14,463 research outputs found

    All at Sea

    Get PDF
    Master's thesis in Risk management and societal safetyThe Norwegian Ministry of Justice and Public Security emphasized in their 2016-2017 report to the Parliament, that the need for a common understanding of preparedness concepts and knowledge of how cross-institutional organizations use concepts and definitions is a prerequisite for understanding and interaction in preparedness and crisis response measures. The concept of civil preparedness means national measures to maintain or establish effective transportation during times of tension, crisis, and war, in which merchant ships and thus naval cooperation plays a crucial role. The thesis purpose is to discuss the research question: to what extent can differences in risk perspectives within organizations in naval cooperation affect risk communication and civil preparedness in the high North? In order to do so, investigating and associate prominent risk perspectives to organizations with roles and tasks to naval cooperation was necessary. A scenario of a military invasion of Northern Norway published by the Norwegian Directorate of Civil Protection (DSB) is used for the thesis purpose because the concept of naval cooperation includes risk communication between stakeholders which is responsible for civil preparedness. In such a scenario the concept of naval cooperation will be in force and coincides with the DSB scenario. This enables an illumination of the research question. The empirical data identifies that the representative organizations have splayed risk perspectives. This is represented within their own sectors and within the sectoral levels of communication. Based on five pre-defined risk perspectives, the overall prominent risk perspective seems to be a mix of ideas and concepts of risk. This applies both to the investigated organizations as well as the numerous documents, regulations, guidelines, and directives, also to the different organizations from the top level, to the educational system and at the operational level. The empiricism holds consensus with a risk and vulnerability analysis of Norwegian food supply, which concluded that the greatest weakness is associated with the delegation of responsibilities between actors. and one of the suggested measures to improve civil preparedness is to examine the possibility of establishing a joint emergency plan for crises. An important element in such joint emergency plan, also consistent with the Norwegian Ministry of Justice and Public Security 2016-2017 report to the Parliament, is the need for a common understanding of preparedness concepts, knowledge of cross-institutional organizations conceptual use of concepts and definitions in preparedness as a prerequisite for understanding and interaction in naval cooperation for civil preparedness

    User requirements for location based services : an analysis on the basis of literature

    Full text link
    The high global penetration of mobile telephony provides a strong basis for the development and diffusion of mobile business applications. Especially for location based services, i.e. mobile services that consider the user’s current location to add value to the service provided, a high potential to become a major market success is seen. Nevertheless the development of mobile business and location based services has so far been lagging behind expert expecations. One of the reasons for this disappointing development is the failure of application developers to center their efforts on potential users and their needs and demands. The following paper therefore reviews the existing literature on user requirements in mobile business and location based services. A definition and characterization of location based services is given and a framework to categorize existing location based services is developed. Additionally, usefulness and usability are put in concrete terms as they are identified as the main determinants of end-user acceptance of location based services. Security concerns of potential users of location based services are analyzed and further limitations of the diffusion of location based services are discussed

    Supermarkets as new food authorities

    Get PDF

    Risk, Overdiagnosis and Ethical Justifications

    Get PDF
    Wendy Rogers was supported by Future Fellowship (FT130100346) from the Australian Research Council and a 2018 Residency from the Brocher Foundation. Stacy Carter was supported by National Health and Medical Research Council Centre for Research Excellence 1104136 and a 2018 Residence from the Brocher Foundation. This study was funded by FT130100346 from the Australian Research Council (Rogers) and CRE 1104136 from the National Health and Medical Research Council (Carter), and Rogers and Carter both received support in the form of a 2018 month-long residency at the Brocher Foundation, Switzerland.Peer reviewedPublisher PD

    Fourteenth Biennial Status Report: MĂ€rz 2017 - February 2019

    No full text

    Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security

    Get PDF
    Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything can be compromised, and designing networks, identities and systems with this in mind and following the principle of least privilege. This approach to information security has been coined as the solution to the weaknesses of traditional perimeter-based information security models, and adoption is starting to increase. However, the principles of Zero Trust are only applied within the technical domain to aspects such as networks, data and identities in past research. This indicates a knowledge gap, as the principles of Zero Trust could be applied to organizational domains such as people and processes to further strengthen information security, resulting in a holistic approach. To fill this gap, we employed design science research to develop a holistic maturity model for Zero Trust maturity based on these principles: The EZTMM. We performed two systematic literature reviews on Zero Trust and Maturity Model theory respectively and collaborated closely with experts and practitioners on the operational, tactical and strategic levels of six different organizations. The resulting maturity model was anchored in prior Zero Trust and maturity model literature, as well as practitioner and expert experiences and knowledge. The EZTMM was evaluated by our respondent organizations through two rounds of interviews before being used by one respondent organization to perform a maturity assessment of their own organization as a part of our case study evaluation. Each interview round resulted in ample feedback and learning, while the case study allowed us to evaluate and improve on the model in a real-world setting. Our contribution is twofold: A fully functional, holistic Zero Trust maturity model with an accompanying maturity assessment spreadsheet (the artifact), and our reflections and suggestions regarding further development of the EZTMM and research on the holistic application of Zero Trust principles for improved information security

    Designing the Extended Zero Trust Maturity Model A Holistic Approach to Assessing and Improving an Organization’s Maturity Within the Technology, Processes and People Domains of Information Security

    Get PDF
    Zero Trust is an approach to security where implicit trust is removed, forcing applications, workloads, servers and users to verify themselves every time a request is made. Furthermore, Zero Trust means assuming anything can be compromised, and designing networks, identities and systems with this in mind and following the principle of least privilege. This approach to information security has been coined as the solution to the weaknesses of traditional perimeter-based information security models, and adoption is starting to increase. However, the principles of Zero Trust are only applied within the technical domain to aspects such as networks, data and identities in past research. This indicates a knowledge gap, as the principles of Zero Trust could be applied to organizational domains such as people and processes to further strengthen information security, resulting in a holistic approach. To fill this gap, we employed design science research to develop a holistic maturity model for Zero Trust maturity based on these principles: The EZTMM. We performed two systematic literature reviews on Zero Trust and Maturity Model theory respectively and collaborated closely with experts and practitioners on the operational, tactical and strategic levels of six different organizations. The resulting maturity model was anchored in prior Zero Trust and maturity model literature, as well as practitioner and expert experiences and knowledge. The EZTMM was evaluated by our respondent organizations through two rounds of interviews before being used by one respondent organization to perform a maturity assessment of their own organization as a part of our case study evaluation. Each interview round resulted in ample feedback and learning, while the case study allowed us to evaluate and improve on the model in a real-world setting. Our contribution is twofold: A fully functional, holistic Zero Trust maturity model with an accompanying maturity assessment spreadsheet (the artifact), and our reflections and suggestions regarding further development of the EZTMM and research on the holistic application of Zero Trust principles for improved information security
    • 

    corecore