نتایج جستجو برای: incident
تعداد نتایج: 47330 فیلتر نتایج به سال:
A central part of the work in Incident Commands (ICs) deals with handling messages that contain relevant information. Classification schemes for messages can be exploited by command staff and assisting tools to support this work, given that a common understanding of the scheme is shared among participants. We present user studies on two such classifications, which imply some disagreement among ...
24 A cornerstone of effective institutional learning and accountability is the development, tracking, and analysis of informative performance measures. In a previous issue of Fire Management Today (“A New Look at Risk Management,” Winter 2011), a series of articles highlighted the importance of organizational safety and risk management and the challenges of balancing safety, efficiency, and eff...
A honeynet is a research tool consisting of a network specifically designed for the purpose of being compromised, with control mechanisms that prevent this network from being used as a base for launching attacks against other networks. Once compromised, the honeynet can be used to observe the intruders’ activities, collect tools and determine new trends in network attacks. In this paper we disc...
A mass casualty incident (MCI) is that which requires a response beyond standard deployment. These can result from natural or artificial events. Casualties can present in peacetime or be evacuated from battle fields. Mass casualty management in most military health facilities in developing countries is not optimal. There are challenges occasioned by dearth of trained, specialized manpower, lack...
The contents of this report reflect the views of the author who is responsible for the facts and the accuracy of the data presented herein. The contents do not necessarily reflect the official views or policies of the Maryland State Highway Administration. This report does not constitute a standard, specification, or regulation. To improve traffic conditions on major highways plagued by non-rec...
We examine a well known confidentiality requirement called noninterference and argue that manysystems do not meet this requirement despite maintaining the privacy of its users. We discussa weaker requirement called incident-insensitive noninterference that captures why these systemsmaintain the privacy of its users while possibly not satisfying noninterference. We extend thisreq...
This paper proposes mathematical programming models with probabilistic constraints in order to address incident response and resource allocation problems for the planning of traffic incident management operations. For the incident response planning, we introduce the concept of quality of service during a potential incident to give the decision-maker the flexibility to determine the optimal poli...
The adoption of IT Infrastructure Library (ITIL) framework is a challenging task for many IT service provider organizations. Many government organizations in Finland have also started to use ITIL and need help in configuring tools and defining processes. The research problem of this study is: What types of challenges exist in the IT service provider’s customer support? The main contribution of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید