Haku
Viitteet 1-10 / 19
National Security Auditing Criteria, KATAKRI: Leading Auditor Training and Auditing Process
(Academic Conferences and Publishing International Limited, 2013)
The National Security Auditing Criteria, KATAKRI, were published in 2009, revised in 2011, and version III is currently under revision. The root of KATAKRI is to preserve the confidentiality of any confidential and classified ...
Cyber Security and Trust: Tools for Multi-agency Cooperation between Public Authorities
(SCITEPRESS Science and Technology Publications, 2015)
Functions vital to society, such as public protection and disaster relief (PPDR), are increasingly dependent on networks, electricity and data processing infrastructure. Incidents such as natural hazards and organized crime ...
Law Enforcement Authorities' Special Requirements for GNSS
(University of Rijeka, 2012)
Organised crime is a real threat in Europe with the emergence of international warehouses of crime. For improving their evidence-gathering abilities, law enforcement authorities (LEAs) are constantly seeking new technological ...
Governance and management information system for cybersecurity centres and competence hubs
(Academic Conferences International Ltd, 2023)
Information sharing allows organizations to leverage the collective knowledge, experience, and analytical capabilities of their sharing partners in a community of interest. Sharing information is made easier with the help ...
Hybrid Threat and Information Influence in Connection with Security of Supply
(Academic Conferences International Ltd, 2023)
Hybrid threat is a multidimensional and hard-to-detect activity. It includes a wide range of actions, from influencing information to the military means by which the hybrid actor achieves its goals. These goals can include ...
Analysis of Sexual Abuse of Children Online and CAM Investigations in Finland
(Academic Conferences International Ltd, 2022)
Children who use their free time with phones and computers online, interact with the digital environment on a daily basis, where they will often make social contacts with their friends as well as exchange photos and videos ...
Resilience Management Concept for Railways and Metro Cyber-Physical Systems
(Academic Conferences International, 2021)
Railways and metros are good examples of cyber-physical systems (CPS). They are safe, efficient, reliable and environmentally friendly. However, being such critical infrastructures turns metro, railway and related intermodal ...
Ethics and Accountability of Care Robots
(Academic Conferences International Limited, 2022)
The subject of this paper is ethical and responsibility issues relating to the development and acquisition of robotics in healthcare. The purpose of the paper is to study previous scientific publications and research related ...
Analysis of Sexual Abuse of Children Online and CAM Investigations in Europe
(Academic Conferences International Limited, 2022)
Child sexual abuse or child´s exploitation online as sexual violence including Child Abuse Materials (CAM/CSAM) is a global phenomenon. This case study aims to get information on the current nature of crimes by online ...
How to Apply Privacy by Design in OSINT and Big Data Analytics?
(Academic conferences international, 2019)
In a world where technology grows exponentially, more information is available to us every day. States and their
governments have collected information on their citizens for a long time now. On the other hand, people give ...