Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: SECURITY DOMAIN ENFORCEMENT.

Artykuły w czasopismach na temat „SECURITY DOMAIN ENFORCEMENT”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „SECURITY DOMAIN ENFORCEMENT”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Camp, L. Jean. "Reconceptualizing the Role of Security User". Daedalus 140, nr 4 (październik 2011): 93–107. http://dx.doi.org/10.1162/daed_a_00117.

Pełny tekst źródła
Streszczenie:
The Internet is not the only critical infrastructure that relies on the participation of unorganized and technically inexpert end users. Transportation, health, waste management, and disaster preparedness are other areas where cooperation between unorganized citizens who lack experience with the domain has increased resiliency, reduced social costs, and helped meet shared goals. Theories of community-based production and management of the commons explain this type of cooperation, both offline and online. This essay examines these two complementary approaches to organizing the cybercitizen for cybersecurity. Cybersecurity discourse has reasonably focused on centralized parties and network operators. From domain name registrars to network service providers, solutions are sought through incentives, regulation, and even law enforcement. However great the ability of these centralized entities to implement change, the end user plays a crucial role. The Internet must remain open to enable innovation and diffusion of innovation; thus, the end user will continue to be important. What is the role of the citizen in cybersecurity? What socio-technical characteristics might enable a system that encourages and empowers users to create a secure infrastructure?
Style APA, Harvard, Vancouver, ISO itp.
2

van Hoof, Joost, Jeroen Dikken, Willeke H. van Staalduinen, Suzan van der Pas, Rudy F. M. van den Hoven i Loes M. T. Hulsebosch-Janssen. "Towards a Better Understanding of the Sense of Safety and Security of Community-Dwelling Older Adults. The Case of the Age-Friendly City of The Hague". International Journal of Environmental Research and Public Health 19, nr 7 (26.03.2022): 3960. http://dx.doi.org/10.3390/ijerph19073960.

Pełny tekst źródła
Streszczenie:
The sense of safety and security of older people is a widely acknowledged action domain for policy and practice in age-friendly cities. Despite an extensive body of knowledge on the matter, the theory is fragmented, and a classification is lacking. Therefore, this study investigated how older people experience the sense of safety and security in an age-friendly city. A total of four focus group sessions were organised in The Hague comprising 38 older people. Based on the outcomes of the sessions, the sense of safety and security was classified into two main domains: a sense of safety and security impacted by intentional acts and negligence (for instance, burglary and violence), and a sense of safety and security impacted by non-intentional acts (for instance, incidents, making mistakes online). Both domains manifest into three separate contexts, namely the home environment, the outdoor environment and traffic and the digital environment. In the discussions with older people on these derived domains, ideas for potential improvements and priorities were also explored, which included access to information on what older people can do themselves to improve their sense of safety and security, the enforcement of rules, and continuous efforts to develop digital skills to improve safety online.
Style APA, Harvard, Vancouver, ISO itp.
3

Grubač, Momčilo. "Enforcement of judgments according to European legal standards". Glasnik Advokatske komore Vojvodine 75, nr 9-10 (2003): 18–33. http://dx.doi.org/10.5937/gakv0302018g.

Pełny tekst źródła
Streszczenie:
The author gives an overview of the achievements of the 24th Conference of European Ministers of Justice, held in Moscow in October 2001, and in particular its section relating to enforcement of judgments. In the first part of the article, the author writes about enforcement of judgments containing a long-term imprisonment sentence. He analyzes in depth the conditions and rules on keeping prisoners, their education and employment, security of prisoners and personnel, conditional release, status of aliens and stateless persons, and relations between the prison system and private sector. In the second part of the article, the author writes about enforcement of judgments in civil matters and the respective strengthening and/or weakening of the state role in this domain.
Style APA, Harvard, Vancouver, ISO itp.
4

van Hardeveld, Gert Jan, Craig Webber i Kieron O’Hara. "Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets". American Behavioral Scientist 61, nr 11 (październik 2017): 1244–66. http://dx.doi.org/10.1177/0002764217734271.

Pełny tekst źródła
Streszczenie:
This work presents an overview of some of the tools that cybercriminals employ to trade securely. It will look at the weaknesses of these tools and how the behavior of cybercriminals will sometimes lead them to use tools in a nonoptimal manner, creating opportunities for law enforcement to identify and apprehend them. The criminal domain this article focuses on is carding, the online trade in stolen payment card details and the consequent criminal misuse of such data. However, these findings could be applied more broadly, as many of the analyzed tools are used across (cyber) criminal domains. This article is a continuation of earlier work, in which a crime script analysis of 25 carding tutorials presented the tools that cybercriminals use to cash-out stolen payment card details while remaining anonymous. We use these tutorials and an analysis of the literature to identify how they can be used incorrectly and create a typology of potential behavioral and technological pitfalls in these tools. Finally, we conclude that finding pitfalls in the usage of tools by cybercriminals has the potential to increase the efficiency of disruption, interception, and prevention approaches. However, in future work, interviews with law enforcement experts and convicted cybercriminals or still active users should be used to analyze the operational security of cybercriminals in more depth.
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Yufei, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa i Fei Fang. "Deep Reinforcement Learning for Green Security Games with Real-Time Information". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17.07.2019): 1401–8. http://dx.doi.org/10.1609/aaai.v33i01.33011401.

Pełny tekst źródła
Streszczenie:
Green Security Games (GSGs) have been proposed and applied to optimize patrols conducted by law enforcement agencies in green security domains such as combating poaching, illegal logging and overfishing. However, real-time information such as footprints and agents’ subsequent actions upon receiving the information, e.g., rangers following the footprints to chase the poacher, have been neglected in previous work. To fill the gap, we first propose a new game model GSG-I which augments GSGs with sequential movement and the vital element of real-time information. Second, we design a novel deep reinforcement learning-based algorithm, DeDOL, to compute a patrolling strategy that adapts to the real-time information against a best-responding attacker. DeDOL is built upon the double oracle framework and the policy-space response oracle, solving a restricted game and iteratively adding best response strategies to it through training deep Q-networks. Exploring the game structure, DeDOL uses domain-specific heuristic strategies as initial strategies and constructs several local modes for efficient and parallelized training. To our knowledge, this is the first attempt to use Deep Q-Learning for security games.
Style APA, Harvard, Vancouver, ISO itp.
6

Yang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang i Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics". Sensors 23, nr 7 (29.03.2023): 3566. http://dx.doi.org/10.3390/s23073566.

Pełny tekst źródła
Streszczenie:
The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability, permanence and uniqueness), the security of biometric data is a key area of research. Security and privacy are vital to enacting integrity, reliability and availability in biometric-related applications. Homomorphic encryption (HE) is concerned with data manipulation in the cryptographic domain, thus addressing the security and privacy issues faced by biometrics. This survey provides a comprehensive review of state-of-the-art HE research in the context of biometrics. Detailed analyses and discussions are conducted on various HE approaches to biometric security according to the categories of different biometric traits. Moreover, this review presents the perspective of integrating HE with other emerging technologies (e.g., machine/deep learning and blockchain) for biometric security. Finally, based on the latest development of HE in biometrics, challenges and future research directions are put forward.
Style APA, Harvard, Vancouver, ISO itp.
7

Csaba, Zágon, i Zsolt Lippai. "The Borderline between Private and Public Security". Academic and Applied Research in Military and Public Management Science 20, nr 3 (26.05.2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.

Pełny tekst źródła
Streszczenie:
A few years ago, a White Paper was published by the Confederation of European Security Services (CoESS) with the collaboration of the Institut National des Hautes Études de Sécurité (INHES) on the security market of the European Union. The authors identified several reasons why public and private security providers in the member states share the market and why they are bound to cooperate for the public good, that is, the security itself. However, the states’ law enforcement capacities cannot cover all security demands of the public due to the finite (mainly budgetary) resources that always set capacity limits hence congestions in the assignments of police services occur from time to time. Private security operatives fill into the supply gaps occurring in a fragmented security landscape in Europe. Due to the variables in the market share, countries made their patterns in public and private security components, the statutory frameworks, and the traditions concerning the role played by the commercial security sector in overall security provisions. Here a typology may be formed from the clusters of countries following alternative approaches, respectively. There is a border zone between the two sectors. The exclusive public security domain gives way to areas of common interest and moves on to where private security takes precedence, and public actors only play a supervisory role. This article examines the boundary zone in multiple approaches, attempting to stipulate the red line between the two security elements.
Style APA, Harvard, Vancouver, ISO itp.
8

Matheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva i Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES". International Journal of Advanced Research 10, nr 11 (30.11.2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.

Pełny tekst źródła
Streszczenie:
Objective: Companies in the cybersecurity consulting market are expanding their services in periodic training to business stakeholders and enforcement of security policies. The objective of this work is to demonstrate the importance of consulting in information security policies aimed at small and medium-sized companies. Methods: It is characterized as a narrative literature review with a qualitative approach, which does not use explicit and systematic criteria for the search and critical analysis of the selected literature. Results: Tools needed for cybersecurity include endpoint detection and response (EDR), antivirus software, next-generation firewalls, Domain Name System (DNS) protection, email gateway security, intrusion detection and prevention, logging and log monitoring, endpoint protection, authentication and virtual private network (VPN) services, cloud-based security, web application firewalls (WAFs), software-defined wide area networks (SD-WAN), enterprise password management , privileged access management (GAP), vulnerability and threat management, and threat detection. Conclusions: In summary, SMBs seem to implement some of the basic cybersecurity measures only as part of their overall IT implementation. However, it appears that unless cybersecurity controls are included as part of an IT solution, many SMBs do not realize the resulting potential risks to their business.
Style APA, Harvard, Vancouver, ISO itp.
9

Kashmar, Nadine, Mehdi Adda i Hussein Ibrahim. "HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities". Journal of Cybersecurity and Privacy 2, nr 1 (14.02.2022): 42–64. http://dx.doi.org/10.3390/jcp2010004.

Pełny tekst źródła
Streszczenie:
Access control (AC) policies are a set of rules administering decisions in systems and they are increasingly used for implementing flexible and adaptive systems to control access in today’s internet services, networks, security systems, and others. The emergence of the current generation of networking environments, with digital transformation, such as the internet of things (IoT), fog computing, cloud computing, etc., with their different applications, bring out new trends, concepts, and challenges to integrate more advanced and intelligent systems in critical and heterogeneous structures. This fact, in addition to the COVID-19 pandemic, has prompted a greater need than ever for AC due to widespread telework and the need to access resources and data related to critical domains such as government, healthcare, industry, and others, and any successful cyber or physical attack can disrupt operations or even decline critical services to society. Moreover, various declarations have announced that the world of AC is changing fast, and the pandemic made AC feel more essential than in the past. To minimize security risks of any unauthorized access to physical and logical systems, before and during the pandemic, several AC approaches are proposed to find a common specification for security policy where AC is implemented in various dynamic and heterogeneous computing environments. Unfortunately, the proposed AC models and metamodels have limited features and are insufficient to meet the current access control requirements. In this context, we have developed a Hierarchical, Extensible, Advanced, and Dynamic (HEAD) AC metamodel with substantial features that is able to encompass the heterogeneity of AC models, overcome the existing limitations of the proposed AC metamodels, and follow the various technology progressions. In this paper, we explain the distinct design of the HEAD metamodel, starting from the metamodel development phase and reaching to the policy enforcement phase. We describe the remaining steps and how they can be employed to develop more advanced features in order to open new opportunities and answer the various challenges of technology progressions and the impact of the pandemic in the domain. As a result, we present a novel approach in five main phases: metamodel development, deriving models, generating policies, policy analysis and assessment, and policy enforcement. This approach can be employed to assist security experts and system administrators to design secure systems that comply with the organizational security policies that are related to access control.
Style APA, Harvard, Vancouver, ISO itp.
10

Lysychkina, �., O. Lysychkina i Ye Protsenko. "NATO SPECIAL TERMINOLOGY IN THE CONTEXT OF MILITARY TERMINOLOGICAL ACTIVITIES WITHIN THE LINGUISTIC SUPPORT". Scientific journal of the National Academy of National Guard "Honor and Law" 2, nr 81 (2022): 99–102. http://dx.doi.org/10.33405/2078-7480/2022/2/81/263803.

Pełny tekst źródła
Streszczenie:
This article highlights the research results concerning the English-Ukrainian translation peculiarities of the NATO special terminology to denote the security and defense sector activities. This terminology is of special significance for the military terminological activity within the linguistic support as a relatively new domain of the troops� (forces�) support due to its special value for the National Guard of Ukraine in terms of establishing and maintaining its cross-cultural communication with the NATO allies and partners. The research was based on the English-Ukrainian and Ukrainian-English glossary "NATO Glossary of Defense and Security Policy Terms", developed under the DCAF in 2017. The choice of the equivalents for special terms to denote defence and security sector activities is grounded on the principles of concepts coherence, accuracy of wording, the term etymology, and the semantic content comparative analysis of the terminological units and their equivalents in Ukrainian and English. It has been defined that the terms functional identity in both languages allows preserving the nominative and systematic nature of the term. The typical translation methods for the analyzed terminological units have been identified (lexico-semantic shifts, loan translation, and explication), as well as the structural and compositional patterns of equivalents selection in the Ukrainian language. The majority (64,5 %) of the analyzed glossary terms are used to denote the activities of the National Guard of Ukraine. The research results underline the importance of military terminological activity of the National Guard of Ukraine in order to systematize the terminological system of this agency and, in a broader context, to better understand military and law enforcement activities of similar law enforcement agencies of other countries.
Style APA, Harvard, Vancouver, ISO itp.
11

Gradoń, Kacper. "Countering lone-actor terrorism: specification of requirements for potential interventions". Studia Iuridica 72 (17.04.2018): 121–47. http://dx.doi.org/10.5604/01.3001.0011.7591.

Pełny tekst źródła
Streszczenie:
The author presents the de-classified preliminary findings of the European Commission funded FP7 research project PRIME, dealing with the extremism, radicalization and lone-actor terrorism (also known as “lone wolf terrorism”). The Article provides the partial results of the research devoted to the preparation of portfolio of lone actor extremism counter-measures requirements based on the findings of the review of existing counter-measures used to defend against lone actor extremist events. The Article concludes with a list of recommendations, which shall be considered in order to prevent, interdict and mitigate the threat of lone actor extremism and terrorism and to support public security and safety. These recommendations are based on the extensive consultations with law-enforcement and security services practitioners and Subject Matter Experts of the PRIME Project domain, representing a wide range of areas (police, intelligence, border protection, military, government, civil defence, non-governmental organizations, and the academic community) and different jurisdictions and law practices (several countries of Europe, United States, Canada, India, Japan, Georgia, Mexico, Australia and New Zealand).
Style APA, Harvard, Vancouver, ISO itp.
12

Jain, Anil K., i Arun Ross. "Bridging the gap: from biometrics to forensics". Philosophical Transactions of the Royal Society B: Biological Sciences 370, nr 1674 (5.08.2015): 20140254. http://dx.doi.org/10.1098/rstb.2014.0254.

Pełny tekst źródła
Streszczenie:
Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large.
Style APA, Harvard, Vancouver, ISO itp.
13

CAN, Özgü, i Murat ÜNALIR. "Ontology Based Access Control: A Case Study through Ontology Based Data Access". Deu Muhendislik Fakultesi Fen ve Muhendislik 25, nr 74 (15.05.2023): 417–32. http://dx.doi.org/10.21205/deufmd.2023257413.

Pełny tekst źródła
Streszczenie:
Ontology Based Data Access (OBDA) is the provision of data access and data integration as a result of the mapping that is established between an ontology and a data source. Thus, storing large amounts of data becomes easier, more powerful queries can be written, and management of complex information systems can be performed quickly and effectively by using Semantic Web technologies. Ontology Based Access Control (OBAC) uses Semantic Web technologies to enable the enforcement of access control mechanism. Therefore, only authorized persons can access data to protect data privacy. In this study, OBDA and OBAC are integrated to improve security while providing data virtualization with a data model-independent access control approach. Therefore, a use case study for the healthcare domain is presented. Hence, a relational database for the hospital domain, a Hospital Ontology for the related hospital database and an access control policy are created. Also, the relevant mappings between the hospital database and the Hospital Ontology are established by using the Ontop framework and finally, various queries are executed by using Ontop SPARQL to evaluate mappings and access rules.
Style APA, Harvard, Vancouver, ISO itp.
14

Stanković, Vladan, i Ana Opačić. "Brussels I regulation: Recognition and enforcement of foreign court decisions in civil and commercial matters". International Review, nr 3-4 (2022): 168–74. http://dx.doi.org/10.5937/intrev2204176s.

Pełny tekst źródła
Streszczenie:
The process of integration of European countries began with the formation of the Coal and Steel Community and as a historical category in a certain domain continues. This decades-long integration has been carried out in phases and in certain segments, and this very way of integration has resulted in these areas not consistently following the basic principles on which the EU is based. The self-proclaimed goal of European integration, its maintenance and development as areas of freedom, security and justice, necessarily required, among other things, instruments and measures related to judicial cooperation in civil and commercial matters, which would ensure the smooth functioning of the EU internal market. The rules of Brussels and regulations establish a single system of recognition and enforcement of foreign court decisions, overcoming the differences that exist in the national systems of member states, and unified rules on simplification of procedures for faster and simpler recognition and enforcement of such decisions. The authors below present the achieved level of unification of these rules from the aspect of functionality, primarily the time needed to execute a foreign decision, reduction of formalities, certainty of outcome and impossibility of conducting a parallel procedure, as the primary goal of Brussels I regulation.
Style APA, Harvard, Vancouver, ISO itp.
15

Dai, Xili, Cheng Yang, Bin Liu, Haigang Gong i Xiaojun Yuan. "An Easy Way to Deploy the Re-ID System on Intelligent City: Cross-Domain Few-Shot Person Reidentification". Mobile Information Systems 2022 (15.06.2022): 1–12. http://dx.doi.org/10.1155/2022/4522578.

Pełny tekst źródła
Streszczenie:
An intelligent urban system relies on different types of electronic and/or sensor technologies to collect data to facilitate education, security, healthcare, etc. Person reidentification (re-ID) plays a crucial role in intelligent security, in which significant progress has been made during the past few years. One example is using re-ID systems for law enforcement tasks such as suspect identification. One common obstacle is quickly deploying a re-ID system to new city, such as data label deficiency. For example, the lacking of enough labeled data to train an excellent model in a new city, only relying on a tiny amount of criminals’ pictures provided by witnesses. Fortunately, this can be modeled as a special application in unsupervised person re-ID of real-world scenarios, the study of which has become more prevalent in the re-ID community in recent years. In this paper, we first formulate our scenario as a cross-domain few-shot problem and discuss the difference between conventional supervised re-ID and unsupervised re-ID. Then, we introduce a reweighting instance method based on influence function (ReWIF) to guide the training procedure of the re-ID model. This method is motivated by the influence function, and we use two-step optimization to avoid the computation of Hessian matrices. We evaluate our proposed method on public datasets, including Market, Duke, and CUHK. Extensive experimental results show that our method can effectively address the domain bias of different datasets and the absence of labeled data on the target dataset, achieving state-of-the-art performance.
Style APA, Harvard, Vancouver, ISO itp.
16

Horváth, Attila. "Possible Applications of High Altitude Platform Systems for the Security of South America and South Europe". Academic and Applied Research in Military and Public Management Science 20, Special Edition (2021): 79–94. http://dx.doi.org/10.32565/aarms.2021.2.ksz.6.

Pełny tekst źródła
Streszczenie:
High Altitude Platform Systems (HAPS)3, or pseudo satellites, are atmospheric, specifically, stratospheric Remotely Piloted Aerial Systems (RPAS).4 These systems can provide services comparable to outer space satellite systems, however, they can be operated without the need of an orbital launch capability. While their geographical coverage is limited compared to space satellites, they can provide persistent coverage over a given area for a long time, weeks or even months. Pseudo satellites can carry Earth observation or radiocommunication payloads, just like satellites.In this article I will provide an overview of HAPS capabilities and potential applications, based on an imaginary operational scenario, namely, the reconnaissance support of a law enforcement operation to defend offshore gas facilities from a planned attack by an eco-terrorist group near Venezuela. At the same time, HAPS can support any defence, emergency response or natural resource observation operation.The complex air–sea operation scenario will be presented using a simulation generated with the AGI Systems ToolKit multi-domain mission simulator software. My article contains maps and pictures of the operation, and the videos will be presented via the https://horvath.space website.
Style APA, Harvard, Vancouver, ISO itp.
17

Tsyhanov, Oleh, Igor Chumachenko, Iryna Panova i Mykola Golub. "Public Policy in the Sphere of Activity of the Ministry of Internal Affairs of Ukraine: Approaches to Determining the Essence and Content". Revista Amazonia Investiga 9, nr 28 (21.04.2020): 159–65. http://dx.doi.org/10.34069/ai/2020.28.04.19.

Pełny tekst źródła
Streszczenie:
The aim of the article is to define a modern interpretation of the categories "public policy" and "the sphere of activity of bodies of the Ministry of Internal Affairs", as well as the essence and content of public policy of Ukraine in this field. To achieve this goal, general scientific and special methods of cognition are used, namely: methods of analysis, synthesis, structural and functional, hermeneutics, comparison, special legal and some others. It is emphasized that public policy should be considered in two notions: 1) as the established course (state) of development of the State and society; 2) as a type of public activity (process) regarding the formulation of public policy (political process) and its implementation (executive activity). The focus of the study is on the social relations that arise in the course of activities of the bodies of the Ministry of Internal Affairs are relatively close, similar, and related in their nature. Therefore, objectively existing link between these social relations and their specificity require the integration of these relations into one domain. In the current context, public policy in the sphere of activity of bodies of Ministry of Internal Affairs of Ukraine is proposed to consider as the purposeful and organizational activity of specially authorized public bodies and representatives of civil society in determining strategic goals, targets, forms and means of their achievement in the field of law enforcement activity. It should be emphasized that this law-enforcement activity is directly related to providing improvement of safe living environment as a basis for internal security in Ukraine, the formation of a modern system of internal security as a deterrent to the aggressor country, as well as the implementation of effective integrated border management and balanced migration policy in Ukraine.
Style APA, Harvard, Vancouver, ISO itp.
18

Riahla, Mohamed Amine, Sihem Goumiri, Karim Tamine i M'hamed Hamadouche. "A New Cooperation Model for Dynamic Networks". International Journal of Business Data Communications and Networking 17, nr 2 (lipiec 2021): 1–15. http://dx.doi.org/10.4018/ijbdcn.286704.

Pełny tekst źródła
Streszczenie:
Technologies evolution revealed new types of dynamic networks with decentralized architectures and autonomous services. Research on this impressive area has provided great objectives and benefits. However, providing some services related to security and routing protocols are a major problem in this domain. All nodes in the networks need to cooperate and relay packets for other nodes, but some misbehavior nodes due to selfish reasons may significantly reduce the network performances. Because they use the network resources only for their own purpose and not share them between neighbors. In this paper, a novel technique of enforcement cooperation is proposed. It aims to control the role of each node in the network and evaluate their participation during the routing function. The model includes important features that force nodes cooperating and discard the selfish ones. Simulation results showed that the proposed model is very efficient to detect and remove misbehavior nodes and enhance cooperation between nodes while routing data.
Style APA, Harvard, Vancouver, ISO itp.
19

Lamsal, Hiranya Lal. "Effectiveness Of Military Diplomacy Towards Nationalism, National Security and Unity". Unity Journal 3, nr 01 (6.03.2022): 82–96. http://dx.doi.org/10.3126/unityj.v3i01.43317.

Pełny tekst źródła
Streszczenie:
Military diplomacy in every country strengthens unity, nationalism and national security. It acts as a specific domain of diplomacy that emphasizes primarily on the pursuit of foreign policy interest of the state in the field of security and defence policy, whose actions are associated on the use of negotiations and other diplomatic instruments. Nepal, being a sovereign kingdom, the nation needs a stout military foundation. In this regard, in the field of nationalism, national unity and security, Nepal Army drives its loyalty, obedience, sacrifice and etiquette to maintain common and control in the nation. Considering this fact, this study examines military diplomacy directed to national interest through the perceptions of general people of Rupandehi district, Lumbini Province of Nepal. This study aims at exploring effectiveness of military diplomacy for the well being of the nation and their role to maintain patriotic feeling through national security and unity, and harmonious civil-military relations. To carry out this research, a set of questionnaires was prepared through Google Docs and circulated to general people through emails and messenger. Altogether, 116 participants were taken as population in this study. The snowball sampling technique was used with an online survey tool to collect data. The collected data was analyzed in terms of simple statistical method of percentages. This study found that the effectiveness of military diplomacy for an important security and foreign policy. The result displayed that military diplomacy provides opportunities, security and strength which boosts the national power. It enumerates the activity of military force of the ministry of defense of the nation which conducts a diplomatic scenario to the enforcement of its foreign policy that is of a non-combat nature. It also signifies that military diplomacy marches towards nationalism, which gravitates to build up the interest of obtaining and maintaining the state’s sovereignty. Therefore, it is an essential tool for foreign policy at strategic level that adds to raise the degree of nationalism, national security and unity in the state.
Style APA, Harvard, Vancouver, ISO itp.
20

Egorov, Gennady. "Legal Forms of Ensuring Information Security on the Internet". Legal Concept, nr 4 (grudzień 2022): 70–76. http://dx.doi.org/10.15688/lc.jvolsu.2022.4.9.

Pełny tekst źródła
Streszczenie:
Introduction: the development of modern digital networks is associated with the introduction into circulation of datawith increased social danger and, as a consequence, limited to civilian use in the Russian Federation. Unlike the authorities, this type of information is not recognized by society as dangerous, but generates aspirations of certain categories of citizens to possess such information, to disseminate it, to introduce it into illegal civil circulation. The scientific community, recognizing this problem, has been striving to neutralize the consequences in this area for a long time. The purpose of the work is to conduct a scientific analysis of the existing legal forms of ensuring information accessibility, to determine the effectiveness of modern legal and organizational mechanisms to ensure civil interests in this area. Using the methods of scientific cognition, primarily the method of system analysis, it is established that the complexity of the highlighted problem involves the use of both law-making and law-realization approaches to identify the violations of arrangements for using electronic information in the violation of applicable law. Results: the considered approaches and legal mechanisms for ensuring information security in the Internet environment will justify the need to introduce the organizational and legal methods to improve the current legislation and law enforcement practice in the country and propose a number of measures for their eliminating. Conclusions: it is necessary 1) to adapt the existing judicial system related to the restriction of the circulation of information on the Internet to modern realities in the technical and legal spheres; 2) to change not only the procedure for recognizing information as prohibited, but also to introduce additional forms of responsibility for its placement, in particular, the imposition of administrative forms of sanctions not only on the creator of illegal content, but also on technical intermediaries (providers, telecom operators, domain name grantors), which can be presented in the form of imposing technical prohibitions on the placement of information on the Internet; 3) to increase the number of persons subject to legal liability (administrative or criminal) for the violation of information security in the Russian Federation.
Style APA, Harvard, Vancouver, ISO itp.
21

S, Vasudha, Neelamma K. Patil i Dr Lokesh R. Boregowda. "Performance Improvement of Face Recognition System using Selective Local Feature Vectors". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, nr 2 (10.08.2013): 1330–38. http://dx.doi.org/10.24297/ijct.v10i2.3299.

Pełny tekst źródła
Streszczenie:
Face recognition is one of the important applications of image processing and it has gained significant attention in wide range of law enforcement areas in which security is of prime concern. Although the existing automated machine recognition systems have certain level of maturity but their accomplishments are limited due to real time challenges. Face recognition systems are impressively sensitive to appearance variations due to lighting, expression and aging. The major metric in modeling the performance of a face recognition system is its accuracy of recognition. This paper proposes a novel method which improves the recognition accuracy as well as avoids face datasets being tampered through image splicing techniques. Proposed method uses a non-statistical procedure which avoids training step for face samples thereby avoiding generalizability problem which is caused due to statistical learning procedure. This proposed method performs well with images with partial occlusion and images with lighting variations as the local patch of the face is divided into several different patches. The performance improvement is shown considerably high in terms of recognition rate and storage space by storing train images in compressed domain and selecting significant features from superset of feature vectors for actual recognition.
Style APA, Harvard, Vancouver, ISO itp.
22

Malik, Ahmad Kamran, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh i Mohammad A. Alqarni. "From Conventional to State-of-the-Art IoT Access Control Models". Electronics 9, nr 10 (15.10.2020): 1693. http://dx.doi.org/10.3390/electronics9101693.

Pełny tekst źródła
Streszczenie:
The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same.
Style APA, Harvard, Vancouver, ISO itp.
23

Loncar-Turukalo, Tatjana, Eftim Zdravevski, José Machado da Silva, Ioanna Chouvarda i Vladimir Trajkovik. "Literature on Wearable Technology for Connected Health: Scoping Review of Research Trends, Advances, and Barriers". Journal of Medical Internet Research 21, nr 9 (5.09.2019): e14017. http://dx.doi.org/10.2196/14017.

Pełny tekst źródła
Streszczenie:
Background Wearable sensing and information and communication technologies are key enablers driving the transformation of health care delivery toward a new model of connected health (CH) care. The advances in wearable technologies in the last decade are evidenced in a plethora of original articles, patent documentation, and focused systematic reviews. Although technological innovations continuously respond to emerging challenges and technology availability further supports the evolution of CH solutions, the widespread adoption of wearables remains hindered. Objective This study aimed to scope the scientific literature in the field of pervasive wearable health monitoring in the time interval from January 2010 to February 2019 with respect to four important pillars: technology, safety and security, prescriptive insight, and user-related concerns. The purpose of this study was multifold: identification of (1) trends and milestones that have driven research in wearable technology in the last decade, (2) concerns and barriers from technology and user perspective, and (3) trends in the research literature addressing these issues. Methods This study followed the scoping review methodology to identify and process the available literature. As the scope surpasses the possibilities of manual search, we relied on the natural language processing tool kit to ensure an efficient and exhaustive search of the literature corpus in three large digital libraries: Institute of Electrical and Electronics Engineers, PubMed, and Springer. The search was based on the keywords and properties to be found in articles using the search engines of the digital libraries. Results The annual number of publications in all segments of research on wearable technology shows an increasing trend from 2010 to February 2019. The technology-related topics dominated in the number of contributions, followed by research on information delivery, safety, and security, whereas user-related concerns were the topic least addressed. The literature corpus evidences milestones in sensor technology (miniaturization and placement), communication architectures and fifth generation (5G) cellular network technology, data analytics, and evolution of cloud and edge computing architectures. The research lag in battery technology makes energy efficiency a relevant consideration in the design of both sensors and network architectures with computational offloading. The most addressed user-related concerns were (technology) acceptance and privacy, whereas research gaps indicate that more efforts should be invested into formalizing clear use cases with timely and valuable feedback and prescriptive recommendations. Conclusions This study confirms that applications of wearable technology in the CH domain are becoming mature and established as a scientific domain. The current research should bring progress to sustainable delivery of valuable recommendations, enforcement of privacy by design, energy-efficient pervasive sensing, seamless monitoring, and low-latency 5G communications. To complement technology achievements, future work involving all stakeholders providing research evidence on improved care pathways and cost-effectiveness of the CH model is needed.
Style APA, Harvard, Vancouver, ISO itp.
24

RAJ, RISHI, T. K. DAS, RAMANJIT KAUR, RAJ SINGH i KAPILA SHEKHAWAT. "Invasive noxious weed management research in India with special reference to Cyperus rotundus, Eichhornia crassipes and Lantana camara". Indian Journal of Agricultural Sciences 88, nr 2 (27.04.2018): 181–96. http://dx.doi.org/10.56093/ijas.v88i2.79160.

Pełny tekst źródła
Streszczenie:
Weeds are eternal pest causing substantial losses of crop yields and quality, which are directly related to food security and safety, respectively. With existing crop protection measures, approximately one-third yield losses occur globally due to weeds, in which contribution of invasive/ noxious weeds is enormous. Invasive/noxious weeds have become a challenge in developing Asian countries, especially in India. These invasive/noxious weeds are widely distributed in all kinds of ecosystems. Invasive species cause losses of native biodiversity including species extinctions, and changes in hydrology and ecosystem function. The total annual cost of dealing with invasive species worldwide is estimated to be in the hundreds of billions of dollars, including costs of control, detrimental effects on human health and losses in agricultural production and ecosystem services. An estimated 20-30% of all introduced species worldwide cause a problem in a way or the other. The list of invasive alien weed species for India is well documented and available in public domain. There are 173 invasive alien species documented in India belonging to 117 genera and 44 families, which represents 1% of the total Indian flora. Tropical American region contributes to the maximum number (with 128 species or 74%) followed by tropical Africa (11%). Other regions, which contribute marginally, are Afghanistan, Australia, Brazil, East Indies, Europe, Madagascar, Mascarene Islands, Mediterranean, Mexico, Peru, Temperate South America, Tropical West Asia, West Indies and Western Europe. Different weed management practices are used for controlling these weeds both in cropped and non-cropped situations. Among these options, none is enough to completely control these weeds. Thus, integration of all these weed management tools is needed to be done. Considering the extent of yield losses caused by these noxious weeds, a comprehensive, effective and well adoptable technology is urgently needed to overcome these challenges. This review article is based upon the most striking management approach for the noxious weeds. It also emphasizes the relevance of future research aspects, such as early detection tool by adopting satellite based remote sensing, application of biotechnological tools like development of herbicide resistant crops, development of new herbicides molecules, enforcement of strong legislation and research on alternate approaches like weeds use for industry (making paper, herbal medicine and bio-fuel) to ensure higher income and livelihood security of farmers.
Style APA, Harvard, Vancouver, ISO itp.
25

Kashmar, Nadine, Mehdi Adda, Hussein Ibrahim, Jean-François Morin i Tony Ducheman. "Instantiation and Implementation of HEAD Metamodel in an Industrial Environment: Non-IoT and IoT Case Studies". Electronics 12, nr 15 (25.07.2023): 3216. http://dx.doi.org/10.3390/electronics12153216.

Pełny tekst źródła
Streszczenie:
Access to resources can take many forms: digital access via an onsite network, through an external site, website, etc., or physical access to labs, machines, information repositories, etc. Whether access to resources is digital or physical, it must be allowed, denied, revoked, or disabled using robust and coherent access control (AC) models. What makes the process of AC more complicated is the emergence of digital transformation technologies and pervasive systems such as the internet of things (IoT) and industry 4.0 systems, especially with the growing demand for transparency in users’ interaction with various applications and services. Controlling access and ensuring security and cybersecurity in IoT and industry 4.0 environments is a challenging task. This is due to the increasing distribution of resources and the massive presence of cyber-threats and cyber-attacks. To ensure the security and privacy of users in industry sectors, we need an advanced AC metamodel that defines all the required components and attributes to derive various instances of AC models and follow the new and increasing demand for AC requirements due to continuous technology upgrades. Due to the several limitations in the existing metamodels and their inability to answer the current AC requirements, we have developed a Hierarchical, Extensible, Advanced, Dynamic (HEAD) AC metamodel with significant features that overcome the existing metamodels’ limitations. In this paper, the HEAD metamodel is employed to specify the needed AC policies for two case studies inspired by the computing environment of Institut Technologique de Maintenance Industrielle (ITMI)-Sept-Îles, QC, Canada; the first is for ITMI’s local (non-IoT) environment and the second for ITMI’s IoT environment. For each case study, the required AC model is derived using the domain-specific language (DSL) of HEAD metamodel, then Xtend notation (an expressive dialect of Java) is utilized to generate the needed Java code which represents the concrete instance of the derived AC model. At the system level, to get the needed AC rules, Cypher statements are generated and then injected into the Neo4j database to represent the Next Generation Access Control (NGAC) policy as a graph. NGAC framework is used as an enforcement point for the rules generated by each case study. The results show that the HEAD metamodel can be adapted and integrated into various local and distributed environments. It can serve as a unified framework, answer current AC requirements and follow policy upgrades. To demonstrate that the HEAD metamodel can be implemented on other platforms, we implement an administrator panel using VB.NET and SQL.
Style APA, Harvard, Vancouver, ISO itp.
26

Sanchez, Gabriella. "Critical Perspectives on Clandestine Migration Facilitation: An Overview of Migrant Smuggling Research". Journal on Migration and Human Security 5, nr 1 (marzec 2017): 9–27. http://dx.doi.org/10.1177/233150241700500102.

Pełny tekst źródła
Streszczenie:
Current representations of large movements of migrants and asylum seekers have become part of the global consciousness. Media viewers are bombarded with images of people from the global south riding atop of trains, holding on to dinghies, arriving at refugee camps, crawling beneath wire fences or being rescued after being stranded in the ocean or the desert for days. Images of gruesome scenes of death in the Mediterranean or the Arizona or Sahara deserts reveal the inherent risks of irregular migration, as bodies are pulled out of the water or corpses are recovered, bagged, and disposed of, their identities remaining forever unknown. Together, these images communicate a powerful, unbearable feeling of despair and crisis. Around the world, many of these tragedies are attributed to the actions of migrant smugglers, who are almost monolithically depicted as men from the Global South organized in webs of organized criminals whose transnational reach allows them to prey on migrants and asylum seekers' vulnerabilities. Smugglers are described as callous, greedy, and violent. Reports on efforts to contain their influence and strength are also abundant in official narratives of border and migration control. The risks inherent to clandestine journeys and the violence people face during these transits must not be denied. Many smugglers do take advantage of the naivetέ and helplessness of migrants, refugees, and asylum seekers, stripping them of their valuables and abandoning them to their fate during their journeys. Yet, as those working directly with migrants and asylum seekers in transit can attest, the relationships that emerge between smugglers and those who rely on their services are much more complex, and quite often, significantly less heinous than what media and law enforcement suggest. The visibility of contemporary, large migration movements has driven much research on migrants' clandestine journeys and their human rights implications. However, the social contexts that shape said journeys and their facilitation have not been much explored by researchers (Achilli 2015). In other words, the efforts carried out by migrants, asylum seekers, and their families and friends to access safe passage have hardly been the target of scholarly analysis, and are often obscured by the more graphic narratives of victimization and crime. In short, knowledge on the ways migrants, asylum seekers, and their communities conceive, define, and mobilize mechanisms for irregular or clandestine migration is limited at best. The dichotomist script of smugglers as predators and migrants and asylum seekers as victims that dominates narratives of clandestine migration has often obscured the perspectives of those who rely on smugglers for their mobility. This has not only silenced migrants and asylum seekers' efforts to reach safety, but also the collective knowledge their communities use to secure their mobility amid increased border militarization and migration controls. This paper provides an overview of contemporary, empirical scholarship on clandestine migration facilitation. It then argues that the processes leading to clandestine or irregular migration are not merely the domain of criminal groups. Rather, they also involve a series of complex mechanisms of protection crafted within migrant and refugee communities as attempts to reduce the vulnerabilities known to be inherent to clandestine journeys. Both criminal and less nefarious efforts are shaped by and in response to enforcement measures worldwide on the part of nation-states to control migration flows. Devised within migrant and refugee communities, and mobilized formally and informally among their members, strategies to facilitate clandestine or irregular migration constitute a system of human security rooted in generations-long, historical notions of solidarity, tradition, reciprocity, and affect (Khosravi 2010). Yet amid concerns over national and border security, and the reemergence of nationalism, said strategies have become increasingly stigmatized, traveling clandestinely being perceived as an inherently — and uniquely — criminal activity. This contribution constitutes an attempt to critically rethink the framework present in everyday narratives of irregular migration facilitation. It is a call to incorporate into current protection dialogs the perceptions of those who rely on criminalized migration mechanisms to fulfill mobility goals, and in so doing, articulate and inform solutions towards promoting safe and dignifying journeys for all migrants and asylum seekers in transit.
Style APA, Harvard, Vancouver, ISO itp.
27

Tsai, Jason, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld i Milind Tambe. "Urban Security: Game-Theoretic Resource Allocation in Networked Domains". Proceedings of the AAAI Conference on Artificial Intelligence 24, nr 1 (4.07.2010): 881–86. http://dx.doi.org/10.1609/aaai.v24i1.7612.

Pełny tekst źródła
Streszczenie:
Law enforcement agencies frequently must allocate limited resources to protect targets embedded in a network, such as important buildings in a city road network. Since intelligent attackers may observe and exploit patterns in the allocation, it is crucial that the allocations be randomized. We cast this problem as an attacker-defender Stackelberg game: the defender’s goal is to obtain an optimal mixed strategy for allocating resources. The defender’s strategy space is exponential in the number of resources, and the attacker’s exponential in the network size. Existing algorithms are therefore useless for all but the smallest networks. We present a solution approach based on two key ideas: (i) A polynomial-sized game model obtained via an approximation of the strategy space, solved efficiently using a linear program; (ii) Two efficient techniques that map solutions from the approximate game to the original, with proofs of correctness under certain assumptions. We present in-depth experimental results, including an evaluation on part of the Mumbai road network.
Style APA, Harvard, Vancouver, ISO itp.
28

István, Zsolt, Soujanya Ponnapalli i Vijay Chidambaram. "Software-defined data protection". Proceedings of the VLDB Endowment 14, nr 7 (marzec 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.

Pełny tekst źródła
Streszczenie:
Most modern data processing pipelines run on top of a distributed storage layer, and securing the whole system, and the storage layer in particular, against accidental or malicious misuse is crucial to ensuring compliance to rules and regulations. Enforcing data protection and privacy rules, however, stands at odds with the requirement to achieve higher and higher access bandwidths and processing rates in large data processing pipelines. In this work we describe our proposal for the path forward that reconciles the two goals. We call our approach "Software-Defined Data Protection" (SDP). Its premise is simple, yet powerful: decoupling often changing policies from request-level enforcement allows distributed smart storage nodes to implement the latter at line-rate. Existing and future data protection frameworks can be translated to the same hardware interface which allows storage nodes to offload enforcement efficiently both for company-specific rules and regulations, such as GDPR or CCPA. While SDP is a promising approach, there are several remaining challenges to making this vision reality. As we explain in the paper, overcoming these will require collaboration across several domains, including security, databases and specialized hardware design.
Style APA, Harvard, Vancouver, ISO itp.
29

Naja, Rola, Nadia Mouawad i Ali J. Ghandour. "Spatio-temporal optimal law enforcement using Stackelberg games." Lebanese Science Journal 18, nr 2 (27.12.2017): 244–54. http://dx.doi.org/10.22453/lsj-018.2.244-254.

Pełny tekst źródła
Streszczenie:
Every year, road accidents claim the lives of around 1.2 million worldwide (USDOT-NHTSA, 2012). Deploying speed traps helps bounding vehicles speed and reducing collisions. Nevertheless, deterministic speed traps deployment in both spatial and temporal domains, allow drivers to learn and anticipate covered areas. In this paper, we present a novel framework that provides randomized speed traps deployment schedule. It uses game theory in order to model drivers and law enforcers’ behavior. In this context, Stackelberg security game is used to derive best strategies to deploy. The game optimal solution maximizes law enforcer utility. This research work aims to optimize the deployment of speed traps on Lebanese highways according to the accidents probability input data. This work complements the near real time accident map provided by the Lebanese National Council for Scientific Research and designs an optimal speed trap map targeting Lebanese highways.
Style APA, Harvard, Vancouver, ISO itp.
30

Weiss, Moritz, i Simon Dalferth. "Security Re-Divided: The Distinctiveness of Policy-Making in ESDP and JHA". Cooperation and Conflict 44, nr 3 (20.08.2009): 268–87. http://dx.doi.org/10.1177/0010836709106216.

Pełny tekst źródła
Streszczenie:
In this article, we argue that the premature abolishment of the allegedly anachronistic concepts of internal versus external security is of doubtful heuristic value for the study of security practices. The two domains may gradually converge from the perspective of problems, but do so much less in terms of political practices. We show that security policy is pursued according to different systems of rules. It follows distinct institutional logics. We undertake a systematic comparison of policy-making in the European Union’s Security and Defence Policy (ESDP) and Justice and Home Affairs (JHA). It is structured along the distinction between making and implementing an agreement as indicative stages of the policy-making process. First, rule-setting asks how decisions are made in the two domains: with or without the inclusion of external actors. Second, we explore whether the implementation of political decisions involves management or enforcement mechanisms. The empirical results are unambiguous: the political actors follow different systems of rules in the two domains. There are still ‘ideal-typical’ differences in a Weberian sense. This implies that internal and external security may be closely linked, like the opposite sides of the same coin, but must be separated for the purpose of analytical clarity.
Style APA, Harvard, Vancouver, ISO itp.
31

Awad, Mamoun, Latifur Khan i Bhavani Thuraisingham. "Policy Enforcement System for Inter-Organizational Data Sharing". International Journal of Information Security and Privacy 4, nr 3 (lipiec 2010): 22–39. http://dx.doi.org/10.4018/jisp.2010070102.

Pełny tekst źródła
Streszczenie:
Sharing data among organizations plays an important role in security and data mining. In this paper, the authors describe a Data Sharing Miner and Analyzer (DASMA) system that simulates data sharing among N organizations. Each organization has its own enforced policy. The N organizations share their data based on trusted third party. The system collects the released data from each organization, processes it, mines it, and analyzes the results. Sharing in DASMA is based on trusted third parties. However, organizations may encode some attributes, for example. Each organization has its own policy represented in XML format. This policy states what attributes can be released, encoded, and randomized. DASMA processes the data set and collects the data, combines it, and prepares it for mining. After mining, a statistical report is produced stating the similarities between mining with data sharing and mining without sharing. The authors test, apply data sharing, enforce policy, and analyze the results of two separate datasets in different domains. The results indicate a fluctuation on the amount of information loss using different releasing factors.
Style APA, Harvard, Vancouver, ISO itp.
32

Perko, Igor, i Peter Ototsky. "Big Data for Business Ecosystem Players". Naše gospodarstvo/Our economy 62, nr 2 (1.06.2016): 12–24. http://dx.doi.org/10.1515/ngoe-2016-0008.

Pełny tekst źródła
Streszczenie:
Abstract In the provided research, some of the Big Data most prospective usage domains connect with distinguished player groups found in the business ecosystem. Literature analysis is used to identify the state of the art of Big Data related research in the major domains of its use-namely, individual marketing, health treatment, work opportunities, financial services, and security enforcement. System theory was used to identify business ecosystem major player types disrupted by Big Data: individuals, small and mid-sized enterprises, large organizations, information providers, and regulators. Relationships between the domains and players were explained through new Big Data opportunities and threats and by players’ responsive strategies. System dynamics was used to visualize relationships in the provided model.
Style APA, Harvard, Vancouver, ISO itp.
33

Berlato, Stefano, Roberto Carbone, Adam J. Lee i Silvio Ranise. "Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud". ACM Transactions on Privacy and Security 25, nr 1 (28.02.2022): 1–37. http://dx.doi.org/10.1145/3474056.

Pełny tekst źródła
Streszczenie:
To facilitate the adoption of cloud by organizations, Cryptographic Access Control (CAC) is the obvious solution to control data sharing among users while preventing partially trusted Cloud Service Providers (CSP) from accessing sensitive data. Indeed, several CAC schemes have been proposed in the literature. Despite their differences, available solutions are based on a common set of entities—e.g., a data storage service or a proxy mediating the access of users to encrypted data—that operate in different (security) domains—e.g., on-premise or the CSP. However, the majority of these CAC schemes assumes a fixed assignment of entities to domains; this has security and usability implications that are not made explicit and can make inappropriate the use of a CAC scheme in certain scenarios with specific trust assumptions and requirements. For instance, assuming that the proxy runs at the premises of the organization avoids the vendor lock-in effect but may give rise to other security concerns (e.g., malicious insiders attackers). To the best of our knowledge, no previous work considers how to select the best possible architecture (i.e., the assignment of entities to domains) to deploy a CAC scheme for the trust assumptions and requirements of a given scenario. In this article, we propose a methodology to assist administrators in exploring different architectures for the enforcement of CAC schemes in a given scenario. We do this by identifying the possible architectures underlying the CAC schemes available in the literature and formalizing them in simple set theory. This allows us to reduce the problem of selecting the most suitable architectures satisfying a heterogeneous set of trust assumptions and requirements arising from the considered scenario to a decidable Multi-objective Combinatorial Optimization Problem (MOCOP) for which state-of-the-art solvers can be invoked. Finally, we show how we use the capability of solving the MOCOP to build a prototype tool assisting administrators to preliminarily perform a “What-if” analysis to explore the trade-offs among the various architectures and then use available standards and tools (such as TOSCA and Cloudify) for automated deployment in multiple CSPs.
Style APA, Harvard, Vancouver, ISO itp.
34

Rublovskis, Raimonds. "RE-THINKING OF NATIONAL SECURITY IN THE AGE OF PANDEMICS". Baltic Journal of Legal and Social Sciences, nr 2 (4.04.2022): 15–25. http://dx.doi.org/10.30525/2592-8813-2021-2-2.

Pełny tekst źródła
Streszczenie:
The magnitude of COVID-19 pandemic caught the world off guard. Therefore, strategic anticipation in policy making, exit strategy out from COVID-19 environment, and strategic impact of the pandemic for international, regional, and national security in post-COVID-19 world will be the most important issues in the foreseeable future. Increasingly complex and complicated strategic security environment of the beginning of the 21st century will be characterized by further global and regional instability in failed and/or failing states, and regional crises and conflicts. Moreover, global security environment in post-COVID-19 world will finalize transition from unipolar, the United States dominated global security framework – legacy of post- Cold War settlement after the collapse of the Soviet Union in 1991-into multipolar global security order with China, Russian Federation, India and other actors who will be increasingly challenging the United States and the West politically, economically and militarily. Post-COVID-19 global security environment will be further challenged by decreased ability of international organizations, such as UN, OSCE, EU, and others, to address urgent and simultaneous security threats and challenges, therefore, the role of the state will increase bothinternationally and domestically. However, since numbers of states are rather weak in terms of social cohesion and institutional capability- these states will be increasingly vulnerable to maintain effective institutional framework in order to address security challenges of the post-COVID-19 world. Moreover, these security challenges will specifically target small states due to the fact that small states are heavily dependent for their own security and defence arrangements on politically powerful and militarily capable global actors, therefore, small states will become increasingly vulnerable to address their political, social, economic and military challenges. The threat of terrorism, illegal migration, conventional military conflict, organized crime, cyber threats, CBRN threats, conventional arms control (CAC) issue, further development and control of nuclear weapons, non-proliferation of weapons of mass destruction- these are just a few domains of global and regional security, which will remain of utmost importance in post-COVID-19 world. Subsequently, defence, security and law enforcement institutions will face substantial legal, operational, moral, and institutional challenges in post-COVID-19 security environment. These challenges will include the limits of recruitment, standing operational procedures (SOP), rules of engagement (ROE), morale of personnel, and other relevant domains. Moreover, possibility of open involvement of active and former members of defence, security and law enforcement institutions into internal political affairs of a state will significantly increase.
Style APA, Harvard, Vancouver, ISO itp.
35

Samimian-Darash, Limor, i Meg Stalcup. "Anthropology of security and security in anthropology: Cases of counterterrorism in the United States". Anthropological Theory 17, nr 1 (7.11.2016): 60–87. http://dx.doi.org/10.1177/1463499616678096.

Pełny tekst źródła
Streszczenie:
In this article we propose a mode of analysis that allows us to consider security as a form distinct from insecurity, in order to capture the heterogeneity of security objects, logics and forms of action. We first develop a genealogy for the anthropology of security, demarcating four main approaches: violence and state terror; military, militarization, and militarism; para-state securitization; and what we submit as ‘security assemblages.’ Security assemblages move away from focusing on security formations per se, and how much violence or insecurity they yield, to identifying and studying security forms of action, whether or not they are part of the nation-state. As an approach to anthropological inquiry and theory, it is oriented toward capturing how these forms of action work and what types of security they produce. We illustrate security assemblages through our fieldwork on counterterrorism in the domains of law enforcement, biomedical research and federal-state counter-extremism, in each case arriving at a diagnosis of the form of action. The set of distinctions that we propose is intended as an aid to studying empirical situations, particularly of security, and, on another level, as a proposal for an approach to anthropology today. We do not expect that the distinctions that aid us will suffice in every circumstance. Rather, we submit that this work presents a set of specific insights about contemporary US security, and an example of a new approach to anthropological problems.
Style APA, Harvard, Vancouver, ISO itp.
36

Apostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras i Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions". Open Research Europe 1 (21.01.2022): 87. http://dx.doi.org/10.12688/openreseurope.13715.2.

Pełny tekst źródła
Streszczenie:
Background: Augmented reality (AR) and artificial intelligence (AI) are highly disruptive technologies that have revolutionised practices in a wide range of domains, including the security sector. Several law enforcement agencies (LEAs) employ AI in their daily operations for forensics and surveillance. AR is also gaining traction in security, particularly with the advent of affordable wearable devices. Equipping police officers with the tools to facilitate an elevated situational awareness (SA) in patrolling and tactical scenarios is expected to improve LEAs’ safety and capacity to deliver crucial blows against terrorist and/or criminal threats. Methods: In this paper we present DARLENE, an ecosystem incorporating novel AI techniques for activity recognition and pose estimation tasks, combined with a wearable AR framework for visualization of the inferenced results via dynamic content adaptation according to the wearer’s stress level and operational context. The concept has been validated with end-users through co-creation workshops, while the decision-making mechanism for enhancing LEAs’ SA has been assessed with experts. Regarding computer vision components, preliminary tests of the instance segmentation method for humans’ and objects’ detection have been conducted on a subset of videos from the RWF-2000 dataset for violence detection, which have also been used to test a human pose estimation method that has so far exhibited impressive results, constituting the basis of further developments in DARLENE. Results: Evaluation results highlight that target users are positive towards the adoption of the proposed solution in field operations, and that the SA decision-making mechanism produces highly acceptable outcomes. Evaluation of the computer vision components yielded promising results and identified opportunities for improvement. Conclusions: This work provides the context of the DARLENE ecosystem and presents the DARLENE architecture, analyses its individual technologies, and demonstrates preliminary results, which are positive both in terms of technological achievements and user acceptance of the proposed solution.
Style APA, Harvard, Vancouver, ISO itp.
37

Kasum, Josip, Marko Pilić, Nebojša Jovanović i Harrison Pienaar. "Model of Forensic Hydrography". Transactions on Maritime Science 8, nr 2 (21.10.2019): 246–52. http://dx.doi.org/10.7225/toms.v08.n02.010.

Pełny tekst źródła
Streszczenie:
Forensic science plays a vital role in the work of judicial bodies. The contents, knowledge, and specialized expertise permit the identification of facts essential to law enforcement and judicial disputes. Hydrography is an applied science that concerns the physical description, measurement, mapping, and predictions of marine and terrestrial water features (ocean, seas, rivers, lakes, and coastal areas). A variety of economic and other activities take place in water resources. In order to reduce incidents and losses, it is extremely important to operate with accurate hydrographic data. In addition to its standard analytical role, forensics may serve in the prevention of adverse events and /or conditions. This paper aims at contributing towards the development of the new multidisciplinary field of forensic hydrography. The specific objectives are to provide a framework for the establishment of a model of forensic hydrography. A model of forensic hydrography is developed based on eleven modules (elements) relevant to fields in the marine, terrestrial, and coastal water domains. Forensic hydrography should serve the analysis and prevention of unwanted and other events and conditions to increase safety of navigation and security of water resources and in support of all other marine activities, including economic development, defence, safety and security, scientific research, social cohesion, as well as environmental management and conservation.
Style APA, Harvard, Vancouver, ISO itp.
38

Schwab, Abraham P., Hung S. Luu, Jason Wang i Jason Y. Park. "Genomic Privacy". Clinical Chemistry 64, nr 12 (1.12.2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.

Pełny tekst źródła
Streszczenie:
Abstract BACKGROUND Genetic information is unique among all laboratory data because it not only informs the current health of the specific person tested but may also be predictive of the future health of the individual and, to varying degrees, all biological relatives. CONTENT As DNA sequencing has become ubiquitous with decreasing cost, large repositories of genomic data have emerged from the domains of research, healthcare, law enforcement, international security, and recreational consumer interest (i.e., genealogy). Broadly shared genomic data are believed to be a key element for future discoveries in human disease. For example, the National Cancer Institute's Genomic Data Commons is designed to promote cancer research discoveries by providing free access to the genome data sets of 12000 cancer patients. However, in parallel with the promise of curing diseases, genomic data also have the potential for harm. Genomic data that are deidentified by standard healthcare practices (e.g., removal of name, date of birth) can be reidentified by methods that combine genomic software with publicly available demographic databases (e.g., phone book). Recent law enforcement cases (i.e., Bear Brook Murders, Golden State Killer) in the US have demonstrated the power of combining DNA profiles with genealogy databases. SUMMARY We examine the current environment of genomic privacy and confidentiality in the US and describe current and future risks to genomic privacy. Reidentification and inference of genetic information of biological relatives will become more important as larger databases of clinical, criminal, and recreational genomic information are developed over the next decade.
Style APA, Harvard, Vancouver, ISO itp.
39

Kampas, Giorgos, Aggelos Vasileiou, Marios Antonakakis, Michalis Zervakis, Emmanouil Spanakis, Vangelis Sakkalis, Peter Leškovský i in. "Design of Sensors’ Technical Specifications for Airborne Surveillance at Borders". Journal of Defence & Security Technologies 5, nr 1 (2022): 58–83. http://dx.doi.org/10.46713/jdst.005.04.

Pełny tekst źródła
Streszczenie:
The need for fast and precise information in combination with the huge technological developments concerning drone, information and sensor technologies, over the last few years, promoted the use of Unmanned Aerial Systems (UAS) in several domains ranging from agriculture to surveillance applications. The unique opportunity that UAVs and the accompanied payloads offer for acquisition of real time and precise data, make them a valuable asset especially for Law Enforcement Agencies that benefit from UAV’s capabilities, preventing or efficiently responding to several cases. Focusing on border external security, the continuous reports on cross border illegal activities apply constant pressure to Border Guard Authorities that aim to safeguard European borders, highlighting in this way, the need of new technologies and ways that will guarantee efficient border surveillance. In this framework, this paper analyses the methodological steps followed and the outcomes derived in the process of requirements identification up to the extraction of specifications, concerning an unmanned aerial system and its payload meaning the respective s censors for border surveillance that are capable of supporting border guard authorities on surveillance and search and rescue missions.
Style APA, Harvard, Vancouver, ISO itp.
40

Curl, Cynthia L., Lisa Meierotto i Rebecca L. Som Castellano. "Understanding Challenges to Well-Being among Latina FarmWorkers in Rural Idaho Using in an Interdisciplinary, Mixed-Methods Approach". International Journal of Environmental Research and Public Health 18, nr 1 (29.12.2020): 169. http://dx.doi.org/10.3390/ijerph18010169.

Pełny tekst źródła
Streszczenie:
The aim of this study was to identify social, cultural and workplace-related risk factors affecting well-being among Latina farmworkers in rural Idaho. We recruited 70 Latina farmworkers from southwestern Idaho in 2019. We employed an inter-disciplinary, mixed-methods approach—including surveys, focus groups, interviews, and pesticide biomonitoring—to characterize multiple domains that influence well-being, including food security and access, housing conditions, social supports, access to medical care, and workplace safety. Six major themes emerged as primary challenges to Latina farmworkers’ well-being. In the public sphere, study participants identified these challenges as long working hours, concerns regarding pesticide exposure, and lack of enforcement of regulatory protections. Participants’ concerns regarding pesticide exposure were underscored by biological sampling results; multiple biomarkers of pesticide exposure were detected in all samples, with the highest concentrations measured in samples collected from women who reported mixing, loading or applying pesticides. Within the private sphere, food security and provisioning, childcare responsibilities, and social isolation were identified as significant challenges to well-being. Gender, ethnicity, and geography emerged as important, intersecting statuses that shaped the life experiences of these agricultural workers. Our findings suggest that gender may play a particularly critical role in the unique challenges facing Latina farmworkers. As a result, the services and regulations needed to support well-being in this population may be highly specific, and almost certainly include attention to work–family dynamics, pesticide exposure, and social connections.
Style APA, Harvard, Vancouver, ISO itp.
41

Diamantopoulou, Vasiliki, i Haralambos Mouratidis. "Practical evaluation of a reference architecture for the management of privacy level agreements". Information & Computer Security 27, nr 5 (11.11.2019): 711–30. http://dx.doi.org/10.1108/ics-04-2019-0052.

Pełny tekst źródła
Streszczenie:
Purpose The enforcement of the General Data Protection Regulation imposes specific privacy- and -security related requirements that any organisation that processes European Union citizens’ personal data must comply with. The application of privacy- and security-by-design principles are assisting organisation in achieving compliance with the Regulation. The purpose of this study is to assist data controllers in their effort to achieve compliance with the new Regulation, by proposing the adoption of the privacy level agreement (PLA). A PLA is considered as a formal way for the data controllers and the data subjects to mutually agree the privacy settings of a service provisioned. A PLA supports privacy management, by analysing privacy threats, vulnerabilities and information systems’ trust relationships. Design/methodology/approach However, the concept of PLA has only been proposed on a theoretical level. To this aim, two different domains have been selected acting as real-life case studies, the public administration and the health care, where special categories of personal data are processed. Findings The results of the evaluation of the adoption of the PLA by the data controllers are positive. Furthermore, they indicate that the adoption of such an agreement facilitates data controllers in demonstrating transparency of their processes. Regarding data subjects, the evaluation process revealed that the use of the PLA increases trust levels on data controllers. Originality/value This paper proposes a novel reference architecture to enable PLA management in practice and reports on the application and evaluation of PLA management.
Style APA, Harvard, Vancouver, ISO itp.
42

Yadav, Priya R. "Review Paper on Introduction to Cyber Forensics". International Journal for Research in Applied Science and Engineering Technology 9, nr 8 (31.08.2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.

Pełny tekst źródła
Streszczenie:
Abstract: Cyber Forensics is termed as scientific methods or applications in association with the judiciary or court of laws. The aim behind these methods is to unveil the digital evidence to be utilized in court for solving crime cases. This sort of technology wasn’t practiced before therefore most criminals tend to urge away with their criminal acts without valid proof to incriminate or prosecute them. During that time the oaths, confessions, testimonies from witnesses were the sole determining factors of evidence Crimes committed within electronic or digital domains, particularly within cyberspace, have become common. Criminals are using technology to commit their offenses and make new challenges for law enforcement agents, attorneys, judges, military, and security professionals. Digital forensics has become a vital instrument in identifying and solving computer-based and computerassisted crime. This paper provides a quick introduction to cyber forensics. During this paper we present a typical model for both Incident Response and Computer Forensics processes which mixes their advantages in an exceedingly flexible way: It allows for a management oriented approach in digital investigations while retaining the chance of a rigorous forensics investigation. Keywords: cyber forensics, digital forensic science, computer forensics, evidence, judicial system.
Style APA, Harvard, Vancouver, ISO itp.
43

Apostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras i Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions". Open Research Europe 1 (30.07.2021): 87. http://dx.doi.org/10.12688/openreseurope.13715.1.

Pełny tekst źródła
Streszczenie:
Background: Augmented reality (AR) and artificial intelligence (AI) are highly disruptive technologies that have revolutionised practices in a wide range of domains. Their potential has not gone unnoticed in the security sector with several law enforcement agencies (LEAs) employing AI applications in their daily operations for forensics and surveillance. In this paper, we present the DARLENE ecosystem, which aims to bridge existing gaps in applying AR and AI technologies for rapid tactical decision-making in situ with minimal error margin, thus enhancing LEAs’ efficiency and Situational Awareness (SA). Methods: DARLENE incorporates novel AI techniques for computer vision tasks such as activity recognition and pose estimation, while also building an AR framework for visualization of the inferenced results via dynamic content adaptation according to each individual officer’s stress level and current context. The concept has been validated with end-users through co-creation workshops, while the decision-making mechanism for enhancing LEAs’ SA has been assessed with experts. Regarding computer vision components, preliminary tests of the instance segmentation method for humans’ and objects’ detection have been conducted on a subset of videos from the RWF-2000 dataset for violence detection, which have also been used to test a human pose estimation method that has so far exhibited impressive results and will constitute the basis of further developments in DARLENE. Results: Evaluation results highlight that target users are positive towards the adoption of the proposed solution in field operations, and that the SA decision-making mechanism produces highly acceptable outcomes. Evaluation of the computer vision components yielded promising results and identified opportunities for improvement. Conclusions: This work provides the context of the DARLENE ecosystem and presents the DARLENE architecture, analyses its individual technologies, and demonstrates preliminary results, which are positive both in terms of technological achievements and user acceptance of the proposed solution.
Style APA, Harvard, Vancouver, ISO itp.
44

Dahlberg, Rasmus, Tobias Pulls, Tom Ritter i Paul Syverson. "Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor". Proceedings on Privacy Enhancing Technologies 2021, nr 2 (29.01.2021): 194–213. http://dx.doi.org/10.2478/popets-2021-0024.

Pełny tekst źródła
Streszczenie:
Abstract The security of the web improved greatly throughout the last couple of years. A large majority of the web is now served encrypted as part of HTTPS, and web browsers accordingly moved from positive to negative security indicators that warn the user if a connection is insecure. A secure connection requires that the server presents a valid certificate that binds the domain name in question to a public key. A certificate used to be valid if signed by a trusted Certificate Authority (CA), but web browsers like Google Chrome and Apple’s Safari have additionally started to mandate Certificate Transparency (CT) logging to overcome the weakest-link security of the CA ecosystem. Tor and the Firefox-based Tor Browser have yet to enforce CT. In this paper, we present privacy-preserving and incrementally-deployable designs that add support for CT in Tor. Our designs go beyond the currently deployed CT enforcements that are based on blind trust: if a user that uses Tor Browser is man-in-the-middled over HTTPS, we probabilistically detect and disclose cryptographic evidence of CA and/or CT log misbehavior. The first design increment allows Tor to play a vital role in the overall goal of CT: detect mis-issued certificates and hold CAs accountable. We achieve this by randomly cross-logging a subset of certificates into other CT logs. The final increments hold misbehaving CT logs accountable, initially assuming that some logs are benign and then without any such assumption. Given that the current CT deployment lacks strong mechanisms to verify if log operators play by the rules, exposing misbehavior is important for the web in general and not just Tor. The full design turns Tor into a system for maintaining a probabilistically-verified view of the CT log ecosystem available from Tor’s consensus. Each increment leading up to it preserves privacy due to and how we use Tor.
Style APA, Harvard, Vancouver, ISO itp.
45

Lajaunie, Claire, Burkhard Schafer i Pierre Mazzega. "Big Data Enters Environmental Law". Transnational Environmental Law 8, nr 3 (31.10.2019): 523–45. http://dx.doi.org/10.1017/s2047102519000335.

Pełny tekst źródła
Streszczenie:
AbstractBig Data is now permeating environmental law and affecting its evolution. Data-driven innovation is highlighted as a means for major organizations to address social and global challenges. We present various contributions of Big Data technologies and show how they transform our knowledge and understanding of domains regulated by environmental law – environmental changes, socio-ecological systems, sustainable development issues – and of environmental law itself as a complex system. In particular, the mining of massive data sets makes it possible to undertake concrete actions dedicated to the elaboration, production, implementation, follow-up, and adaptation of the environmental targets defined at various levels of decision making (from the international to the subnational level).This development calls into question the traditional approach to legal epistemology and ethics, as implementation and enforcement of rules take on new forms, such as regulation through smart environmental targets and securing legal compliance through the design of technological artefacts. The entry of Big Data therefore requires the development of a new and specific epistemology of environmental law.
Style APA, Harvard, Vancouver, ISO itp.
46

BROŽIČ, LILIANA. "CONTEMPORARY MILITARY CHALLENGES IN ENGLISH – A PROBLEM OR AN OPPORTUNITY". CONTEMPORARY MILITARY CHALLENGES 2011, nr 13/4 (15.10.2011): 11–14. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.13.4.00.

Pełny tekst źródła
Streszczenie:
Dear readers,You are looking at a new edition of the Contemporary Military Challenges, which includes contributions by the authors employed in Slovenian defence system; all except for one work in the Slovenian Armed Forces. This continues our tradition that the last issue in a year includes Slovenian military authors.The previous, thematic, issue devoted to hybrid threats was published entirely in English. It drew different responses from the readers, although some articles have also been published in Slovene on our website. We have received a letter from a reader, who specifically highlighted the problem of publishing a Slovenian pu-blication in English. He agreed that his letter be published on the website of the Contemporary Military Challenges, where our reply is also published (in Slovene). The reader mainly underlined his concern about the preservation and development of Slovene military language. Indirectly, he listed a few hesitations for which we believe deserve a few explanations related to the publication of the Contemporary Military Challenges.Within the framework of developing military professional literature, which is imposed by the Defence Act, the Slovenian Armed Forces publish several different periodicals, such as Vojaškošolski zbornik (Military Education Journal), Vojaška zgodovina (Military History) and other occasional publications (Prava smer, Prvi, Modri, etc.). The Ministry of Defence, on the other hand, also publishes a biweekly Slovenska vojska (Slovenian Armed Forces).Among all the publications published by the Slovenian Armed Forces, the Contemporary Military Challenges are the only publication ranking among scienti-fic and professional publications. It is included in the Slovenian Research Agency’s list of magazines. One of the quality conditions for publications to be included in this list is that one of the four issues in a year be published in English. In line with the higher education legislation, the publication of articles in a periodical of such rank provides authors with habilitation points. Therefore, the authors take this as a form of motivation, both, for external scientists and experts as well as for those employed in Slovenian defence system. The importance of developing quality Slovenian military scientific and professional subjects has been discussed in several articles by many Slovenian authors1. As for the younger generations, a number of experts and scientists from various faculties and other institutions have cooperated with our Editorial Board. Since the publication was indexed in an international database, the interest of foreign and Slovenian authors to publish in our publication has increased. All in all, the number of quality writers in Slovenian defence system has been increasing, which is evident from the articles and statistics published on our website. The Editorial Board has developed links and cooperation with various command and staff schools in the EU and NATO. We exchange experiences, knowledge and new findings. We wish for other military experts and scientists to be able to publish their articles in the Slovenian Armed Forces publication, but our main wish is for other people from partner countries to be able to learn about our knowledge and experiences. A value added undoubtedly lies in the exchange of articles with foreign military scientific and professional publications, and cooperation among editorial boards2. We have developed cooperation with the institutions such as Center for Civil-Military Relations from Monterey, USA; European Center for Security Studies George C. Marshall from Germany; Research Institute for European and American Studies from Greece and others. Different experts take part in the process of developing Slovenian military literature, including proofreaders and translators. The cooperation of both has resulted in the publication of several Slovenian terminology handbooks and dictionaries3. We can thus write with an easy conscience that, we, at the Ministry of Defence and the Slovenian Armed Forces are doing our best to provide for quality development of Slovenian military literature and terminology. However, it is true that a lot remains to be done. Of course, the above-mentioned facts are not perceived as a reason to rest on our laurels. International security environment is a very dynamic one and the Slovenian Armed Forces constitute a part of it. Our daily routine in this environment represents a constant challenge and demonstrates a need for confirming our quality. Personally, I am convinced that the Slovene language with a long tradition in the Slovenian Armed Forces is under no threat. I believe that today’s membership and the role of our country in international structures differs a great deal from the one from our former common country. The proofreaders and translators, who have been supporting the making of the Contemporary Military Challenges for thirteen years, perceive the development of their domain as an every-day challenge rather than a problem. On the other hand, it also represents an excellent opportunity for the print media, the development of Slovenian military science and professional literature, and the exchange of knowledge with others. The opinions of our readers are a precious stimulation for the reflexions about the accuracy of our goals and, of course, about the best way to attain them. In addition to other factors, our decisions have lately also been largely influenced by the financial aspects of publishing our publication. As usual, we kindly invite all who would like to contribute to the development of military subjects to participate in the making of the Contemporary Military Challenges. You are, of course, welcome to contribute polemics and comments; however, professional and scientific articles written in line with the “Instructions for the Authors of Papers”, which we publish at the end of our publication, are a better way of developing the quality of military literature. In this issue of the Contemporary Military Challenges, Tanja Pečnik introduces a subject entitled Geopolitical Determination of the Slovenian Armed Forces – Formation of Multinational Forces in the Area of Western Balkans. Her aim was to verify the possibility of Slovenia or any of other former Yugoslav republics thinking about expanding their geopolitical influence by building closer military relations. Comprehensive operations planning in NATO has been discussed by Jože Grozde who claims that the resolution of crisis in post-Cold War conflicts by using military force has proved ineffective, since it does not guarantee significant improvements in the security situation. NATO has introduced comprehensive operations planning in support of the comprehensive approach of the international community to the resolution of complex crises. In his Command and Control Paradigm in the Enforcement of Military Discipline, Vojko Obrulj discusses military discipline from two aspects, i.e. as an individual’s attitude towards military discipline, and as a behavioural discipline. Regulations or Code of Conduct and Behaviour for the Providers of Education and Training in the Slovenian Armed Forces is a subject which stimulated the writing of Mojca Pešec. The providers of education and training are obliged to attain the highest competence standards and to respect the values regulating mutual relation-ships of the participants. She therefore proposes the adoption of such a document.In his article entitled Views of Slovenian Armed Forces Members on Postings to International Duties Abroad, Branko Podbrežnik presents the results of a research he conducted among these service members. He has found that, in this respect, the latter have to cope with various challenges concerning them personally, their life and work, as well as the life of their families. Finally, the author discusses the way the defence system provides its support.The Challenges of Development Strategy Regarding Information and Communications Technology Services have inspired the writing of Mihael Nagelj. According to his findings, the experiences regarding the implementation of business strategies in modern organisations had shown that strategies can only be implemented by using advanced information technologies.We wish you pleasant reading. Perhaps the above-mentioned subjects will inspire an idea for a new or an already familiar subject which could be presented to others in a new or a different way.
Style APA, Harvard, Vancouver, ISO itp.
47

Staller, Mario S., i Swen Körner. "Regression, Progression and Renewal: The Continuous Redevelopment of Expertise in Police Use of Force Coaching". European Journal for Security Research, 16.10.2020. http://dx.doi.org/10.1007/s41125-020-00069-7.

Pełny tekst źródła
Streszczenie:
Abstract Professionalism in law enforcement requires the identification and development of expertise of police use of force (PUOF) coaches. Effective PUOF training includes the transfer from the training into the real-world environment of policing. This difference between working in the field and working as a PUOF coach has not been thoroughly investigated. However, research in other professional domains has shown that practical competence in the subject matter itself does not make a coach effective or successful. With this article, we conceptualize expert practice in PUOF instruction on the basis of a conflict management training setting in the security domain. First, by discussing a model of “territories of expertise”, we point out the dynamic and contextual character of expertise within the PUOF domain. Second, by conceptualizing expertise as a process and effect of communication, we provide a framework that describes and examines the interdependency between performance-based and reputation-based expertise. These considerations present two practical challenges, which we recommend professional law enforcement institutions to engage. We close by providing practical orientations and pointers for addressing these issues.
Style APA, Harvard, Vancouver, ISO itp.
48

Figini, Silvia. "MACHINE LEARNING PER CARATTERIZZARE GLI ATTACCHI TERRORISTICI". Istituto Lombardo - Accademia di Scienze e Lettere - Rendiconti di Lettere, 15.07.2020. http://dx.doi.org/10.4081/let.2018.680.

Pełny tekst źródła
Streszczenie:
For security departments understanding the dynamics of terrorist events finding significant and recurrent patterns can have an important impact in the counter-terrorism strategy development. Machine learning techniques coupled with domain knowledge are useful to understand terrorist behaviours with high accuracy, thus helping policy makers for time-sensitive understanding of terrorist activity, which can enable precautions to avoid against future attacks. In this paper different computational techniques, able to derive relationships among terrorist attacks and detect terrorist behaviours, are used on the Global Terrorism Database. The analysis proposed in this paper could help security and government departments to prevent terrorist attacks and to reduce financial, human and political losses. Furthermore, this information can be useful for law enforcement agencies to propose reactive strategies.
Style APA, Harvard, Vancouver, ISO itp.
49

"Enforcement of Women's Rights through Education". International Journal of Recent Technology and Engineering 8, nr 4 (30.11.2019): 5397–402. http://dx.doi.org/10.35940/ijrte.d7619.118419.

Pełny tekst źródła
Streszczenie:
The experiences of successive world wars brought the Universal Declaration, bringing an adherence of acceptance from all the countries which proved to be a comprehensive treatise of inviolable and in alienated human rights. It bestows civil and political rights including right to life, liberty, free speech and privacy. In addition it includes economic, social, cultural rights being right to social security, health and education. These entitled basic rights and fundamental freedom that helps in promoting peace and progress by preventing atrocities against humanity. Widening its domain, today human rights have befitted essential in achieving development goals which enables a constant improvement of well being of inhabitants of the world. The paper aims at drawing a similarity in the case study of an autobiography of 19th century (Amar Jibon by Rassundari Devi) and an autobiography of 21st century (I Am Malala by Malala Yousafzai), one being the earliest of women autobiographies and the other being most horrific and recent one. Both the characters establish an indistinguishable coherence between development and acquisition of basic rights for women. Malala recognized as a human rights champion, continued to speak out portraying the indomitable courage even on the face of religious and military activists. Rassundari Devi silenced under patriarchal norms and a life burdened with duty and responsibilities which eventually made her acquire a greater strength to become a lettered woman. The paper presents striking similarity in the status of women from two different time zones who fought for their rights and carved a niche for themselves as liberated women. They emerged successful in terms of their courage and determination by seeking live of equality and freedom.
Style APA, Harvard, Vancouver, ISO itp.
50

"A Prototype Design for a Framework to Analyse the Traffic Flow in Darknet". International Journal of Innovative Technology and Exploring Engineering 8, nr 6S4 (26.07.2019): 1449–52. http://dx.doi.org/10.35940/ijitee.f1295.0486s419.

Pełny tekst źródła
Streszczenie:
The malicious activities in the darknet are an emerging threat to the cyber space. Darknet sites operate using TOR(The Onion Router) hidden services which provides the feature of disguising the users of the transaction in the darknet market place. Hence identifying and monitoring such illegal activities in the marketplace has become a tedious task for the cyber and law enforcement officials. This paper presents a prototype for a framework which analyse the traffic flow in the darknet as finding the exact sender and receiver is almost impossible as the TOR is increasing the layers of security to the maximum extent making it impossible to track the users in the transactions. Here we give a methodology using webcrawlers and extract the data from the darknet sites to find the domain of the traffic flow through which the broad area of traffic can be sorted out which would be beneficial for the cyber and law enforcement agencies to find the illicit trade in the darknet market places
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii