Дисертації з теми "Security e safety e disabilità"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Security e safety e disabilità".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Simpson, Andrew C. "Safety through security." Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Повний текст джерелаCarter, R. A. "Fire Safety and Security in Schools." University of Canterbury. Civil Engineering, 1999. http://hdl.handle.net/10092/8255.
Повний текст джерелаSajjad, Imran. "Autonomous Highway Systems Safety and Security." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.
Повний текст джерелаÅkerberg, Johan. "On Security in Safety-Critical Process Control." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Повний текст джерелаThis Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.
The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.
The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.
In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of Security Modules in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.
Åkerberg, Johan. "On security in safety-critical process control /." Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Повний текст джерелаNyström, Oskar. "FIRE SAFETY AND EVACUATION SECURITY IN WIND TURBINES." Thesis, Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83289.
Повний текст джерелаMatović, Aleksandar. "CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320.
Повний текст джерелаMeyers, Tommey H. "Safety risk management for Homeland Defense and Security responders." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMeyers.pdf.
Повний текст джерелаThesis Advisor(s): Paul Pitman. Includes bibliographical references (p.55-59). Also available online.
Nkwantabisa, Godfrey K. "The United States Army food safety, security, and protection system." Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/975.
Повний текст джерелаAbdo, Houssein. "Dealing with uncertainty in risk analysis : combining safety and security." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT113/document.
Повний текст джерелаRisk analysis is a critical part for regulatory decision-making related to high-risk risk industries. A systematic risk analysis is made up of three steps: (i) identifying the undesirable risk scenarios. A risk scenario is characterized by referencing to the potential event with its causes and consequences. (ii) Estimating the likelihood of occurrence of risk scenarios. (iii) Calculating the effect of consequences of the identified risk scenarios. Likelihood and effect analysis are carried out with the help of models that depend on several number of input parameters.However, the trustworthiness of risk analysis is limited when inaccuracies in the results can occur, and are due to various sources of uncertainty. Parameter, model and completeness uncertainties are the main sources of uncertainty. Parameter uncertainty arises from the inability to set exact values for certain input parameters used for likelihood and severity analysis. Completeness uncertainty originates from not considering all contributions to risk in the identification process (some initiating events are ignored). Model uncertainty is not considered in this work.The INERIS (French National Institute for Industrial Environment and Risks) has developed an interval semi-quantitative approach that uses both quantitative information if available or qualitative information if not. However, this interval semi-quantitative approach has some drawbacks due to parameter uncertainty.Information regarding model parameters used for effect analysis is often incomplete, vague, imprecise or subjective. Moreover, some of the parameters may be random in nature and have different values. This leads to two different types of parameter uncertainty that need to be accounted for an accurate risk analysis and effective decision-making. Aleatoric uncertainty arises from randomness due to natural variability resulting from the variation of a value in time. Or epistemic uncertainty caused by the lack of information resulting, for example, from measurement errors, subjectivity expert judgment or incompleteness.Moreover, the identification step is incomplete where only safety related scenarios caused by accidental events are considered. The introduction of connected systems and digital technology in process industries creates new cyber-security threats that can lead to undesirable safety accidents. These cyber-security related events should be considered during industrial risk analysis.This research aims to develop uncertainty analysis methodologies to treat uncertainty in the INERIS risk analysis process. In other words, to analyze uncertainty in likelihood analysis, effect analysis and the identification step.In this work, we propose a fuzzy semi-quantitative approach to deal with parameter uncertainty in the likelihood analysis step. We handle the limits of the interval semi-quantitative approach by introducing the concept of fuzzy numbers instead of intervals. Fuzzy numbers are used to represent subjectivity in expert judgments (qualitative data) and covers uncertainty in the quantitative data if this data exists.A hybrid methodology that treat each cause of parameter uncertainty in effect analysis with the right theory is developed. Probability theory is used to represent variability, fuzzy numbers are used to represent imprecision and evidence theory is used to represent vagueness, incompleteness and the lack of consensus.A new risk identification methodology that considers safety and security together during industrial risk analysis is developed. This approach combines Bow-Tie Analysis (BTA), commonly used for safety analysis, with a new extended version of Attack Tree Analysis (ATA), introduced for security analysis of industrial control systems. The combined use of AT-BT provides an exhaustive representation of risk scenarios in terms of safety and security
Bongiovanni, Ivano. "Assessing vulnerability to safety and security disruptions in Australian airports." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/95964/1/Ivano_Bongiovanni_Thesis.pdf.
Повний текст джерелаRossi, Fabiana <1982>. "Safety, Security And safeguards In GEN IV sodium fast reactors." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/6836/1/Rossi_Fabiana_Tesi.pdf.
Повний текст джерелаRossi, Fabiana <1982>. "Safety, Security And safeguards In GEN IV sodium fast reactors." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/6836/.
Повний текст джерелаNoonan, Daniel Richard. "Security through Design in the Public Environment." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/51592.
Повний текст джерелаMaster of Architecture
Doyle, Maria. "FEELINGS OF SAFETY : Feelings of Safety In The Presence Of the Police, Security Guards and Police Volunteers." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35885.
Повний текст джерелаPerez, Huertas Daniel. "Cyber-Security and Safety Analysis of Interconnected Water Tank Control Systems." Thesis, KTH, Reglerteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-55972.
Повний текст джерелаAddy, Naa Adoley. "Aviation : the new order (deregulation, the environment, health, safety and security." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32791.
Повний текст джерелаShajkovci, Ardian. "Radicalization and Safety and Security in the Balkans: An Ethnographic Study." ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1864.
Повний текст джерелаLang, Martin. "Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18235.
Повний текст джерелаBakgrund.Som en påföljd av den digitala eran, så har fordon blivit digitalis-erade i ett hastigt tempo. Självkörande bilar och kraftfulla infotainmentsys-tem är bara några få av förändringarna som sker med bilarna. Dessa systemkräver att mer information skickas genom fordonets nätverk. För att nå dessahastigheter föreslogs Ethernet. Dock så är Ethernet ett så kallat ’best-effort’protokoll, vilket inte kan garantera tillförlitlig leverans av meddelanden. För attlösa detta har speciella tillämpningar skett, vilket skapar Automotive Ethernet.Det finns fortfarande sårbarheterna av Ethernet kvar, och behöver hanteras föratt tillämpningen skall vara lämplig för fordonsindustrin. Syfte.Denna studie undersöker vilka sårbarheter som finns i Ethernet ’out-of-the-box’ och identifierar vilka sårbarheter som har värst konsekvenser urperspektivet säkerhet för människor och egendom. Två säkerhetsimplementa-tioner väljs ut för att se över vidare de kan användas för kommunikation i bilar. Metod.För att nå arbetets mål, så genomfördes en literaturstudie för attundersöka sårbarheter och potentiella motverkningar. Studiens resulat använ-des sedan i en simulering för att kunna mäta fördröjningen av en enkel topologii en OMNeT++miljö. Sedan addera den tiden med exekveringstiden för säker-hetsimplementationerna för att få en total fördröjning. Kommunikationstidenmåste vara mindre än 10 ms för att räknas som säker för bilar. Resultat.I simuleringen, så ger mätningarna en basal kommunikation på1.14957±0.02053 ms. När säkerhetsimplementationerna tillsätts så får manden totala kommunikationstiden. För HMAC-SHA-512 mäts den totala kom-munikationstiden till 1.192274 ms genom att använda den övre gränsen av kon-fidensintervallet. För ECDSA - ED25519 mäts tiden till 3.108424 ms. Slutsatser.Enligt resultaten så är både HMAC-SHA-512 och ECDSA - ED25519möjliga alternativ för integritets- och äkthetstillämpningar i fordorns kommu-nikation. Dessa resultaten är dock framtagna ur en simulering och bör verifierasmed hjälp av fysisk hårdvara så mätningarna är sanningsenliga.
ROCCA, LUCA. "IEC 61850: a safety and security analysis in industrial multiprotocol networks." Doctoral thesis, Università degli studi di Genova, 2019. http://hdl.handle.net/11567/944847.
Повний текст джерелаAl-Mulla, Khalil I. "Stress Reduction Strategies for Improving Private Security Officer Performance." Thesis, Walden University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13427945.
Повний текст джерелаThe impact of occupational stress on employees' health and work performance costs U.S. companies $300 billion annually; work-related stress is an issue for private security organizations all over the world. The purpose of this single case study was to explore strategies private security organizational leaders used to mitigate private security officers' occupational stress. The study participants were 4 leaders of a private security organization in Bahrain who had a minimum of 5 years of experience in the private security field and had addressed occupational stress successfully. The human capital theory was the conceptual framework used for this study. Data were collected using semistructured interviews and review of archival documents. Yin's 5-step data analysis plan was applied to the data to generate 4 themes: private security occupational stressors, occupational stress reduction practices, leaders-officers open communication, and health protection policies. The identification and development of job stressor mitigation strategies has multiple implications for positive social change including protecting employees' well-being and increasing their working performance, productivity, and business success. Improving work performance and productivity produces opportunities for employment and supports economic growth and community goodwill. The practices of a successful organization positively influence the society by providing jobs and capital investments, which can improve the quality of life in the community.
Waters, Joanna. "Perceptions of personal safety on university campuses." Thesis, University of South Wales, 2006. https://pure.southwales.ac.uk/en/studentthesis/perceptions-of-personal-safety-on-university-campuses(34446044-5628-4879-903d-318cf291b304).html.
Повний текст джерелаAcharya, Gautam. "Legal aspects of aviation security measures taken at airports." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Повний текст джерелаAviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Tang, Man-chung, and 鄧文聰. "A study of aviation security requirement for Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/199868.
Повний текст джерелаpublished_or_final_version
Transport Policy and Planning
Master
Master of Arts in Transport Policy and Planning
Diepenbrock, Robert G. "Safety and security concerns: perceptions of preparedness of a rural school district." Diss., Wichita State University, 2010. http://hdl.handle.net/10057/3648.
Повний текст джерелаThesis (Ed.D.)--Wichita State University, College of Education, Dept. of Educational Leadership
Foster, Nathalie Louise. "The application of software and safety engineering techniques to security protocol development." Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.
Повний текст джерелаChung, Jae-woo. "Will you help me : enhancing personal safety and security utilizing mobile phones." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37389.
Повний текст джерелаIncludes bibliographical references (p. [109]-[110]).
This thesis describes the design and development of a system that is aimed for enhancing safety and security using cellular phones. This system has two main components: a master phone application to assist people who need to take care of their loved ones, and a slave phone application to provide help to care-recipients who need attention from their caregivers. This system applies location awareness (GPS), awareness of social activities (communication activity and proximity with close peers,) and peer-to-peer data communication as its core technologies. There are three sub-components that are implemented the system: First component is for providing a set of information in order to enhance awareness of crime around users' surrounding areas. This component is used to assess risk on users themselves as well as their property. The second component is a sub-system that is dedicated for detecting a possible abnormal transit behavior. Consequently, the system alerts this abnormality to both the system users and their caregivers. Third component detects nearby phone to cultivate social activities with the system user's peers.
(cont.) The purpose of finding contacts is to get remote help from friends of the care-recipients. All the functions provided by the system fall into the gray area in between the state in which care-recipients are completely safe, and that in which care-recipients had an accident severe enough to require help from authorities.
by Jae-woo Chung.
S.M.
Rishko, Andriy, and Андрій Рішко. "Aviation safety provision in civil aviation." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51123.
Повний текст джерелаThe emergence of aviation as a distinguished, independent transport industry took place in the twenties of the twentieth century. However, in the second half of the twentieth century, the network of international air routes covered almost all countries of the world. Operations on modern air transport are characterized by mass (number of transport units and volumes), rhythmic (frequency of traffic units) and adequate complexity. In this regard, there is a need for a rigorous legal mechanism for carrying out air transportation, fixing the obligations and rights of the transport process participants and, most importantly, ensuring a reliable level of security. Aviation security as a scientific field is a relatively new aspect of scientific activity. Aviation security is a state of protection of the sector of civil aviation from threats of external factors associated with the implementation of acts of illegal intrusion. The basis of aviation security is a complex of organizational and legal, financial, technical and scientific-methodological measures that ensure the organization of civil security in the aviation at all its levels.
Виникнення авіації як видатної, незалежної транспортної галузі відбулося у двадцятих роках ХХ століття. Однак у другій половині ХХ століття мережа міжнародних повітряних маршрутів охопила майже всі країни світу. Операції на сучасному повітряному транспорті характеризуються масовістю (кількістю транспортних одиниць та обсягами), ритмічністю (частота одиниць руху) та достатньою складністю. У зв'язку з цим існує потреба у суворому правовому механізмі здійснення повітряних перевезень, фіксації обов'язків та прав учасників транспортного процесу та, що найголовніше, забезпечення надійного рівня безпеки. Авіаційна безпека як науковий напрямок є відносно новим аспектом наукової діяльності. Авіаційна безпека - це стан захисту сектору цивільної авіації від загроз зовнішніх факторів, пов’язаних з виконанням актів незаконного вторгнення. Основою авіаційної безпеки є комплекс організаційно-правових, фінансових, технічних та науково-методологічних заходів, що забезпечують організацію цивільної безпеки в авіації на всіх її рівнях.
Bukelwa, Ngoqo. "The establishment of a mobile phone information security culture: linking student awareness and behavioural intent." Thesis, University of Fort Hare, 2014. http://hdl.handle.net/10353/657.
Повний текст джерелаBroman, David. "Safety, Security, and Semantic Aspects of Equation-Based Object-Oriented Languages and Environments." Licentiate thesis, Linköping University, Linköping University, PELAB - Programming Environment Laboratory, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10134.
Повний текст джерелаDuring the last two decades, the interest for computer aided modeling and simulation of complex physical systems has witnessed a significant growth. The recent possibility to create acausal models, using components from different domains (e.g., electrical, mechanical, and hydraulic) enables new opportunities. Modelica is one of the most prominent equation-based object-oriented (EOO) languages that support such capabilities, including the ability to simulate both continuous- and discrete-time models, as well as mixed hybrid models. However, there are still many remaining challenges when it comes to language safety and simulation security. The problem area concerns detecting modeling errors at an early stage, so that faults can be isolated and resolved. Furthermore, to give guarantees for the absence of faults in models, the need for precise language specifications is vital, both regarding type systems and dynamic semantics.
This thesis includes five papers related to these topics. The first paper describes the informal concept of types in the Modelica language, and proposes a new concrete syntax for more precise type definitions. The second paper provides a new approach for detecting over- and under-constrained systems of equations in EOO languages, based on a concept called structural constraint delta. That approach makes use of type checking and a type inference algorithm. The third paper outlines a strategy for using abstract syntax as a middle-way between a formal and informal language specification. The fourth paper suggests and evaluates an approach for secure distributed co-simulation over wide area networks. The final paper outlines a new formal operational semantics for describing physical connections, which is based on the untyped lambda calculus. A kernel language is defined, in which real physical models are constructed and simulated.
Report code: LIU-TEK-LIC-2007:46. On the day of the defence date the status of article IV was: In Progress; The status of article V was: Manuscript.
Roni, Saouma. "Risk Management in the Swedish Hotel Industry : Managing Safety & Security Infra Hospitium." Thesis, Södertörns högskola, Institutionen för ekonomi och företagande, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-9940.
Повний текст джерелаHeinrich, Markus [Verfasser], Max [Akademischer Betreuer] Mühlhäuser, and Stefan [Akademischer Betreuer] Katzenbeisser. "Security Engineering in Safety-critical Railway Signalling / Markus Heinrich ; Max Mühlhäuser, Stefan Katzenbeisser." Darmstadt : Universitäts- und Landesbibliothek, 2021. http://d-nb.info/1226288804/34.
Повний текст джерелаAppel, Matt Andrew. "Security Control Mechanism for Safety Critical Functions Operating on Automotive Controller Area Network." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587645195243586.
Повний текст джерелаYehorova, Victoria, and Вікторія Олександрівна Єгорова. "Controllers (PLC) safety (safety relay). Overview. Primary requirements. Features of the application." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50754.
Повний текст джерелаMany machines and robots require safety circuits to stop all or part of an operation in the event of an emergency event. These safety circuits are typically configured using safety relays, or a safety-rated programmable logic controller (PLC) or other safety-rated controller. One or more multi-function safety relays can often be used to replace many basic single-function safety relays, simplifying installations and saving money. In other cases, multi-function safety relays can be used instead of a safety-rated PLC, resulting in substantial savings while streamlining implementation and maintenance. Most safety relay designs have traditionally used safety relays constructed with internal electromechanical, forceguided relays. The key advantage here is voltage flexibility, as nearly any typical control voltage can be switched. Typical voltages include: 5 V DC,12 V DC, 24 V DC, 120 V AC and 230 V AC. The nominal current at 24 V DC is about 6 amps for a resistive-based load. Contrast this with a safety controller. A safety controller is a solid-state device. This means that its outputs are “transistorized” and only designed to switch 24 V DC at a typical maximum of 2 amps. If you plan on controlling a higher power relay or contactor, then these outputs will work fine. However, if you are using a safety relay to control the final load switching using voltages other than 24 V DC, then this is an important consideration. Safety controllers are typically modular, so safety I/O can be added. The safety I/O expansion modules are either solid-state or electromechanical. If safety controller expansion modules are needed, these costs will be an important consideration. Expansion modules can also be added to a safety relay system.
Багато машин і роботів потребують ланцюгів безпеки, щоб зупинити всю або частину операції у випадку надзвичайної події. Ці схеми безпеки зазвичай конфігуруються з використанням реле безпеки, або програмованого логічного контролера (PLC) з оцінкою безпеки або іншого контролера з оцінкою безпеки. Одне або кілька багатофункціональних реле безпеки часто можна використовувати для заміни багатьох основних однофункціональних реле безпеки, спрощуючи монтаж та заощаджуючи гроші. В інших випадках замість ПЛК із рейтингом безпеки можна використовувати багатофункціональні реле безпеки, що призводить до значної економії при спрощенні впровадження та технічного обслуговування. У більшості конструкцій реле безпеки традиційно використовуються реле безпеки, виготовлені з внутрішніми електромеханічними реле, що керуються силою. Ключовою перевагою тут є гнучкість напруги, оскільки майже будь-яка типова керуюча напруга може перемикатися. Типові напруги включають: 5 В постійного струму, 12 В постійного струму, 24 В постійного струму, 120 В змінного струму та 230 В змінного струму. Номінальний струм при 24 В постійного струму становить близько 6 ампер для резистивного навантаження. Порівняйте це з контролером безпеки. Контролер безпеки – це твердотільний пристрій. Це означає, що його виходи “транзисторовані” і призначені лише для перемикання 24 В постійного струму на типовий максимум 2 ампер. Якщо ви плануєте керувати реле або контактором більшої потужності, тоді ці виходи будуть працювати нормально. Однак, якщо ви використовуєте реле безпеки для управління кінцевим перемиканням навантаження з напругою, відмінною від 24 В постійного струму, то це є важливим фактором. Контролери безпеки, як правило, модульні, тому можна додати введення-виведення безпеки. Модулі розширення вводу-виводу безпеки є або твердотільними, або електромеханічними. Якщо потрібні модулі розширення контролера безпеки, ці витрати будуть важливим фактором. Модулі розширення також можуть бути додані до системи реле безпеки.
Moeller, David K. "A model for future military operations : the effect of state security and human security on strategy /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=9c267789-85b9-4963-9298-936e82991d13&rs=PublishedSearch.
Повний текст джерелаMauwa, Hope. "Information security awareness: generic content, tools and techniques." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/560.
Повний текст джерелаSadiq, Mazhar. "Modeling the Non-functional Requirements in the Context of Usability, Performance, Safety and Security." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3246.
Повний текст джерелаSalim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Повний текст джерелаThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
93
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 148-156).
If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eight breaches that each exposed over ten million identities. These breaches were recorded despite the fact that significant resources are expended, on managing cyber security risks each year by businesses and governments. The objective of this thesis was twofold. The first objective was to understand why traditional approaches for managing cyber security risks were not yielding desired results. Second, propose a new method for managing cyber security risks more effectively. The thesis investigated widely used approaches and standards, and puts forward a method based on the premise that traditional technology centric approaches have become ineffective on their own. This lack of efficacy can be attributed primarily to the fact that, Web 2.0 is a dynamic and a complex socio-technical system that is continuously evolving. This thesis proposes a new method for managing cyber security risks based on a model for accident or incident analysis, used in Systems Safety field. The model is called System-Theoretic Accident Model and Processes (STAMP). It is rooted in Systems Thinking and Systems Theory. Based on a case study specifically written for this thesis, the largest cyber-attack reported in 2007 on a major US based retailer, is analyzed using the STAMP model. The STAMP based analysis revealed insights both at systemic and detailed level, which otherwise would not be available, if traditional approaches were used for analysis. Further, STAMP generated specific recommendations for managing cyber security risks more effectively.
by Hamid M. Salim.
S.M. in Engineering and Management
S.M.
Ung, Shuen-Tai. "The development of safety and security assessment techniques and their application to port operations." Thesis, Liverpool John Moores University, 2007. http://researchonline.ljmu.ac.uk/5831/.
Повний текст джерелаViding, Emmie. "Does Your TV Spy on You? : The security, privacy and safety issues with IoT." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17985.
Повний текст джерелаBasu, Nandita. "Pedestrian route choice behaviour: Influences of built environment on route preference, safety and security." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236797/1/Thesis_Nandita%2BBasu_24112022.pdf.
Повний текст джерелаSELVATICI, Michele. "Introduction of wireless technology in agricultural and heavy duty vehicles: security and safety issues." Doctoral thesis, Università degli studi di Ferrara, 2018. http://hdl.handle.net/11392/2488003.
Повний текст джерелаLe tecnologie wireless hanno, di recente, fatto il loro ingresso nel mondo dei mezzi agricoli e movimento terra. Al momento sono utilizzate in applicazioni che prevedono la pubblicazione di dati utili ai fini di gestione della flotta, diagnostica e assistenza. Questa introduzione ha fatto sì che venisse aperta, sulle reti veicolari, una porta verso il mondo esterno. Porta che, fino ad ora, era saldamente chiusa. Le reti veicolari, infatti, sono sempre state considerate intrinsecamente affidabili grazie a questa chiusura, in quanto non accessibili da remoto e difficilmente accessibili in locale. L’apertura di questa porta va ad esporre a problemi di cyber-security che verranno analizzati. Verranno confrontati i requisiti derivanti dalla necessità di proteggersi da attacchi esterni con quelli necessari alle reti per continuare a far girare applicazioni safety critical. La conclusione di questo confronto è che la rete CAN utilizzata oggi giorno, non riuscirà a continuare a sopperire ai requisiti di safety, iniziando, contemporaneamente, a sopperire ai neonati requisiti di security. Per questa ragione si rende necessario una salto tecnologico nelle reti veicolari del mondo agricultural. Il successore, designato da diversi comitati tecnici, è rappresentato da reti Ethernet. Tuttavia, considerato il tempo di vita dei mezzi agricoli che è di 20-30 anni, si pone la necessità di avere alcune generazioni di veicoli con rete ibrida CAN/Ethernet, prima che Ethernet soppianti completamente la rete CAN. A tal scopo viene illustrato lo sviluppo di un gateway CAN/Ethernet, e, in particolare, TCP-IP/ISOBUS, che potrà essere usato per consentire l’interazione tra le due reti. Le applicazioni fino ad ora sviluppate in ambito agricolo sfruttando tecnologie wireless non sono safety relevant, ma, la sempre crescente richiesta del wireless, porterà a rendere necessario il loro utilizzo anche in applicazioni con implicazioni di functional safety. Una tecnologia particolarmente appetitosa per il mercato è quella delle Wireless Sensor Networks. Non è possibile adottarla così com’è, ma è necessario effettuare un approfondito studio e delle accurate modifiche con lo scopo di permettere la rispondenza ai principali standard di safety. Verrà presentata l’analisi effettuata sulle architetture hardware e software dei nodi WSN e verrà mostrato il primo prototipo di nodo wireless adatto per applicazioni di safety. Verrà poi trattato il tema della gesture recognition come HMI per applicazioni safety relevant, analizzando un sistema dimostrativo realizzato sfruttando il suddetto prototipo.
PUGLISI, DANIEL. "PREBREEDING OF MAIZE TRADITIONAL FARMERS¿ VARIETIES AND THEIR BIOFORTIFICATION FOR FOOD SAFETY AND SECURITY." Doctoral thesis, Università degli Studi di Milano, 2019. http://hdl.handle.net/2434/616805.
Повний текст джерелаStrohmeier, Martin. "Security in next generation air traffic communication networks." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:c5c61de4-ffef-479e-9f49-de38c2a8e9ec.
Повний текст джерелаÅhlfeldt, Rose-Mharie. "Information Security in Distributed Healthcare : Exploring the Needs for Achieving Patient Safety and Patient Privacy." Doctoral thesis, Stockholm University, Department of Computer and Systems Sciences (together with KTH), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-7407.
Повний текст джерелаIn healthcare, patient information is a critical factor. The right information at the right time is a necessity in order to provide the best possible care for a patient. Patient information must also be protected from unauthorized access in order to protect patient privacy. It is furthermore common for patients to visit more than one healthcare provider, which implies a need for cross border healthcare and continuity in the patient process.
This thesis is focused on information security in healthcare when patient information has to be managed and communicated between various healthcare actors and organizations. The work takes a practical approach with a set of investigations from different perspectives and with different professionals involved. Problems and needs have been identified, and a set of guidelines and recommendations has been suggested and developed in order to improve patient safety as well as patient privacy.
The results show that a comprehensive view of the entire area concerning patient information management between different healthcare actors is missing. Healthcare, as well as patient processes, have to be analyzed in order to gather knowledge needed for secure patient information management.
Furthermore, the results clearly show that there are deficiencies both at the technical and the administrative level of security in all investigated healthcare organizations.
The main contribution areas are: an increased understanding of information security by elaborating on the administrative part of information security, the identification of information security problems and needs in cross border healthcare, and a set of guidelines and recommendations in order to advance information security measures in healthcare.
Benner, Andrea, James McDonald, and Abderrahim Sallak. "Towards a Sustainable Maritime Transport Corridor : How Could Security and Safety Help Attain This Goal ?" Thesis, Blekinge Tekniska Högskola, Avdelningen för maskinteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3207.
Повний текст джерелаÅhlfeldt, Rose-Mharie. "Information security in distributed healthcare : exploring the needs for achieving patient safety and patient privacy /." Kista : Department of Computer and Systems Sciences, Stockholm University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-7407.
Повний текст джерелаEnoma, Norman Aghahowa. "Developing key performance indicators for airport safety and security : a study of three Scottish airports." Thesis, Heriot-Watt University, 2008. http://hdl.handle.net/10399/2147.
Повний текст джерелаLetwaba, Joseph. "The safety and security of tourists with reference to the Sebideng District Municipality / J. Letwaba." Thesis, North-West University, 2008. http://hdl.handle.net/10394/2654.
Повний текст джерелаThesis (M. Development and Management)--North-West University, Vaal Triangle Campus, 2009.
MORTARI, Serena. "Sicurezza e disabilità nell'impresa: formazione e prevenzione. La strategia formativa della personalizzazione per una cultura della sicurezza inclusiva in azienda." Doctoral thesis, 2011. http://hdl.handle.net/11562/349447.
Повний текст джерелаAnalysing the existing literature on this subject a serious gap emerges: ever since the obligation for companies to employ people with disability was introduced in Italy (by Law no. 482/68, later revoked by Law no. 68/99), no studies on the management of these workers’ security & safety have been carried out. In other countries, although research on the same subject is limited and incomplete, the issue seems to draw more attention. The crucial point in managing workplace security & safety, with specific reference to our subject, is the lack of a unitary and interdisciplinary approach to both disability and security & safety. In an ever-changing technological scenario, and with new aspects to security & safety continuously emerging – such as privacy – employers and security & safety managers are often unprepared to employ a worker with disability due to both organizational and structural problems. This investigation is divided into two different studies. The aim of the former is to identify the critical points in the ‘disability-workplace safety & security’ relation. In particular, it intends to examine how companies meet their accessibility, information, training, risk assessment and emergency management obligations. To this end, a quantity-quality survey has been designed and administered to both workers with disability and company managers. 118 questionnaires were collected and analysed. Another step in the research included administering 4 semi-structured interviews to workers with disability who contacted us spontaneously for information and made themselves available for further investigations. This allowed us to deal more thoroughly with some issues that emerged from the questionnaires as particularly interesting. The second study’s aim is to check whether the customization of the training for workers with disability and security & safety managers is functional to the promotion of security & safety culture in the workplace as applied specifically to disability issues. A customized training course for 4 workers with disability and 3 security & safety managers was developed. A careful company analysis was performed, considering documents such as social accounting, risk assessment form and security policy document, and using tools like semi-structured interviews and entrance tests to identify the training needs. The evaluation of the training’s results was carried out both ex post, using exit tests and semi-structured interviews, and in itinere, to monitor and – if necessary – fine-tune the course, by using classroom journals and discussions.