Results for ' Security Configuration Management'

984 found
Order:
  1.  7
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  42
    Who is controlling whom? Reframing “meaningful human control” of AI systems in security.Pascal Vörös, Serhiy Kandul, Thomas Burri & Markus Christen - 2023 - Ethics and Information Technology 25 (1):1-7.
    Decisions in security contexts, including armed conflict, law enforcement, and disaster relief, often need to be taken under circumstances of limited information, stress, and time pressure. Since AI systems are capable of providing a certain amount of relief in such contexts, such systems will become increasingly important, be it as decision-support or decision-making systems. However, given that human life may be at stake in such situations, moral responsibility for such decisions should remain with humans. Hence the idea of “meaningful (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Surveillance, Snowden, and Big Data: Capacities, consequences, critique.David Lyon - 2014 - Big Data and Society 1 (2).
    The Snowden revelations about National Security Agency surveillance, starting in 2013, along with the ambiguous complicity of internet companies and the international controversies that followed provide a perfect segue into contemporary conundrums of surveillance and Big Data. Attention has shifted from late C20th information technologies and networks to a C21st focus on data, currently crystallized in “Big Data.” Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid configurations. This (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   44 citations  
  4.  29
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5. Global Regulatory System of Human Resources Development.Sergii Sardak - 2014 - Dissertation, Київський Національний Економічний Університет Імені Вадима Гетьмана
    ANNOTATION Sardak S.E. Global Regulatory System of Human Resources Development. – Manuscript. Thesis for the Doctor of Economic Science academic degree with major in 08.00.02 – World Economy and international economic relations. – SHEE «Kyiv National Economic University named after Vadym Hetman», Kyiv, 2014. The preconditions and factors of the global economic system with the identified relevant subjects areas and mechanisms of regulation instruments have been investigated. The crucial role of humans in the global economic system as a key factor (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  54
    Evolution of the Asia-Pacific region: Seven scenarios.Dennis Florig - 2001 - World Futures 57 (2):103-152.
    Forecasting is fraught with difficulty, but the dynamic Asia?Pacific region is unlikely to remain static in its present configuration. This paper offers 7 scenarios for the future of integration of the Asia?Pacific that take into account economic, strategic, and cultural dimensions of change, and the kinds of events that could trigger regional reconfiguration. The scenarios are aligned along a continuum from low to high tension: (1) a formal, multilateral security regime, (2) a concert of Asia, (3) the status (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  50
    Securing Cisgendered Futures: Intersex Management under the “Disorders of Sex Development” Treatment Model.Catherine Clune-Taylor - 2019 - Hypatia 34 (4):690-712.
    In this critical, feminist account of the management of intersex conditions under 2006's controversial “Disorders of Sex Development” (DSD) treatment model, I argue that like the “Optimal Gender of Rearing” (OGR) treatment model it replaced, DSD aims at securing a cisgendered future for the intersex patient, referring to a normalized trajectory of development across the lifespan in which multiple sexed, gendered, and sexual characteristics remain in “coherent” alignment. I argue this by critically analyzing two ways that intersex management (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  18
    Risk management in digitalized educational environments: Teachers’ information security awareness levels.Hamza Fatih Sapanca & Sezer Kanbul - 2022 - Frontiers in Psychology 13.
    With the spread of Information and Communication Technologies tools and the Internet, Twenty first century technologies have significantly affected human life, and it has been desired to be obtained continuously. It has become challenging to protect information due to the increase in the methods by which malicious people can get information. As a result, it is crucial to determine people’s awareness levels by revealing the risks and threats to information security. In this context, a study was conducted to show (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  18
    Organizations’ Management Configurations Towards Environment and Market Performances.Shuang Ren & Guiyao di FanTang - 2022 - Journal of Business Ethics 188 (2):239-257.
    When organizations face the coexistence of multiple institutional logics for environmental management (e.g., maximizing market profit, protecting the environment), how do firms configure green human resource management (GHRM) practices to achieve sustainability in both environmental and market domains? Leveraging the fuzzy-set qualitative comparative analysis (fsQCA) technique, this study adopts a configurational approach to analyze the complex interdependence of GHRM practices with the underlying institutional logics for achieving firm sustainable performance. Employing a multi-source matched sample of 179 firms, the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  11. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  20
    Hybrid Management Configurations in Joint Research.Roland Bal, Marleen Bekker & Rik Wehrens - 2014 - Science, Technology, and Human Values 39 (1):6-41.
    Researchers are increasingly expected to deliver “socially robust knowledge” that is not only scientifically reliable but also takes into account demands from societal actors. This article focuses on an empirical example where these additional criteria are explicitly organized into research settings. We investigate how the multiple “accountabilities” are managed in such “responsive research settings.” This article provides an empirical account of such an organizational format: the Dutch Academic Collaborative Centres for Public Health. We present a cross-case analysis of four collaborative (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Security and Policy Based Management-ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies.Kuong-Ho Liu Chen & Tzong-Jye Dow Liu - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 197-208.
     
    Export citation  
     
    Bookmark  
  14.  15
    A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  16
    Biopolitics and (in)security in Foucault: elements for a diagnosis of the management of the COVID-19 pandemic in Brazil.Daniel Verginelli Galantin & Thiago Fortes Ribas - 2022 - Revista de Filosofia Aurora 34 (61).
    Faced with the criticism of the biopolitical control exercised in the COVID-19 pandemic, we defend the importance of a re-examination of the foucauldian reflections so that the critical diagnoses of the present is accompanied by a careful analysis of the fields of force and knowledges in which such controls occur. Bearing in mind the correlation between security mechanisms and the management of insecurities, we argue that in the management of the pandemic by the brazilian executive government, the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  27
    Management of Economic Security in the High-Tech Sector in the Context of Post-Pandemic Modernization.Andriy Shtangret, Nataliia Korogod, Sofia Bilous, Nataliia Hoi & Yurii Ratushniak - 2021 - Postmodern Openings 12 (2).
    The accelerated rates of scientific and technological progress and the intellectualization of the main factors of production play a leading role in ensuring the economic recovery of national economies, in particular in the conditions of the existence of today's post-pandemic consequences. The technological development of the leading countries of economic development poses difficult tasks for other participants in the world economic space to avoid a significant lag, especially in today's post-pandemic society. For the countries of Eastern Europe, this task is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  29
    Anticipatory Governance in Biobanking: Security and Risk Management in Digital Health.Dagmar Rychnovská - 2021 - Science and Engineering Ethics 27 (3):1-18.
    Although big-data research has met with multiple controversies in diverse fields, political and security implications of big data in life sciences have received less attention. This paper explores how threats and risks are anticipated and acted on in biobanking, which builds research repositories for biomedical samples and data. Focusing on the biggest harmonisation cluster of biomedical research in Europe, BBMRI-ERIC, the paper analyses different logics of risk in the anticipatory discourse on biobanking. Based on document analysis, interviews with ELSI (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki & Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  19.  19
    Benefits of farmer managed natural regeneration to food security in semi-arid Ghana.Seth Opoku Mensah, Suglo-Konbo Ibrahim, Brent Jacobs, Rebecca Cunningham, Derrick Owusu-Ansah & Evans Adjei - 2024 - Agriculture and Human Values 41 (3):1177-1193.
    Promoting Farmer Managed Natural Regeneration (FMNR) aims to increase the productive capacities of farmer households. Under FMNR, farmers select and manage natural regeneration on farmlands and keep them under production. While FMNR contributes to the wealth of farming communities, its contribution to household food security has rarely been researched. We, therefore, used a mixed-methods approach to address the research gap by measuring FMNR’s contribution to food security among farmer households in the Talensi district of Ghana. We adopted the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  6
    Small States and the Development of Their External Security and Defense Policy From the Aspect of Security Management.Leta Bargjieva Miovska - 2024 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 77 (1):457-486.
    Foreign security and defense policy is an interdependent component of securitymanagement. According to the neo-classical definition of security management in thefield of external security-defense policy, it includes a series of practices, strategies andprinciples aimed at protecting assets, information and resources from various threatsand risks through the development of civil and military skills. From the perspective ofthe realist theory, the nature of the international structure is defined by its organizingprinciple, that is, the balance and distribution of power (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  54
    Gender, livestock assets, resource management, and food security: Lessons from the SR-CRSP. [REVIEW]Corinne Valdivia - 2001 - Agriculture and Human Values 18 (1):27-39.
    North Sumatra and West Java in Indonesia, the Andes of Bolivia and Peru, Western Province, the Coast and Machakos in Kenya, were Small Ruminant Collaborative Research Support Program (SR-CRSP) sites in which the role of small ruminants was studied and where technological interventions were designed. In all cases the target groups were poor rural households that could maintain sheep, goats, or South American camelids. The objective was to increase the welfare of families through the use of small ruminant technologies. Access (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  22.  36
    Intensification of Management of Economic Security of the Enterprise in the Post-Pandemic Space.Oleksandr Sylkin, Iryna Bosak, Viktoriia Homolska, Ihor Okhrimenko & Roman Andrushkiv - 2021 - Postmodern Openings 12 (1Sup1):302-312.
    Intensification of entrepreneurial activity in a post-pandemic space requires improved management both at the level of economic security and at the level of the entire enterprise. The expediency of the transition from the extensive type of development of the load management system is substantiated. The scientific approaches to the interpretation of the terms "intensification", "management" and "economic behaviour" are generalized. The attention is focused on the need to create a safe development environment for each enterprise. The (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  41
    Configuration and Development of Alliance Portfolios: A Comparison of Same-Sector and Cross-Sector Partnerships.Roberto Gutiérrez, Patricia Márquez & Ezequiel Reficco - 2016 - Journal of Business Ethics 135 (1):55-69.
    Management of different types of partnerships plays a decisive role in company performance. Complex business ventures, such as those created to serve low-income populations, usually include both cross- and same-sector partnerships. However, the initial diversity featured in these alliance portfolios diminishes as companies take their ventures up to scale. This article develops theoretical propositions about the evolution and configuration patterns of portfolios that include both cross- and same-sector partnerships. Two longitudinal case studies serve to illustrate the theoretical framework (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  24.  12
    Developing a theory-based information security management framework for human service organizations.Sameera Mubarak - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):254-271.
    Purpose This paper aims to identify organizations’ information security issues and to explore dynamic, organizational culture and contingency theories to develop an implementable framework for information security systems in human service organizations based soundly in theory and practice. Design/methodology/approach The paper includes a critical review of global information security management issues for HSOs and relevant multi-disciplinary organizational theories to address them. Findings Effective information security management can be particularly challenging to HSO because of their (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  9
    Firewall configuration: An application of multiagent metalevel argumentation.Katie Atkinson, Federico Cerutti, Peter McBurney, Simon Parsons & Iyad Rahwan - 2016 - Argument and Computation 7 (2-3):201-221.
    Firewalls are an important tool in the assurance of network security. Packet filtering firewalls are configured by providing a set of rules that identify how to handle individual data packets that arrive at the firewall. In large firewall configurations, conflicts may arise between these rules. Argumentation provides a way of handling conflicts such that their origin is illuminated, and hence can help a system administrator understand the effects of a given configuration. To show how argumentation might help in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  23
    Context-aware security management system for pervasive computing environment.Seon-Ho Park, Young-Ju Han & Tai-Myoung Chung - 2001 - In P. Bouquet V. Akman, Modeling and Using Context. Springer. pp. 384--396.
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  23
    Testimony on computer security before the U.S. senate Subcommittee on oversight of government management of the commmittee on governmental affairs.Susan Hubbell Nycum - 1984 - Acm Sigcas Computers and Society 13 (4, 1-3):2-4.
  28. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  29.  10
    The National Security Managers and the National Interest.Richard J. Barnet - 1971 - Politics and Society 1 (2):257-268.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  38
    Firewall configuration: An application of multiagent metalevel argumentation.Andy Applebaum, Zimi Li, Karl Levitt, Simon Parsons, Jeff Rowe & Elizabeth I. Sklar - 2016 - Argument and Computation 7 (2-3):201-221.
    Firewalls are an important tool in the assurance of network security. Packet filtering firewalls are configured by providing a set of rules that identify how to handle individual data packets that arrive at the firewall. In large firewall configurations, conflicts may arise between these rules. Argumentation provides a way of handling conflicts such that their origin is illuminated, and hence can help a system administrator understand the effects of a given configuration. To show how argumentation might help in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  19
    Configuration of prosocial motivations to enhance employees’ innovation behaviors: From the perspective of coupling of basic and applied research.Yuting Lu, Linlin Zheng, Binghua Zhang & Wenzhuo Li - 2022 - Frontiers in Psychology 13:958949.
    Prosocial motivation refers to the employees’ willingness to invest for the sake of helping others. It improves basic and applied research behaviors of employees and the interaction between them. Employees’ innovation behavior depends on prosocial motivation because the motivation to protect the interests of others may promote knowledge sharing and knowledge coupling. However, there is a research gap in solving the optimal solution of prosocial motivations that facilitates different types of innovation behaviors based on the combination of prosocial motivations. We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  33
    Mitigating risks of digitalization through managed industrial security services.Christoph Jansen & Sabina Jeschke - 2018 - AI and Society 33 (2):163-173.
    Digitalization has become a cornerstone of competitiveness in the industrial arena, especially in the cases of small lot sizes with many variants in the goods produced. Managers of industrial facilities have to handle the complexity that comes along with Industry 4.0 in diverse dimensions to leverage the potentials of digitalization for their sites. This article describes major drivers of this complexity in current industrial automation to outline the environment of today’s challenges for managers of this technical transition—and shows how managed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  21
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  31
    A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption.Xiao-Ling Jin, Zhongyun Zhou & Yiwei Tian - 2020 - Journal of Business Ethics 175 (1):135-166.
    Consumer indirect misbehavior in access-based consumption is a significant challenge for enterprises. The literature is in short of a deep understanding of the antecedent conditions of consumer indirect misbehavior in this context and limited by inconsistent findings, calling for developing a holistic and integrative theoretical framework. This study integrates three commonly used theoretical perspectives in the consumer misbehavior literature to present holistic archetypes of consumer indirect misbehavior formation. In accordance with this theoretical objective, we adopted an emerging approach for configurational (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  29
    HIPPA, privacy and organizational change: a challenge for management.Bradley K. Jensen, Melinda Cline & Carl S. Guynes - 2007 - Acm Sigcas Computers and Society 37 (1):12-17.
    Organizational change surrounding the security of identifiable health information has become imperative. This is a significant challenge for managers who are held responsible for loss of privacy through faulty security procedures. Management cannot completely secure the organization and still provide employees and customers with the information and services they need. Organizations must decide how much and what type of security they need, how to assign priorities, and how to manage security as the organization evolves in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  36.  18
    Configurations of progress and the historical trajectory of the future in African higher education.Emnet Tadesse Woldegiorgis - 2022 - Educational Philosophy and Theory 54 (11):1839-1853.
    The role of African higher education institutions has been embedded within the socio-economic and historical contexts of the continent. Understanding the nature of African universities, their roles in African societies, and their place in the global knowledge system demands comprehensive reflection of the historical trajectories of the sector itself. In order to re-imagine the future of African higher education, it is important not only to reconstruct the past by uncovering facts but also to deconstruct it by challenging the nature of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi, 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper (...) countermeasures can be devised. Ontologies are instruments developed to address these conceptual clarification and terminological systematization issues. Over the years, several ontologies have been proposed in Risk Management and Security Engineering. However, as shown in recent literature, they fall short in many respects, including generality and expressivity - the latter impacting on their interoperability with related models. We propose a Reference Ontology for Security Engineering (ROSE) from a Risk Treatment perspective. Our proposal leverages on two existing Reference Ontologies: the Common Ontology of Value and Risk and a Reference Ontology of Prevention, both of which are grounded on the Unified Foundational Ontology (UFO). ROSE is employed for modeling and analysing some cases, in particular providing clarification to the semantically overloaded notion of Security Mechanism. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  48
    Organizational Configurations for Sustainability and Employee Productivity: A Qualitative Comparative Analysis Approach.Sanja Pekovic & Magali A. Delmas - 2018 - Business and Society 57 (1):216-251.
    We propose a model that identifies the configurations of relations between environmental practices and other management practices that can improve employee performance, measured as labor productivity. To test our model, we use the qualitative comparative analysis methodology, which allows us to demonstrate empirically how different configurations of management practices, including environmental practices, quality management systems, teamwork, and interorganizational relations, contribute to work systems in ways that increase labor productivity. Our results, based on data from 4,975 employees from (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  39.  2
    Unbundling Ethical Consumer Choice: A Configurational Analysis With a Framing Experiment.Leena Lankoski & Sari Ollila - forthcoming - Business and Society.
    To understand ethical consumer choice, it should be studied from a holistic, configurational perspective. We use fuzzy-set qualitative comparative analysis (fsQCA) ( N = 715) with a randomized experiment in the context of animal welfare to examine (a) the interdependencies of factors aiding or impeding ethical choice, and (b) whether ethical choices occur differently in a loss frame than in a gain frame. We identify several alternative pathways to ethical choice and non-choice, and within these pathways, we reveal substitution effects, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  24
    When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?Awais Rashid, Sveta Milyaeva & Ola Michalec - 2022 - Big Data and Society 9 (1).
    Big data technologies are entering the world of ageing computer systems running critical infrastructures. These innovations promise to afford rapid Internet connectivity, remote operations or predictive maintenance. As legacy critical infrastructures were traditionally disconnected from the Internet, the prospect of their modernisation necessitates an inquiry into cyber security and how it intersects with traditional engineering requirements like safety, reliability or resilience. Looking at how the adoption of big data technologies in critical infrastructures shapes understandings of risk management, we (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  99
    Managing corporate ethics: learning from America's ethical companies how to supercharge business performance.Francis Joseph Aguilar - 1994 - New York: Oxford University Press.
    Managers often ask why their firm should have an ethics program, especially if no one has complained about unethical behavior. The pursuit of business ethics can cost money, they say. It can lose sales to less scrupulous competitors and can drain management time and energy. But as Harvard business professor Francis Aguilar points out, ethics scandals (such as over Beech-Nut's erzatz "apple juice" or Sears's padded car repair bills) can severely damage a firm, with punishing legal penalties, bad publicity, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  42.  24
    Knowledge management model of Center for the Development of Humanities and Social Sciences in Health.Norbis Díaz Campos & Macías Llanes - 2013 - Humanidades Médicas 13 (2):314-329.
    La gestión del conocimiento es un proceso relacionado con la producción, transmisión y utilización del conocimiento y su pertinencia para el desempeño organizacional; en la actualidad han aparecido diversidad de modelos que prescriben su configuración. El presente artículo describe el modelo que fundamenta teórica y metodológicamente la aplicación de la gestión del conocimiento en el Centro de Desarrollo de las Ciencias Sociales y Humanísticas en Salud. Esta entidad dedicada a la producción y transmisión del conocimiento científico en estas áreas de (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  29
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  59
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  45. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  91
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  47.  14
    Enhancing academic integrity in a UAE safety, security defence emergency management academy – the Covid- 19 response and beyond.Rami Al Sharefeen & Amanda Davies - 2022 - International Journal for Educational Integrity 18 (1).
    Globally, academic integrity and misconduct is a continuing conundrum for education institutions. Whilst the online delivery of education is not new, the onset of Covid-19 with accompanying health and safety limitations and the consequential rapid transition to emergency online delivery of education has, for many, exacerbated the need to focus on emerging potential for new forms of student academic misconduct i.e., e-dishonesty. This paper presents the strategies developed by a higher education institution specializing in university courses for safety and (...) professionals in the United Arab Emirates to address academic integrity during Covid-19 and beyond. The fundamental approach draws on lessons learnt from across the education community and focuses on engaging a comprehensive whole of Academy commitment to a high standard of academic integrity. The research investigated the outcomes of the academic integrity interventions in a total student population of 631. The early trending results of the strategies are encouraging, whilst monitoring of the ever-changing academic assessment landscape is pivotal to ensure these early trends are validated and sustained. The strategies developed and deployed by the Academy are replicable and offer a contribution to the demanding and complex challenge of establishing academic integrity within educational institutions across the world. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. Security and Privacy Protection in Developing Ethical AI: A Mixed-Methods Study from a Marketing Employee Perspective.Xuequn Wang, Xiaolin Lin & Bin Shao - forthcoming - Journal of Business Ethics:1-20.
    Despite chatbots’ increasing popularity, firms often fail to fully achieve their benefits because of their underutilization. We argue that ethical concerns dealing with chatbot-related privacy and security may prevent firms from developing a culture of embracing chatbot use and fully integrating chatbots into their workflows. Our research draws upon the stimulus-organism-response theory (SOR) and a study by Floridi et al. (Minds and Machines, 28:689–707, 2018 ) on the ethical artificial intelligence framework to investigate how chatbot affordances can foster employees’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  63
    A Control and Management Network for Wireless ATM Systems.Stephen Bush, Jagannath F., Evans Sunil, B. Joseph, Victor Frost, Gary Minden & K. Sam Shanmugan - 1997 - Acm-Baltzer Wireless Networks 3:267--283.
    This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 984