The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The complexity of contemporary external action missions is increasing with a growing number of civilian and other non-military actors operating in a shared environment. There are currently not sufficient capabilities for civil-military cooperation in place which hinders operational effectiveness and the full exploitation of the information sharing potential. We contribute to the assessment of information...
Cyber has been on NATO’s agenda since 2002, with clear mandates and taskings from Summits and Ministerials on how to develop its capacity in the area. Yet, despite an increasingly cyber-dependent world and visible progress on the Alliance’s civilian side, NATO has had no visible track record on how this change in the way the world does business has had an impact on its key military structure and enabler...
Utility networks are part of every nation's critical infrastructure, and their protection is now seen as a high priority objective. In this paper, we propose a threat awareness architecture for critical infrastructures, which we believe will raise security awareness and increase resilience in utility networks. We first describe an investigation of trends and threats that may impose security risks...
Recent developments under the term Smart Grid change how users consume electricity and interact with the power grid. Smart metering and energy management are developments that transform the yet passive energy consumer to a participant that is actively involved in the energy market by using variable energy tariffs or by demand-response services. But such functionality demands a platform that integrates...
Cities are seeking new innovative approaches to deliver public services by involving their community in a co-creation process. The main innovation of CLIPS is to provide a usable methodology with a toolkit that enables civil servants and other external stakeholders to collaborate in new designs and delivery of services, starting from a set of basic building blocks available in the cloud. This offers...
Deterrence and rational choice calculus theories can regulate or motivate employees' compliance with information systems security policy (ISSP). However, the two well-developed theories may not fully induce compliance behavior of ISSP given the growing trend of IS security violation in China. Deterrence and rational choice calculus employ an assumption of general awareness of ISSP to address compliance...
The Networked Society introduces many challenges but even more opportunities for our industry. When everyone and everything is connected, the demand on e.g. capacity, coverage, flexibility and quality on the networks will increase as will that on security, data protection and privacy.
The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery and security against crime. Nevertheless, uncertainty on costs, timescale and functionalities have...
At the end of the criminal intelligence analysis process there are relatively well established and understood approaches to explicit externalisation and representation of thought that include theories of argumentation, narrative and hybrid approaches that include both of these. However the focus of this paper is on the little understood area of how to support users in the process of arriving at such...
The location security in current location-based services (LBS) meets threat where mobile users have to report their actual location knowledge to the LBS provider in order to get their desired POI, (Points of Interests). We consider location privacy techniques that work using obfuscation operators and provide different information services using different cloaking techniques without any trusted components...
This paper addresses dynamic security management in air navigation as a distributed collaborative agent problem and identifies a modelling approach for the implementation of a situation management capability in ATM. The traditional focus of aviation security is on preventive security aircraft and airport measures. When it comes to air navigation, the concept and scope of security is evolving. This...
This paper is meant to provide an overview over SWIM and its context from a security point of view. Rather than describing everything in detail it refers to the relevant SJU deliverables where possible and tries to provide the "glue" between the different pieces of information.
The Mediterranean ports play a crucial role in the long-term economic growth of the local and regional communities providing numerous maritime services. They are situated close to the international trade routes and are the main hubs with the necessary infrastructure for the accommodation of transhipment cargo, connecting with all regional ports. Thus, the protection of the ports' infrastructure may...
In recent years increasing shares of intermittent renewable energy sources (RES) have changed the usual pattern of electricity markets especially in Western Europe. The fact that these must run capacities are offered at Zero costs over a large time per year have led to the argumentation that fossile plants like CCGT or coal power stations become economically less attractive because of the lower fullload...
The liberalisation of European energy markets and their integration into a single market are under way. However, the energy environment of the European Union as well as its own internal situation have undergone profound changes. The energy security of member states is therefore an important issue that should be examined. The energy security of member states is therefore an important issue that should...
Air Traffic Management (ATM) has embraced the concept of System Wide Information Management (SWIM) as the means to improve data exchange between various applications in different domains such as flight data management, weather and aeronautical information management. Even though SWIM definitions in the US and Europe put emphasis at different aspects in their NextGen and SESAR (Single European Sky...
Technical progress in information and communication technologies, increased competition through alternative trading systems, and regulatory actions have significantly changed the trading landscape during the last decade. In this paper, we first provide a conceptual framework to analyze market quality. The framework comprises of external factors, the internal market structure, and specific quantifiable...
As new security technologies are introduced in public transportation systems, their accessibility for the disabled needs to be evaluated. We analyze the usability of the passenger process in airports alongside the security risk, both from the point of view of the disabled and elderly passengers. A process-centered analytical framework has been developed. The methodology is to identify different user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.