Haku
Viitteet 31-40 / 77
Version Control Systems : Development, Comprehension and Rationalization of usage: Case Aalto University
(World Scientific and Engineering Academy and Society, 2017)
IT environments are a continuously changing entirety. Software and systems in these environments go through their lifecycles and then they are replaced with more advanced and economical solutions. This is a normal phenomenon ...
Information Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI
(WSEAS Press, 2014)
The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. ...
Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network
(American Institute of Physics (AIP), 2017)
Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting ...
SATERISK : Risks of Satellite Based Tracking. Sample of Evidence Series: Volume (2)
(Laurea-ammattikorkeakoulu, 2012)
The SATERISK project studied risks associated with satellite based tracking, specifically whether the use of tracking generates additional risks. The project analyzed risks using different approaches: legal, technical and ...
INTEGRATIVE STUDENT-CENTERED RESEARCH AND DEVELOPMENT WORK : Sample of Evidence Series: Volume (1)
(Laurea-ammattikorkeakoulu, 2010)
RIESCA
In the RIESCA project (The Rescuing of Intelligence and Electronic Security Core Applications) Laurea aimed at developing further evaluation methods for systems that are critical to the functioning of the society. ...
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
(Procon, 2020)
This article presents the conceptual resilience governance framework and design aspects for resilient cyber-physical eHealth systems. Our safety and security thinking has been based on the supposition that inside defensive ...
ECHO Information sharing models
(European commission, 2019)
As part of the ECHO project, the Early Warning System (EWS) is one of four technologies under development. The E-EWS will provide the capability to share information to provide up to date information to all constituents ...
Mobile Object Bus Interaction : Designing Future Emergency Vehicles Samples of Evidence Series: Volume 3
(Laurea-ammattikorkeakoulu, 2014)
“Are emergency service vehicles packed with too much equipment?” “Why can’t vehicles’ ICT applications be simplified and rationalized to help first responders work more efficiently and effectively?” “Can two items of ...
Organization and individual security
(Turiba University, 2018)
Nowadays the rapidly advancing technologies and the ongoing changes in the socioeconomic and political processes in societies have stipulated an increased attention to security issues. In its broadest sense, the notion of ...
Redundant Multichannel Public Safety Communication Network for Public Protection and Disaster Relief (PPDR) Organizations
(WSEAS Press, 2012)
All Public Protection and Disaster Relief (PPDR) organizations across Europe have multiple similar needs. A common cyber secure voice and data network for PPDR brings synergy and enables interoperability; separate networks ...