| | SLO | ENG | Piškotki in zasebnost

Večja pisava | Manjša pisava

Iskanje po katalogu digitalne knjižnice Pomoč

Iskalni niz: išči po
išči po
išči po
išči po
* po starem in bolonjskem študiju

Opcije:
  Ponastavi


1 - 5 / 5
Na začetekNa prejšnjo stran1Na naslednjo stranNa konec
1.
Cyber Security- Training Students and Scholars for the Challenges of Information and Communication Technologies in Research and Studies for Internationalisation : handbook
2023

Opis: This handbook is a product of the Erasmus+ Strategic Partnership between the partners Université Polytéchnique Hauts-de-France, Politechnika Poznanska, Brandenburgische Technische Universität Cottbus-Senftenberg and the coordinator University of Maribor. Contentuous contribution were made by staff of University of Maribor and Politechnika Poznanska, evaluations by staff of the other two partners. The handbooks handles virtual learning environments in the international education and research area and exposure of the systems to cybercrime. Besides introductory contributions on legal aspects of challenges in the fields of human rights, European regulations of data security, civil law and criminal law aspects of caber security of virtual learning environments and methodologies of their introduction w8ithin organisations, the handbook also gives useful instructions for elaboration of virtual courses within virtual learning environments relevant for the internationalised research and education not only since the Covid-19 pandemic. The handbook is dedicated to use on the internet within the Moodle system.
Ključne besede: cyber security, virtual learning environment, data security, cyber crime, systems
Objavljeno v DKUM: 13.04.2023; Ogledov: 341; Prenosov: 29
.pdf Celotno besedilo (5,72 MB)
Gradivo ima več datotek! Več...

2.
Unlimited access to information systems with mobile devices : information security perspective
Igor Bernik, Blaž Markelj, 2011, pregledni znanstveni članek

Opis: Purpose: Mobile devices have become an indispensible part of modern communications; they enable easy access to the Internet and also remote manipulation of data stored in corporate information systems. The number of mobile device users is on the rise, but most of them don’t comprehend completely the less obvious functions of these devices. Users also have almost no control over background computer programs, because they run without their knowledge and volition. From the standpoint of information security, a lack of awareness of the risks can seriously compromise the integrity of corporate networks and information systems. The weakest links are users, but also the technology itself. To ensure the functioning and security of information systems, corporations and individual users should learn about protective mechanisms. It is also important that users adhere to implemented (internal) safety regulations. Design/Methods/Approach: We used descriptive and comparative methods, and made an overview of published literature, as well as processes pertaining to the use of mobile devices and related security issues. We compared general elements of information security in regard to the use of mobile devices. Findings: At present mobile devices are more and more frequently used to access information systems. The majority of users are concerned almost exclusively with the question, how to get uninterrupted remote access to data, but far less with security issues. This paper presents some guidelines for achieving and maintaining information security. Research limitations/implications: It has been noted, that this is a time of turbulent development and evolution in the field of mobile devices, and also related security issues, so best practices haven’t been defined yet. Corporations and other organizations have just recently begun defining guidelines to eliminate security breaches through mobile devices, therefore a comparison of their implemented solutions is practically impossible. VS_ Practical implications: We propose guidelines, which can be used to: minimize information security risks posed by mobile devices; evaluate the current state of information security; and implement protective measures against cyber threats encountered by corporations and individual users of mobile devices. Originality/Value: Information security is a relatively new field because mobile devices and remote access to the Internet and data have just recently come into wider use. At the same time security issues and protective measures have stayed largely overlooked. Security threats are many, so it is impervious that users learn more about them and adopt some necessary security measures.
Ključne besede: information security, blended threats, mobile devices, corporate information systems, business integrity
Objavljeno v DKUM: 12.05.2020; Ogledov: 1187; Prenosov: 62
.pdf Celotno besedilo (884,10 KB)
Gradivo ima več datotek! Več...

3.
Inoculation of safety in healthcare
Bojan Dobovšek, Boštjan Slak, 2017, pregledni znanstveni članek

Opis: The purpose of this paper is to analyse - through a prism of informal institutions - the role and importance of security in healthcare and the manner in which healthcare sector copes with security threats in postmodern society. We note that bad informal institutions are differently reflected in Slovenia. In the forefront are the problems of systemic corruption, various forms of clientelism and nepotism. This is (in)directly reflected in the (lack of) quality of Slovenian healthcare system. Inadequate public procurement system and conflicts of interest in healthcare sector are causing inferior quality of the healthcare system, while informal institutions in politics and economics are weakening Slovenian economy, consequently affecting the funding of Slovenian healthcare system which is also undermined by the financial crisis. Additionally, globalisation, which has a (negative) impact on human health, has caused the importation of improper business practices into healthcare system. It is therefore necessary to develop a preventive action that will inoculate the idea of a safe country for the benefit of people and not for the benefit of bad informal networks.
Ključne besede: informal institutions, corruption, health systems, security
Objavljeno v DKUM: 09.10.2018; Ogledov: 1264; Prenosov: 207
.pdf Celotno besedilo (566,97 KB)
Gradivo ima več datotek! Več...

4.
Crime prevention through public-private cooperation within the security system of Republic of Macedonia
Saše Gerasimoski, 2013, pregledni znanstveni članek

Opis: Purpose: This article examines the contribution of public-private cooperation in crime prevention within the security system of Macedonia in the last 10 years. Design/Methods/Approach: Secondary data analysis on information obtained from the Ministry of Interior and private security entities as well as content analysis of available resources to estimate the importance of the crime prevention. Findings: In general, the contribution of the public-private cooperation to crime prevention within the contemporary security system of the Republic of Macedonia is seen more as potential than as reality, owing to the present level of co-existence between public and private security sector. Although the crime prevention advantages of the cooperation between them are recognized within both sectors, it is certain that only joint activities within securing the public events and transportation of money, documents and other valuables are functioning so far. Research limitations / implications: Considering the fact that secondary data are being used, employing primary data for analysis in the future will probably strengthen the findings obtained with this research and reveal new relations. Originality/Value: Though there are several studies related to private security in the Republic of Macedonia, there is a lack of studies concerning public-private cooperation within the security system, let alone their relationship to crime prevention. We see this study as a pivotal contribution to efforts to highlight this crucial dimension of their mutual relation nowadays and in the future.
Ključne besede: crime, prevention, public-private cooperation, security systems, Republic of Macedonia kriminaliteta, preprečevanje, javno-zasebno partnerstvo, varnostni sistemi, Makedonija
Objavljeno v DKUM: 10.07.2015; Ogledov: 1020; Prenosov: 65
URL Povezava na celotno besedilo
Gradivo ima več datotek! Več...

5.
QoS-oriented design of embedded systems with specification PEARL
Roman Gumzej, Wolfgang A. Halang, 2007, izvirni znanstveni članek

Opis: Only recently have methodical tools adequate to design real-time systems been formally introduced in design methodologies. Naturally, they were present fromthe beginning, but due to the large diversity of embedded systemsć areas of deployment, specially dedicated formalisms have been developed and used. High-level language programming and integration of modeling formalisms into design methods eased the development of more complex real-time applications. With the emerging object-oriented programming languages and design methods, their integration into larger information systems has become more transparent. It was the UML methodology, however, which eventually merged also the design methods and concepts of real-time systems into a consistent whole. It took a large consortium and a long process to persuade industry of the benefits the new integral methodology can offer. On the other hand, there are some trade-offs, and there are some features not completely covered, yet. Here, a different, more straightforward approach to program and design (embedded) real-time systems is presented. Since it emerged from the real-time community, it includes most features relevant there. Independent of the UML profile for schedulability, performance and time specification, a profile was devised for use in PEARL-oriented UML design. The strengths of the mentioned language and design methods for QoS-oriented design of (embedded) real-time systems are emphasised throughout this article.
Ključne besede: real time systems, embedded systems, quality of service, co-design, co-simulation, safety, dependability, security, timeliness, determinism, readiness, reliability, portability, flexibility, specification PEARL, UML profiles, patterns
Objavljeno v DKUM: 31.05.2012; Ogledov: 2413; Prenosov: 128
URL Povezava na celotno besedilo

Iskanje izvedeno v 12.43 sek.
Na vrh
Logotipi partnerjev Univerza v Mariboru Univerza v Ljubljani Univerza na Primorskem Univerza v Novi Gorici