Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Jeremy Busby"'
Autor:
Antonios Gouglidis, Mark Rouncefield, Karen Hough, Tom Anderson, David Hutchison, Jeremy Busby
Publikováno v:
Computer Communications and Networks ISBN: 9783030446840
Guide to Disaster-Resilient Communication Networks
Guide to Disaster-Resilient Communication Networks
Human and organizational issues are able to create both vulnerabilities and resilience to threats. In this chapter, we investigate human and organizational factors, conducted through ethnographic studies of operators and sets of interviews with staff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b98a13f92b30b1991eb794f8cf95fd7a
https://doi.org/10.1007/978-3-030-44685-7_32
https://doi.org/10.1007/978-3-030-44685-7_32
Publikováno v:
Risk Analysis. 37:1298-1314
Industrial control systems increasingly use standard communication protocols and are increasingly connected to public networks—creating substantial cybersecurity risks, especially when used in critical infrastructures such as electricity and water
Autor:
Jeremy Busby
The primary concern in the resource-based view of the firm has been competition. For many firms, however, the relevant ecology includes parasites as well as competitors – notably product counterfeiters who parasitically exploit a firm's reputationa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f64447c2d55314065e2469d3d8d76652
https://doi.org/10.1016/j.ejor.2018.12.039
https://doi.org/10.1016/j.ejor.2018.12.039
Publikováno v:
European Journal of Operational Research. 251:1029-1042
A characteristic aspect of risks in a complex, modern society is the nature and degree of the public response – sometimes significantly at variance with objective assessments of risk. A large part of the risk management task involves anticipating,
Publikováno v:
ABAC@CODASPY
Access control offers mechanisms to control and limit the actions or operations that are performed by a user on a set of resources in a system. Many access control models exist that are able to support this basic requirement. One of the properties ex
The counterfeiting of safety critical products such as pharmaceuticals is a significant risk to public safety, but the literature suggests that much of the causation of counterfeiting is endogenous: the decisions of legitimate producers and consumers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c4da5564883fee4e57a289be7473fcef
https://doi.org/10.1080/13669877.2015.1121903
https://doi.org/10.1080/13669877.2015.1121903
Autor:
Jeremy Busby, Alison Collins
Publikováno v:
Risk Analysis. 34:1738-1752
In the same way that individuals’ risk perceptions can influence how they behave toward risks, how organizational members make sense of risk controls is an important influence on how they apply and maintain such controls. In this article, we descri
Autor:
Marian Iszatt-White, Jeremy Busby
Publikováno v:
Journal of Contingencies and Crisis Management. 22:69-80
The literature on ‘high reliability organizations’ demonstrates how central reliability is to organizing in certain highly demanding settings. In more mundane settings, however, where there may not be a dominant type of catastrophic failure, the
This 15th Edition of the International Conference on Materials Degradation in Light Water Reactors focuses on subject areas critical to the safe and efficient running of nuclear reactor systems through the exchange and discussion of reseach results a
Publikováno v:
SMC
It becomes essential when reasoning about the security risks to critical utilities such electrical power and water distribution to recognize that the interests of producers and consumers do not fully coincide. They may have incentives to behave strat