Results for 'Security System'

996 found
Order:
  1.  6
    National Security System of the Republic of China.Oliver Bakreski - 2017 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 70:263-282.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  3
    National security system of Spain.Oliver Bakreski - 2021 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 74:345-357.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  5
    National Security System of Israel.Oliver Bakreski - 2022 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 75:223-233.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  3
    The National Security System of the Republic of Montenegro.Oliver Bakreski - 2018 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 71:281-288.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational culture, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  31
    The CSCE process: European security system in statu nascendi?Adam Rotfeld - 1990 - World Futures 29 (3):199-216.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  1
    The National Security System of the Republic of Montenegro.Оливер Бакрески - 2018 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 71:271-288.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. The role of global studies in the development of a sustainable security system.Ilya V. Ilyin & Kristina S. Leonova - 2022 - In Alexander N. Chumakov, Alyssa DeBlasio & Ilya V. Ilyin (eds.), Philosophical Aspects of Globalization: A Multidisciplinary Inquiry. Boston: BRILL.
     
    Export citation  
     
    Bookmark  
  9. Hybrid Information Technology Using Computational Intelligence-Security Intelligence: Web Contents Security System for Semantic Web.Nam-Deok Cho, Eun-ser Lee & Hyun-gun Park - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4252--819.
     
    Export citation  
     
    Bookmark  
  10.  3
    How Does Social Insurance Affect the Social Interactions of Rural Residents in China: Study on the Impact of Rural Formal Social Security System on Informal Social Security Mechanism.Ming Zhang, Lan Yuan, Zhanlian Ke, Juanfeng Jian, Hong Tan & Gangwu Lv - 2022 - Frontiers in Psychology 13.
    With the increasing mobility of the rural population in China and the growing number of residents moving to the cities for work or study, rural society is forming a pluralistic, interest-centered, “open” social networks relations that follows the modern rule of law contract. Based on Chinese General Social Survey data, the results of the empirical study finds that social insurance can significantly enhance the social interactions of rural residents in China, that is, formal social security system in rural (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  22
    Ethical Issues in the Medical Security System in Mainland China.Qiu Renzong - 2014 - Asian Bioethics Review 6 (2):108-124.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  10
    Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories.Agnieszka M. Zbrzezny, Sabina Szymoniak & Miroslaw Kurkowski - 2022 - Logic Journal of the IGPL 30 (2):289-300.
    The paper presents a novel method for the verification of security protocols’ time properties. The new method uses a translation to satisfiability modulo theories problem. In our approach, we model protocol users’ behaviours using networks of synchronized timed automata. Suitably specified correctness properties are defined as a reachability property of some chosen states in an automata network. Then, the network of timed automata and the property are translated to an SMT problem and checked using an SMT-solver and a BMC (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  31
    Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches.Sanjay Goel & Stephen F. Bush - 2003 - Complexity 9 (2):54-73.
  14.  23
    The parables of Jesus as critique on food security systems for vulnerable households in urban townships.Ernest Van Eck & Meshack Mandla Mashinini - 2016 - HTS Theological Studies 72 (3).
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  32
    Vital Systems Security: Reflexive Biopolitics and the Government of Emergency.Stephen J. Collier & Andrew Lakoff - 2015 - Theory, Culture and Society 32 (2):19-51.
    This article describes the historical emergence of vital systems security, analyzing it as a significant mutation in biopolitical modernity. The story begins in the early 20th century, when planners and policy-makers recognized the increasing dependence of collective life on interlinked systems such as transportation, electricity, and water. Over the following decades, new security mechanisms were invented to mitigate the vulnerability of these vital systems. While these techniques were initially developed as part of Cold War preparedness for nuclear war, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  16.  14
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  9
    Secure traveling salesman problem with intelligent transport systems features.Gloria Cerasela Crişan, Camelia-M. Pintea, Anisoara Calinescu, Corina Pop Sitar & Petrică C. Pop - forthcoming - Logic Journal of the IGPL.
    Meeting the security requests in transportation is nowadays a must. The intelligent transport systems represent the support for addressing such a challenge, due to their ability to make real-time adaptive decisions. We propose a new variant of the travelling salesman problem integrating security constraints inspired from ITSs. This optimization problem is called the secure TSP and considers a set of security constraints on its integer variables. Similarities with fuzzy logic are presented alongside the mathematical model of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  19.  14
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  21
    Secure UAV-Based System to Detect Small Boats Using Neural Networks.Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo & Cándido Caballero-Gil - 2019 - Complexity 2019:1-11.
    This work presents a system to detect small boats to help tackle the problem of this type of perilous immigration. The proposal makes extensive use of emerging technologies like Unmanned Aerial Vehicles combined with a top-performing algorithm from the field of artificial intelligence known as Deep Learning through Convolutional Neural Networks. The use of this algorithm improves current detection systems based on image processing through the application of filters thanks to the fact that the network learns to distinguish the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  6
    When security games hit traffic: A deployed optimal traffic enforcement system.Ariel Rosenfeld, Oleg Maksimov & Sarit Kraus - 2020 - Artificial Intelligence 289 (C):103381.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  22
    Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium.Xiong Wang, Akif Akgul, Sezgin Kacar & Viet-Thanh Pham - 2017 - Complexity:1-10.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  14
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  24.  13
    Secure JAVA application in SOA-based cross-border PKI mobile government systems.M. Markovic & G. Dordevic - 2013 - Logic Journal of the IGPL 21 (4):680-691.
  25.  30
    ‘Rescaling’ alternative food systems: from food security to food sovereignty.Navé Wald & Douglas P. Hill - 2016 - Agriculture and Human Values 33 (1):203-213.
    In this paper, we critically interrogate the benefits of an interdisciplinary and theoretically diverse dialogue between ‘local food’ and ‘alternative food networks’ and outline how this dialogue might be enriched by a closer engagement with discourses of food sovereignty and the politics of scale. In arguing for a shift towards a greater emphasis on food sovereignty, we contend that contemporary discourses of food security are inadequate for the ongoing task of ensuring a just and sustainable economy of food. Further, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  26.  5
    Security of multi-agent systems: A case study on comparison shopping.Dieter Hutter, Heiko Mantel, Ina Schaefer & Axel Schairer - 2007 - Journal of Applied Logic 5 (2):303-332.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  28. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  29.  22
    The Schengen Information System and Data Retention. On Surveillance, Security and Legitimacy in the European Union.Elisa Orrù - 2017 - In Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate. Baden-Baden: Nomos. pp. 115-136.
    As a technique of social control based on the collection of information, surveillance has been a central instrument of any administrative power since the modern era. Surveillance, however, can be carried out in different ways and these can provide important information on the basic features of a particular political system. Indeed, the introduction of surveillance measures has an impact on key relationships of a political system, such as liberty and security, autonomy and authority. When a political (...) is, like the European Union (EU), in a dynamic and build-up phase, by analysing its surveillance practices one can even discern the trajectories of its developments. The paper analyses two surveillance measures in the EU: the Schengen Information System (SIS) and the Directive 2006/24/EC on data retention. It puts forth the argument that the reference to security as a value enables the EU to compensate its legitimacy deficiencies and to develop into a power system characterised by a more supranational structure than before. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  16
    Security beyond the state: exploring potential development impacts of community policing reform in post-conflict and fragile environment.Muhammad Abbas & Vandra Harris Agisilaou - 2023 - Journal of Global Ethics 19 (3):426-444.
    This study investigates the significance of understanding police perspectives on community policing as a means of addressing insecurity, particularly within the context of localised and asymmetrical conflicts. It highlights the pivotal role of the police in shaping community security and the substantial impact they can have (positive or negative) in fragile environments. The study contends that the localised nature of the community policing effectively addresses security and development issues and empowering citizens. Qualitative interviews were conducted with senior police (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  13
    On Spillover Effect of Systemic Risk of Listed Securities Companies in China Based on Extended CoVaR Model.Ze-Jiong Zhou, Shao-Kang Zhang, Mei Zhang & Jia-Ming Zhu - 2021 - Complexity 2021:1-13.
    Based on the daily data from January 2, 2019, to September 30, 2020, this paper uses the extended CoVaR model to measure the spillover effect of systemic risk among top 10 securities companies by market value in China, All Share Brokerage Index, All Share Financials Index, All Share Insurance Index, and CSI Banks Index. The conclusions are as follows: there are risk spillover effects among 10 securities companies, which are asymmetric and bidirectional and highly volatile in a short period of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications.Markus Christen, Thomas Burri, Joseph O. Chapa, Raphael Salvi, Filippo Santoni de Sio & John P. Sullins - 2017 - University of Zurich Digital Society Initiative White Paper Series, No. 1.
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  7
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  19
    A Clonal Selection Optimization System for Multiparty Secure Computing.Minyu Shi, Yongting Zhang, Huanhuan Wang, Junfeng Hu & Xiang Wu - 2021 - Complexity 2021:1-14.
    The innovation of the deep learning modeling scheme plays an important role in promoting the research of complex problems handled with artificial intelligence in smart cities and the development of the next generation of information technology. With the widespread use of smart interactive devices and systems, the exponential growth of data volume and the complex modeling requirements increase the difficulty of deep learning modeling, and the classical centralized deep learning modeling scheme has encountered bottlenecks in the improvement of model performance (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  37
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36. Workshop on Security Issues on Grid/Distributed Computing Systems (SIGDCS 2006)-Towards Reliable and Trustworthy Cooperation in Grid: A Pre-evaluating Set Based Trust Model.Xiangli Qu, Jingwei Zhong & Xuejun Yang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3984--224.
     
    Export citation  
     
    Bookmark  
  37.  53
    The model gap: cognitive systems in security applications and their ethical implications. [REVIEW]Tobias Matzner - 2016 - AI and Society 31 (1):95-102.
    The use of cognitive systems like pattern recognition or video tracking technology in security applications is becoming ever more common. The paper considers cases in which the cognitive systems are meant to assist human tasks by providing information, but the final decision is left to the human. All these systems and their various applications have a common feature: an intrinsic difference in how a situation or an event is assessed by a human being and a cognitive system. This (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  26
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burns & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  39.  14
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burns & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  40.  13
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burris & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  41.  23
    Who is controlling whom? Reframing “meaningful human control” of AI systems in security.Pascal Vörös, Serhiy Kandul, Thomas Burri & Markus Christen - 2023 - Ethics and Information Technology 25 (1):1-7.
    Decisions in security contexts, including armed conflict, law enforcement, and disaster relief, often need to be taken under circumstances of limited information, stress, and time pressure. Since AI systems are capable of providing a certain amount of relief in such contexts, such systems will become increasingly important, be it as decision-support or decision-making systems. However, given that human life may be at stake in such situations, moral responsibility for such decisions should remain with humans. Hence the idea of “meaningful (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  18
    Context-aware security management system for pervasive computing environment.Seon-Ho Park, Young-Ju Han & Tai-Myoung Chung - 2007 - In D. C. Richardson B. Kokinov (ed.), Modeling and Using Context. Springer. pp. 384--396.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  31
    A framework for a regional integrated food security early warning system: a case study of the Dongting Lake area in China.Xiaoxing Qi, Laiyuan Zhong & Liming Liu - 2015 - Agriculture and Human Values 32 (2):315-329.
    Understanding the regional food security situation is of great importance to maintaining China’s food security. To provide targeted information to help regional policymakers monitor food security status, based on the differentiated foci during the phased development of food security, this paper was conceived from the perspective of the need for early warnings and proposes a framework for regional integrated food security that incorporates food quantity security, food quality security, and sustainable food security. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  67
    Dynamical Analysis, Synchronization, Circuit Design, and Secure Communication of a Novel Hyperchaotic System.Li Xiong, Zhenlai Liu & Xinguo Zhang - 2017 - Complexity:1-23.
    This paper is devoted to introduce a novel fourth-order hyperchaotic system. The hyperchaotic system is constructed by adding a linear feedback control level based on a modified Lorenz-like chaotic circuit with reduced number of amplifiers. The local dynamical entities, such as the basic dynamical behavior, the divergence, the eigenvalue, and the Lyapunov exponents of the new hyperchaotic system, are all investigated analytically and numerically. Then, an active control method is derived to achieve global chaotic synchronization of the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  28
    Human Security Analysis as a Framework for Value-Oriented Governance: The Example of Climate Change. Des Gasper - 2014 - International Journal of Social Quality 4 (2):6-27.
    “Good governance” may be viewed as governance that effectively promotes human rights, human security and human development. This article discusses human security analysis, which in certain ways offers an integration of these “human” perspectives together with a “social” orientation, by combining a person-focus with systematic investigation of the environing systems of all sorts: physical, cultural, organizational. The importance of such analysis is illustrated through the example of climate change impacts and adaptation. The article presents applications of a human (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  46. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  15
    Responding to the problem of ‘food security’ in animal cruelty policy debates: building alliances between animal-centred and human-centred work on food system issues.Brodie Evans & Hope Johnson - 2020 - Agriculture and Human Values 37 (1):161-174.
    Research on ethical issues within food systems is often human-centric. As a consequence, animal-centric policy debates where regulatory decisions about food are being made tend to be overlooked by food scholars and activists. This absence was notable in the recent debates around Australia’s animal live export industry. Using Foucault’s tools, we explore how ‘food security’ is conceptualised and governed within animal cruelty policy debates about the live export trade. The problem of food security produced in these debates shaped (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 996