نتایج جستجو برای: interdependent security

تعداد نتایج: 185170  

2005
Tridib Bandyopadhyay Varghese S. Jacob Srinivasan Raghunathan

Firms in a supply chain share information assets among them, and make use of inter-firm network connections to enable quick information sharing. Both of these approaches have significant implications when a security breach occurs. One, the interconnections may become conduits for security breach propagation. Two, shared information assets now become vulnerable at the owner as well as at the par...

2012
Joshua Letchford Yevgeniy Vorobeychik

We introduce a novel framework for computing optimal randomized security policies in networked domains which extends previous approaches in several ways. First, we extend previous linear programming techniques for Stackelberg security games to incorporate benefits and costs of arbitrary security configurations on individual assets. Second, we offer a principled model of failure cascades that al...

2011
G. Leventakis

The present paper introduces a comprehensive Transportation Security Risk Assessment Framework for assessing related risks and provides cohered contingency management procedures in interconnected, interdependent and heterogeneous transport networks. The proposed approach includes elements, methodological tools and approaches found in the literature, in addition to operational experience from th...

2013
John W. Bagby

Infrastructure challenges continue to drive considerable public policy debate. The nation’s economy relies very heavily on the combined provision of three critical infrastructures: energy, banking and finance, and information technology (IT). These three critical infrastructures are interconnected, interdependent and cross-cutting essential services to the whole economy. Indeed, the “incapacity...

2012
Wihem Arsac Annett Laube Henrik Plate

Service Providers using Service Oriented Architecture in order to deliver in-house services as well as on-demand and cloud services have to deal with two interdependent challenges: (1) to achieve, maintain and prove compliance with security requirements stemming from internal needs, 3rd party demands and international regulations and (2) to manage requirements, policies and security configurati...

2004
Howard Kunreuther Geoffrey Heal

The World Trade Center terrorist attacks of September 11 th have stimulated us to think about the challenges organizations face in dealing with low-probability events that have catastrophic consequences. More specifically, there are certain bad events that can only occur once. Death is the clearest example: an individual's death is irreversible and unrepeatable. With respect to firm behavior, b...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1391

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

Journal: :Information Systems Frontiers 2014
Fang Fang Manoj Parameswaran Xia Zhao Andrew B. Whinston

As organizations increasingly deploy Inter-organizational Information Systems (IOS), the interdependent security risk they add is a problem affecting market efficiency. Connected organizations become part of entire networks, and are subject to threats from the entire network; but members’ security profile information is private, members lack incentives to minimize impact on peers and are not ac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید