12,948 research outputs found

    Navigational Trip: Safety, Security, and Protection as Compliance to Interntional Standard

    Get PDF
    This study was determined the evaluation of the safety, security, and protection of the navigational trip in terms of safety among marine engineering students as an entire group and when they were classified according to section such as Polaris 3-A, Polaris 3-B, and Polaris 3-C. Respondents of the study were the one hundred twenty (120) Polaris marine engineering students who are currently enrolled in the College of Maritime Education of JBLFMU-Molo for School Year 2017-2018 who were on board or have undertaken the navigational trip and have observed some of the safety and security services on board. The researchers employed quantitative-qualitative research design by Creswell (2013) to determine the navigational trip and observations of the safety and security services on board. Results revealed that the respondents had “excellent evaluation” about the safety, protection, and security of the navigational trip vessel. There were no significant differences in the evaluation of the respondents as to the different sections; no relationships were observed when the respondents’ evaluation results were compared according to sections. The observations and comments cited in this study signify that the navigational trip vessel exhibited safety and security, maintain clean and safe environment, and followed the strict implementation of safety as prescribed by the international standards. The respondents’ comments attested that the navigational ship has implemented the international standard of safety and procedure on board

    Considerations Regarding the Security and Protection of E-Banking Services Consumers’ Interests

    Get PDF
    A significant number of breaches in the security of electronic banking (e-Banking) system is reported each year, drawing attention to the need to protect and inform customers about the risk of exposure to malicious actions initiated by cyber-criminals. Financial institutions and consumers recognize the fact that attacks and financial frauds are becoming more complex and are perpetrated by a different class of criminal. This class is increasingly sophisticated and uses technology as part of their strategy. Furthermore, the specialists forecast that the current global recession is likely to increase the frequency of internal fraud and security breaches. The present research tries: (1) to analyze the potential dangers threatening the security of e- Banking services through a comprehensive investigation of the relevant literature; (2) to identify the tools and methods that can ensure the consumers’ protection in E-Banking, (3) to present the results of a pilot study regarding the Romanian consumer perception on the protection and security related to E-Banking servicesE-Banking services, security, consumer protection, cyber-attack

    Organization of computer security and protection of information

    Get PDF
    Розглянуто деякі питання комп’ютерної та інформаційної безпеки. Проведено аналіз основних захисних засобів персональних комп’ютерів. Охарактеризовано основні технічні складові комп’ютерної безпеки. Визначено актуальні проблеми захисту інформації в інформаційних системах.Рассмотрены некоторые вопросы компьютерной и информационной безопасности. Проведен анализ основных защитных средств персональных компьютеров. Охарактеризованы основные технические составляющие компьютерной безопасности. Определены актуальные проблемы защиты информации в информационных системах.Some aspects of computer and information security. The analysis of basic safety equipment of personal computers. Describes the main technical components of computer security. Identified actual problems of information protection in information system

    Economy Law and Economic Analysis of Law and the Impact on Intellectual Property in the Common Law System

    Get PDF
    This article analyses the concept of economics applied to law in order to understand the school's analysis of legal phenomena by economic principles that emerged in 1960 in the United States of America, tracing the impacts on intellectual property law in the Common Law system. This study relies on the hypothetical-deductive method, with a focus on economic and legal literature, to conclude that intellectual property legislation is frequently modernized, especially at the time of major socio economic transformations such as an industrial revolution with the effect of boosting development and innovation, ensuring economic growth with the proper security and protection of industrial secrets and expertise

    A Survey On Cloud Computing Security Issues

    Get PDF
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, looked at their qualities and constraints, and imagined future research headings

    CLOUD COMPUTING SYSTEM IN SECURITY

    Get PDF
    Cloud computing is turning into a notable popular expression these days. Numerous organizations, for example, Amazon, Google, and Microsoft, etc, quicken their speeds in creating Cloud Computing frameworks and upgrading their administrations to accommodate a bigger measure of clients. Notwithstanding, security and protection issues present a solid boundary for clients to adjust into Cloud Computing frameworks. In this paper, we examine a few Cloud Computing framework suppliers about their interests on security and protection issues. We discover those worries are not satisfactory and more should be included terms of five perspectives (i.e., accessibility, classification, information uprightness, control, review) for security. Besides, delivered follows up on security are outdated to ensure clients' private data in the new climate (i.e., Cloud Computing framework climate) since they are not, at this point material to the new connection among clients and suppliers, which contains three gatherings (i.e., Cloud administration client, Cloud specialist organization/Cloud client, Cloud supplier). Multi found information stockpiling and administrations (i.e., applications) in the Cloud exacerbate protection. Consequently, adjusting delivered represents new situations in the Cloud, it will bring about more clients to venture into Cloud. We guarantee that the thriving in Cloud Computing writing is to be coming after those security and protection issues having be settled

    Survey of Enhancing Security of Cloud Using Fog Computing

    Get PDF
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. So these issues in fog computing arises new research challenges and opportunities. This survey features about existing security concerns for fog computing and new proposed system to tackle some of the issues in fog computing related to security and privacy, thereby enhancing the cloud security

    Methodology of the Auditing Measures to Civil Airport Security and Protection

    Get PDF
    Airports similarly to other companies are certified in compliance with the International Standardization Organization (ISO) standards of products and services (series of ISO 9000 Standards regarding quality management), to coordinate the technical side of standardizatioon and normalization at an international scale. In order for the airports to meet the norms and the certification requirements as by the ISO they are liable to undergo strict audits of quality, as a rule, conducted by an independent auditing organization. Focus of the audits is primarily on airport operation economics and security. The article is an analysis into the methodology of the airport security audit processes and activities. Within the framework of planning, the sequence of steps is described in line with the principles and procedures of the Security Management System (SMS) and starndards established by the International Standardization Organization (ISO). The methodology of conducting airport security audit is developed in compliance with the national programme and international legislation standards (Annex 17) applicable to protection of civil aviation against acts of unlawful interference

    Sexuality, Bodily Experiences and Gender: an Ethnographic Study among People Living with HIV in the Metropolitan Area of Buenos Aires, Argentina

    Get PDF
    Objectives: To discuss both security and protection approaches related to sexual behavior before HIV emerged as a social problem, as well as to discuss the categories of social construction and hegemony under the imperative of inquiring into gender inequalities
    corecore