Haku
Viitteet 31-40 / 106
MACICO : Multi-Agency Cooperation In Cross-border Operations Samples of Evidence Series: Volume 4
(Laurea-ammattikorkeakoulu, 2014)
Cooperation between Public Protection and Disaster Relief actors across a border is a difficult task today, because the teams on both sides of the border cannot communicate with each other. One of the reasons is that their ...
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence
(Procon, 2020)
An Early Warning System (EWS) for cybersecurity intelligence will provide the capability to share information to provide up to date information to all constituents involved in the EWS. The development of EWSs will be rooted ...
Version Control Systems : Development, Comprehension and Rationalization of usage: Case Aalto University
(World Scientific and Engineering Academy and Society, 2017)
IT environments are a continuously changing entirety. Software and systems in these environments go through their lifecycles and then they are replaced with more advanced and economical solutions. This is a normal phenomenon ...
Information Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI
(WSEAS Press, 2014)
The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. ...
Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network
(American Institute of Physics (AIP), 2017)
Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting ...
SATERISK : Risks of Satellite Based Tracking. Sample of Evidence Series: Volume (2)
(Laurea-ammattikorkeakoulu, 2012)
The SATERISK project studied risks associated with satellite based tracking, specifically whether the use of tracking generates additional risks. The project analyzed risks using different approaches: legal, technical and ...
INTEGRATIVE STUDENT-CENTERED RESEARCH AND DEVELOPMENT WORK : Sample of Evidence Series: Volume (1)
(Laurea-ammattikorkeakoulu, 2010)
RIESCA
In the RIESCA project (The Rescuing of Intelligence and Electronic Security Core Applications) Laurea aimed at developing further evaluation methods for systems that are critical to the functioning of the society. ...
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
(Procon, 2020)
This article presents the conceptual resilience governance framework and design aspects for resilient cyber-physical eHealth systems. Our safety and security thinking has been based on the supposition that inside defensive ...
Mobile Object Bus Interaction : Designing Future Emergency Vehicles Samples of Evidence Series: Volume 3
(Laurea-ammattikorkeakoulu, 2014)
“Are emergency service vehicles packed with too much equipment?” “Why can’t vehicles’ ICT applications be simplified and rationalized to help first responders work more efficiently and effectively?” “Can two items of ...
Organization and individual security
(Turiba University, 2018)
Nowadays the rapidly advancing technologies and the ongoing changes in the socioeconomic and political processes in societies have stipulated an increased attention to security issues. In its broadest sense, the notion of ...









