Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "security and technology" wg kryterium: Temat


Tytuł:
Everyday artificial intelligence unveiled: Societal awareness of technological transformation
Autorzy:
Moravec, Vaclav
Hynek, Nik
Gavurova, Beata
Kubak, Matus
Powiązania:
https://bibliotekanauki.pl/articles/39992183.pdf
Data publikacji:
2024
Wydawca:
Instytut Badań Gospodarczych
Tematy:
everyday artificial intelligence
AI literacy
security and technology
technological awareness
digital transformation
Opis:
Research background: As Artificial Intelligence (AI) weaves into the fabric of daily life, its societal and economic implications underscore the urgency of embracing an environment conducive to its informed adoption. This requires a sophisticated understanding of the societal perception and adaptability to AI, emphasizing the importance of developing comprehensive AI literacy.  Purpose of the article: This study inquiries into the sociodemographic underpinnings of AI literacy, aiming to demystify how knowledge about AI's capabilities in everyday tasks varies across individual population segments. It allows us to define the basic determinants that influence the differences in the individual population structures. It also reveals the potential risks associated with the use of AI. Methods: This study investigates the awareness of Artificial Intelligence (AI) in daily lives of the Czech population, focusing on the influence of socio-demographic factors. Utilizing computer-assisted web interviewing, we surveyed 1,041 respondents in April 2023, ensuring representativeness by applying quotas for age, gender, education, region, and residential area size. Our investigation spanned AI applications in sectors like customer service, music playlist recommendation, email sorting, healthcare, online shopping, and home devices. Findings & value added: Findings taken from descriptive statistics reveal variable AI awareness levels across different domains, with younger demographics exhibiting notably lower awareness in several areas. Regression analysis highlighted that awareness is significantly associated with gender, age, and education level. Regression analysis showed that males, younger age groups and those with higher levels of education were more likely to correctly answer majority of questions about the role of AI in everyday life. These insights are crucial for stakeholders aiming to enhance AI literacy, tailor communication strategies, and develop digital platforms, offering guidance for policymakers and market analysts in optimizing AI-related initiatives.
Źródło:
Oeconomia Copernicana; 2024, 15, 2; 367-406
2083-1277
Pojawia się w:
Oeconomia Copernicana
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Finding the Right Balance Between Business and Information Security Priorities in Online Companies
Autorzy:
Dorca, Vasile
Powiązania:
https://bibliotekanauki.pl/articles/633699.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
customer data
information technology and security
sustainability, management
Opis:
In order to keep up with the trend and satisfy the Internet users, it is crucial for the online businesses to adapt to new technologies and offer the right services (shop, bank online, etc.) to their customers. To anticipate customer needs, the online businesses use customer behaviour analysis and process customer data. Even if companies handle customer information (e.g. PII is considered highly confidential and must be protected accordingly) to anticipate and meet customers’ expectations, the management often struggles finding the right approach in making informed decisions when talking about information security of such data. This can threaten the sustainability of the business and put its customers at major risks (e.g. identity theft), risks that decision makers of companies do not see, or do not understand, the results being they do not invest properly to secure the data they handle.This paper gives a parallel overview between:a)    the management priorities of an online business that handles customer data and b)    the implicit information technology and security threats that those priorities generate.Once we have a view around point a) and point b), the paper will also show potential ways of finding a right balance between business needs, regulatory requirements and security of customer data so that the business can take risks to achieve their goals in an informed manner, using a customised risk assessment methodology, based on COBIT5 framework, industry leading standards and potential internal customised processes.
Źródło:
International Journal of Synergy and Research; 2015, 4, 2
2083-0025
Pojawia się w:
International Journal of Synergy and Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methods of securing and controlling critical infrastructure assets allocated in information and communications technology sector companies in leading European Union countries
Autorzy:
Sieńko, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/527027.pdf
Data publikacji:
2015
Wydawca:
Collegium Civitas
Tematy:
information and communications technology
critical infrastructure
national security
Opis:
Critical Infrastructure (CI) plays a significant role in maintaining public order and national security. The state may use many different methods to protect and control CI allocated to commercial companies. This article describes the three most important ones: legislation, ownership and government institutions and agencies. The data presented in this paper is the result of research done on the most developed countries in the EU (United Kingdom, France, Germany and Italy) and their strategic enterprises in the ICT sector, one of the most important sectors in any national security system.
Źródło:
Securitologia; 2015, 2 (22); 107-122
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Location of Innovative Enterprises within Urban Technology Park in the Context of Economic Security
Autorzy:
Rutkowska-Gurak, Anna
Powiązania:
https://bibliotekanauki.pl/articles/438271.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Pedagogiczny im. Komisji Edukacji Narodowej w Krakowie
Tematy:
city of Lublin
economic security
economic security of enterprises
innovative enterprises
Lublin Science and Technology Park
urban technology park
Opis:
Turbulent environment is causing increasing risk and uncertainty affecting the functioning of enterprises. Therefore, the need for strengthening their economic security is of basic importance to them. The goal of this paper is to present the understanding of economic security of enterprises from the perspective of enterprises situated in urban technology parks. The topic is relevant and has not been widely discussed yet, particularly within the analysed context of local economic security. To accomplish this goal, the research uses the case study method to analyse Lublin Science and Technology Park (LSTP) and its local environment of the city of Lublin. The study is based on standardised questionnaire directed to enterprises located in LSTP. Empirical studies referring to perception of economic security of enterprises are based on information gained from enterprises located in Lublin with the status of tenants of LPNT, which are used as a base for a case study. The study confirms that location in a technology park which is innovative city’s space has a positive impact on economic security of enterprises. It also confirms the impact of the city on economic security of enterprises as city’s space users. It is attributable both to new enterprises located in the technology park, as well as enterprises relocated there from other areas of the city.
Źródło:
Prace Komisji Geografii Przemysłu Polskiego Towarzystwa Geograficznego; 2019, 33, 1; 36-49
2080-1653
Pojawia się w:
Prace Komisji Geografii Przemysłu Polskiego Towarzystwa Geograficznego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Education in a Changing Technological Environment
Autorzy:
Banse, Gerhard
Powiązania:
https://bibliotekanauki.pl/articles/29520295.pdf
Data publikacji:
2006-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
information-based society
technology-based society
culture of society
interaction of technology and culture
social patterns
IT security
Opis:
The main ideas of this article are the following: (1) Education in a knowledge-based society takes place in a technology-based society. Therefore, we must pay attention to the technological possibilities and changes. (2) On the one hand, the technological “reality” forms the prevailing culture. On the other hand, the cultural patterns of action and using influence this technological “reality”, change it, adapt it to the cultural “environment” (interaction of technology and culture). (3) These actual processes of change include two (ideal) forms: (a) the adjustment of existing cultural resp. social patterns to the new technological possibilities (persistence of the “traditions”); (b) the recombination of existing and the appearance or arising of (complete) new cultural resp. social patterns (surprises, mostly no foreseeable/ predictable). (4) Cultural changes are not an automatic resp. direct result of technological possibilities. The use of these possibilities depends on the competencies, the values a. s. o. of the user(s); this is fundamentally influenced by the existing culture. – On this basis, the article at first will show some trends and problems in the current development of ICTs. Secondly some cultural and social implications of these trends will be discussed (examples: “evaluation and selection of a / the technological solution”, “important criteria of IT-security”, “security/safety culture” and “tacit presence”). Some conclusions finish the reflections.
Źródło:
The New Educational Review; 2006, 10; 53-62
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IT Security Development Process in the Experimental SecLab Development Environment
Proces rozwoju bezpieczeństwa IT w eksperymentalnym środowisku rozwoju SecLab
Autorzy:
Białas, Andrzej
Flisiuk, Barbara
Powiązania:
https://bibliotekanauki.pl/articles/585886.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Ekonomiczny w Katowicach
Tematy:
Bezpieczeństwo danych
Rynek informatyczny
Systemy informatyczne
Technologie informacyjne i telekomunikacyjne
Zabezpieczenie systemów informatycznych
Computer system
Data security
Information and Communication Technology (ICT)
Information technology (IT) market
Security of information systems
Opis:
Artykuł zawiera krótką charakterystykę trzech podstawowych procesów podejścia Common Criteria. Autorzy opisują, jak proces rozwoju bezpieczeństwa technologii informacji jest zorganizowany w eksperymentalnym laboratorium SecLab w Instytucie EMAG. Badany proces obejmuje analizę użyteczności produktu informatycznego, opis jego środowiska działania i czynniki ryzyka. Prowadząc analizę w ten sposób, autorzy opracowują specyfikację wymagań i dokonują wdrożenia funkcji bezpieczeństwa produktu informatycznego. W części obejmującej wnioski końcowe autorzy przedstawiają dalsze kroki wdrażania funkcji bezpieczeństwa w odniesieniu do konkretnych produktów informatycznych.
Źródło:
Studia Ekonomiczne; 2014, 188; 25-38
2083-8611
Pojawia się w:
Studia Ekonomiczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vision of the Decision Support Model on Board of the Vessel with Use of the Shore Based IT Tools
Autorzy:
Bibik, L.
Krolikowski, A.
Czaplewski, K.
Duda, D.
Powiązania:
https://bibliotekanauki.pl/articles/117203.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
e-Navigation
Decision Support Model
Information Technology (IT)
Shore Based IT Tools
Maritime Safety and Security Information Exchange System (MarSSIES)
Maritime Safety
communication technology
Opis:
The Maritime Safety Committee (MSC) at its 81st session decided to include, in the work programmes of the NAV and COMSAR Sub-Committees, a high priority item on "Development of an e–navigation strategy”. E-navigation is meant to integrate existing and new electronic navigational tools (ship and shore based) into one comprehensive system that will contribute to enhanced navigational safety and security while reducing the workload of the mariner (navigator). This paper describes present IT created to support navigational and administrative activities related to vessel movement and cargo transhipment. Direction of development of existing systems is drafted with reference to E-Navigation concept. Information sets available for the vessel in Polish Sea Areas are grouped.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2008, 2, 3; 255-258
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
SCIENTIFIC AND TECHNOLOGICAL SECURITY OF THE STATE IN THE KNOWLEDGE ECONOMY
NAUKOWE I TECHNOLOGICZNE BEZPIECZEŃSTWO PAŃSTWA W GOSPODARCE OPARTEJ NA WIEDZY
НАУЧНО-ТЕХНОЛОГИЧЕСКАЯ БЕЗОПАСНОСТЬ ГОСУДАРСТВА В КОНТЕКСТЕ РАЗВИТИЯ ЭКОНОМИКИ ЗНАНИЙ
Autorzy:
Vaschay, Yulia
Powiązania:
https://bibliotekanauki.pl/articles/576825.pdf
Data publikacji:
2015-12-30
Wydawca:
Międzynarodowy Instytut Innowacji Nauka – Edukacja – Rozwój w Warszawie
Tematy:
the knowledge economy, science and technology security, human capital, knowledge economy index, economic security, innovation
bezpieczeństwo, gospodarka oparta na wiedzy, nauka i technologia, kapitał ludzki, wskaźnik gospodarki opartej na wiedzy,
bezpieczeństwo ekonomiczne, innowacje
экономика знаний, научно-технологическая безопасность, человеческий капитал, индекс экономики знаний, экономическая безопасность, инновации
Opis:
W artykule w oparciu o międzynarodowe wskaźniki przeprowadzono analizę rozwoju gospodarki opartej na wiedzy na Ukrainie. Wskazano na rolę stanu nauki i techniki w osiąganiu bezpieczeństwa w obecnych społeczeństwach opartych na wiedzy. Określono dynamikę głównych wskaźników innowacji naukowych i kluczowych działań, które doskonalą kwestię naukowego, technologicznego i ekonomicznego bezpieczeństwa w gospodarce opartej na wiedzy.
The author analyzes the development of the knowledge economy in Ukraine based on global indices that characterize it in the article. The role of the state of science and technology security in the modern knowledge society is found. The author analyzes the dynamics of the main indicators of scientific and innovation activity and key directions which will strengthen the scientific and technological component of economic security in the knowledge economy.
В статье проанализировано развитие экономики знаний в Украине на основе глобальных показателей, которые ее характеризируют. Выяснена роль состояния научно-технологической безопасности в современном обществе знаний. Проанализирована динамика основных показателей научно-инновационной деятельности и основные мероприятия, которые позволят усилить научно-технологическую составляющую экономической безопасности в эпоху экономики знаний.
Źródło:
International Journal of New Economics and Social Sciences; 2015, 2(2); 109-115
2450-2146
2451-1064
Pojawia się w:
International Journal of New Economics and Social Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wykorzystanie analizy ryzyka oraz scenariuszy przebiegu incydentów w systemie zarządzania bezpieczeństwem informacji gromadzonej, przetwarzanej i przesyłanej w systemach teleinformatycznych instytucji
Use of risk analysis and incident scenarios in systems managing security of information collated, processed and transmitted in information and communication technology systems
Autorzy:
Szleszyński, A.
Witkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/347810.pdf
Data publikacji:
2013
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
bezpieczeństwo informacji
analiza ryzyka
scenariusze przebiegu incydentów
systemy teleinformatyczne
information security
risk analysis
incident scenarios
information and communication technology systems
Opis:
W pracy przedstawiono wykorzystanie analizy ryzyka oraz scenariuszy przebiegu incydentów w systemie teleinformatycznym do oceny wpływu incydentów na bezpieczeństwo gromadzonej i przetwarzanej w systemie informacji. Dokonano przeglądu literatury przedmiotu, a następnie zaprezentowano związki pomiędzy analizą ryzyka a scenariuszami. Scenariusz w sposób opisowy ma pokazać, jakie mogą być skutki incydentów dla bezpieczeństwa systemu teleinformatycznego oraz dla znajdującej się w nim informacji. Przedstawiono wyniki badań dotyczące znajomości zagadnień związanych z analizą ryzyka. Wykonanie analizy ryzyka jest wymaganiem ustawowym.
In the paper the use of risk analysis and incident scenarios in Information and Communication Technology (ICT) systems is presented. An evaluation of the incidents affecting the security of information stored and processed in an ICT system is made. In the first part of the paper an analysis of the current state is made. Next a correlation between risk analysis and incident scenarios developed for information security is shown. In Tables 1, 2, 3 and 4 the result of the survey conducted by the authors on the body of knowledge related to risk analysis methods is shown. The survey shows that potential analysis users who would have to do it sometime in the future have decent theoretical knowledge about risk analysis. However, as they indicated in their responses, they were not ready to make it themselves.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2013, 4; 153-166
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safe information exchange on board of the ship
Autorzy:
Ahvenjärvi, S.
Czarnowski, I.
Kåla, J.
Kyster, A.
Meyer, I.
Mogensen, J.
Szyman, P.
Powiązania:
https://bibliotekanauki.pl/articles/116173.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
information exchange
navigation safety
autonomous ship
autonomous ships navigation
information technology (IT)
safe information exchange
maritime education and training (MET)
cyber security
Opis:
The first ever attempt at fully autonomous dock-to-dock operation has been tested and demonstrated successfully at the end of 2018. The revolutionary shift is feared to have a negative impact on the safety of navigation and the getting of real-time situation awareness. Especially, the centralized context onboard could be changed to a distributed context. In navigation safety domain, monitoring, control, assessment of dangerous situations, support of operators of decision-making support system should be implemented in real time. In the context of autonomous ships, decision-making processes will play an important role under such ocean autonomy, therefore the same technologies should consist of adequate system intelligence. At the same time, situation awareness is the key element of the decision-making processes. Although there is substantial research on situation awareness measurement techniques, they are not suitable to directly execute quantitative processing for the situation awareness of autonomous ships navigation. Hence, a novel quantitative model of situation awareness is firstly proposed based on the system safety control structure of remotely controlled vessel. The data source is greatly limited, but the main result still indicates that the probability of operator lose adequate situation awareness of the autonomous ship is significantly higher than the conventional ship. Finally, the paper provides a probabilistic theory and model for high-level abstractions of situation awareness to guide future evaluation of the navigation safety of autonomous ships.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2019, 13, 1; 165-171
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies