Search Results

You are looking at 31 - 40 of 91 items for :

  • Social Sciences and Law x
  • All content x
Clear All

environment” has been described as a “ sprawling web of immigration controls now embedded at the heart of the UK’s public services and communities ” ( Liberty, 2019 , p. 7). First mentioned by Theresa May as Home Secretary in an interview with The Telegraph in

Open access

a problem with pedagogues as well, having a bad attitude and lack of devotion and readiness. The majority of children does not encounter valuable, high standard music neither at home nor in daily life ( Marosz, 2013 ). The subject lost a lot of

Open access

Összefoglalás. Az elektronikusan tárolt információ biztonsága, általánosabban véve a kiberbiztonság, az egyik legnagyobb kihívás a 21. században. Folyamatosan jelennek meg újabb és újabb fenyegetések, melyekre innovatív és újszerű megoldásokat kell adni. Ezek az innovatív megoldások mindenképpen magukkal hozzák az olyan új típusú technológiák használatát az információbiztonságban, mint például a Nagy Adatokból (Big Data) való építkezés és az erre épülő mesterséges intelligencia. Ennek támogatása érdekében az Európai Unió a 2021 és 2027 közötti időszakban kiemelt fontosságúnak tartja a kiberbiztonsági innovációkat. A tanulmány bemutatja a kiberbiztonsági kompetenciahálózatok tervezetét, illetve ismerteti, hogy milyen kutatás-fejlesztés-innovációs lehetőségek lesznek a következő évtizedben Európában.

Summary. Security of stored digital information and more generally, cybersecurity is one of the biggest challenges of the 21st century. Besides the negative effects of cybercrime, cyberespionage, or other state sponsored activities, like cyberwarfare, our society and economy should face the exposure of infocommunication systems all around us. At the dawn of 4th industrial revolution when the whole world is going to be digitalized and will be surrounded by networked digital devices in homes, cities and industry, new threats are constantly emerging that need to be responded with new innovative solutions. These innovative solutions should include the usage of big data and artificial intelligence built onto it. They should also give a response for the inherited risks of legacy systems that can be found in many critical information infrastructures. Meanwhile, they should protect the digital privacy of citizens by not giving out unnecessary user data which is contradictory with the need of big data and AI mentioned before.

Due to the emerging cybersecurity threats and the virtually non-existence of European cybersecurity market, European Union gives high importance for cybersecurity innovation and will support it between 2021 and 2027. In the proposed budget for this period, approximately 3 billion of euros is expected to be spent to cybersecurity related research. On the one hand, that fund may help European research institutes, enterprises, and startups to appear on the global market, on the other hand this is the only possible way to regain Europe’s digital independence from the United States and China. In alignment with the European security policy, these innovative solutions may also lead to reducing the amount of cybercrime, ensure the resilience of continental critical information infrastructure and can help to establish strong European cyberwarfare capabilities. As Ursula von der Leyden, president of the European Commission said in her op-ed in February 2020, “The point is that Europe’s digital transition must protect and empower citizens, businesses and society as a whole. It has to deliver for people so that they feel the benefits of technology in their lives. To make this happen, Europe needs to have its own digital capacities – be it quantum computing, 5G, cybersecurity or artificial intelligence (AI). These are some of the technologies we have identified as areas for strategic investment, for which EU funding can draw in national and private sector funds.” The study presents the draft of cybersecurity competence networks and describes what R&D&I possibilities will be in Europe in the next decade.

Open access

strenghten persistence – town or city as home settlement and students’ dorm as accommodation – through which students are really closely integrated into their respective institutions. In connection with the female students, we found a higher degree of

Open access

. Issad , M. , Mezhdunarodnoye chastnoye pravo (Private International Law) (Progress 1989 ). Kegel , G. , ‘ Paternal Home and Dream Home: Traditional Conflict of

Full access

of beneficiaries of international/humanitarian protection into the labour market: policies and good practices (EMN 2015 ) <https://ec.europa.eu/home-affairs/sites/homeaffairs/files/13a

Full access

konflikty (Auditorium 2011 ). Barry , K. , ‘ Home and Away. Construction of Citizenship in Emigration Context ’ ( 2006 ) 1 New York University Law Review 11 – 59

Full access

families in their homes Access Prior research in the community demonstrated the importance of getting access by going through gatekeepers with a standing in the community. Thus, employees in a

Open access

University of Cakovec and the Roma Family Centre in Kursanec. These locations were chosen so as to make the participants feel comfortable in a familiar space or because of the proximity to their homes. Furthermore, the reason for conducting the focus groups

Open access

apartments without safe drinking water at home. In 2005, the indicator was 4% nationally and 26% among the Roma. In 2014, it sinks to 2% of the total population and will decrease to 18% for the Roma. We have only output data for homes that are not powered by

Open access