1,326 research outputs found

    COMPUTER SECURITY

    Get PDF
    The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines

    Prevention strategies, vulnerable positions and risking the ‘identity trap’:Digitalized risk assessments and their legal and socio-technical implications on children and migrants

    Get PDF
    At first sight, the prevention of abuse of children, anti-social behaviour of children or migrants’ identity fraud or illegal entry are quite different objectives which require different professional skills and legislative background. Even the digital technologies introduced to boost the prevention of the above problems are quite different. However, this article, aims to show that the implications of the design and use of these systems cast quite similar ‘risk shadows’ on both children and migrants that can be conceived as an ‘identity trap’ risk. The aim of this article is therefore to look for similarities and acquire a better insight into the use and implications of digital tools within policy areas that focus on vulnerable groups in" our society such as children and migrants. A second aim is to explore how the legal framework, in particular the new European Union data protection regime soon to be formally adopted, can assist actors involved to remedy the negative implications on children and migrants’ positions, which stem from the use of preventative identity management systems. In addition, the article also pursues possibilities of guiding professionals in becoming reflexive about the detrimental implications of digital technologies and testing the normative potential of the legal framework regarding the vulnerable position of children and migrants. For finding ways in which professionals can become more reflexive about the potential negative implications of preventative identity management technologies is critical in order to create a context that is much more than merely law on the books

    Committee V.1: Accidental Limit States

    Get PDF
    Concern for accidental scenarios for ships and offshore structures and for their structural components leading to limit states. Types of accidental scenarios shall include collision, grounding, dropped objects, explosion, and fire. Attention shall be given to hazard identification, accidental loads and nonlinear structural consequences including strength reduction, affecting the probability of failure and related risks. Uncertainties in the use of accidental scenarios for design and analysis shall be highlighted. Consideration shall be given to the practical application of methods and to the development of ISSC guidance for quantitative assessment and management of accidental risks
    • 

    corecore