH SIKAP, KONTROL PERILAKU, DAN NORMA SUBJEKTIF TERHADAP PERILAKU SAFETY ». Jurnal PROMKES 5, no 2 (26 février 2018) : 193. http://dx.doi.org/10.20473/jpk.v5.i2.2017.193-204.
Texte intégralOlney, Marjorie F. « Caught in a Social Safety Net : Perspectives of Recipients of Social Security Disability Programs on Employment ». Journal of Applied Rehabilitation Counseling 38, no 2 (1 juin 2007) : 5–13. http://dx.doi.org/10.1891/0047-2220.38.2.5.
Texte intégralJosé G. Hernández R., María J. García G. et Gilberto J. Hernández G. « Safety and Attention of Passengers With Disabilities Who Travel by Train ». International Journal of Sustainable Entrepreneurship and Corporate Social Responsibility 7, no 1 (janvier 2022) : 1–16. http://dx.doi.org/10.4018/ijsecsr.287867.
Texte intégralBarreto de Miranda, Cristiano, Amanda Gonçalves Simões, João Silvestre Silva-Junior et Frida Marina Fischer. « Temporal trend of social security disability benefits due to musculoskeletal disorders from 2008 to 2018 in Brazil ». Safety and Health at Work 13 (janvier 2022) : S152. http://dx.doi.org/10.1016/j.shaw.2021.12.1227.
Texte intégralDaigle, Megan, Sarah Martin et Henri Myrttinen. « ‘Stranger Danger’ and the Gendered/Racialised Construction of Threats in Humanitarianism ». Journal of Humanitarian Affairs 2, no 3 (1 septembre 2020) : 4–13. http://dx.doi.org/10.7227/jha.047.
Texte intégralAri, Ajeni, Maria Chiara Leva, Lorraine D’Arcy et Mary Kinahan. « Fairness and Inclusion for Users of Surface Transport—An Exploratory Thematic Study for Irish Users ». Sustainability 14, no 11 (25 mai 2022) : 6480. http://dx.doi.org/10.3390/su14116480.
Texte intégralWillets, Laura, Paul Mooney et Nicholas Blagden. « Social climate in Learning Disability services ». Journal of Intellectual Disabilities and Offending Behaviour 5, no 1 (4 mars 2014) : 24–37. http://dx.doi.org/10.1108/jidob-10-2013-0025.
Texte intégralThèses sur le sujet "Security e safety e disabilità"
Simpson, Andrew C. « Safety through security ». Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Texte intégralCarter, R. A. « Fire Safety and Security in Schools ». University of Canterbury. Civil Engineering, 1999. http://hdl.handle.net/10092/8255.
Texte intégralSajjad, Imran. « Autonomous Highway Systems Safety and Security ». DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.
Texte intégralÅkerberg, Johan. « On Security in Safety-Critical Process Control ». Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Texte intégralThis Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.
The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.
The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.
In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of Security Modules in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.
Åkerberg, Johan. « On security in safety-critical process control / ». Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Texte intégralNyström, Oskar. « FIRE SAFETY AND EVACUATION SECURITY IN WIND TURBINES ». Thesis, Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83289.
Texte intégralMatović, Aleksandar. « CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY ». Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320.
Texte intégralMeyers, Tommey H. « Safety risk management for Homeland Defense and Security responders ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMeyers.pdf.
Texte intégralThesis Advisor(s): Paul Pitman. Includes bibliographical references (p.55-59). Also available online.
Nkwantabisa, Godfrey K. « The United States Army food safety, security, and protection system ». Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/975.
Texte intégralAbdo, Houssein. « Dealing with uncertainty in risk analysis : combining safety and security ». Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT113/document.
Texte intégralRisk analysis is a critical part for regulatory decision-making related to high-risk risk industries. A systematic risk analysis is made up of three steps: (i) identifying the undesirable risk scenarios. A risk scenario is characterized by referencing to the potential event with its causes and consequences. (ii) Estimating the likelihood of occurrence of risk scenarios. (iii) Calculating the effect of consequences of the identified risk scenarios. Likelihood and effect analysis are carried out with the help of models that depend on several number of input parameters.However, the trustworthiness of risk analysis is limited when inaccuracies in the results can occur, and are due to various sources of uncertainty. Parameter, model and completeness uncertainties are the main sources of uncertainty. Parameter uncertainty arises from the inability to set exact values for certain input parameters used for likelihood and severity analysis. Completeness uncertainty originates from not considering all contributions to risk in the identification process (some initiating events are ignored). Model uncertainty is not considered in this work.The INERIS (French National Institute for Industrial Environment and Risks) has developed an interval semi-quantitative approach that uses both quantitative information if available or qualitative information if not. However, this interval semi-quantitative approach has some drawbacks due to parameter uncertainty.Information regarding model parameters used for effect analysis is often incomplete, vague, imprecise or subjective. Moreover, some of the parameters may be random in nature and have different values. This leads to two different types of parameter uncertainty that need to be accounted for an accurate risk analysis and effective decision-making. Aleatoric uncertainty arises from randomness due to natural variability resulting from the variation of a value in time. Or epistemic uncertainty caused by the lack of information resulting, for example, from measurement errors, subjectivity expert judgment or incompleteness.Moreover, the identification step is incomplete where only safety related scenarios caused by accidental events are considered. The introduction of connected systems and digital technology in process industries creates new cyber-security threats that can lead to undesirable safety accidents. These cyber-security related events should be considered during industrial risk analysis.This research aims to develop uncertainty analysis methodologies to treat uncertainty in the INERIS risk analysis process. In other words, to analyze uncertainty in likelihood analysis, effect analysis and the identification step.In this work, we propose a fuzzy semi-quantitative approach to deal with parameter uncertainty in the likelihood analysis step. We handle the limits of the interval semi-quantitative approach by introducing the concept of fuzzy numbers instead of intervals. Fuzzy numbers are used to represent subjectivity in expert judgments (qualitative data) and covers uncertainty in the quantitative data if this data exists.A hybrid methodology that treat each cause of parameter uncertainty in effect analysis with the right theory is developed. Probability theory is used to represent variability, fuzzy numbers are used to represent imprecision and evidence theory is used to represent vagueness, incompleteness and the lack of consensus.A new risk identification methodology that considers safety and security together during industrial risk analysis is developed. This approach combines Bow-Tie Analysis (BTA), commonly used for safety analysis, with a new extended version of Attack Tree Analysis (ATA), introduced for security analysis of industrial control systems. The combined use of AT-BT provides an exhaustive representation of risk scenarios in terms of safety and security
Livres sur le sujet "Security e safety e disabilità"
Joseph, Carmel. Safety and security. Johannseburg : Friedrich Ebert Stiftung, South Africa Office, 2002.
Trouver le texte intégralBooks, Time-Life, dir. Home safety & security. Alexandria, Va : Time-Life Books, 1990.
Trouver le texte intégralPoynton, Deborah. Safety and security. Cape Town : Michael Stevenson, 2006.
Trouver le texte intégralCheng, Jieren, Xiangyan Tang et Xiaozhang Liu, dir. Cyberspace Safety and Security. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73671-2.
Texte intégralBabalola, Olubukola Oluranti, dir. Food Security and Safety. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-50672-8.
Texte intégralMeng, Weizhi, et Mauro Conti, dir. Cyberspace Safety and Security. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94029-4.
Texte intégralChen, Xiaofeng, Jian Shen et Willy Susilo, dir. Cyberspace Safety and Security. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18067-5.
Texte intégralVaidya, Jaideep, Xiao Zhang et Jin Li, dir. Cyberspace Safety and Security. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5.
Texte intégralVaidya, Jaideep, Xiao Zhang et Jin Li, dir. Cyberspace Safety and Security. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8.
Texte intégralCastiglione, Arcangelo, Florin Pop, Massimo Ficco et Francesco Palmieri, dir. Cyberspace Safety and Security. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01689-0.
Texte intégralChapitres de livres sur le sujet "Security e safety e disabilità"
M'hamed, Abdallah. « Safety, Security, Privacy and Trust Issues ». Dans The Engineering Handbook of Smart Technology for Aging, Disability, and Independence, 619–29. Hoboken, NJ, USA : John Wiley & Sons, Inc., 2008. http://dx.doi.org/10.1002/9780470379424.ch33.
Texte intégralSuojanen, Ilona, et Neil Thin. « Positive Safety ». Dans International Security Management, 29–41. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42523-4_3.
Texte intégralHearn, Keith, et Jennifer Murray. « Safety and security ». Dans Barcraft, 84–89. London : Macmillan Education UK, 1990. http://dx.doi.org/10.1007/978-1-349-10170-2_9.
Texte intégralPaul, Valerie, et Christine Jones. « Safety and Security ». Dans Housecraft, 106–19. London : Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-10172-6_8.
Texte intégralHayter, Roy. « Safety and security ». Dans Food and Drink Service, 13–16. London : Macmillan Education UK, 1993. http://dx.doi.org/10.1007/978-1-349-80473-3_3.
Texte intégralSmith, Mary S. « Security and Safety ». Dans Parking Structures, 114–35. Boston, MA : Springer US, 1996. http://dx.doi.org/10.1007/978-1-4684-9922-3_4.
Texte intégralSerpanos, Dimitrios, et Marilyn Wolf. « Security and Safety ». Dans Internet-of-Things (IoT) Systems, 55–76. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69715-4_6.
Texte intégralChun, Julia, Tyler Tingley et William Lidwell. « Safety and Security ». Dans The Elements of Education for School Leaders, 82–83. New York : Routledge, 2022. http://dx.doi.org/10.4324/9780429321641-41.
Texte intégralVardon-Smith, Garry M., Kenneth I. Roberts, Kenneth I. Roberts et Bob Mark. « Safety and Security ». Dans Conflict and Catastrophe Medicine, 287–314. London : Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-352-1_19.
Texte intégralEckert, Claudia, et Michael Waidner. « Safety and Security ». Dans Digital Transformation, 265–83. Berlin, Heidelberg : Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58134-6_16.
Texte intégralActes de conférences sur le sujet "Security e safety e disabilità"
Burton, Simon, Jürgen Likkei, Priyamvadha Vembar et Marko Wolf. « Automotive functional safety = safety + security ». Dans the First International Conference. New York, New York, USA : ACM Press, 2012. http://dx.doi.org/10.1145/2490428.2490449.
Texte intégralDutta, Raj Gautam, Feng Yu, Teng Zhang, Yaodan Hu et Yier Jin. « Security for safety ». Dans ICCAD '18 : IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3240765.3243496.
Texte intégralCancelier, Julien, Sébastien Faux, Alexandre Gouin et Michel Dufresne. « Convergence Safety Security ». Dans Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61830.
Texte intégral« Session safety & ; security ». Dans 2008 IEEE International Workshop on Factory Communication Systems. IEEE, 2008. http://dx.doi.org/10.1109/wfcs.2008.4638779.
Texte intégralTiwari, Ashish, Bruno Dutertre, Dejan Jovanović, Thomas de Candia, Patrick D. Lincoln, John Rushby, Dorsa Sadigh et Sanjit Seshia. « Safety envelope for security ». Dans HiCoNS '14 : 3rd International Conference on High Confidence Networked Systems. New York, NY, USA : ACM, 2014. http://dx.doi.org/10.1145/2566468.2566483.
Texte intégralWhite, Phil. « Improving Maritime and Port Security ». Dans Passenger Ship Safety. RINA, 2003. http://dx.doi.org/10.3940/rina.pass.2003.12.
Texte intégralKrumov, Assen V. « Software Reliability, Safety and Security ». Dans Third IEEE Workshop on Intelligent Data Acquisition and Advanced Computer Syetems : Technology and Applications. IEEE, 2005. http://dx.doi.org/10.1109/idaacs.2005.283017.
Texte intégralSimmerman, Jeff. « Security and Safety Are Sisters ». Dans SPE Americas E&P Health, Safety, Security, and Environmental Conference. Society of Petroleum Engineers, 2011. http://dx.doi.org/10.2118/141051-ms.
Texte intégralHickey, James A., et William Carman. « Safety, security and theft issues ». Dans 2016 Down to Earth Conference (DTEC). IEEE, 2016. http://dx.doi.org/10.1109/dtec.2016.7731294.
Texte intégralRomanski, G. « Combined safety and security certification ». Dans 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012. Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1511.
Texte intégralRapports d'organisations sur le sujet "Security e safety e disabilità"
Harper, S. L., R. Schnitter, A. Fazil, M. Fleury, J. Ford, N. King, A. Lesnikowski et al. Food safety and security. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/329534.
Texte intégralBriscoe, G., R. Nertney et D. Riffe. Safety considerations for security programs. Office of Scientific and Technical Information (OSTI), février 1987. http://dx.doi.org/10.2172/6686554.
Texte intégralGoldschlag, David, Carl Landwehr et Michael Reed. Chapter 17. Agent Safety and Security. Fort Belvoir, VA : Defense Technical Information Center, janvier 1996. http://dx.doi.org/10.21236/ada465298.
Texte intégralReiss, Peter T. Airline Safety & ; Security : An International Perspective. Fort Belvoir, VA : Defense Technical Information Center, octobre 1997. http://dx.doi.org/10.21236/ada351545.
Texte intégralUecker, Norma J., et Michael J. Schwartz. Office of Health, Safety and Security, Office of Security Policy FY 2013 Accomplishments. Office of Scientific and Technical Information (OSTI), octobre 2013. http://dx.doi.org/10.2172/1105101.
Texte intégralOgata, Michael, Barbara Guttman et Nelson Hastings. Public Safety Mobile Application Security Requirements Workshop Summary. National Institute of Standards and Technology, janvier 2015. http://dx.doi.org/10.6028/nist.ir.8018.
Texte intégralFiresmith, Donald G. Common Concepts Underlying Safety Security and Survivability Engineering. Fort Belvoir, VA : Defense Technical Information Center, décembre 2003. http://dx.doi.org/10.21236/ada421683.
Texte intégralSievers, Cindy S. Worker Safety and Security Teams Team Member Handbook. Office of Scientific and Technical Information (OSTI), juin 2012. http://dx.doi.org/10.2172/1043505.
Texte intégralLeach, Janice, Mark K. Snell, R. Pratt et S. Sandoval. Leveraging Safety Programs to Improve and Support Security Programs. Office of Scientific and Technical Information (OSTI), octobre 2015. http://dx.doi.org/10.2172/1226427.
Texte intégralChoong, Yee-Yin, Joshua M. Franklin et Kristen K. Greene. Usability and Security Considerations for Public Safety Mobile Authentication. National Institute of Standards and Technology, juillet 2016. http://dx.doi.org/10.6028/nist.ir.8080.
Texte intégral