Counter-terrorism Measures - Determining of Soft Target’s Vulnerability
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F19%3A63524183" target="_blank" >RIV/70883521:28140/19:63524183 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Counter-terrorism Measures - Determining of Soft Target’s Vulnerability
Popis výsledku v původním jazyce
This article is focused on counter-terrorism measures. Our research is deal to Soft targets when we try to identify them, to describe them and to propose their protection. In this article, we present the research about a determining of the Soft target’s vulnerability. This is important for Risk management because it is necessary to know how much is my object or event vulnerability and what I should do for improvement. In this article, we describe our method of the determining of vulnerability, which is based on local knowledge of the environment. In the present, in the Czech Republic, there is one method for the determining of vulnerability from Ministry of interior1; however, this method is especially for security experts or for people with knowledge about security. In our new method, we proposal the process for non-specialists. The results are very similar to method of Ministry of interior. We discussed our method with them, and they agree with our process. We tested our methods on several objects (about 30), and we have very good results.
Název v anglickém jazyce
Counter-terrorism Measures - Determining of Soft Target’s Vulnerability
Popis výsledku anglicky
This article is focused on counter-terrorism measures. Our research is deal to Soft targets when we try to identify them, to describe them and to propose their protection. In this article, we present the research about a determining of the Soft target’s vulnerability. This is important for Risk management because it is necessary to know how much is my object or event vulnerability and what I should do for improvement. In this article, we describe our method of the determining of vulnerability, which is based on local knowledge of the environment. In the present, in the Czech Republic, there is one method for the determining of vulnerability from Ministry of interior1; however, this method is especially for security experts or for people with knowledge about security. In our new method, we proposal the process for non-specialists. The results are very similar to method of Ministry of interior. We discussed our method with them, and they agree with our process. We tested our methods on several objects (about 30), and we have very good results.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
Výsledek vznikl pri realizaci vícero projektů. Více informací v záložce Projekty.
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2019
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
2019 IEEE 6th Asian Conference on Defence Technology (ACDT) - Proceedings
ISBN
978-1-72811-766-9
ISSN
—
e-ISSN
—
Počet stran výsledku
6
Strana od-do
79-84
Název nakladatele
IEEE
Místo vydání
Boston
Místo konání akce
Bali
Datum konání akce
13. 11. 2019
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—