Academic literature on the topic 'Unauthorised aids'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unauthorised aids.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Unauthorised aids"

1

Pal, Puspalata, and Dhirendra Kumar Sarangi. "Impact of Biomedical Waste on Cuttack City." Current World Environment 13, no. 2 (August 25, 2018): 259–69. http://dx.doi.org/10.12944/cwe.13.2.11.

Full text
Abstract:
Waste generated from health care centres and its management are emerging issues in India. The improper management of such wastes has adverse impact on health and environment. Though these wastes constitute a small portion of the total waste but very special handling , treatment and disposal are needed to manage such wastes because of their highly toxic and infectious nature. There are seven major specialized government hospitals in Cuttack City. According to the Chief District Medical Officer, Cuttack there are 131 registered and more than 300 unregistered nursing homes, clinics, pathology and diagnostics centres also which generate huge quantity of biomedical wastes. Most of the health care centres of the City are either dumping the wastes in the municipal bins or Mahanadi river and Taladanda canal side or hand over the waste to the unauthorised private parties. This is ultimately collected by rag pickers for reuse.Unlawful disposal of these wastes by healthcare cenres can contribute to the spread of serious diseases such as hepatitis, AIDS (HIV) and other deadly diseases. The present study focuses upon the management practice followed in Cuttack City by the Hospitals and and large number of other health care centres and the impact of biomedical waste on environment. According to the study ,the unethical open dumping and unsegregaed mixed biomedical waste were found in municipal bins is a serious health hazards for rag pickers and also to the hospital staff and the public. The study also found that wastes generated from the radio diagonostics centres, and the laboratory units disposed off directly into the municipal sewer without proper disinfection of pathogens, ultimately flowing to the river Mahanadi and Kathajodi and also to the Taladanda canal through various drains of the city. The results of the study showed that there is an adverse impact of the biomedical wastes on Cuttack city due to mismanagement which needs strict enforcement of laws and other legal provisions for better environmental management system for the disposal of biomedical waste in order to bring back congenial and healthy environment for city dwellers.
APA, Harvard, Vancouver, ISO, and other styles
2

Edgar, Harold, and Hazel Sandomire. "Medical Privacy Issues in the Age of AIDS: Legislative Options." American Journal of Law & Medicine 16, no. 1-2 (1990): 155–222. http://dx.doi.org/10.1017/s0098858800009977.

Full text
Abstract:
Promises of confidentiality of HIV-related medical records and protection from discrimination based on HIV seropositivity are two of the legislative inducements state governments have offered to encourage voluntary HIV testing. Yet neither can be granted without impact on others whose interests range from those of a lover to those of an insurer. Politics as well as practicalities prevent the absolute protection of records from unauthorized disclosure and of individuals from discrimination. This article details the already enacted statutory compromises that have been made to resolve the conflicts of these competing interests and closely examines the myriad fine decisions made in reaching those legislative decisions.
APA, Harvard, Vancouver, ISO, and other styles
3

Enyindah, P., and Uzochukwu C. Onwuachu. "An Intrusion Detection System Application for an Organisation." Circulation in Computer Science 2, no. 3 (April 24, 2017): 23–28. http://dx.doi.org/10.22632/ccs-2017-251-87.

Full text
Abstract:
This paper is aimed at developing an Intrusion Detection System (IDS) that will guarantee the integrity of data housed in databases and connected through a network to other computers. There is need to protect clients’ and organization’s sensitive information as well as gain the benefits of Information Technology without compromising reliability of information. The objective of this software is to detect and track down details of intrusion attempt by unauthorized users such as cases of Internet Fraud. The Structured System Analysis and Development Methodology (SSADM) is adopted to developing this system as it aids effective analysis of the above problem using a series of well defined steps that builds upon each other. The development is done using technologies such as html, css, javascript for its frontend; php for its backend and the Mysql database technology for an organized data collection. The expected result will be a network based Intrusion Detection System that will help prevent unauthorized access to a network and its linked data.
APA, Harvard, Vancouver, ISO, and other styles
4

Zovko Končić, Marijana. "Getting More Than You Paid For: Unauthorized “Natural” Substances in Herbal Food Supplements on EU Market." Planta Medica 84, no. 06/07 (January 16, 2018): 394–406. http://dx.doi.org/10.1055/s-0044-100042.

Full text
Abstract:
AbstractAs the population in the industrialized world develops preference for what is perceived as a natural and holistic way of disease treatment, the popularity and the number of food supplements on the market, including herbal ones, is experiencing an unprecedented rise. However, unlike herbal medicinal products, intended for treating or preventing disease, current legislation classifies food supplements as products intended for achieving nutritional or physiological effect and to supplement the normal diet. Accordingly, most food supplements are not to be associated with specific health claims. However, either due to the subtle suggestions by the producers or the wishful thinking of the consumers, certain pharmacological effects from food supplements are often expected. Medicinal plants included in food supplements usually do not produce dramatic and instant pharmacological effects. Therefore, in order to meet the expectation of their customers, some producers have turned to the illicit and dangerous practice of adulterating their products with synthetic adulterants, including naturally occurring molecules, having the desired activity. Such practice is prevalent in, although not limited to, food supplements intended for use as weight-loss aids, as well as for sport performance and libido enhancement. The review is focusing on naturally occurring alkaloids, phenylethanolamines, and their semi-synthetic derivatives in food supplements in the European Union as reported by the Rapid Alert System for Food and Feed. Their desired and undesired pharmacological effects, as well as the methods for their detection and quantification in food supplements, will be reviewed.
APA, Harvard, Vancouver, ISO, and other styles
5

Patel, Maitri, and Rajan Patel. "Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem." Emerging Science Journal 5, no. 1 (February 1, 2021): 77–84. http://dx.doi.org/10.28991/esj-2021-01259.

Full text
Abstract:
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC). IBC will generate and distribute the private key to each user to decrypt a message. The thought behind presenting the scheme was to improve and reduce the complexity of certificate and key management, but it also gives rise to key escrow problem, access to encrypted information to unauthorized users. The paper represents Improved Identity-Based Encryption Scheme (IIBES) for Domain Name System (DNS) security which provides confidentiality and authentication through modified identity based encryption and identity based digital signatures. The IIBES comprises key revocation mechanism for non-revoked users and also eliminates key escrow problem. Thus, the IIBES aids to implement the identity-based cryptography more safely in reality and protects DNS against cache poisoning, spoofing attack and masquerade attack. Doi: 10.28991/esj-2021-01259 Full Text: PDF
APA, Harvard, Vancouver, ISO, and other styles
6

Wesolowski, Michael D., Arnie H. Zencius, and Ileana M. Rodriguez. "Mini-breaks: the use of escape on a fixed-time schedule to reduce unauthorized breaks from vocational training sites for individuals with brain injury." Behavioral Interventions 14, no. 3 (July 1999): 163–70. http://dx.doi.org/10.1002/(sici)1099-078x(199907/09)14:3<163::aid-bin30>3.0.co;2-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meyer, Dirk. "Zur juristischen Begründung des ‚Rettungsschirms‘." Review of Economics 61, no. 2 (January 1, 2010). http://dx.doi.org/10.1515/roe-2010-0201.

Full text
Abstract:
SummaryThe financial and guarantee aids within the European Financial Stabilisation Mechanism suspend the Stability and Growth Pact as the basis of the European Economic and Monetary Union. The actual ‘suspension’ from the ‘no bail-out’ restriction (Art. 125 TFEU) and the prohibition of funding national debts (Art. 123 TFEU) transfers risks and financial burdens from deeply indebted states to solvent EU member states. This is the beginning of an unauthorized ‘transfer union’.This analysis does not display any evidence of market failure with respect to a potential domino effect for other EU member states. In addition, a destabilizing speculation cannot be identified. The case ‘Greece’ is rather a special case which has become a common model for other member states, caused by the Council of the European Union and the aid packages. Speculations build a part of the observable market reactions apart from pure hedging, but they simply indicate political system errors.The interventions by the European Central Bank do not lead to functioning markets. These interventions rather lead to yield structures that are inadequate in terms of risks and scarcity. Therefore they will cause a misallocation of financial resources with high economic costs.
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Dirk. "Kosten des Europäischen Finanzstabilisierungsmechanismus (EFSM) aus deutscher Sicht / The Costs of the European Financial Stability Facility (EFSF) – The German Point of View." Jahrbücher für Nationalökonomie und Statistik 231, no. 2 (January 1, 2011). http://dx.doi.org/10.1515/jbnst-2011-0206.

Full text
Abstract:
SummaryThe European Financial Stability Facility (EFSF), which is supported by the German Gesetz zur Übernahme von Gewährleistungen im Rahmen des europäischen Stabilisierungsmechanismus (StabMechG), suspends the Stability and Growth Pact as the basis of the European Economic and Monetary Union. The actual ‘suspension’ from the ’no bail-out’ restriction (Art. 125 TFEU) and the prohibition of funding national debts (Art. 123 TFEU) transfers risks and financial burdens from deeply indebted states to solvent EU member states. As a result an unauthorized „transfer union‘‘ emerges, whose Central Bank lost its independence to a political leadership and cannot focus on its objective of price stability as contracted any longer. Even without the use of financial and guarantee aids the German economy suffers from a distorted yield structure and crowding-out effects of private investments. From the economic point of view the used measures are neither appropriate nor necessary for achieving financial stability within the European Economic and Monetary Union. Much less these measures are proportionate. Of course, the alternative of accepting a ‘controlled’ national bankruptcy would not have been without its formidable costs.However, its attribution of arrangements in the line with market requirements and the adherence to EU-contract provisions would have been the more worthwhile regulatory policy option for a more solid budgetary policy in the future.
APA, Harvard, Vancouver, ISO, and other styles
9

Kolås, Åshild, and Lacin ldil Oztig. "From towers to walls: Trump’s border wall as entrepreneurial performance." Environment and Planning C: Politics and Space, March 24, 2021, 239965442110030. http://dx.doi.org/10.1177/23996544211003097.

Full text
Abstract:
The pledge to build a “great”, “beautiful” southern border wall was a cornerstone of Donald J. Trump’s 2016 presidential election campaign. This paper analyzes Trump’s border wall project as an example of performative statecraft, suggesting that the wall works better rhetorically, than as a barrier against unauthorized cross-border movement. Identifying Trump’s performative statecraft as “entrepreneurial”, we argue that his border wall discourse differs from that of earlier presidents in the way Trump meshes the performance of the border wall as a protective device with his own performance as an entrepreneur and developer. Trump’s border wall discourse accentuates his personal skills as an entrepreneur, and makes these skills relevant to his key campaign promises: to “Make America Great Again”, and defend the nation against transnational crime. Despite Trump’s radical reformulation of US asylum policy, enhanced pursuit of unauthorized immigrants, termination of Obama-era programs like Deferred Action for Childhood Arrivals (DACA), and disturbing but short-lived family separation and ‘Zero-Tolerance’ detention scheme, the border security policies of President Trump are not as novel as his promotional campaigns would have us believe. In fact, Trump’s border control strategies have continued many of the measures introduced by earlier presidents. The novelty of the Trump presidency lies in the strong focus on the new US–Mexico border wall, and fervent attention to the physical attributes and instrumental functions of the wall. Much more than a fence, Trump’s proposed border wall is a grand, awe-inspiring monument to national security, and to Trump’s entrepreneurial statecraft. It also works as a visual aide for Trump’s plan to “Make America Great Again”. Border walls stand as testimony to the power of the state, and the determination of those who defend it. Trump’s border wall would be no exception.
APA, Harvard, Vancouver, ISO, and other styles
10

"Image Steganography embedded with Advance Encryption Standard (AES) securing with SHA-256." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (June 10, 2020): 641–48. http://dx.doi.org/10.35940/ijitee.h6442.069820.

Full text
Abstract:
The proposed paper, works upon the idea of securing the classified information. This is achieved by using steganography which is an approach to hide classified information into some other file while maintaining its visual aids and secondly is cryptography which works upon textual data and transform it in a way that no one can comprehend it. The proposed method secures the weaker section which is the key in Advance Encryption Standard using hashing technique. The proposed work enhances the level of concealment of information from unauthorized access and for covert information exchange by encrypting the data and hiding it into a multimedia file known as image. The Secure Hash Algorithm 256 generates a hash key of 256 bits which is an unbreakable hashing technique after that the key is used in the process of encrypting the text with Advance Encryption Standard 256 which is an unbreakable encryption technique till this time and a cipher text is obtained. The cipher text is embedded into a target image using Least Significant Bit method which make changes in image that cannot be understand by naked eyes. The change in byte is 0.000002%. It ensures the visual quality of an image remains intact. The distortion or change in the image remains intermittent to human eyes. The major issue concerned for the government and security agencies such as were to exchange highly classified information in a secure and undetectable manner and abide the notion of hacker to comprehend any such information.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Unauthorised aids"

1

Edlander, Timmie. "Akademiskt fusk : En kvalitativ studie om hur studenter motiverar handlingar som har föranlett disciplinära åtgärder." Thesis, Karlstads universitet, Institutionen för sociala och psykologiska studier, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-57027.

Full text
Abstract:
This is a qualitative study that has reviewed decision reports on academic cheating with content analysis as a method, aimed to investigate the actions that has led to disciplinary action and illustrate how students motivate their actions. The result shows that plagiarism is the main act that has led to disciplinary action. In the cheating plagiarism, the approach varies from the fact that the plagiarized texts may originate from students from other universities, classmates or it may be the result of collaboration between students. In the other cheating form unauthorised aids, the procedure is similar to the approach in terms of students bringing unauthorised aids on the examination. What varies is what kind of assistant students bring such as mobile phones, notes or writing sheets. The study can determine that student motivations for their actions may vary but include causes such as mistakes, pressed study situations and lack of resources, lack of time and stress, lack of knowledge and misinterpretations of the university rules.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Unauthorised aids"

1

An underground education: The unauthorized and outrageous supplement to everything you thought you knew about art, sex, business, crime, science, medicine, and other fields of human knowledge. New York: Doubleday, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fiscal year 1997 unauthorized transit projects: Hearing before the Subcommittee on Surface Transportation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Fourth Congress, second session, April 25, 1996. Washington: U.S. G.P.O., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Office, General Accounting. Foreign aid: Potential for diversion of economic support funds to unauthorized use : report to the Chairman, Subcommittee on Europe and the Middle East, Committee on Foreign Affairs, House of Representatives. Washington, D.C: The Office, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, General Accounting. Foreign aid: Potential for diversion of economic support funds to unauthorized use : report to the Chairman, Subcommittee on Europe and the Middle East, Committee on Foreign Affairs, House of Representatives. Washington, D.C: The Office, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Foreign aid: Potential for diversion of economic support funds to unauthorized use : report to the Chairman, Subcommittee on Europe and the Middle East, Committee on Foreign Affairs, House of Representatives. Washington, D.C: The Office, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lex Luthor: The Unauthorized Biography. Action Direct Distribution, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Library of Congress. Congressional Research Service, ed. The potential liability of insurance comapanies and self-insured businesses for unauthorized disclosure of medical information provided in connection with AIDS related insurance claims. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

An Underground Education : The Unauthorized and Outrageous Supplement to Everything You Thought You Knew About Art, Sex, Business, Crime, Science, Medicine, and Other Fields of Human. Anchor, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manekin, Devorah S. Regular Soldiers, Irregular War. Cornell University Press, 2020. http://dx.doi.org/10.7591/cornell/9781501750434.001.0001.

Full text
Abstract:
What explains differences in soldier participation in violence during irregular war? How do ordinary men become professional wielders of force, and when does this transformation falter or fail? This book presents a theoretical framework for understanding the various forms of behavior in which soldiers engage during counterinsurgency campaigns—compliance and shirking, abuse and restraint, as well as the creation of new violent practices. Through an in-depth study of the Israeli Defense Forces' repression of the Second Palestinian Intifada of 2000—2005, including interviews with and a survey of former combatants, the book examines how soldiers come both to unleash and to curb violence against civilians in a counterinsurgency campaign. It argues that variation in soldiers' behavior is best explained by the effectiveness of the control mechanisms put in place to ensure combatant violence reflects the strategies and preferences of military elites, primarily at the small-unit level. Furthermore, the book develops and analyzes soldier participation in three categories of violence: strategic violence authorized by military elites; opportunistic or unauthorized violence; and “entrepreneurial violence”—violence initiated from below to advance organizational aims when leaders are ambiguous about what will best serve those aims. By going inside military field units and exploring their patterns of command and control, the book sheds new light on the dynamics of violence and restraint in counterinsurgency.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Unauthorised aids"

1

Castañeda, Heide. "Medical aid as protest: acts of citizenship for unauthorized im/migrants and refugees." In Protesting Citizenship: Migrant Activisms, 85–98. Routledge, 2017. http://dx.doi.org/10.4324/9781315089393-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yoshikawa, Hirokazu, Alice J. Wuermli, and J. Lawrence Aber. "Mitigating the Impact of Forced Displacement and Refugee and Unauthorized Status on Youth." In Humanitarianism and Mass Migration, 186–206. University of California Press, 2018. http://dx.doi.org/10.1525/california/9780520297128.003.0009.

Full text
Abstract:
An unprecedented half of the world’s 57 million out of school children live in conflict-affected countries, and 50% of children of primary-school-age are not attending school. In addition, the unauthorized status of many refugees and migrants worldwide is associated with experiences of social exclusion as access to employment and social services are often unavailable or constrained by host-country governments. Children and youth affected by unauthorized or refugee status are also often excluded from services to support healthy development and learning. This chapter presents a process-oriented developmental framework to guide the development and evaluation of interventions that can buffer the effects of social and political upheaval, displacement, and refugee and unauthorized status on children and youth's development. Rigorous evaluations, showing how programs mitigate the risks of displacement or refugee or unauthorized status, could yield great benefits for the fields of humanitarian aid and refugee and migration policy, making the relative dearth of such evidence even more stunning. This chapter reviews the existing literature from rigorous evaluations of interventions to address these issues, discusses the challenge of measurement of risk and protective factors in these contexts with particular sensitivity to cultural variation, as well as how to address cultural factors in the development and evaluation of interventions. The chapter concludes with specific methodological recommendations for a sound research agenda to further improve our understanding of risk and resilience in development of children and youth affected by war, displacement, and refugee or unauthorized status.
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Philip. "US Farm Labor." In The Prosperity Paradox, 29–66. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198867845.003.0004.

Full text
Abstract:
Hired farm workers do two-thirds of US farm work. The hired labor system that developed in the western US in the nineteenth century has spread across the US, as the large farms that hire most farm workers expect seasonal crews to be available when needed and to fend for themselves in the off season. The major source of seasonal US farm workers is rural Mexico. Most Mexicans arrive as unauthorized workers and move to nonfarm US jobs after gaining experience in the US. Unions such as the United Farm Workers tried and failed to turn seasonal farm work from a decade-long job into a lifelong career. Farm-labor costs have been rising since the 2008–9 recession slowed unauthorized Mexico–US migration, prompting the 4-S adjustments: satisfy current workers to reduce turnover; stretch current workers with mechanical aids that increase their productivity; substitute machines for workers where possible and switch to less labor-intensive crops; and supplement current workforces with H-2A guest workers.
APA, Harvard, Vancouver, ISO, and other styles
4

Cabrera, Luis. "Free Movement, Sovereignty and Cosmopolitan State Responsibility." In The State and Cosmopolitan Responsibilities, 224–42. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198800613.003.0012.

Full text
Abstract:
How ‘cosmopolitan’ can a sovereign state be? That question is considered here in the context of unauthorized immigration and arguments for free movement of persons across state boundaries. Details are first presented on non-cosmopolitan attitudes commonly expressed by receiving-state leaders in response to unauthorized immigration. They focus not on equal moral standing and the cosmopolitan mandate to give fair consideration to all persons’ interests, but on the criminality of unauthorized entry, often the perceived criminality or poor character of entrants themselves, and a ‘war’ on human smugglers. A robustly cosmopolitan state, it is argued, would support much freer movement of persons. This raises a question, however: is a state which does not seek to control its borders still a cosmopolitan state? It is acknowledged, in relation to an argument from Joseph Carens, that state sovereignty might, in principle, be defined separate from state control of borders. In practice, however, free movement has been strongly associated in recent years with fairly intensive projects of regional integration. These entail significant pooling of sovereignty, creating in effect more-cosmopolitan regions, rather than more-cosmopolitan sovereign states. Overall, the analysis reinforces some significant challenges, highlighted by institutional cosmopolitans, to realizing robust cosmopolitan moral aims in a system of independent sovereign states. It also, however, highlights ways in which states can be ‘more-cosmopolitan’ in relation to migration in the current system.
APA, Harvard, Vancouver, ISO, and other styles
5

Bhatt, Chintan M., Kevin R. Patel, Yashvi Nileshbhai Raythatha, Poojan S. Dharaiya, Chirag Jethva, Karan Mehul Kathiriya, Vidhya Piyushbhai Kothadia, Deep Kothadiya, Vaishali Mewada, and Mayuri Jamanadas Popat. "Video-Based Human Authentication System for Access Control." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 181–202. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5101-1.ch009.

Full text
Abstract:
The issue of security is paramount in any organisation. Therefore, the authors intend to aid in the security of such organisations by bringing a video based human authentication system for access control which is a type of cyber physical system (CPS). CPS is an integration of computation and physical processes; here the computation is provided by face detection and recognition algorithm and physical process is the input human face. This system aims to provide a platform that allows any authorized person to enter or leave the premise automatically by using face detection and recognition technology. The system also provides the administrator with the access to the logs, wherein he/she would be able to access the details of the people entering or leaving the organisation along with the live video streaming so that there is no sneaking of any unauthorized person with any other authorized person. The administrator can also do registration on behalf of a new person who requires access to the premises for a restricted amount of time only as specified by the administrator.
APA, Harvard, Vancouver, ISO, and other styles
6

Dadmarz, Hamed H. "Identification of Information Security Management Factors." In Advances in Electronic Government, Digital Divide, and Regional Development, 160–74. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7086-8.ch009.

Full text
Abstract:
Considering the important role of information in organizations, an appropriate management is required for maintaining the security of the information. The information security management system is part of a general management system in an organization and based on the business risk approach aims to establish, implement, use, monitor, revise, maintain, and improve security that leads to the protection of information and minimizes unauthorized access. The main objective of this chapter is to identify factors and indicators of information security based on the information management system. For this purpose, after reviewing the literature and having opinions of 30 experts, a conceptual framework for public organizations is proposed that includes information security management factors such as financial, technical, operation and communication, human resources, data and information classification, environmental and physical, and managerial.
APA, Harvard, Vancouver, ISO, and other styles
7

Shaqrah, Amin A., and Talal Noor. "A Conceptual Framework for an Extension Access Control Models in Saudi Arabia Healthcare Systems." In Data Analytics in Medicine, 182–93. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1204-3.ch010.

Full text
Abstract:
This article aims to develop an extension access control models framework in Saudi Arabian healthcare systems. The conceptual framework acts as an ascendency structure to organize and support the efforts of several health care standards which reflect on the coherent of confidentiality; integrity; and availability triads in order to achieve the strategic business objectives of Saudi Arabian healthcare institutions. It is considered to be three common access control models developed by ACM institute and extended to other criteria identified by the National Institute of Standards and Technology. While literature explains that an easy-to-use access control model can lead to success healthcare system, understanding the extension of access control systems is vital for Saudi Arabian healthcare institutions to protect resources against unauthorized use. This article has taken a step in this direction.
APA, Harvard, Vancouver, ISO, and other styles
8

Mazid, Mohammed M., A. B. M. Shawkat Ali, and Kevin S. Tickle. "Intrusion Detection Using Machine Learning." In Dynamic and Advanced Data Mining for Progressing Technological Development, 70–107. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-908-3.ch005.

Full text
Abstract:
Intrusion detection has received enormous attention from the beginning of computer network technology. It is the task of detecting attacks against a network and its resources. To detect and counteract any unauthorized activity, it is desirable for network and system administrators to monitor the activities in their network. Over the last few years a number of intrusion detection systems have been developed and are in use for commercial and academic institutes. But still there have some challenges to be solved. This chapter will provide the review, demonstration and future direction on intrusion detection. The authors’ emphasis on Intrusion Detection is various kinds of rule based techniques. The research aims are also to summarize the effectiveness and limitation of intrusion detection technologies in the medical diagnosis, control and model identification in engineering, decision making in marketing and finance, web and text mining, and some other research areas.
APA, Harvard, Vancouver, ISO, and other styles
9

Karydi, Dimitra, and Ioannis Karydis. "Greek Copyright Law Framework for Musical Databases and Academic Research Use." In Advances in Multimedia and Interactive Technologies, 278–94. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0270-8.ch013.

Full text
Abstract:
Music Information Research (MIR) aims at producing Information Retrieval and Data Mining methods that when applied to musical data will allow for the support of creative and consuming users' needs. Accordingly, the most basic requirement of MIR is the need to test its methods on real musical data to ensure their efficiency. Original musical works are protected under Greek Copyright Law. Databases are also offered copyright protection as well as sui generis protection (‘database right'). Accordingly, creators are given exclusive rights over their respective creations while third parties are excluded from unauthorized uses of these creations. A lawful use of a musical work/a database is achieved by either obtaining permission from the copyright owner/database right owner or by relying on exceptions/limitations prescribed by law. Greek legislation provides for certain limitations that warrant uses of a work, otherwise deemed copyright/database right infringing. It is debatable to what extent these limitations can be helpful for academic research purposes focusing on musical databases.
APA, Harvard, Vancouver, ISO, and other styles
10

Omar, Marwan. "Insider Threats." In New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 162–72. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8345-7.ch009.

Full text
Abstract:
Malicious insiders are posing unique security challenges to organizations due to their knowledge, capabilities, and authorized access to information systems. Data theft and IT sabotage are two of the most recurring themes among crimes committed by malicious insiders. This paper aims to investigate the scale and scope of malicious insider risks and explore the impact of such threats on business operations. Organizations need to implement a multi layered defensive approaches to combat insider risks; safeguarding sensitive business information from malicious insiders require firstly, an effective security policy that communicates consequences of stealing or leaking confidential information in an unauthorized manner. Secondly, logging and monitoring employee activity is essential in detecting and controlling system vulnerabilities to malicious insiders. Thirdly, conducting periodic and consistent insider vulnerability assessments is critical to identifying any gaps in security controls and preventing insiders from exploiting them. And lastly, but certainly not least, taking extra caution with privileged users is important to proactively protecting information infrastructure from insider risks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Unauthorised aids"

1

Costovici (Mema), Denisa-Atena. "Ethics in Cyberspace – Dangers and Threats." In 2nd International Conference Global Ethics - Key of Sustainability (GEKoS). LUMEN Publishing House, 2021. http://dx.doi.org/10.18662/lumproc/gekos2021/6.

Full text
Abstract:
Rapid technology development and easy access to virtual space was directly proportional to the proliferation of multiple categories of network users and consumers. This contemporary reality has contributed to the emergence of the illusion of unrestricted accessibility of the online environment and the permissiveness of expression “no matter what”. The cyberspace draws a thin line between freedom of expression and violation of behavioural norms toward others. In order to mitigate the behaviours that transcend ethical boundaries, a series of basic conditions of use and restrictions have been legislated (mainly crimes related to threats and illegal content shared in the virtual world) which do not include all the situations encountered in practice. Given the cyberspace dimension, prevalent in most civilized areas of the planet, as a means and method of intercultural communication, ethical standards should be standardized and applied uniformly. This research paper is an attempt to objectively address the issues of standards and ethical values on the Web, with reference to cyber terrorism, groups of organized crime, hacktivism and states’ implication and responsibility. The main hypothesis of the research emphasizes that the information society requires the creation and enforcement of new laws, because it coexists in a completely new environment - the Network. Referring to the Network links, it is a fact that it cannot be kept safer against unauthorized access, without the application of adequate security measures and techniques. This research paper aims to shed the light on the dangers and threats that challenges the information society thought cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
2

Matúš, Peter, and Matúš Materna. "Approaches of chosen air navigation services providers to UAV integration into air traffic control systems." In Práce a štúdie. University of Zilina, 2021. http://dx.doi.org/10.26552/pas.z.2021.2.26.

Full text
Abstract:
In this article are approaches of Air Navigation Services (ANS) providers in chosen countries to UAV integration into Air Traffic Control Systems identified and described. Firstly we made a synpaper of theoretical information about ANS and UAV. Product of ANS providers has 11 parts. For UAV traffic control and management are important ATC, CNS, AIS, MET, ATFCM and ASM services. The volume of ANS provided depends on UAV operation development in the country, and on the level of integration of UAV into ATC systems. The biggest problem of UAV operation is the risk of collision with piloted aircraft, and potential threat of people and property on the ground. The biggest risk is during UAV operation close to airports, because there are many aircrafts flying in low altitudes (after take-off and on approach to landing). The consequences of collision in this altitudes in the most serious. Because of this, 4 ways to detect and 2 ways to mitigate an unauthorized UAV close to airport are currently in use. Various combinations of UAV detection and mitigation ways create complex airport UAV protection systems. Secondly, we chose 7 countries (Poland, Hungary, Germany, Great Britain, USA, India, and United Arab Emirates), and analysed their approaches to UAV integration. In all of the analysed countries can remote pilots use a mobile application, which allows them to create a flight plan, and receive all the information, necessary for the flight. Differences between these countries are for example if the permission in required for every UAV flight (in Hungary and India yes), if the ANS provider has an opportunity to watch UAV during flight (in Poland, India, and partly in Germany), if the UAV operation without direct visual contact between remote pilot and UAV is allowed (in Poland and Germany), and if are UAV operations included into airspace capacity management systems (in Poland, Hungary, Germany, and Great Britain). UAV integration process in next years will relate to development of communication systems between UAVs, between UAV and ATC, and between UAV and piloted aircraft. The process will also relate to development of technologies to avoid mid-air collisions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography