Searched for: subject%3A%22NO%255C%2B%255C-%255C%2BNetworked%255C%2BOrganisations%22
(81 - 100 of 202)
- document
-
Bouma, H. (author), Baan, J. (author), ter Haar, F.B. (author), Eendebak, P.T. (author), den Hollander, R.J.M. (author), Burghouts, G.J. (author), Wijn, R. (author), van den Broek, S.P. (author), van Rest, J.H.C. (author)In the security domain, cameras are important to assess critical situations. Apart from fixed surveillance cameras we observe an increasing number of sensors on mobile platforms, such as drones, vehicles and persons. Mobile cameras allow rapid and local deployment, enabling many novel applications and effects, such as the reduction of violence...conference paper 2015
- document
-
Schraagen, J.M.C. (author), van Buul-Besseling, K. (author), van Ruijven, T.W.J. (author), de Koning, L. (author)Met de introductie van de netcentrische werkwijze in de crisisbeheersing en rampenbestrijding werd beoogd versnelling te brengen in het proces Beeldvorming, Oordeelsvorming en Besluitvorming (het BOB-proces). De kern daarbij was door middel van het ondersteunen bij het snel ontsluiten en toegankelijk maken van informatie en te komen tot een...report 2015
- document
-
Luiijf, H.A.M. (author)Nederland heeft drie handreikingen overhandigd aan de deelnemende landen en private partijen die deelnamen aan de Global Conference on GlobalSpace 2015. Hieronder een korte beschrijving en verwijzingen naar de handreikingenarticle 2015
- document
-
den Hollander, R.J.M. (author), Bouma, H. (author), Baan, J. (author), Eendebak, P.T. (author), van Rest, J.H.C. (author)Person tracking across non-overlapping cameras and other types of video analytics benefit from spatial calibration information that allows an estimation of the distance between cameras and a relation between pixel coordinates and world coordinates within a camera. In a large environment with many cameras, or for frequent ad-hoc deployments of...conference paper 2015
- document
-
Klaver, M.H.A. (author), Luiijf, H.A.M. (author)Uitval of verstoring van vitale infrastructuren kan ernstige gevolgen hebben. De bescherming van Europese en nationale vitale infrastructuur vormt daarom een belangrijk onderdeel binnen het overheidsbeleid inzake Nationale Veiligheid. Onderlinge afhankelijkheden en gelijktijdig falen van vitale infrastructuren kan het risico versterken. Ter...article 2015
- document
-
Neef, R.M. (author), Streefkerk, J.W. (author), van Buul-Besseling, K. (author), Rijken, M. (author)D3.1 describes the core feature set of the COBACORE platform, the underlying assumptions and information elements, and introduces a number of interaction patterns. D3.1 is a guiding document that serves as a blueprint for the actual implementation of the COBACORE platform, and that can be used by other work packages to guide the implementation...report 2014
- document
-
Luiijf, H.A.M. (author)Advancements in information and communication technologies (ICT) inextricably bring new threats to the end-users and society. However, the last 40 years have shown that many of the same cyber security design and programming failures occur over and over again when a new ICT innovation and development cycle takes place. Unfortunately, this allows...bookPart 2014
- document
-
van den Homberg, M.J.C. (author), Posthumus, A.L. (author)Christian Aid, Cordaid, PVGS and Practical Action established a community-based early warning system for cross-border floods between India and Nepal in 45 Indian villages. The project will scale to 95 villages early 2016. The number of stakeholders and organizational levels of this system with four key elements (risk knowledge, monitoring and...conference paper 2014
- document
-
van den Homberg, M.J.C. (author), Neef, R.M. (author)Large scale natural and man-made disasters are complex events involving many stakeholders. Despite the structures the national and international humanitarian system provide, still many collaboration and information gaps between stakeholders, levels of operations and phases in the disaster management cycle occur. In the recovery phase,...conference paper 2014
- document
-
van den Homberg, M.J.C. (author), Meesters, K. (author), van der Walle, B. (author)The response to the Level 3 disaster of Typhoon Haiyan in the Philippines involved a large number of organizations providing assistance and support. Coordination structures between a large variety of international and national organizations, the government and the military were established at the national, provincial and local levels. These...article 2014
- document
-
van Rest, J.H.C. (author), Boonstra, D. (author), Everts, M.H. (author), van Rijn, M. (author), van Paassen, R.J.G. (author)The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these privacy risks. In this vision paper, we...bookPart 2014
- document
-
Klaver, M.H.A. (author), Boltjes, B. (author), Croom-Jonson, S. (author), Jonat, F. (author), Çankaya, Y. (author)The rapidly evolving environment of Cyber threats against the NATO Alliance has necessitated a renewed focus on the development of Cyber Defence policy and capabilities. The NATO Modelling and Simulation Group is looking for ways to leverage Modelling and Simulation experience in research, analysis and training to assist the Cyber Defence...conference paper 2014
- document
-
Duijnhoven, H.L. (author), Buul-Besseling, K. (author), Vink, N. (author)Dit artikel bespreekt de samenhang tussen de werkvelden van fysieke en sociale veiligheid. Op basis van resultaten van een onderzoeksproject over multidisciplinaire samenwerking en informatiedeling in het veiligheidsdomein in Nederland beargumenteren we dat het niet realistisch is om te spreken van twee onafhankelijke werkvelden, maar dat het...article 2014
- document
-
Duijnhoven, H.L. (author), Neef, R.M. (author)In the last decades the concept ‘resilience’ has gained much ground in a wide variety of academic disciplines, including research on engineering, organizational performance, ecological science, psychology, economics, climate change, disaster management, (systems safety, security, and risk. Resilience seems to be the answer to a wide range of...article 2014
- document
-
Weimar, P.W.L. (author), Kerkkamp, J.S.F. (author), Wiel, R.A.N. (author), Meiller, P.P. (author), Bos, J.G.H. (author)With this book TNO provides an overview of topics related to Miniature Unmanned Aerial Vehicles (MUAVs). Both novices and experts may find this publication valuable. The Netherlands Organisation for Applied Scientific Research TNO conducts research on UAVs and MUAVs, see for example [1], on the basis of which this book was written.book 2014
- document
-
Luiijf, H.A.M. (author)Bij ontwikkelaars en gebruikers in de |CT-wereld staat veiligheid zelden bovenaan als het gaat om de belangrijkste producteigenschappen. Op de eerste plaats moet het gewoon werken.Vervolgens moet het zoveel mogelijk kunnen. En het mag natuurlijk niet te ingewikkeld zijn. Of het ook veilig is? Dat zaltoch wel? Nu tegenwoordig zo ongeveer alles en...article 2014
- document
-
Bouma, H. (author), van Rest, J.H.C. (author), Burghouts, G.J. (author), Schutte, K. (author), Baan, J. (author)To improve security in crowded environments, such as airports, shopping malls and railway stations, the number of surveillance cameras (CCTV) is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams can be observed. This makes it hard for an operator to be proactive. This paper gives...article 2014
- document
-
van Rest, J.H.C. (author), Roelofs, M.L. (author), van der Kleij, R. (author)Afwijkend gedrag biedt aanwijzingen voor het voorkomen van veiligheidsincidenten. Naar aanleiding van het onlangs verschenen TNO rapport Afwijkend gedrag wordt in dit artikel ingegaan op het waarom, het hoe en het wat van het gebruiken van kennis over afwijkend gedrag.article 2014
- document
-
Luiijf, H.A.M. (author)The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an elegant and simple definition. That definition...bookPart 2014
- document
-
Klaver, M.H.A. (author), van Buul, K. (author), Nieuwenhuijs, A.H. (author), Luiijf, H.A.M. (author)PREDICT has the objective to provide a comprehensive solution for dealing with cascading effects in multi-sectorial crisis situations covering aspects of critical infrastructures (CI). The PREDICT solution will be composed of the following three pillars: methodologies, models, and software tools. Their integrated use will increase the awareness...report 2014
Searched for: subject%3A%22NO%255C%2B%255C-%255C%2BNetworked%255C%2BOrganisations%22
(81 - 100 of 202)