Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 8

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Enterprises using cranes, HDS platforms, other handling equipment, or pressure equipment in their activities are subject to registration with the Office of Technical Inspection (UDT), which is obliged to conduct inspection activities on them. Inspections of technical devices are aimed at checking their technical condition. Approximately 1.3 million technical devices are currently subject to UDT supervision in Poland. Annually, UDT inspectors carry out over 1 million tests of technical devices, and the activities carried out by UDT translate into a constant reduction in the accident rate. All this takes place in conditions that require continuous work planning and scheduling. This article aims to present and discuss the use of open-source solutions for planning the work of teams carrying out inspection activities, along with the concept of their use.
EN
The article discusses a multi-criteria comparative analysis of GIS class computer systems using the Pareto method . Referring to this problem, to find a GIS system (a compromise solution) that would be acceptable for each decision criterion, to make a Pareto optimal decision, multi-criteria optimization was obligatory. To find the mentioned optimum (the Pareto optimum), it is necessary for the decision maker to make a choice concerning the set of admissible decision solutions. Here, a matrix of criteria constructed by the authors is available, filled in with appropriate weights by field experts. This structure is very useful when evaluating the admissible solutions of the resulting algorithm. The space of acceptable solutions in the considered problem task is a set of systems, limited to their eighteen instances, which meet the criterion of completeness of all data required in the conducted research. The selected criteria are the most widely used and most accepted in the environments that systems of this class use daily.
EN
The article discusses the methodology of comparative analysis of GIS class computer systems using the current elements of taxonomy and classification theory. Eighteen selected GIS class systems that meet the criterion of completeness of all data required in the conducted research were fully analyzed. The proper comparative characteristics were preceded by the recognition of the market situation in terms of the availability of GIS systems. Eight thematic groups of criteria were used in the research, based on which the selection of GIS solutions for comparison was carried out. The adopted system selection criteria carry out the selection of objects in a binary manner. The chosen rules of classifying the system into a set of objects for comparison covered the issue of the availability of the required information. Due to the characteristics carried out, this information was obligatory, because a full set of data is required, which will allow for a comprehensive and factual comparison, based on which a given product (GIS system) can be indicated to the consumer with full responsibility. The set of features and comparative criteria was created based on own experience and numerous consultations with specialists and field experts. The selected criteria are the most widely used and most accepted in the environments that systems of this class use daily. Both the functional scope (features, functions, properties, advantages and disadvantages) as well as the degree of fulfillment of subsequent criteria by the considered systems were determined and described.
4
EN
The article discusses the methodology of comparative analysis of GIS class computer systems using the AHP method. Eighteen selected GIS systems that meet the criterion of completeness of all data required in the research were fully analysed. The proper comparative features were preceded by the recognition of the market situation in terms of the availability of GIS systems. Eight thematic groups of criteria were used in the research, on the basis of which GIS solutions were selected for comparison. The adopted system selection criteria carry out the selection of objects in a binary manner. The set of features and comparative criteria was created on the basis of our own experience and numerous consultations with specialists and field experts. The selected criteria are the most commonly used and most commonly accepted in the environments that systems of this class use on a daily basis. Both the functional scope (features, functions, properties, advantages and disadvantages) and the degree of fulfillment of subsequent criteria by the considered systems were defined and described.
EN
The Statement of Applicability (SoA) is a mandatory document ISMS that you need to develop, prepare, and submit with your ISO 27001, and it is crucial in obtaining your ISO 27001 Risk Assessment and ISMS certification. According to ISO/IEC 27001, Information Security Management System is a collection of ‘that part of the general management system, based on the approach to business risk, to establish, implement, operate, monitor, review, maintain and improve information security. ISO/IEC 27001 specifies the requirements and implementation process for the Information Security Management System. However, implementing this standard without a good SoA document may prove impossible. The article presents a system model for the construction of SoA for ISMS and its certification following the ISO 27001 standard. This model aims to provide instruments for designing and generating an SoA document in relation to ISMS, covering all information processes in GIS. This model allows organizations to evaluate their current state of GIS information asset security implementation according to the best practices defined in ISO/IEC 27001. The proprietary model proposed in this article is assessed from a multi-stage perspective, which confirms that the proposed draft Statement of Use document makes a valuable and innovative contribution to information security management by considering the best practices in this field.
6
Content available Risk in GIS systems
EN
The development of information technologies, widespread access to the Internet, globalisation and the development of measurement technologies in geodesy, on the one hand, result in wide access to geographical, cartographic or geodetic data, and on the other hand, increase the level of risk of losing basic security attributes of these data. Risk management in GIS should be implemented at every stage of the GIS life cycle, which starts with the organising phase of a GIS and is expected to continue until the end of its life - decommissioning. It is important to remember that it is not enough to have a good analysis and assessment of adverse events and their consequences without precise, pre-developed methods of measuring and responding to risks in the form of various response plans. This article is an attempt to answer the questions: what should be understood by risk in GIS systems, how to measure it and how to proceed to manage it effectively and efficiently. The models and instruments presented, which have been developed on the basis of available literature and own research, point the way to effective risk management in GIS class systems.
EN
The purpose of this paper is to propose a way to measure security culture as a determinant of organizational safeguards for sensitive resources in GIS-class systems. Based on a critical analysis of the results of the risk estimation of sensitive resources in GIS, a variant of the model and then the methodology for measuring security culture was proposed, its basic elements were described, and then the criteria that should be met by each organizational safeguard, considered in the measurement of security culture, were identified and established. Based on the developed model of security culture measurement, methods for measuring this phenomenon in GIS from the perspective of the organizational safeguard system are indicated. Attention was focused on theoretical aspects and elements of best practice that indicate the feasibility of developing and applying a security culture model to measure security performance of GIS.
EN
This paper attempts to develop and characterize instruments and approaches to the problem of identification, protection and quality of information processed in GIS class systems. One of the issues that causes most problems in the process of identifying and valuing GIS resources for measuring security, quality and risk is the proper selection of methods, techniques and tools for collecting and compiling various types of data in relation to these resources. In the process of identifying and valuing GIS resources, there is no list of test methods and techniques „reserved” for GIS only. It uses all – quantitative, qualitative and mixed – approaches and methods used in various studies. When designing an appropriate set of methods, techniques and tools in the process of identifying and valuing GIS resources, it is also important to remember to collect only those data that are really necessary. Proposed methods, techniques and tools take into account all the features, characteristics and determinants of GIS resources necessary to measure their security, quality and risk. A set of GIS resource identification instruments has been proposed, the implementation of which will significantly contribute to an increase in the level of security, reliability and quality of these resources. The proposed elements of a set, which are theoretically justified, may be improved and the set may be extended to other elements of the security policy. Far-reaching flexibility is called for in the choice of methods, techniques and tools used to identify and value GIS resources.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.