Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber" wg kryterium: Temat


Tytuł:
„Lajki” i „followersi” na portalach społecznościowych sposobem na poszukiwanie własnej tożsamości
"Likes" and "followers" on social portals as a way of searching for personal identity
Autorzy:
Andrzejewski, Adam
Powiązania:
https://bibliotekanauki.pl/articles/893728.pdf
Data publikacji:
2018-03-07
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
(cyber-)identity
likes
followers
social portals
ultimate selfie
tożsamość
lajki
followersi
portale społecznościowe
ostateczne selfie
Opis:
The publication focuses on the connection between humans' personal identity and activity on social networks. Facebook and Instagram are a kind of (cyber-communication) sphere in which we are able to communicate with everyone who belongs to these (cyber-)communities. It allows us to publish our photos, memories, current activities, and videos while simultaneously allowing the portal’s other users to observe our life and expression of our Self. In this (cyber-)social space, people are able to create their image and (cyber-)identity in a psychological and social context, encounter a variety of (personal) experiences, but also gain popularity – sometimes at all cost, at the expense of their health and life. The following issues are discussed in the publication: 1. (People's cyber-)identity created on the social networks: Facebook and Instagram. 2. Self-esteem depending on the number of "likes." 3. "Ultimate selfie" - the popularity for which you pay with your life.
W publikacji skoncentrowano się nad związkiem ludzkiej tożsamości z aktywnością na portalach społecznościowych. Facebook i Instagram to przestrzeń, w której możemy komunikować się z każdym, kto należy do tych społeczności. Pozwala nam na publikowanie własnych zdjęć, wspomnień, bieżących aktywności, filmików przy jednoczesnym przyzwoleniu dla innych użytkowników portalu do obserwowania naszego życia i ekspresji własnego ja. W tej społecznej przestrzeni ludzie kreują swój wizerunek oraz tożsamość w kontekście psychologicznym i społecznym, doświadczają różnorodnych przeżyć, ale także czasem za wszelką cenę zdobywają popularność, kosztem swojego zdrowia i życia. Przedmiotem analiz w publikacji uczyniono następujące zagadnienia: 1. Tożsamość kreowana na portalach społecznościowych Facebook i Instagram. 2. Poczucie własnej wartości uzależnione od liczby „lajków”. 3. „Ostateczne selfie” – popularność, za którą płaci się życiem.
Źródło:
Problemy Opiekuńczo-Wychowawcze; 2018, 566(1); 21-29
0552-2188
Pojawia się w:
Problemy Opiekuńczo-Wychowawcze
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
‘Just a few more minutes online - and I will release myself from tension’. The moderation mediating effect of problematic cyber-activities and Japanese vs. East European culture on the relationship between student burnout and cyber-aggression
Autorzy:
Tomaszek, Katarzyna
Muchacka-Cymerman, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/36449049.pdf
Data publikacji:
2022-11-25
Wydawca:
Wydawnictwo Naukowe Chrześcijańskiej Akademii Teologicznej w Warszawie
Tematy:
student burnout
phubbing
FB addiction
cyber-aggression types
Opis:
Past studies indicate that a number of environmental and psychological factors positively predict the perpetration of cyber-aggression. The main purpose of the present study was to investigate the moderation mediating effect of problematic cyber-activities (FB addiction, phubbing) and culture (Japanese vs. West European) on the association between student burnout and cyber-aggression behaviours among the university student population. In the current studies 171 West European (83% Females, age M = 23.16, SD = 5.46) and 120 Japanese (50% Females, age M = 21.95, SD = 1.62) students. The highest levels of academic dissatisfaction, phubbing, and cyber–aggression in FB-addicted students were found. The phubbing mediated the association between student burnout and cyber-aggression behaviours, but the results for FB addiction in simple mediation analysis were insignificant. Furthermore, FB addiction and culture were significant moderators of phubbing and cyber-aggression behaviours.
Źródło:
Studia z Teorii Wychowania; 2022, XIII(3 (40)); 127-143
2083-0998
2719-4078
Pojawia się w:
Studia z Teorii Wychowania
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A comprehensive assessment model for critical infrastructure protection
Autorzy:
Häyhtiö, M.
Zaerens, K.
Powiązania:
https://bibliotekanauki.pl/articles/407153.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
critical infrastructure
supply chains
capability management
risk management
cyber
service
Opis:
International business demands seamless service and IT-infrastructure throughout the entire supply chain. However, dependencies between different parts of this vulnerable ecosystem form a fragile web. Assessment of the financial effects of any abnormalities in any part of the network is demanded in order to protect this network in a financially viable way. Contractual environment between the actors in a supply chain, different business domains and functions requires a management model, which enables a network wide protection for critical infrastructure. In this paper authors introduce such a model. It can be used to assess financial differences between centralized and decentralized protection of critical infrastructure. As an end result of this assessment business resilience to unknown threats can be improved across the entire supply chain.
Źródło:
Management and Production Engineering Review; 2017, 8, 4; 42-53
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Concept of an SME Focused Edge Computing Self-managing Cyber-physical System
Autorzy:
Stadnicka, Dorota
Bonci, Andrea
Longhi, Sauro
Pirani, Massimiliano
Dec, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/24200520.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
cyber-physical system
information communication
knowledge management
edge computing
e-kanban
Opis:
The dynamically changing environment forces companies to introduce changes in production processes and the need for employees to adapt quickly to new tasks. Therefore, it is expected to implement solutions to support employees. The system that will manage the work on a manufacturing line should work in real time to support the ongoing activities and, to be implemented in SMEs, must not be expensive. The authors identified important system components and expected functionalities. The methodology of the work is based on humancentered design. A concept of a cyber-physical system is proposed. The aim of the proposed edge computing-based system is to manage the work on the manufacturing line in which certain elements communicate with each other to achieve common goals. The paper presents what the system can consist of, how information and knowledge are managed in the system, and what can be the benefits for enterprises from its implementation.
Źródło:
Management and Production Engineering Review; 2023, 14, 3; 3--15
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Concept of V2G Battery Charging Station as the Implementation of IoT and Cyber Physical Network System
Autorzy:
Nasir, Muhammad
Safitri, Nelly
Rachmawati, Yassir
Arhami, Muhammad
Powiązania:
https://bibliotekanauki.pl/articles/27311964.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
IoT
cyber physical network
V2G
EV
SoC
charging station
Opis:
The integration of the internet of things (IoT) and cyber physical network into the battery charging station system is critical to the success and long-term viability of the vehicle to grid (V2G) trend for future automobiles in terms of environmental and energy sustainability. The goal of this article is to create a V2G battery charging station concept using the internet of things (IoT) and a cyber physical network system. The V2G charging station concept was developed with the idea that every charging electric vehicle (EV) can communicate and coordinate with the charging station's control center, which includes a cyber physical system that addresses privacy and security concerns. The communication protocol must also be considered by the charging station. The preliminary test has been taken into consideration. Normal hours (for case one), peak hours (for case two), and valley hours (for case three), respectively, were created as charging circumstances for EVs at charging stations. Simulations were run for each of the three case scenarios. Each EV's battery state of charge (SoC) is provided a 50 percent initial charge and user-defined SoC restrictions. The MATLAB/SIMULINK platform was used to run the case simulations. The grid frequency, charging station output power, and the EV's battery SoC were all observed during the 24- hour simulation. As a result, the developed V2G charging station concept can regulate its input and output power depending on the battery status of the EVs inside the charging station, as well as provide frequency regulation service to the grid while meeting the energy demand of EV customers.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 2; 269--273
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A critical link in the cybersecurity system
Kluczowe ogniwo w systemie cyberbezpieczeństwa
Autorzy:
Laszczak, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/30145687.pdf
Data publikacji:
2023
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
personality
dysfunction
behavioural learning
artificial intelligence
data leakage
cyber security
cyberbezpieczeństwo
osobowość
dysfunkcje
uczenie behawioralne
sztuczna inteligencja
wyciek danych
Opis:
The aim of this article is to identify human traits that are responsible for the propensity to betray and take secrets outside the organisation. For this purpose, an analytical-diagnostic approach has been used. The primary research method to achieve the stated objectives is the method of analysis and critique of the literature on the subject and the analysis of review papers describing security breaches in cyberspace, when the source of these breaches is the exploitation of human personality weaknesses. First of all, personality and character traits leading to taking information outside the organisation or selling important data are identified. Psychopathic tendencies are identified, in addition to the immature, narcissistic and egotistical personality. The reasons for disclosing sensitive data are discussed. In this way, the article shows a different side of the problem of information system security and helps to understand the mechanism of theft or leakage of important information. Since security weaknesses are attributed to personality traits, the article points to the possibility of anticipatory threat recognition and security enhancement. This is achieved through the use of machine learning, artificial intelligence and behavioural analysis. This succeeds in identifying potentially dangerous individuals who are not coping with their own problems.
Artykuł omawia rolę człowieka w systemie zapewnienia bezpieczeństwa cyfrowego. Podjęte na potrzeby artykułu badania wynikają z podejścia analityczno-diagnostycznego. Podstawową metodą badawczą służącą osiągnięciu wyznaczonych celów jest metoda analizy i krytyki literatury przedmiotu oraz analizy prac przeglądowych opisujących naruszenia bezpieczeństwa w cyberprzestrzeni wykorzystujące słabości ludzkiej osobowości. Przede wszystkim identyfikowane są cechy osobowościowe i charakterologiczne prowadzące do wynoszenia informacji poza organizację lub sprzedawanie ważnych danych. Wskazano na skłonności psychopatyczne, a prócz nich wyróżniono jeszcze osobowość niedojrzałą, narcystyczną i egotyczną. Omówione zostały przyczyny ujawniania danych wrażliwych. W ten sposób artykuł ukazuje problem zabezpieczeń systemów informatycznych od innej strony oraz pomaga zrozumieć mechanizm kradzieży lub wycieku ważnych informacji. Skoro słabości zabezpieczeń upatruje się w cechach osobowościowych – artykuł wskazuje na możliwość uprzedzającego rozpoznania zagrożeń i wzmocnienia bezpieczeństwa. Droga do niego wiedzie przez zastosowanie maszynowego uczenia się, wykorzystanie sztucznej inteligencji i analizy behawioralnej. Dzięki temu udaje się zidentyfikować potencjalnie niebezpieczne osoby, nie radzące sobie z własnymi problemami.
Źródło:
Bezpieczeństwo. Teoria i Praktyka; 2023, LIII, 4; 45-57
1899-6264
2451-0718
Pojawia się w:
Bezpieczeństwo. Teoria i Praktyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A development methodology for cyber-physical systems based on deterministic theatre with hybrid actors
Autorzy:
Cicirello, Franco
Nigro, Libero
Powiązania:
https://bibliotekanauki.pl/articles/1954580.pdf
Data publikacji:
2021
Wydawca:
Politechnika Gdańska
Tematy:
cyber-physical systems
model-driven development
timing models reconciliation
hybrid actors
model continuity
determinism
theatre actor system
Uppaal
Java
systemy cyber-fizyczne
rozwój sterowany
model czasowy
aktorzy hybrydowi
ciągłość modelu
determinizm
Opis:
The goal of the work described in this paper is to propose a development approach for cyber-physical systems (CPS) which relies on actors as the fundamental modelling blocks. The approach is characterized by its capability to deal with the discrete aspects of the cyber part of a CPS, as well as the continuous behaviour of the physical part. More in particular, the approach is based on the Theatre actor system which fosters determinism in model behaviour, and favours model continuity when switching from system modelling and analysis down to prototype and synthesis phases. A key factor of Theatre is the possibility to combine both discrete-event actors, which operate on a discrete timeline, with continuous-time actors which reproduce, in general by using Ordinary Differential Equations (ODEs), the dynamical evolution of physical components. For formal property assessment, Theatre actors (both discrete and continuous) can be reduced to Timed Automata (TA) in the context of the Uppaal toolbox, where the exhaustive andór the statistical model checkers can be exploited. This paper first describes the proposed approach, then it demonstrates its suitability to CPS modelling and analysis through examples. The paper also discusses how abstract and formal modelling actor concepts can be naturally transitioned to implementation concepts in Java.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2021, 25, 2; 233-260
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A multiple case study of METI cybersecurity education and training: A basis for the development of a guiding framework for educational approaches
Autorzy:
Bacasdoon, J.
Bolmsten, J.
Powiązania:
https://bibliotekanauki.pl/articles/2172506.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
maritime education and training
STCW Convention
cyber security course
cyber security course design
cyber security training
Opis:
Cyberattacks have become a serious global concern, effecting enormous losses to different sectors. In the shipping business, major companies report violations to their operations’ integrity and security, and losing great amounts of money. While the International Maritime Organization (IMO), through the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) 1978, as amended, is yet to release a standard for the cybersecurity education and training of seafarers, some maritime education and training institutions (METIs) have acted proactively and included cybersecurity knowledge and skills in their curricular offerings. This study looked into the cybersecurity course offerings of four METIs that served as the case studies of the researchers. In particular, the following objectives were addressed: the cybersecurity knowledge and skills included in their curriculum; the importance of the cybersecurity knowledge and skills to seafarers; and the educational approaches of the METIs in delivering their topics on cybersecurity. The first and third objectives were answered using different sources of qualitative data, including document analysis, interview and direct observation. The quantitative approach, in the form of a survey questionnaire, was used to address the second objective. The METIs, though not the same in content, were found to have included cybersecurity knowledge and skills in their curriculum. These knowledge and skills were perceived to be very important by seafarers. Similar to the content of their courses, the METIs delivered their cybersecurity courses by employing varied educational approaches. To address the gap on the lack of cybersecurity course design and delivery minimum standards, a framework in the shape of a lantern is developed and proposed to guide maritime courses designers, in particular, and other course designers, in general.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 319--334
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A new generation of production with Cyber-Physical Systems – enabling the biological transformation in manufacturing
Autorzy:
Neugebauer, Reimund
Ihlenfeldt, Steffen
Schließmann, Ursula
Hellmich, Arvid
Noack, Marian
Powiązania:
https://bibliotekanauki.pl/articles/99713.pdf
Data publikacji:
2019
Wydawca:
Wrocławska Rada Federacji Stowarzyszeń Naukowo-Technicznych
Tematy:
biological transformation
Cyber-Physical Production Systems
future manufacturing systems
machine tools
Opis:
Within 200 years since the industrial revolution manufacturing systems have often changed their faces. Emerging nations, new markets, new inventions and the changing needs of the society forced them to adapt. Until today, the arising challenges are immensely diverse: highly individualized products, decreasing manufacturing time, limited resources and critical ecological footprints are only a few of them. Oftentimes solutions for these issues and other future requirements can be found by interrogating nature. Applying knowledge of biological principles to industrial manufacturing processes is recently referred to as "biological transformation of manufacturing systems". Hereby three levels of a biological transformation are introduced, starting from inspiration over integration to the interaction of biological and technical systems. The paper illustrates the idea of biological transformation with specific examples for each level. On the inspiration-level the design of manufacturing systems with elements of natural ecosystems is described. Thus flexibility is increased, material cycles are closed and waste will be reduced. Furthermore the integration-level is illustrated by the use of microorganisms in cutting fluids. Finally, evolutionary computing within an automatic joining cell is shown as an example for the interaction-level.
Źródło:
Journal of Machine Engineering; 2019, 19, 1; 5-15
1895-7595
2391-8071
Pojawia się w:
Journal of Machine Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Autorzy:
Motupalli, Ravi Kanth
Prasad, Krishna K.
Powiązania:
https://bibliotekanauki.pl/articles/2086214.pdf
Data publikacji:
2022
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
Hadoop network
data security
cyber attacks
Salsa20
Opis:
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Źródło:
Journal of Computer Sciences Institute; 2022, 23; 140--144
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A retrospective analysis of maritime cyber security incidents
Autorzy:
Meland, P. H.
Bernsmed, K.
Wille, E.
Rødseth, Ø. J.
Nesheim, D. A.
Powiązania:
https://bibliotekanauki.pl/articles/2063970.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
retrospective analysis
digital attack
cyber security incidents
maritime cyber threats
maritime incidents
Opis:
The maritime industry is undergoing a rapid evolution through the introduction of new technology and the digitization of existing services. At the same time, the digital attack surface is increasing, and incidents can lead to severe consequences. This study analyses and gives an overview of 46 maritime cyber security incidents from the last decade (2010-2020). We have collected information from open publications and reports, as well as anonymized data from insurance claims. Each incident is linked to a taxonomy of attack points related to onboard or off-ship systems, and the characteristics have been used to create a Top-10 list of maritime cyber threats. The results show that the maritime sector typically has incidents with low frequency and high impact, which makes them hard to predict and prepare for. We also infer that different types of attackers use a variety of attack points and techniques, hence there is no single solution to this problem.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 3; 519--530
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System
Autorzy:
Kessler, G.C.
Craiger, J.P.
Haass, J.C.
Powiązania:
https://bibliotekanauki.pl/articles/116413.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cybersecurity
maritime cybersecurity
Automatic Identification System (AIS)
taxonomy
taxonomy framework
cyber attack
Maritime Transportation System
risk mitigation
Opis:
The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the Automatic Identification System as a specific illustration of the approach. This method has already been applied to the aviation sector; retooling it for a maritime example demonstrates its broad applicability to the transportation sector, in general.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2018, 12, 3; 429-437
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Advanced persistent threats as a manifestation of states’ military activity in cyber space
Autorzy:
Olszewski, B.
Powiązania:
https://bibliotekanauki.pl/articles/30147076.pdf
Data publikacji:
2018
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
APT
cyber warfare
cyber weapon
state
Opis:
The term Advanced Persistent Threats (APT, APTs) has a relatively short history – originated in the United States’ government spheres and as such was referred to cyber attacks waged by a state actor. The emergence of such threats has been linked to the evolution of the hacker underground that took place after 2000. The activity of specialists swelling the Black Hat ranks had the nature of criminal offences, targeting data collected by corporations and state institutions. Despite a dozen or so years of experience with APTs, they continue to be a dynamic category of contemporary cyber security threats, with many evolving components beyond simple classification. Their unambiguous identification as a strictly separate type is obstructed mainly by the complex structure of such attacks, prompting analysts to locate them in a catalog containing various known vulnerabilities, mechanisms, cycles and variables. The analysis of the problem and the evolution of attacks to date has led to the hypothesis that Advanced Persistent Threats are now in the phase of their further modification and testing as a means of offensive action in inter-state and asymmetric conflicts. Armed forces and special services of states saw in them not only a tool per se to achieve economic and military advantage, but a theoretical basis for further research on the development of advanced cyber weapon.
Źródło:
Scientific Journal of the Military University of Land Forces; 2018, 50, 3(189); 57-71
2544-7122
2545-0719
Pojawia się w:
Scientific Journal of the Military University of Land Forces
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Agent-based approach to the design of a multimodal interface for cyber-security event visualisation control
Autorzy:
Kasprzak, W.
Szynkiewicz, W.
Stefańczyk, M.
Dudek, W.
Węgierek, M.
Seredyński, D.
Figat, M.
Zieliński, C.
Powiązania:
https://bibliotekanauki.pl/articles/200534.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
multimodal interface
cyber security visualisation
embodied agent
Opis:
Convenient human-computer interaction is essential to carry out many exhausting and concentration-demanding activities. One of them is cyber-situational awareness as well as dynamic and static risk analysis. A specific design method for a multimodal human-computer interface (HCI) for cyber-security events visualisation control is presented. The main role of the interface is to support security analysts and network operators in their monitoring activities. The proposed method of designing HCIs is adapted from the methodology of robot control system design. Both kinds of systems act by acquiring information from the environment, and utilise it to drive the devices influencing the environment. In the case of robots the environment is purely physical, while in the case of HCIs it encompasses both the physical ambience and part of the cyber-space. The goal of the designed system is to efficiently support a human operator in the presentation of cyberspace events such as incidents or cyber-attacks. Especially manipulation of graphical information is necessary. As monitoring is a continuous and tiring activity, control of how the data is presented should be exerted in as natural and convenient way as possible. Hence two main visualisation control modalities have been assumed for testing: static and dynamic gesture commands and voice commands, treated as supplementary to the standard interaction. The presented multimodal interface is a component of the Operational Centre, which is a part of the National Cybersecurity Platform. Creation of the interface out of embodied agents proved to be very useful in the specification phase and facilitated the interface implementation.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 5; 1187-1205
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Aktualne trendy w sferze komunikacji bezpieczeństwa
Autorzy:
Даниленко, Сергей
Нестеряк, Юлия
Гринчук, Марина
Powiązania:
https://bibliotekanauki.pl/articles/687058.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
communicative security, information security, cyber security, disinformation, emotional content, confirming prejudice, convergent society, cognitivism, narrative
bezpieczeństwo komunikacyjne, bezpieczeństwo informacyjne, cyberbezpieczeństwo, dezinformacja, treść emocjonalna, społeczeństwo konwergentne, kognitywizm, narracja
коммуникативная безопасность, информационная безопасность, кибербезопасность, дезинформация, эмоциональный контент, подтверждающее предубеждение, конвергентное общество, когнитивизм, нарратив
Opis:
Authors claim that in the modern information field one should differentiate between communication and information security. These two types are distinguished by the dominance of the human factor, as far as communication security is concerned. A technical component of the distribution, preservation and protection of information is of the secondary importance. Nevertheless, it becomes relevant when we talk about information security, which has a tendency to closed space. Authors claim that for a person, society and state it is much more dangerous when a destructive communicative influence forces an individual (user) to take active actions, which are dangerous both for himself and for others. The first doctrinal trend in the field of communication security is the inevitable further separation of communication and information (with a dominant cyber security) security, based on human nature, its physiological, psychological and intellectual features. Authors claim that the second direction, which will be actively discussed and to which the efforts of states, society and the individual will be applied, is the problem of increasing disinformation that came after the milder threat of communicative security – post-truth. And the third tendency in the field of communication security is the impossibility of overcoming or completely neutralizing the negative consequences of the action of institutionally produced, purposeful disinformation. Even with the current development of the means and methods of disseminating of information both individually and en masse, neutralization can only be partial. Therefore, the least consequences of the impact of destructive information, in other words, the effective communication security will be possible if the “informational health” of a person, society and the state is ensured by their common efforts.
Autorzy uzasadniają twierdzenie, że współczesna przestrzeń informacyjna powinna wyróżniać bezpieczeństwo komunikatywne i bezpieczeństwo informacyjne. Te dwa typy wyróżniają się dominacją czynnika ludzkiego, jeśli mówimy o bezpieczeństwie komunikatywnym. Komponent techniczny dystrybucji, przechowania i ochrony informacji ma znaczenie drugorzędne. Niemniej jednak staje się to istotne, gdy mówimy o bezpieczeństwie informacyjnym, które ma tendencję do zamkniętej przestrzeni. Bardziej niebezpieczny dla osoby, społeczeństwa i państwa, zdaniem autorów, jest problem, gdy niszczący wpływ komunikacyjny zmusza osobę (użytkownika) do podjęcia aktywnych działań, niebezpiecznych zarówno dla niego samego, jak i dla innych. Jako pierwszy doktrynalny trend w dziedzinie bezpieczeństwa komunikacyjnego autorzy podają nieuniknioną dalszą separację opartą na ludzkiej naturze, jej fizjologicznych, psychologicznych i intelektualnych cechach, bezpieczeństwo komunikacyjne i bezpieczeństwo informacyjne (z dominującym bezpieczeństwem cybernetycznym). Drugi kierunek, który ich zdaniem będzie aktywnie dyskutowany i który będą stosować państwa, społeczeństwa i jednostki, to problem zwiększenia dezinformacji (disinformation), zastępujący łagodniejsze zagrożenie bezpieczeństwa komunikacyjnego – post-prawdy (post-truth). Trzecią tendencją w dziedzinie bezpieczeństwa komunikacyjnego jest niemożność przezwyciężenia lub całkowitego zneutralizowania negatywnych skutków działania celowej dezinformacji produkowanej instytucjonalnie. Nawet przy obecnym rozwoju mediów neutralizacja może być tylko częściowa. Dlatego też najmniejsze konsekwencje oddziaływania niszczącej informacji, skutecznego bezpieczeństwa komunikacji będą tam, gdzie „zdrowie informacyjne” osoby, społeczeństwa i państwa będzie maksymalnie zapewnione przez ich wspólne wysiłki.
Авторы обосновывают утверждение, что в современном информационном поле следует различать коммуникационную и информационную безопасность. Эти две разновидности отличает доминирование человеческого фактора, если говорить о коммуникационной безопасности. А технический компонент распространения, сохранения и защиты информации в этом понимании занимает второстепенное значение, но актуализируется, когда мы говорим о безопасности информационной, где существует тенденция к закрытости пространства. Гораздо опаснее для человека, общества и государства, по мнению авторов, является проблема, когда деструктивное коммуникативное влияние принуждает индивида (пользователя) к активным действиям, опасным как для него самого, так и для окружающих. Первым доктринальным трендом в сфере коммуникационной безопасности авторы называют неминуемое дальнейшее разделение на основе человеческой природы, ее физиологических, психологических и интеллектуальных особенностей, коммуникационной и информационной (с доминантой на кибербезопасности) безопасности. Вторым направлением, которое, по их мнению, будет активно обсуждаться и к которому будут прилагаться усилия государств, общества и отдельного человека, будет проблема нарастающей дезинформации (disinformation), пришедшая на смену более мягкой угрозе коммуникативной безопасности – постправде (post-truth). Наконец, третьей тенденцией в сфере коммуникационной безопасности следует считать невозможность преодоления или полной нейтрализации негативных последствий действия институционально продуцированной, целенаправленной дезинформации. Даже при нынешнем развитии средств и методов распространения информации как индивидуально, так и массово, нейтрализация может быть лишь частичной. Поэтому наименьшие последствия влияния деструктивной информации, иными словами – эффективная коммуникационная безопасность, буде там, где «информационное здоровье» человека, общества и государства будет максимально обеспечено их общими усилиями.
Źródło:
Wschód Europy. Studia humanistyczno-społeczne; 2018, 4, 2
2450-4866
Pojawia się w:
Wschód Europy. Studia humanistyczno-społeczne
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies