Haku
Viitteet 31-40 / 96
Information Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI
(WSEAS Press, 2014)
The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. ...
Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network
(American Institute of Physics (AIP), 2017)
Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting ...
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
(Procon, 2020)
This article presents the conceptual resilience governance framework and design aspects for resilient cyber-physical eHealth systems. Our safety and security thinking has been based on the supposition that inside defensive ...
ECHO Information sharing models
(European commission, 2019)
As part of the ECHO project, the Early Warning System (EWS) is one of four technologies under development. The E-EWS will provide the capability to share information to provide up to date information to all constituents ...
Redundant Multichannel Public Safety Communication Network for Public Protection and Disaster Relief (PPDR) Organizations
(WSEAS Press, 2012)
All Public Protection and Disaster Relief (PPDR) organizations across Europe have multiple similar needs. A common cyber secure voice and data network for PPDR brings synergy and enables interoperability; separate networks ...
Ethics of Open Source Intelligence Applied by Maritime Law Enforcement Authorities
(Academic Conferences and Publishing International Limited, 2018)
The MARISA Horizon 2020 project improves maritime security communities’ information exchange, situational awareness, decision-making and reaction capabilities with a data fusion toolkit based on various heterogeneous and ...
OSINT on the Dark Web: Child Abuse Material Investigations
(Procon Ltd, 2022)
The Dark Web allows users to hide their identity while browsing or sending information, providing an ideal environment for transferring information, goods, and services with potentially illegal intentions. Therefore, Law ...
Governance and management information system for cybersecurity centres and competence hubs
(Academic Conferences International Ltd, 2023)
Information sharing allows organizations to leverage the collective knowledge, experience, and analytical capabilities of their sharing partners in a community of interest. Sharing information is made easier with the help ...
Hybrid Threat and Information Influence in Connection with Security of Supply
(Academic Conferences International Ltd, 2023)
Hybrid threat is a multidimensional and hard-to-detect activity. It includes a wide range of actions, from influencing information to the military means by which the hybrid actor achieves its goals. These goals can include ...
Improving the Cybersecurity Awareness of Finnish Podiatry SMEs
(WSEAS Press, 2023)
In the health and welfare sector, many entrepreneurs and employees are not skilled in information and cybersecurity, even when they are constantly dealing with sensitive data. This case study research examines a team of ...