Informaatioteknologian tiedekunta: Recent submissions
Now showing items 66-70 of 2258
-
The Use of Neutralisation Techniques in the Context of Responsible Online Shopping : A Latent Profile Analysis
(University of Maribor Press, 2024)Although many consumers use various neutralisation techniques to eliminate the anticipated guilt that results from not engaging in responsible consumption, the use of such techniques in the context of responsible online ... -
Spare visual capacity and driver inattention in dynamic car following scenarios
(Elsevier, 2024)Drivers often look away from the forward roadway. However, this does not necessarily mean that they are inattentive, as they might be utilizing their spare visual capacity (SVC). Because of the safety–critical risks ... -
The Importance of Cybersecurity Governance Model in Operational Technology Environments
(Academic Conferences International Ltd, 2024)There is a common will to unify regulation in the Western world regarding overall security, including cybersecurity. European cyber security regulations aim to create a foundation and guidelines for international standards ... -
Cognitive Security in a Changing World : Citizen Perceptions During Finland's NATO Joining Process
(Academic Conferences International Ltd, 2024)Contemporary conflicts are multifaceted and no longer fit the traditional war-and-peace dichotomy due to digital dimensions and the role of the human mind. The concept of warfare has transformed significantly: it's no ... -
Utilizing Vector Database Management Systems in Cyber Security
(Academic Conferences International Ltd, 2024)The rising popularity of phenomena such as ubiquitous computing and IoT poses increasingly high demands for data management, and it is not uncommon that database management systems (DBMS) must be capable of reading and ...