Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Solange Ghernaouti"'
Autor:
Leonore Cellier, Solange Ghernaouti
Publikováno v:
Jusletter, pp. 1-30
La qualification de l’application de traçage de contacts « SwissCovid » en dispositif médical, annoncée par le Conseil fédéral, devrait contribuer d’une part à garantir sa qualité, sa sûreté et son efficacité et d’autre part, à bâ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e25f79ad46911feffd992c821b3e9ff2
https://serval.unil.ch/notice/serval:BIB_31A779CBC475
https://serval.unil.ch/notice/serval:BIB_31A779CBC475
Autor:
Solange Ghernaouti, Vanessa Hanifa, Maxime Stauffer, Anna Leander, Jérôme Duberry, Abhimanyu George Jain, Himanshu Verma, Alexandre Dormeier Freire, Jamie Berryhill, Sabrya Hamidi, Moritz Büchi, Yanina Welp, Olivier Leclère, Nathan Stern, Diego Garzia, Jasmine Lorenzini, Aljaz Kosmerlj
Publikováno v:
SSRN Electronic Journal.
When discussing the role of digital technologies in pluralist democracies, artificial intelligence (AI) is probably the most controversial. This technology triggers the greatest hopes (e.g. AI can help making sense out of millions of comments) and at
Autor:
Solange Ghernaouti
Comprendre, prévenir et réagir à la cybercriminalité sont des enjeux majeurs de nos sociétés. De plus en plus de formations en droit, en management, en géopolitique proposent des cursus ou des cours spécialisés.Les étudiants trouveront dans
Autor:
Solange Ghernaouti
Ce livre apporte des réponses concrètes pour maîtriser les risques liés au numérique et à la cybercriminalité.Il constitue un outil d'aide à la compréhension des menaces et des besoins de sécurité des systèmes d'information et des réseau
Publikováno v:
CSNet
This article focuses on the importance of information sharing practices for capacity building competences in the field of cybersecurity.It analyses needs and constraints of information sharing to produce security and cyberresilience that promote trus
Autor:
Solange Ghernaouti, Leonore Cellier
Publikováno v:
HealthCom
The use of electronic medical records in healthcare institutions is becoming more widespread, bringing benefits in terms of quality, security and efficiency of patient care. The development of e-health, i.e. the integrated use of information and comm
Autor:
Solange Ghernaouti, Bastien Wanner
Publikováno v:
Cybersecurity Best Practices ISBN: 9783658216542
The development and deployment of a cybersecurity culture and best practices among all stakeholders are a crucial issue for the information society. Based on two innovative initiatives in the field of education and research issued by the University o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::47ea5c31f8008d62f40657b32d5aa72a
https://doi.org/10.1007/978-3-658-21655-9_38
https://doi.org/10.1007/978-3-658-21655-9_38
Publikováno v:
Cybersecurity Best Practices ISBN: 9783658216542
For states and societies to increase international cyber-realm stability, they must first develop capacities to recognize the relevant risks. The relation between capacity building and cybersecurity has been recognized by a wide range of internationa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ebddbb08a9b25f91b39c79127b923689
https://doi.org/10.1007/978-3-658-21655-9_37
https://doi.org/10.1007/978-3-658-21655-9_37
Autor:
Solange Ghernaouti, Arnaud Dufour
Publikováno v:
Que sais-je ? ISBN: 9782130795001
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5bbdf684d1e1321d6535edde27e20565
https://doi.org/10.3917/puf.ghern.2017.01
https://doi.org/10.3917/puf.ghern.2017.01
Publikováno v:
Critical Information Infrastructures Security ISBN: 9783319713670
CRITIS
CRITIS
Various measures have been proposed to mitigate the underinvestment problem in cybersecurity. Investment models have theoretically demonstrated the potential application of security information sharing (SIS) to Critical Infrastructure Protection (CIP
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c44ab0051790a06cdbac6e330671867
https://doi.org/10.1007/978-3-319-71368-7_13
https://doi.org/10.1007/978-3-319-71368-7_13