Filters








2,793 Hits in 8.6 sec

Organizing Viable Information Security Governance and Management

Kevin Bollengier, Yuri Bobbert
2020 Zenodo  
Organizations must ensure that they remain viable against the rising and evolving threats of utilizing information technology and its accompanying risks.  ...  Business information security has evolved over the years, where it first started as a technique to protect critical information assets from the growing use of information technology and its accompanying  ...  As the use of information and data has an enterprise wide impact, I will no longer use the terms "information risk" and "information security", preferring the terms "business information risk" and "Business  ... 
doi:10.5281/zenodo.3960147 fatcat:r3kgcwgevjfmzferpperaeijja

Prevalence of diet-related risk factors for chronic disease in male prisoners in a high secure prison

M Hannan-Jones, S Capra
2015 European Journal of Clinical Nutrition  
Our study aimed to determine the prevalence of diet related 70 chronic disease markers in a group of high secure, male prisoners in Australia, with the goal of 71 informing the food and nutrition policy  ...  Dietary interviews 225 confirmed challenges at the individual level when managing Type 1 diabetes in the prison 226 environment.  ... 
doi:10.1038/ejcn.2015.100 pmid:26081491 fatcat:y4a5iofvlbe3nenrsixbm2nzq4

Future Cyber-security Demands in Modern Agriculture

Erwin Kristen, Reinhard Kloibhofer, Vicente Hernández
2020 Zenodo  
The proposal herein is one of the outcomes from the research being carried out in the European research project called AFarCloud.  ...  This paper emphasizes the need for this kind of methodologies now that the agricultural sector is facing one of its most challenging phase: its digital transformation.  ...  means to security. ronment (e.g., a computer network, or a facility), evaluate the model and continuously verify it.  ... 
doi:10.5281/zenodo.4633653 fatcat:pq5fuxvzyjgzdoiaa4m6cnzpju

POSSIBILITIES OF DEFENSE SPENDING STABILIZATION

Vladan Holcner, Aleš Olejníček
2017 Journal of Security and Sustainability Issues  
GAAA 3_2/2016 -Strategic business performance measurement and management and its comparison in Czech and Slovak companies.  ...  Research interests: Legal Reguliation of Public Servants Activity; Legal Regulation of Public Safety; Legal Issues of National, State and Regional Security.  ...  These results confirmed a relatively high self-confidence of entrepreneurs in managing the credit risk.  ... 
doi:10.9770/jssi.2017.7.1(1) fatcat:7biezjgxfraj5ipjtslc46n7fu

Retrospective Analysis [chapter]

2015 Security Intelligence  
Dedication To my loving parents, little sister, and wife for their continuous suppo rt, patience, and encouragement v Acknowledgements  ...  Survival Analysis Censoring techniq ue and survival analysis were used to overcome the challenge of different observation periods and incomplete information on the study endpoints (many patients, especially  ...  Although this assumption could not be directly verified because of the lack of information on BPH diagnosis in the database, it is supported by the fact that alpha-blockers were used by only male patients  ... 
doi:10.1002/9781119183617.ch8 fatcat:h3duzj4itbgb7mmjnzs4bsk5ka

How users perceive and respond to security messages: a NeuroIS research agenda and empirical study

Bonnie Brinton Anderson, Anthony Vance, C Brock Kirwan, David Eargle, Jeffrey L Jenkins
2016 European Journal of Information Systems  
Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions.  ...  In this article, we argue for the potential of NeuroIScognitive neuroscience applied to Information Systemsto shed new light on users' reception of security messages in the areas of (1) habituation, (2  ...  We challenge this flawed logic. PMT does not account for the distinction in the nature of the espoused threat and, therefore, has been repeatedly misspecified in the security literature.  ... 
doi:10.1057/ejis.2015.21 fatcat:gqlv5tog4jgtvjxxt7eusytklm

Safety in transportation: a review of the concept, its context, safety preservation and improvement effectiveness

Maciej SZCZUKOWSKI
2017 Scientific Journal of Silesian University of Technology. Series Transport  
The article presents definitions of and approaches to the concept of safety in order to confirm the subjective character of its determination, description, and interpretation.  ...  It also explains how people who are believed to be directly responsible for the level of safety, due to a distorted and unclear information flow, can be forced into taking defensive positions and, in turn  ...  In 1977, Borgida and Nisbett defined such a state as risk homeostasis [10] .  ... 
doi:10.20858/sjsutst.2017.95.18 fatcat:ph5qys6ucvfx7lyd4a2dsvcz4q

Emergence and Spread of New Races of Wheat Stem Rust Fungus: Continued Threat to Food Security and Prospects of Genetic Control

Ravi P. Singh, David P. Hodson, Yue Jin, Evans S. Lagudah, Michael A. Ayliffe, Sridhar Bhavani, Matthew N. Rouse, Zacharias A. Pretorius, Les J. Szabo, Julio Huerta-Espino, Bhoja R. Basnet, Caixia Lan (+1 others)
2015 Phytopathology  
Emergence and spread of new races of wheat stem rust fungus: Continued threat to food security and prospects of genetic control. Phytopathology 105:872-884.  ...  Ethiopian Agricultural Research Institute (EIAR) for the provision of field and other facilities that have been crucial in generating some of the information presented in the article; and J.  ...  Melinda Gates Foundation and DFID), USAID, ICAR-India, USDA-ARS, and GRDC-Australia, among others, for their financial support; the Kenyan Agricultural and Livestock Research Organization (KALRO), and  ... 
doi:10.1094/phyto-01-15-0030-fi pmid:26120730 fatcat:6jtp7lvwpzdkpcypezrqlzif6a

Determinant Factors in Personal Decision-Making to Adopt COVID-19 Prevention Measures in Chile

Karina Fernanda Gonzalez, Maria Teresa Bull, Sebastian Muñoz-Herrera, Luis Felipe Robledo
2021 International Journal of Environmental Research and Public Health  
We selected the risk homeostasis approach to identify relevant variables associated with the risk of contagion and the Protective Action Decision Model to understand protective decision-making in the pandemic  ...  Finally, women have a higher risk perception and adopt more protective measures, and in contrast, young people between 18 and 30 years of age are the least concerned about COVID-19 infection.  ...  Acknowledgments: The authors would like to thank the important contributions of reviewers and editor which improved the quality of this paper.  ... 
doi:10.3390/ijerph18158131 fatcat:hh5qetzhefb45alfef5vy6phuy

Food fraud and adulteration: a challenge for the foresight of Veterinary Services

A. CARTÍN-ROJAS
2017 Rev Sci Tech Off Int Epizoot  
Demographic and commercial trends show an increase in production of food of animal origin in the coming decades. Therefore, it is expected that health risks will also intensify in parallel.  ...  This article analyses why food fraud is an emerging challenge for national Veterinary Services and proposes possible lines of action to mitigate its side effects.  ...  This article analyses the characteristics and possible causes of food fraud, the challenge for veterinarians in assuring food security in the context of FFA and possible lines of action to minimise its  ... 
doi:10.20506/rst.36.3.2733 pmid:30160682 fatcat:sacg6dauujdf5lf5refkrol5cu

Access to a high resource environment protects against accelerated maturation following early life stress: A translational animal model of high, medium and low security settings

Arielle R. Strzelewicz, Evelyn Ordoñes Sanchez, Alejandro N. Rondón-Ortiz, Anthony Raneri, Sydney T. Famularo, Debra A. Bangasser, Amanda C. Kentner
2019 Hormones and Behavior  
Early life exposure to a low security setting, characterized by a scarcity of resources and limited food access, increases the risk for psychiatric illness and metabolic dysfunction.  ...  Collectively, these studies suggest that both compensatory maternal care and juvenile enrichment can reduce the impact of a low security environment.  ...  This project was funded in part by NIMH under Award Number R15MH114035 (to ACK) and by the National Science Foundation (NSF CAREER IOS-1552416 to D.A.B).  ... 
doi:10.1016/j.yhbeh.2019.01.003 pmid:30708031 pmcid:PMC6527488 fatcat:gylnsff7vrdr3monsvcqzitc3y

Food for Thought … Mechanistic Validation
EN

Thomas Hartung
2013 ALTEX: Alternatives to Animal Experimentation  
Acknowledgements Development of these concepts was possible due to the experiences and discussions of our experimental programs, i.e., the NIH transformative research grant "Mapping the Human Toxome by  ...  Systems Toxicology" (RO1ES020750) and FDA grant "DNTox-21c Identification of pathways of developmental neurotoxicity for high throughput testing by metabolomics" (U01FD004230) as well as NIH "A 3D model  ...  It is imaginary, difficult to grasp and can never exist in the present, only in the future. If there is certainty, there is no risk."  ... 
doi:10.14573/altex.2013.2.119 pmid:23665802 pmcid:PMC4086802 fatcat:swkngscqxjaeblejtk5kamlonu

Organizational Communication and Individual Behavior: Implications for Supply Chain Risk Management

Scott DuHadway, Steven Carnovale, Vijay R. Kannan
2018 Journal of Supply Chain Management  
A multi-stage experimental design is applied, in which decision makers make decisions across three dimensions of risk and adjust their risk-taking behavior after being presented with organizational communication  ...  This study examines the influence of organizational communication regarding supply chain risk on individual decision-making strategies and the perceptions of risk.  ...  can confirm the findings from this research and extend the understanding of how organizational communication impacts supply chain risk decision making.  ... 
doi:10.1111/jscm.12182 fatcat:vxcr7g3bqrgfnfmb7vl7yitjhu

Containing Future Epidemics with Trustworthy Federated Systems for Ubiquitous Warning and Response [article]

Dick Carrillo, Lam Duc Nguyen, Pedro H. J. Nardelli, Evangelos Pournaras, Plinio Morita, Demóstenes Z. Rodríguez, Merim Dzaferagic, Harun Siljak, Alexander Jung, Laurent Hébert-Dufresne, Irene Macaluso, Mehar Ullah (+2 others)
2021 arXiv   pre-print
It leverages the pervasiveness of wireless connectivity while being trustworthy and secure.  ...  In this paper, we propose a global digital platform to avoid and combat epidemics by providing relevant real-time information to support selective lockdowns.  ...  Our proposal answers those challenges based on informational self-determination as the way to build trustworthy and secure public infrastructure that shall enable graceful lockdowns as advocated here.  ... 
arXiv:2010.13392v2 fatcat:4yy5vfjvd5aqte43jb24hxiqoe

Containing Future Epidemics With Trustworthy Federated Systems for Ubiquitous Warning and Response

Dick Carrillo, Lam Duc Nguyen, Pedro H. J. Nardelli, Evangelos Pournaras, Plinio Morita, Demóstenes Z. Rodríguez, Merim Dzaferagic, Harun Siljak, Alexander Jung, Laurent Hébert-Dufresne, Irene Macaluso, Mehar Ullah (+2 others)
2021 Frontiers in Communications and Networks  
In this paper, we propose a global digital platform to avoid and combat epidemics by providing relevant real-time information to support selective lockdowns.  ...  It leverages the pervasiveness of wireless connectivity while being trustworthy and secure.  ...  Our proposal answers those challenges based on informational self-determination as the way to build trustworthy and secure public infrastructure that will enable graceful lockdowns as advocated here.  ... 
doi:10.3389/frcmn.2021.621264 fatcat:x2yrkqts7vejzae45jkadkcf4q
« Previous Showing results 1 — 15 out of 2,793 results