Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "digital security" wg kryterium: Temat


Tytuł:
Security policy for low-voltage smart grids
Autorzy:
Czechowski, R.
Powiązania:
https://bibliotekanauki.pl/articles/410616.pdf
Data publikacji:
2014
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
smart power grid
digital security
smart metering
security policy
Opis:
Smart Grid is both a concept and a way to mitigate infrastructural deficiencies and counteract the effects of the growing demand for electrical energy. One of the ways ensuring an increase in power grid’s management efficiency is utilization of the latest communication solutions by use of IT technologies. Such solutions ensure reduced energy consumption and evened 24-hour loads, decreased losses and – thanks to automated energy balancing – increased transfer security. Such solutions will directly translate into increased efficiency of the entire power grid. The present article contains an introduction to smart power grids, perspectives for their development in Poland, as well as an extended discussion of related issues concerning security on the organizational level.
Źródło:
Present Problems of Power System Control; 2014, 5; 55-72
2084-2201
Pojawia się w:
Present Problems of Power System Control
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
PSYCHOLOGICAL ASPECT OF DIGITAL SECURITY
Autorzy:
Malwina, Dankiewicz,
Powiązania:
https://bibliotekanauki.pl/articles/891222.pdf
Data publikacji:
2018-08-21
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
digital security
new media
media violence
electronic aggression
Opis:
Digital security is an extensive subject, part of which is the safe use of modern technology, including such forms of new media as the Internet, television and video games. The main psychological threat posed by information and communication technology, is the problem of violence in the media, including electronic aggression. The article presents studies on the effect of watching violence on television and in films, playing in violent video games, and being a victim or perpetrator of electronic aggression. The possible consequences were indicated, and highlighted the role of education in preventing negative effects of technological progress.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2014, 16; 113-120
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity Risk Analysis and Threat Assessment Within Smart Electrical Power Distribution Grids
Autorzy:
Czechowski, R.
Powiązania:
https://bibliotekanauki.pl/articles/410579.pdf
Data publikacji:
2016
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
smart power grid
digital security
risk analysis
hazard valuation
cyber-physical security
Opis:
Development Of Electrical Power Systems And Their Integration With An Increasing Number Of Smart Automation Devices Compel To Undertake A New Approach To The Issue Of The System’s Security. Reliability Of An Electrical Power System And High Service Availability Are The Essential Characteristics Of Efficient Strategic Electricity Customers, I.E.: Large Industrial Facilities, Railway Transport, Medical Service Providers And Life-Saving Institutions. The Time Of Manual Or Automatic System Recovery After A Failure, Which Increases Its Security, Is Not Without Significance, Either. The Article Discusses The Issues Of Risk Assessment And Management, Including The Overall Process Of Analysis And Assessment Of Threat Probability In Electrical Power Systems.
Źródło:
Present Problems of Power System Control; 2016, 7; 19-28
2084-2201
Pojawia się w:
Present Problems of Power System Control
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ITC system security in the context of contemporary challenges for electric power industry
Autorzy:
Czechowski, R.
Rosołowski, E.
Powiązania:
https://bibliotekanauki.pl/articles/410573.pdf
Data publikacji:
2015
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
smart power grid
digital security
transport protocol
smart metering
remote control
security policy
Opis:
In recent years, electric power systems, in order to improve their efficiency, are increasingly using the latest innovations in the field of information and communication technologies (ICT) starting from wireless communication and fiber optics systems. Both used for industrial automation purposes and complex data analysis. Those systems, year by year, have made use of more and more sophisticated communication algorithms leading to automatic management of energy distribution process as well as undertaking the system resuscitation tasks as a result of failure. The use of ICT communication equipment in electric power systems is certainly a big advantage, but it also entails some safety issues. The traditional understanding of smart grid cyber security involves the general requirements (placed on existing systems) as well as specific solutions for detection and intrusion prevention (for individual parts of the system infrastructure). Implementation of security policy in management process of the power system, with means of modern technical of digital information transmission, will increase efficiency and reliability of those systems.
Źródło:
Present Problems of Power System Control; 2015, 6; 21-31
2084-2201
Pojawia się w:
Present Problems of Power System Control
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The importance and challenges of information security in the digital age: analysis of the current situation and prospects for development
Autorzy:
Sapiński, Aleskander
Powiązania:
https://bibliotekanauki.pl/articles/19233711.pdf
Data publikacji:
2023-03-31
Wydawca:
Wyższa Szkoła Finansów i Prawa w Bielsku-Białej
Tematy:
security studies
information security
digital age
information security management
Opis:
In this age of increasing digitalisation, information security is becoming one of the most important issues for every state and organisation. This article provides an analysis of the current situation of information security and the challenges it faces. The article focuses on various aspects of information security, such as cyber security, privacy protection, data protection and network security. It also analyses the ways in which countries and organisations are taking steps to ensure information security and the challenges that accompany these efforts. Finally, the article provides an outlook on the development of information security in the digital age and points to the most important directions to be taken to ensure information security in the future.
Źródło:
Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej; 2023, 27, 1; 53-56
2543-9103
2543-411X
Pojawia się w:
Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The policy of protecting public administration cyberspace based on the example of the government administration authorities indicated in the Act on the National Cybersecurity System
Autorzy:
Brzostek, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/1991281.pdf
Data publikacji:
2021-02-26
Wydawca:
Akademia Sztuki Wojennej
Tematy:
national system of cyber security
Government Plenipotentiary for cybersecurity
government administration
digital infrastructure
digital services
threat
security
Opis:
The necessity of the implementation of the NIS directive resulted in the adoption of solutions and concepts which would regulate the system of cybersecurity in the cyberspace to the Polish legal order. The directive formulates the obligations to ensure cybersecurity of the information systems in the service sectors which have a key meaning for maintaining critical socio-economic activity and thus energy, transport, banking, financial institutions, the health sector, water supplies and digital infrastructure. The act on the national system of cyber-security, which implements the directive, introduces a new concept to the Polish legal order, and thus a key service operator, digital service provider, and defines the organs responsible for cybersecurity, formulating their scope of tasks and mutual relations.
Źródło:
Cybersecurity and Law; 2019, 1, 1; 25-36
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security issues on digital watermarking algorithms
Autorzy:
Wójtowicz, W.
Ogiela, M. R.
Powiązania:
https://bibliotekanauki.pl/articles/106206.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
digital watermarking
security
steganography
Discrete Wavelet Transform
DWT
Opis:
This paper gives a general introduction to the digital watermarking procedures and their security aspects. The first issue is to clarify unifying and differentiating properties of steganography and watermarking. Then the most important aspects of digital watermarking are reviewed by studying application, requirement and design problems. We put emphasis on the importance of digital watermark as an effective technology to protect intellectual property rights and legitimate use of digital images. In the paper we provide an overview of the most popular digital watermarking methods for still images available today. The watermarking algorithms are divided into two major categories of spatial and transform domains. Because of outstanding robustness and imperceptibility the transform domain algorithms are the mainstream of research. Popular transforms of images include the DFT (Discrete Fourier Transform) ([1, 2, 3, 4, 5]), DCT (Discrete Cosine Transform) ([1, 3, 6, 5]) and DWT (Discrete Wavelet Transform) ([1, 3, 4, 7, 6, 5]). In the paper we emphasize the advantageous features of DWT such as local time-frequency and multi-scale analysis, preserving the quality of host image and ensuring high robustness of watermark. Finally, we present three algorithms which are based on the combination of DWT and some other transformations like DFT ([4]), DCT ([6]) and the Arnold transform ([7, 6]). Finally, we discuss security requirements and possible attacks on the watermarking systems.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 123-139
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenie wykluczeniem cyfrowym jako element bezpieczeństwa osobistego Polaków
Risk of digital exclusion as a part of personal security of Poles
Autorzy:
Żuk, Jadwiga
Powiązania:
https://bibliotekanauki.pl/articles/565240.pdf
Data publikacji:
2015-07-01
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
wykluczenie cyfrowe
podział cyfrowy
bezpieczeństwo jednostki
digital exclusion
the digital divide
personal security
Opis:
Brak komputera i dostępu do Internetu jest głównym czynnikiem wywołującym zjawisko podziału, a w konsekwencji wykluczenie cyfrowe. Drugim ważnym elementem tego zjawiska jest brak potrzeby korzystania z nowych technologii. Działanie przeciw wykluczeniu cyfrowemu wydaje się konieczne, ponieważ dotyka ono najsłabszych grup społecznych: osób starszych, niepełnosprawnych, długotrwale bezrobotnych, z rodzin dysfunkcyjnych, a także mieszkańców wsi i małych miasteczek. Zapewniając dostęp do Internetu w każdym miejscu naszego kraju i edukację osób zagrożonych można wpływać na zmniejszenie tego negatywnego zjawiska. Inkluzja społeczna ma wpływ na poprawę jakości życia poszczególnych jednostek, a pośrednio wpływa również na rozwój społeczno-gospodarczy całego kraju.
The lack of computer and Internet access is a factor that causes division and, consequently, the digital exclusion. Another important element of this phenomenon is lack of need to use new technologies. The action against digital exclusion is so necessary that it affects the most vulnerable groups: the elderly people, disabled, long-term unemployed, dysfunctional families, as well as residents of villages and small towns. Providing access to the Internet in every place of our country and education of people at risk can have an influence on reducing this negative phenomenon. Social inclusion has the effect of improving the quality of life of individuals, and indirectly affects the socio-economic development of the whole country.
Źródło:
De Securitate et Defensione. O Bezpieczeństwie i Obronności; 2015, 1(1); 169-180
2450-5005
Pojawia się w:
De Securitate et Defensione. O Bezpieczeństwie i Obronności
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The impacts of dynamic capabilities on SMEs digital transformation process: The resource-based view perspective
Autorzy:
Civelek, Mehmet
Krajčík, Vladimír
Ključnikov, Aleksandr
Powiązania:
https://bibliotekanauki.pl/articles/40012202.pdf
Data publikacji:
2023
Wydawca:
Instytut Badań Gospodarczych
Tematy:
digital transformation
digital literacy
cyber-security
dynamic capabilities of the Resource Based View
SMEs
Opis:
Research background: SMEs' concern for the digital literacy of their workforce, their interest in increasing digital literacy among employees, and securing their digital platforms, have been major issues in their digital transformation process. To reduce those obstacles, the dynamic capabilities of SMEs included in the Resource-based View (RBV) might be an effective solution since they help companies be more competitive and proactive against the threats they face in the digitalization process. Purpose of the article: This research aims to investigate whether SMEs' dynamic capabilities positively contribute to their digital transformation process. Methods: In line with the proposed relationships, this paper analyzes SMEs from Czechia by running Ordinal Logistic Regression analyses. The research sample is created by stratified random sampling and purposive sampling methods. The research data is collected via telephone surveys. Findings & value added: This research does not find a positive relationship between the dynamic capabilities of SMEs and the digital transformation process. While the results related to digital literacy are negatively associated with digital transformation, no significant relationship exists between security actions and the digital transformation of SMEs. This paper extends the scope of RBV on the digital transformation of SMEs by analyzing various dynamic capabilities of SMEs that have not been included in a sole study. Moreover, the perceptions of SME executives are considered by this research to provide effective solutions for the problems they face in digital transformation. Having a joint venture agreement with well-experienced IT companies, having a network with partner firms, looking for funding opportunities in the EU, participating in some practical training, and providing internships for bachelor students might enable SMEs to hit their targets in digital transformation.
Źródło:
Oeconomia Copernicana; 2023, 14, 4; 1367-1392
2083-1277
Pojawia się w:
Oeconomia Copernicana
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza porównawcza metod znakowania wodnego obrazów RTG
Comparative analysis of the methods of watermarking X-ray images
Autorzy:
Kulbaka, Weronika Zofia
Paluch, Paulina
Kozieł, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1837838.pdf
Data publikacji:
2021
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
digital watermarks
security
steganography
cyfrowe znaki wodne
bezpieczeństwo
steganografia
Opis:
Artykuł poświęcono analizie porównawczej algorytmów znakowania wodnego obrazów RTG. Porównano technikę opartą na dyskretnej transformacie falkowej (DWT), metodę rozkładu wartości osobliwych (SVD) oraz hybrydę DWT-SVD. Zbadano przezroczystość, odporność na przekształcenia graficzne, a także szybkości. Oznakowane obrazy pod-dano ocenie wizualnej oraz badaniu jakości. SVD wykazała największą odporność na ataki, a obrazy z osadzonym znakiem wodnym były lepszej jakości w porównaniu do obrazów oznakowanych za pomocą pozostałych algorytmów. Technika DWT była najszybsza, jednak nieodporna na przekształcenia graficzne. Na obrazach oznakowanych DWT-SVD znak wodny jest niedostrzegalny, jednak odporność na ataki jest niska. Najodpowiedniejszą metodą do znakowania obrazów RTG okazała się metoda SVD.
This paper is devoted to the comparative analysis of watermarking algorithms for X-ray images. The techniques based on discrete wavelet transform (DWT), singular value decomposition (SVD) and DWT-SVD hybrid were compared. Transparency, resistance to graphical transformations, and performance were investigated. The watermarked images were visually evaluated and quality tested. SVD showed the highest resistance to attacks, and the embedded water-marked images were of better quality in the comparison to the other algorithms. The DWT technique was the fastest, but not resistant to graphical transformations. In DWT-SVD labeled images, the watermark is indistinguishable, but the resistance to attacks is low. The SVD was found to be the most suitable method for watermarking of X-ray images.
Źródło:
Journal of Computer Sciences Institute; 2021, 20; 189-196
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Japanese historical challenge of social inclusion: from the digitally restored household survey data on receiving social security in 1952
Autorzy:
Shinichi, Aizawa,
Yutaka, Koyama,
Powiązania:
https://bibliotekanauki.pl/articles/890399.pdf
Data publikacji:
2016
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
digital records
technological innovation
Japan
social security
social politics
Opis:
This paper explores the historical challenge of social inclusion relying on the example of the Japanese social security system. The current public assistance system in Japan is grounded on the Public Assistance Act of 1951, which was originally constituted in 1946 and already declared equal treatment of all citizens. We will focus on a hidden aspect in this introductory period of the public assistance system, the actual situations of people who depend on it. We have digitally restored a survey data for households receiving public assistance. This data was collected in a Japanese prefecture in 1952. The results of this survey indicate that differences in poverty by gender are remarkable. For male householders, the total number of events that caused the onset of public assistance, principally injured or diseases, in 1950 or 1951 was more than that of 1944 or 1945. On the other hand, for female householders, the events of 1944 or 1945 were related to the Second World War, principally the death of male breadwinners, which induced poverty. Moreover, we broke down recipients by gender, age, and household types and revealed, in particular, two facts. First, many widows were receiving public assistance, but not all had lost their spouses in the war. Second, the largest age cluster of recipients was composed of children in the compulsory education age group. The increasing inclusion of the ‘standard’ type of household indicates the success of the Public Assistance Act’s universalism. This digitally restored sample has much potential to provide detailed descriptions of life courses and information on the jobs of household members.
Źródło:
International Journal of Pedagogy, Innovation and New Technologies; 2016, 3(2); 74-84
2392-0092
Pojawia się w:
International Journal of Pedagogy, Innovation and New Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improving Quality of Watermarked Medical Images Using Symmetric Dilated Convolution Neural Networks
Autorzy:
Pulgam, Namita D.
Shinde, Subhash K.
Powiązania:
https://bibliotekanauki.pl/articles/24200734.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data security
denoising
digital watermarking
image processing
medical imaging
Opis:
Rapid development of online medical technologies raises questions about the security of the patient’s medical data.When patient records are encrypted and labeled with a watermark, they may be exchanged securely online. In order to avoid geometrical attacks aiming to steal the information, image quality must be maintained and patient data must be appropriately extracted from the encoded image. To ensure that watermarked images are more resistant to attacks (e.g. additive noise or geometric attacks), different watermarking methods have been invented in the past. Additive noise causes visual distortion and render the potentially harmful diseases more difficult to diagnose and analyze. Consequently, denoising is an important pre-processing method for obtaining superior outcomes in terms of clarity and noise reduction and allows to improve the quality of damaged medical images. Therefore, various publications have been studied to understand the denoising methods used to improve image quality. The findings indicate that deep learning and neural networks have recently contributed considerably to the advancement of image processing techniques. Consequently, a system has been created that makes use of machine learning to enhance the quality of damaged images and to facilitate the process of identifying specific diseases. Images, damaged in the course of an assault, are denoised using the suggested technique relying on a symmetric dilated convolution neural network. This improves the system’s resilience and establishes a secure environment for the exchange of data while maintaining secrecy.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 2; 46--52
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A retrospective analysis of maritime cyber security incidents
Autorzy:
Meland, P. H.
Bernsmed, K.
Wille, E.
Rødseth, Ø. J.
Nesheim, D. A.
Powiązania:
https://bibliotekanauki.pl/articles/2063970.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
retrospective analysis
digital attack
cyber security incidents
maritime cyber threats
maritime incidents
Opis:
The maritime industry is undergoing a rapid evolution through the introduction of new technology and the digitization of existing services. At the same time, the digital attack surface is increasing, and incidents can lead to severe consequences. This study analyses and gives an overview of 46 maritime cyber security incidents from the last decade (2010-2020). We have collected information from open publications and reports, as well as anonymized data from insurance claims. Each incident is linked to a taxonomy of attack points related to onboard or off-ship systems, and the characteristics have been used to create a Top-10 list of maritime cyber threats. The results show that the maritime sector typically has incidents with low frequency and high impact, which makes them hard to predict and prepare for. We also infer that different types of attackers use a variety of attack points and techniques, hence there is no single solution to this problem.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 3; 519--530
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Digital society and the information age: challenges and threats for man, business and the state
Autorzy:
Reshetnikova, Natalia
Powiązania:
https://bibliotekanauki.pl/articles/1933430.pdf
Data publikacji:
2021-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
digital society
digital economy
information age
digital transformation
financial market
fintech
national and global security
challenges and threats
coronavirus
Opis:
The scientific article covers the problem of the digital transformation impact on the state, individuals, business and society in Russia and the world. An overview of the concept of «digital economy» by leading world experts is given. The authors concluded that, despite all the positive aspects of the transition to the digital economy, the market faces many risks. All of this affects national and global security.
Źródło:
Reality of Politics; 2021, 17; 145-154
2082-3959
Pojawia się w:
Reality of Politics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity from the perspective of a new technology user
Autorzy:
Dymicka, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/2143064.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber security
cyber hygiene
new technology
information technology
digital technologies
Opis:
New technologies are, in the world of advancing processes of globalization, scientific and technical revolution, one of the most important indicators for designing many areas of social life. The useage of information technology has initiated many social phenomena generating many previously unknown concepts, threats, and in response, new areas of expert and research interest. One of them is cyber security, which focuses on building national, European or international policies to secure the functioning of information systems. The aim of this paper is to analyze and evaluate cyber security from the perspective of a user of new technologies. The applied research method will be a synthetic and analytical analysis of domestic and foreign literature in the field of new technologies and cyber security.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 27-36
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies