17,332 research outputs found

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    Workplace Violence and Security: Are there Lessons for Peacemaking?

    Get PDF
    Workplace violence has captured the attention of commentators, employers, and the public at large. Although statistically the incidents of workplace homicide and assault are decreasing, public awareness of the problem has heightened, largely through media reports of violent incidents. Employers are exhorted to address the problem of workplace violence and are offered a variety of programs and processes to prevent its occurrence. Many techniques, however, conflict with values that are critical to achieving sustainable peace. We focus on types of workplace violence that are triggered by organizational factors. From among the plethora of recommendations, we identify those responses that are most and least consistent with positive peace. We find that processes that promote privacy, transparency, and employee rights hold the most promise for peacemaking. We submit that such structures and processes can be transportable beyond the workplace to promote peace locally, nationally, and globally.http://deepblue.lib.umich.edu/bitstream/2027.42/39920/3/wp535.pd

    Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    Get PDF
    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements.\ud Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session

    Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

    Full text link
    Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. {\em Shared} hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical analysis of the distribution of web security features and software patching practices in shared hosting providers, the influence of providers on these security practices, and their impact on web compromise rates. We construct provider-level features on the global market for shared hosting -- containing 1,259 providers -- by gathering indicators from 442,684 domains. Exploratory factor analysis of 15 indicators identifies four main latent factors that capture security efforts: content security, webmaster security, web infrastructure security and web application security. We confirm, via a fixed-effect regression model, that providers exert significant influence over the latter two factors, which are both related to the software stack in their hosting environment. Finally, by means of GLM regression analysis of these factors on phishing and malware abuse, we show that the four security and software patching factors explain between 10\% and 19\% of the variance in abuse at providers, after controlling for size. For web-application security for instance, we found that when a provider moves from the bottom 10\% to the best-performing 10\%, it would experience 4 times fewer phishing incidents. We show that providers have influence over patch levels--even higher in the stack, where CMSes can run as client-side software--and that this influence is tied to a substantial reduction in abuse levels

    Workplace Violence and Security: Are there Lessons for Peacemaking?

    Get PDF
    Workplace violence has captured the attention of commentators, employers, and the public at large. Although statistically the incidents of workplace homicide and assault are decreasing, public awareness of the problem has heightened, largely through media reports of violent incidents. Employers are exhorted to address the problem of workplace violence and are offered a variety of programs and processes to prevent its occurrence. Many techniques, however, conflict with values that are critical to achieving sustainable peace. We focus on types of workplace violence that are triggered by organizational factors. From among the plethora of recommendations, we identify those responses that are most and least consistent with positive peace. We find that processes that promote privacy, transparency, and employee rights hold the most promise for peacemaking. We submit that such structures and processes can be transportable beyond the workplace to promote peace locally, nationally, and globally.workplace violence, employee rights, sustainable peace, and corporate governance

    Integration and development trajectories: Latin American populations in The Netherlands: exploratory study

    Get PDF
    This document gathers the main results of an exploratory study about the obstacles and possibilities of articulating the population of Latin American origin residing in The Netherlands to the receiving society. Two specific issues on the matter are presented: an overview of the types of organizations working with or for said populations; and information on the living conditions, potential and needs of the individuals. A review of the available statistical data from various government institutions is exposed and analysed and, on the basis of the results from a survey as well as several interviews, the situation of the target population is analyzed. The document contains a special section about the conditions of ‘populations in special situations’ and, when required, pertinent recommendations on their needs and the possibilities to improve their conditions are made. The study demonstrates that the increases in number of Latin American migrants as well as the changes in the causes for migration and the profile of those who arrive to The Netherlands are issues which deserve attention both at a theoretical level as well as in the practical and policy formulation aspects.civil society;migration;integration;organizations;Latin American populations

    Nonbanks and risk in retail payments

    Get PDF
    This paper documents the importance of nonbanks in retail payments in the United States and in 15 European countries and analyzes the implications of the importance and multiple roles played by nonbanks on retail payment risks. This paper also reviews the main regulatory safeguards in place, and concludes that there may be a need to reconsider some of them in view of the growing role of nonbanks and of the global reach of risks in the electronic era.
    corecore