605,783 Hits in 6.7 sec

United States Criminal Law [chapter]

2002 Asset Protection and Security Management Handbook  
This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed.  ...  Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation, without intent to infringe.  ...  However, the assets protection  ... 
doi:10.1201/9781420031386-15 fatcat:7rbmtre2tjbmxfusjnhjnsobuy

Crime Prevention through Environmental Design [chapter]

2002 Asset Protection and Security Management Handbook  
times more protection than no security.  ...  CRITICAL CONSIDERATIONS There is little doubt that the approach to reducing crime through the design, build and management of properties and their surroundings is a cost-effective and common sense approach  ... 
doi:10.1201/9781420031386.ch13 fatcat:e3cdrf6tuvhlbkf3dom5nsossi

Security and privacy protection in RFID-enabled supply chain management

Manmeet Mahinderjit Singh, Xue Li, Zhanhuai Li
2011 International Journal of Radio Frequency Identification Technology and Applications  
This paper discusses the ways in which privacy and security protection can be maintained in an open-loop RFID supply chain.  ...  Counterfeiting in the form of cloned or fraudulent RFID tags is a consequence of a lack of security measures and trust among the partners when RFID technology is used to automate their business transactions  ...  We also believe trust management is the key for the overall protection of security and privacy in an RFID system.  ... 
doi:10.1504/ijrfita.2011.043738 fatcat:tjajycerknecnltqly64md6a6u

The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program

Wesley Jennings
2003 Security Journal  
old and the new world of the security professional; the corporate security manager; corporate security functions; and the security profession now and in the future.  ...  Chapter 4 provides a discussion of the role of the 21st-century corporate security manager, and poses the question: 'Is such a position required in a corporation?'  ...  In summation, this book succeeds in illustrating a systematic and holistic approach to the creation of a successful assets protection program.  ... 
doi:10.1057/ fatcat:luosy7lwerd67ps3wyuq64iyru

Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering

Marco Grimm, Reiner Anderl
2013 Procedia Computer Science  
The goal conflict between a wide availability of knowledge to system engineers and a secure management and usage of intellectual property is still unsolved.  ...  It covers the specific requirements and constraints in the Systems Engineering context and provides a knowledge security improvement over the current technical approaches.  ...  Acknowledgements The authors would like to thank the Secure Product Creation Processes (SP²) and the Enterprise Rights Management Open (ERM.Open) working groups from ProSTEP iViP Association for providing  ... 
doi:10.1016/j.procs.2013.01.060 fatcat:z6m4i3rdpnhnjeiarz3bjn2d3q

14. Leveraging Interledger Technologies in IoT Security Risk Management [chapter]

Dmitrij Lagutin, Yki Kortesniemi, Vasilios A. Siris, Nikos Fotiou, George C. Polyzos, Lei Wu
2020 Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection  
2020 research and innovation program under grant agreement No. 779984.  ...  Acknowledgments The research reported here has been undertaken in the context of SOFIE (Secure Open Federation for Internet Everywhere) project, which has received funding from the European Union's Horizon  ...  This approach is motivated by, and addresses in particular, IoT systems risk management.  ... 
doi:10.1561/9781680836837.ch14 fatcat:lpsofse6rjhgfhlva4bsf2unyu

A Personal Approach

Kellyn Weir, Alan Costall
2015 International Journal of Qualitative Methods  
This study explored the process of taking a personal approach to my son's problems with computer games.  ...  By engaging in dialogue and encouraging the ability to object, a first-person plural (We), position was achieved in which an understanding of this situation developed and has transferred to our everyday  ...  The ''chat'' had managed to blow everything wide open and in doing so produced an approach in which everything was negotiable.  ... 
doi:10.1177/1609406915618048 fatcat:espexoqbkbdazcu4r2l7j3f4lu

Developing Intelligent Child Protection and Security Systems

2020 International journal for research in engineering application & management  
In present time, the security and safety aspect of a school going children is of main concern and paramount importance.  ...  The project also proposes safety systems such as person identification, Geofacing and automatically ON and OFF system using thumb impression.  ...  RESULTS Child Security is any intervention or program that tackles or protects children from abuse, coercive, neglect and exploitative circumstances.  ... 
doi:10.35291/2454-9150.2020.0258 fatcat:rj5kebn7nzfwxfwrjwi4avahha

An adaptive group decision pattern and its use for industrial security management

Heiko Thimm
2012 American Journal of Environmental Protection  
A process model for security incident management and a process model for adaptive complete asynchronous group decision making are described using the BPMN2.0 graphical process modeling standard.  ...  In this article a respective new group decision pattern is introduced and demonstrated in combination with an enhanced GDSS through a fictive industrial security case example.  ...  Several researcher groups investigated this approach in the security manage-ment domain including [8] [7] [3] .  ... 
doi:10.11648/j.ajep.20120101.11 fatcat:eh5lf6aygvao3dbkzlo2p46ogy

Emergency and Civil Protection: Curriculum Design for 30 Hours of Instructional Time

Aurora Jordá
2011 Journal of Homeland Security and Emergency Management  
This paper describes the experience of designing the curriculum and teaching the subject of Emergency and Civil Protection in a master's program in Spain, from 2006 to the present.  ...  With the restrictions set by key descriptors: civil protection, actions in emergencies and major accidents, and an assigned instructional time of 30 hours, the curriculum consists of 3 thematic units:  ...  CONCLUSIONS AND PERSONAL EVALUATION Although students do not have a clear idea about the subject of emergency management and civil protection early in the course, their interest in the subject is enough  ... 
doi:10.2202/1547-7355.1908 fatcat:i5na5eq3wvbrnghhkih2laz6fm

Trust Management in Collaborative Systems for Critical Infrastructure Protection

Nawal Ait Aali, Amine Baina, Loubna Echabbi
2018 Security and Communication Networks  
In addition, we present a case study to demonstrate and illustrate the feasibility of our solution for CI protection, especially the electrical grid.  ...  Based on our conducted study about the different constraints and requirements of the collaborative systems within CI, we reached a security solution: Tr-OrBAC.  ...  In [28] , a model based on the principle of blockchain is proposed to manage the access and to protect the personal data.  ... 
doi:10.1155/2018/7938727 fatcat:e2myxklcqnefxcrpdobufgmqwm


Grzegorz PIETREK
2017 Security and Defence Quarterly  
Crisis management, civil protection and civil defence are terms which are used every day by theoreticians and practitioners. Are they really diff erent or are they synonyms?  ...  protection and rescue services.  ...  security and during the a time of war, whereas the crisis management plan is to be applied during the time of peacepeacetime.  ... 
doi:10.35467/sdq/103185 fatcat:3t4kmfzfejcszdfqhoewpnozl4

A novel security information and event management system for enhancing cyber security in a hydroelectric dam

Cesario Di Sarno, Alessia Garofalo, Ilaria Matteucci, Marco Vallini
2016 International Journal of Critical Infrastructure Protection  
Security information and event management (SIEM) Systems Decision support systems Resilient event storage Hydroelectric dam a b s t r a c t Security information and event management (SIEM) systems are  ...  increasingly used to cope with the security challenges involved in critical infrastructure protection.  ...  Acknowledgments This research was partially supported by the TENACE PRIN Project (No. 20103P34XC) funded by the Italian Ministry of Education, Universities and Research.  ... 
doi:10.1016/j.ijcip.2016.03.002 fatcat:hjf5zx5v6nbibc2rmdwl4oippa

A Study on Information Security Management with Personal Data Protection

Chien-Cheng Huang, Kwo-Jean Farn, Frank Yeong-Sung Lin
2011 2011 IEEE 17th International Conference on Parallel and Distributed Systems  
On May 26 th 2010, with the announcement of the Personal Data Protection Act in Taiwan, information security management (ISM) of the Personal Data Protection Act has received much attention from the public  ...  This study is centered on the working items of standards announced by the International Organization for Standardization (ISO) and the ongoing information security management system (ISMS) standards and  ...  This Framework is a top-down approach.  ... 
doi:10.1109/icpads.2011.16 dblp:conf/icpads/HuangFL11 fatcat:ibaw7lsrjrg67kts2dlegcpdfq

Internal Whistleblowing Systems – New Standards for Active Security Management and Protection Against Systemic Risks

Marcin Jurgilewicz, Krzysztof Michalski, Andrzej Misiuk, Jozefína Drotarova
To disrupt these interactions, all organizations with a security impact should be required to install credible internal whistleblowers systems.  ...  Design/Methodology/Approach: The research carried out using the problem analysis method was aimed at the initial structuring of the research field and theoretical and conceptual preparation of tools for  ...  A change in the culture of security is a difficult challenge, but it is a prerequisite for an adaptive approach to the increasingly frequent systemic threats and proactive management of the associated  ... 
doi:10.35808/ersj/1887 fatcat:5geytvyezrb6pnxn45fxjddeva
« Previous Showing results 1 — 15 out of 605,783 results