Spelling suggestions: "subject:"2security bplanning"" "subject:"2security deplanning""
1 |
Security and Planning: A Canadian Case Study AnalysisBartolo, Giuseppe January 2012 (has links)
This thesis explores security planning policy in Canada. It provides a historical overview of the securing of cities from the threat of mass violence and demonstrates how violence affects urban populations and the form and function of cities as a result. A purposefully stampeded case study approach is used to determine the state of security planning in Canada and compare selected cities to a benchmark case of Washington D.C. This thesis contributes to the understanding of security planning within Canada in the post September 11, 2001 world and offers insight into strategies used in defense of urban areas The review of literature and discussion sections also provide a critical assessment of security planning which has occurred in the time following WWII, the IRA crisis in Britain the FLQ crisis in Quebec and the terrorist attacks in London and New York in the past decade. Research questions are answered through a case study and literature analysis approach. Results demonstrate that American responses to the threat of terrorism have motivated various governmental agencies to create policy and physical responses to respond to the threat of terrorism. This thesis concludes that Canada, in comparison to the United States and other areas has done little to secure itself against terrorist attack and more specifically that urban planning and municipalities in Canada have done little to integrate anti-terrorism security planning into their planning policy. It is argued that a lack of federal mandates, a lack of motivation and education in planning spheres as well as funding issues are contributing factors.
|
2 |
Network Security Planning for New Generation Network Service ProvidersHuang, Shao-Chuan 25 July 2009 (has links)
The internet network and e- commerce become more and more popular currently.
Various applications of the network and services already become the indispensable important tools to most enterprises, such as the application of e mail , to establish the entry website of company, installing server to provide employees with information sharing, etc..
As the internet network providing the convenience and business opportunity , as well as e commerce be further developed, all of such IT applications created unbelievable values to enterprises. However, the security of the internet network becomes an endless issues. The external attacks , such as the electronic virus , the worm, special Lip river depends on the hobbyhorse ( Trojan Horse), procedure of back door, spy's software, the network hacker's depend event and activities have never been stopped.
From which, the enterprises suffered with great losses. Therefore, the IT people of company are requested to develop and installed a suitable protection system to guarantee the security of company information assets.
The case company specified in my paper is the biggest ISP in Taiwan. It owns more than three millions of customers. The company also provides its over 20,000 staffs with internal network and management network equipment for conducting routine jobs. The network and information security concerns are more complicated than that of regular commercial companies.
This research will discuss the management & Network Security planning of this company from the structure and system views. Not only to create potential benefit of rigid information Security for existing network, but also to offer IT planning people with valuable reference as they are performing the related works.
|
3 |
Security and Planning: A Canadian Case Study AnalysisBartolo, Giuseppe January 2012 (has links)
This thesis explores security planning policy in Canada. It provides a historical overview of the securing of cities from the threat of mass violence and demonstrates how violence affects urban populations and the form and function of cities as a result. A purposefully stampeded case study approach is used to determine the state of security planning in Canada and compare selected cities to a benchmark case of Washington D.C. This thesis contributes to the understanding of security planning within Canada in the post September 11, 2001 world and offers insight into strategies used in defense of urban areas The review of literature and discussion sections also provide a critical assessment of security planning which has occurred in the time following WWII, the IRA crisis in Britain the FLQ crisis in Quebec and the terrorist attacks in London and New York in the past decade. Research questions are answered through a case study and literature analysis approach. Results demonstrate that American responses to the threat of terrorism have motivated various governmental agencies to create policy and physical responses to respond to the threat of terrorism. This thesis concludes that Canada, in comparison to the United States and other areas has done little to secure itself against terrorist attack and more specifically that urban planning and municipalities in Canada have done little to integrate anti-terrorism security planning into their planning policy. It is argued that a lack of federal mandates, a lack of motivation and education in planning spheres as well as funding issues are contributing factors.
|
4 |
Dynamic Game-Theoretic Models to Determine the Value of Intrusion Detection Systems in the Face of UncertaintyMoured, David Paul 27 January 2015 (has links)
Firms lose millions of dollars every year to cyber-attacks and the risk to these companies is growing exponentially. The threat to monetary and intellectual property has made Information Technology (IT) security management a critical challenge to firms. Security devices, including Intrusion Detections Systems (IDS), are commonly used to help protect these firms from malicious users by identifying the presence of malicious network traffic. However, the actual value of these devices remains uncertain among the IT security community because of the costs associated with the implementation of different monitoring strategies that determine when to inspect potentially malicious traffic and the costs associated with false positive and negative errors. Game theoretic models have proven effective for determining the value of these devices under several conditions where firms and users are modeled as players. However, these models assume that both the firm and attacker have complete information about their opponent and lack the ability to account for more realistic situations where players have incomplete information regarding their opponent's payoffs. The proposed research develops an enhanced model that can be used for strategic decision making in IT security management where the firm is uncertain about the user's utility of intrusion. By using Harsanyi Transformation Analysis, the model provides the IT security research community with valuable insight into the value of IDS when the firm is uncertain of the incentives and payoffs available to users choosing to hack. Specifically, this dissertation considers two possible types of users with different utility for intrusion to gain further insights about the players' strategies. The firm's optimal strategy is to start the game with the expected value of the user's utility as an estimate. Under this strategy, the firm can determine the user's utility with certainty within one iteration of the game. After the first iteration, the game may be analyzed as a game of perfect information.
|
5 |
Managing IT Security In Organizations : A look at Physical and Administrative ControlsAsmah, Gilbert Yaw, Baruwa, Adebola Abdulrafiu January 2005 (has links)
Introduction Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control. Purpose Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls. Methods When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study. Conclusion Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.
|
6 |
Managing IT Security In Organizations : A look at Physical and Administrative ControlsAsmah, Gilbert Yaw, Baruwa, Adebola Abdulrafiu January 2005 (has links)
<p>Introduction</p><p>Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control.</p><p>Purpose</p><p>Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls.</p><p>Methods</p><p>When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study.</p><p>Conclusion</p><p>Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.</p>
|
7 |
Att inte bli iakttagen men ändå bli sedd : En studie om tjejers trygghet i det offentliga rummet och hur det kan planeras för trygga och jämställda miljöerAlcazar, Liza January 2018 (has links)
Abstract Making individuals feel safe in public space is an increasingly relevant issue in planning the city's public space. However, fear is not easy to explain or counteract as this is something that is highly subjective. Many urban planning projects are being carried out today focusing on creating safe and equal environments. Such a project is Frizon in Umeå municipality, which is a meeting place based on young girls' experience of security and gender equality.This study tries to create an understanding of how planners can work with girls' safety in the public space, as well as create an understanding of how places that are planned based on security and gender equality can be perceived.The study has been conducted through interviews, surveys and observations, in which young girls experience the city of Umeå and the meeting place Frizon has been the focus.The result shows that the city is primarily a place to hang out with friends and the places most used by the girls in the city are the central parts for shopping and food, but also some of the city's parks.Many of the girls who participated in the study feel insecure sometimes when in the city, but this is something that occurs mainly when they are alone. Hanging out with their friends is not just something they do for socializing, but this is also something that gives them a sense of security. The result also shows that Frizon is an appreciated place by many girls, but that the site partially feels somewhat unavailable during certain times of the day and year.
|
8 |
Trygghetsuppfattningar och könsnormativa beteenden : Unga mäns ideér och uppfattningar om trygghet på Ålidhem, UmeåJohansson, Mattias January 2018 (has links)
Abstract Feelings of safeness in public space differs a lot between the sexes, where women more often than men feel unsafe. But how do men relate to feelings of safeness in public spaces and how does unsafeness affect the relation between men and women? This study focusses on men’s behaviour towards women and how their behaviour changes during times of unsafeness, and how this behaviour affect´s men´s relationship with their romantic partners. The study is a case study and will focus on the city district Ålidhem in Umeå city, which reputation has suffered from the current image that local medias have projected. This case is interesting when it allows us to study how men in today´s society relate to problems with safeness in public space. The study´s result is based in six qualitative semi-structured interviews. the interviews were conducted with six young men in age 20-30 who had experience living in- or had prior experience living in the city district Ålidhem or had a relationship with a woman who had a similar experience. The interviews were later analysed through a narrative analysis method. The study´s result show that the men are more open with expressing their feelings of unsafeness and to talk about what types of factors that affect their mindset than previous studies show. These men sometimes felt that they got perceived as threatening elements in public spaces by unknown women, especially at night. This perception of the men as threatening elements sometimes caused the men to change their behaviour, like slowing down or taking other paths to their destination, to dampen the woman´s feeling of anxiety. The men themselves sometimes felt anxiety towards their romantic partner when they move in public spaces and they sometimes applied certain strategies to safeguard them. These strategies however weren’t a product of the men’s anxiety, but rather more often a product of the women´s. KEYWORDS: Safety in public space, Gender normative behaviour, Security planning
|
9 |
Food system analysis and the development of a system dynamics approach to improve food security for a vulnerable community in the Breede River Region, Western Cape Province, South AfricaRoos, Johanna Adriana 03 1900 (has links)
Thesis (MScEng)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: The current food system is failing to effectively serve the urban poor. The modernisation and globalisation of the food system solves one set of problems, regarding food security, but at the same time it results in the creation of other complex challenges. Technically the food system ensures adequate food availability on a macro scale, but the structure of the system contributes to the creation of food deserts. Food deserts are areas in which there is a lack of food retail outlets where affordable, nutritious food is available. Communities living in these areas usually struggle to obtain a nutritious diet and the residents are characterised as poverty-stricken and of a poor nutritional status.
The aim of this research is to support local authorities in the management and strategic planning of community food security. The research was conducted in Avian Park, a low-income community in the Breede Valley of the Western Cape, South Africa. The food retail environment of Avian Park was investigated to determine the availability and accessibility of food in the community. Furthermore, a system dynamics model was developed to identify those areas in the food system which need attention, in order to achieve greater food security.
In addition strategies are suggested to improve community food security; specifically for Avian Park. These research outcomes, however, also serve as a general guideline for managing food security in low-income communities more effectively. / AFRIKAANSE OPSOMMING: Die huidige voedsel sisteem slaag nie daarin om arm mense in stede effektief te dien nie. Die ontwikkeling en globalisering van die voedsel sisteem los een stel probleme rondom voedselsekerheid op, maar skep terselfdetyd ander komplekse uitdagings. Tegnies verseker die voedsel sisteem die beskikbaarheid van genoegsame voedsel op 'n makro skaal, maar die struktuur van die sisteem dra by tot die ontwikkeling van “food deserts.” “Food deserts” is areas waar daar „n tekort aan voedsel kleinhandel afsetpunte is waar daar bekostigbare, voedsame kos beskikbaar is. Gemeenskappe wat in hieride areas leef sukkel gewoonlik om „n voedsame dieet te bekom en die inwoners word geken aan armoede en 'n ongewenste voedingstatus.
Die doel van hierdie navorsing is om plaaslike owerhede te ondersteun om gemeenskap voedselsekerheid meer efektief te bestuur. Die navorsing was in Avian Park, „n lae-inkomste gemeensakp in die Breede Vallei van die Wes-Kaap, Suid-Afrika uitgevoer. Die voedsel kleinhandel omgewing van Avian Park is ondersoek om die voedsel beskikbaarheid en toegangklikheid te bepaal. Verder is „n “system dynamics” model ontwikkel om die areas in die voeldsel sisteem wat aandag verg, ten einde voedselsekuriteit te bekom, te identifiseer.
Ten slotte word daar strategieë voorgestel om gemeenskap voeldselsekuriteit in Avian Park te verbeter. Hierdie navorsingsuitkomste dien egter ook as algemene riglyne om lae inkomste gemeenskappe se voedselsekerheid meer effektief te bestuur.
|
10 |
Vědomosti členů ZZS JčK o problematice medicíny katastrof a hromadných neštěstí / Knowledge of members of the emergency services of South Bohemia about issue of Disaster Medicine and mass disasters.VAŇATA, David January 2016 (has links)
Mass accidents and catastrophes do not occur on a daily scale, they occur irregularly and unpredictably and always have devastating consequences that negatively affect the society or nature. They are usually accompanied by a large number of casualties or damage whose removal cannot be managed using usual local means. To cope with such events, it is necessary to have a professionally trained staff in the Integrated Rescue System and an appropriate coordination of rescue and liquidation. In recent years, there has been an increase of such incidents which have resulted in a mass disability of people. The events of recent days have brought a series of terrorist acts, for example in Paris or Brusselles, of suicide bombings that claimed 130 dead and numerous wounded. These acts, which are associated with the current migration crisis on the European continent, cause considerable tension in the society and evoke questions like whether the readiness of IRS to eliminate the consequences of such events is sufficient. Due to these facts, the thesis tries to find out what knowledge the members of the emergency medical service in South Bohemia have on the issue of disaster medicine and mass accidents. The theoretical part of the thesis titled Knowledge of the Members of the Emergency Medical Service in SB on Disaster Medicine and Mass Accidents defines disaster medicine and all tasks and subjects it deals with. It also mentions the Integrated Rescue System including its basic and other components, its powers and organizational structure resulting from the legislation. Furthermore, it describes the security system and planning, specifically crisis and emergency planning, up to the individual partial plans related to this issue. Finally, the thesis deals with the organization of emergencies with a mass disability of people and a detailed procedure of medical emergency regarding the sorting and evacuation of the wounded. The aim of this thesis is to map the knowledge of the members of the emergency medical service in SB, which concern the issue of disaster medicine and mass accidents, where the level of knowledge is later analyzed to confirm or disprove the hypothesis that the knowledge of the SB IRS members corresponds with a normal distribution frequency. The practical part uses a quantitative method based on questionnaires completed anonymously, where 50 questionnaires were selected randomly as a statistical set. The survey focuses on a group of emergency workers in South Bohemia. The meetings with them were organized during previous practical studies. The results of the survey were analyzed using statistical investigation. The statistical investigation used the methods of scaling, measurement of the absolute, relative and cumulative frequency. Later on, the empirical parametres used for non-parametric testing were counted. The results of this pilot study indicate the current state of the knowledge of the SB IRS members on disaster medicine and mass accidents. The thesis will be a beneficial study material for current and future paramedics and students of the field of population protection.
|
Page generated in 0.056 seconds