Journal articles on the topic 'Security complex'

To see the other types of publications on this topic, follow the link: Security complex.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security complex.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dhume, Sadanand. "Singapore's Security Complex." Foreign Policy, no. 127 (November 2001): 86. http://dx.doi.org/10.2307/3183303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (February 23, 2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boyle, Philip, and Kevin D. Haggerty. "Spectacular Security: Mega-Events and the Security Complex." International Political Sociology 3, no. 3 (September 2009): 257–74. http://dx.doi.org/10.1111/j.1749-5687.2009.00075.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Collinson, Helen. "Security: the complex crypto relationship." Computers & Security 14, no. 4 (January 1995): 299. http://dx.doi.org/10.1016/0167-4048(95)90039-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Buzan, Barry. "The Southeast Asian Security Complex." Contemporary Southeast Asia 10, no. 1 (June 1988): 1–16. http://dx.doi.org/10.1355/cs10-1a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lai, Ying-Cheng, Adilson Motter, Takashi Nishikawa, Kwangho Park, and Liang Zhao. "Complex networks: Dynamics and security." Pramana 64, no. 4 (April 2005): 483–502. http://dx.doi.org/10.1007/bf02706197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Volevodz, A. G. "Legal security in fuel and energy complex: statement of problem." SOCAR Proceedings, no. 3 (September 30, 2019): 97–112. http://dx.doi.org/10.5510/ogp20190300403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kilroy, Richard, Abelardo Rodriguez, and Todd Hataley. "Security Inequalities in North America: Reassessing Regional Security Complex Theory." Journal of Strategic Security 10, no. 4 (December 2017): 1–28. http://dx.doi.org/10.5038/1944-0472.10.4.1613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

M. Xheladini, Fatmir. "Regional Security Complex: The Macedonian Context." European Journal of Multidisciplinary Studies 3, no. 1 (December 1, 2016): 34. http://dx.doi.org/10.26417/ejms.v3i1.p34-37.

Full text
Abstract:
The traditional concepts of security analysis addresses concerns that deal with security at the state level leaving ample room for the concerns regarding security aspects that are not addressed through these lenses appropriately. The challenges that international system of security is facing range in variety from ones that are different in form to the time sequence that they appear in a different space and geographical location. These may include factors that are objective and subjective and as such they characterize the nature of relationships between states. Behavior of the states may at times include an action that conceptualizes within a geographical framework based on attributes that states poses. Given this, Buzan has presented the idea of security complex that is defined as a group of states in which perceptions and key concerns over security are interrelated. In this context the security complex is tied together through geographical, political, historical economic and cultural issues amongst others. Hence regional issues have an important role in the building of security logic for countries individually or in a group and may impact the formulation of policies internally or externally. Based on these considerations in this article we analyze the security issues of Macedonia and how they reflect upon the wider security agenda of the countries in the region in a two-way reflection.
APA, Harvard, Vancouver, ISO, and other styles
10

Aghazada, M. M., P. M. Pavlova, and G. A. Nikolova. "Great Mediterranean as a Security Complex." Herald of Omsk University. Series Historical studies 8, no. 3 (2021): 117–22. http://dx.doi.org/10.24147/2312-1300.2021.8(3).117-122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gonçalves, Duarte. "Understanding Actors in Complex Security Problems." International Journal of Strategic Decision Sciences 9, no. 2 (April 2018): 1–18. http://dx.doi.org/10.4018/ijsds.2018040101.

Full text
Abstract:
This article arose while working on the rhino poaching problem in South Africa and having to deal with the large number of stakeholders and complexity. The purpose of actor modelling is to develop a deeper understanding of how stakeholders and threats contribute to the complex security problems. This article is the author's reflection on two different attempts at modelling actors in the rhino problem. A framework is developed and a number of issues are raised with respect to actor modelling: First, values and perspectives are driven by actor needs. The knowledge acquired by actors is determined by perspectives. With a diversity of actors, there is a “fragmentation of perspective” that hampers addressing the problem. Thus, dealing with fragmentation of perspective, requires an approach that is inclusive of actors and different ways of knowing. The validity of actor modelling is limited by what can be determined about the values and interests of actors and this varies across actors. Second, actors have multiple identifications with multiple levels of relationality. For high levels of identification combined with low levels of relationality, there is a challenge for a researcher to understand actor behaviour. Third, actors operate in an autonomy-heteronomy space. This is not a continuum, but both autonomy and heteronomy experienced at the same time. When actors are autonomous they live out their values and interests and are most creative. When creativity is applied, there are many ways (what) of satisfying interests and living out values (why), but actors do not behave randomly. Under autonomy, understanding motivation (why) is more important than what because why is more stable and what cannot be predicted. Actors are dynamic, non-deterministic and non-linear. Fourth, the model represents not only structure but also motivation or purpose and resources; thus, addressing certain aspects of subjective and objective fragmentation. Based on the argument advanced in the paper, the sources of actor complexity leading to novel emerging behaviour in social systems are actor needs and the corresponding values and perspectives, high levels of identification with low levels of relationality and autonomy.
APA, Harvard, Vancouver, ISO, and other styles
12

Meyer, Helen. "Cracking the complex world of security." Computers & Security 15, no. 3 (January 1996): 224. http://dx.doi.org/10.1016/s0167-4048(96)90307-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Nunes-Vaz, Rick, and Steven Lord. "Designing physical security for complex infrastructures." International Journal of Critical Infrastructure Protection 7, no. 3 (September 2014): 178–92. http://dx.doi.org/10.1016/j.ijcip.2014.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lee, Geun. "Environmental Security in East Asia: The Regional Environmental Security Complex Approach." Asian Perspective 26, no. 2 (2002): 77–99. http://dx.doi.org/10.1353/apr.2002.0024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Huebert, Robert. "Health security, environmental security, and hard security in the Arctic." Journal of Intelligence, Conflict, and Warfare 5, no. 1 (May 31, 2022): 90–95. http://dx.doi.org/10.21810/jicw.v5i1.4267.

Full text
Abstract:
On February 17, 2022, the Canadian Association for Security and Intelligence Studies (CASIS)-Vancouver hosted a digital roundtable titled Health Security, Environmental Security, and Hard Security in the Arctic: A Complex Relationship, conducted by Dr. Rob Huebert, a research fellow for the Center for Military, Security and Strategic Studies and an associate professor at the University of Calgary. The presentation was followed by a question-and-answer period with questions from the audience and CASIS-Vancouver executives. The main discussion topics centered around health, the environment, geopolitics, and hard power in the Arctic.
APA, Harvard, Vancouver, ISO, and other styles
16

Uriadnikova, Inga, and Vasyl Zaplatynskyi. "MANAGEMENT OF COMPLEX SOCIAL HUMAN SECURITY SYSTEMS." JOURNAL of Donetsk mining institute, no. 1 (2021): 135–42. http://dx.doi.org/10.31474/1999-981x-2021-1-135-142.

Full text
Abstract:
Purpose: scientific substantiation of social security based on the principles of management of complex systems and an example of the application of mathematical modeling to determine internal risks in a complex social system.. Methods: use of elements of mathematical modeling, in particular the theory of optimal control and linear programming; analysis of the content of the concept of “security paradox”, logical-determinant assessment of this concept. Results: it is proposed to apply the principles of management of complex systems to ensure the social security of groups of people and society. An example of the application of mathematical modeling to determine internal risks in a complex social system is given. In order to ensure the proper functioning of risk mitigation measures in complex social systems, it is proposed to introduce compensatory risks, which may be penalties or other measures that can be considered as specifically introduced risks for individuals. The introduction of external protection against a number of dangers can provoke the emergence of a “security paradox”, the essence of which is to reduce the personal activity of counteracting risk by relying on external protection. Effective social security requires the development of a culture of security, morality, worldview and legislative measures.. Scientific novelty: the use of elements of mathematical modeling for risk assessment in the social security management system is proposed; introduced the concept of “security paradox”, which arises when security is moved from the individual to the collective level. The use of principles of management of complex systems for social security is offered. Practical significance: The use of a systematic approach and principles of management of complex systems in ensuring the security of society will identify the most important risks and focus on their prevention, prevention or reduction. An example of mathematical modeling is proposed to assess the internal risks of the social system.
APA, Harvard, Vancouver, ISO, and other styles
17

Dunn Cavelty, Myriam, and Andreas Wenger. "Cyber security meets security politics: Complex technology, fragmented politics, and networked science." Contemporary Security Policy 41, no. 1 (October 14, 2019): 5–32. http://dx.doi.org/10.1080/13523260.2019.1678855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Varga, Márton. "The Security Complex of the European Union." Hadtudomány 32, no. 1 (July 14, 2022): 104–14. http://dx.doi.org/10.17047/hadtud.2022.32.e.104.

Full text
Abstract:
The security regime of Europe has enormously changed in the last thirty years. The European Union has developed not only on the political but also on the geographical level. That means, the former regional interpretation of the European security complex requires a review. With the new challenges and aspects, the European Union must redefine its foreign policy to be able to act as a global power, which is the declared ambition of the EU.
APA, Harvard, Vancouver, ISO, and other styles
19

GEORGESCU, Valentin. "Security of 5G Networks – A Complex Issue –." Romanian Military Thinking 2022, no. 1 (February 2022): 140–53. http://dx.doi.org/10.55535/rmt.2022.1.08.

Full text
Abstract:
"The history of mobile telecommunications is not very old. It has been a bit more than 40 years since the first generation of cellular communications (1G) was launched on the market, offering the possibility of making and receiving phone calls while on the go, even accompanied by a number of technological limitations, including network and system security. Each new generation of technologies that followed this stage brought significant diversification and improvements in services. Today, there is more and more talk of the fifth generation of mobile communications technologies (5G). The security aspects of 5G networks are a hot topic worldwide, both among major state and nonstate actors. This article highlights the main characteristics of 5G technologies and why security of 5G networks is essential and complex."
APA, Harvard, Vancouver, ISO, and other styles
20

Trusova, N., S. Kalchenko, and M. Tereshchenko. "PLATFORM OF COMPLEX ENSURING OF ECONOMIC SECURITY." Scientific papers OF DMYTRO MOTORNYI TAVRIA STATE AGROTECHNOLOGICAL UNIVERSITY (ECONOMIC SCIENCES) 42 (2020): 58–64. http://dx.doi.org/10.31388/2519-884x-2020-42-58-64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Papp, V. V., and N. V. Boshota. "Economic Security of the Region’s Transport Complex." Business Inform 8, no. 511 (2020): 69–75. http://dx.doi.org/10.32983/2222-4459-2020-8-69-75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mongush, Amyrtaa K., and Igor N. Karmanov. "AUTOMATION OF COMPLEX INFORMATION SECURITY SYSTEMS DESIGN." Interexpo GEO-Siberia 6, no. 2 (July 8, 2020): 31–35. http://dx.doi.org/10.33764/2618-981x-2020-6-2-31-35.

Full text
Abstract:
Entry of modern society into the information stage of development wake, information security one of the most important problems of our time. The article discusses the possibility of automating the design of an integrated information security system. One of the key stages in the design of an information security system is the assessment of the current state of the information security system through audit. An information security audit allows identifying all vulnerabilities in the system. To automate the detection of vulnerabilities of the investigated object, network scanners are considered. The use of scanners allows solving the problems of identification and analysis of vulnerabilities. A scheme for automating the design of physical protection systems is also considered. In conclusion, the advantages of automating the design of an information protection system are noted, frequently used software tools and utilities for automating individual stages of the design of information protection systems are presented.
APA, Harvard, Vancouver, ISO, and other styles
23

Muller, Marie. "South African diplomacy and security complex theory." Round Table 88, no. 352 (October 1999): 585–620. http://dx.doi.org/10.1080/750459617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Berghel, Hal. "Leadership Failures in the National Security Complex." Computer 47, no. 6 (June 2014): 64–67. http://dx.doi.org/10.1109/mc.2014.152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pounder, Chris. "Plain speaking on a complex security problem." Computer Fraud & Security 2002, no. 5 (May 2002): 6. http://dx.doi.org/10.1016/s1361-3723(02)00510-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Highland, Harold Joseph. "Partitioning the Security Analysis of Complex Systems." Computers & Security 14, no. 1 (January 1995): 30. http://dx.doi.org/10.1016/0167-4048(95)97004-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Dub, Bohdana. "COMPLEX ASSESSMENT OF UKRAINIAN AGROHOLDINGS’ ECONOMIC SECURITY." CHERKASY UNIVERSITY BULLETIN: ECONOMICS SCIENCES, no. 1 (2019): 102–13. http://dx.doi.org/10.31651/2076-5843-2019-1-102-113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lisetskyi, Yuriy M. "Complex Security of the Corporate Information Systems." Upravlâûŝie sistemy i mašiny, no. 1 (279) (June 2019): 68–75. http://dx.doi.org/10.15407/usim.2019.01.068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wright, Joanne. "Northern Ireland ‐ a British isles security complex." Terrorism and Political Violence 5, no. 4 (December 1993): 266–87. http://dx.doi.org/10.1080/09546559308427229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Giray Gunaydin, Gazi. "Securitization in Modern Politics: Complex Security Institution." Social Sciences 6, no. 3 (2017): 85. http://dx.doi.org/10.11648/j.ss.20170603.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Stivachtis, Yannis A. "A Mediterranean Region? Regional Security Complex Theory Revisited." Vestnik RUDN. International Relations 21, no. 3 (September 20, 2021): 416–28. http://dx.doi.org/10.22363/2313-0660-2021-21-3-416-428.

Full text
Abstract:
This article argues that the shift from the bipolar structure of the Cold War international system to a more polycentric power structure at the system level has increased the significance of regional relations and has consequently enhanced the importance of the study of regionalism. It makes a case for a Mediterranean region and examines various efforts aimed at defining what constitutes a region. In so doing, it investigates whether the Regional Security Complex Theory (RSCT) can be utilized to define a Mediterranean region and argues that the patters of amity and enmity among Mediterranean states are necessary but not sufficient to identify such a region. It suggests that economic, energy, environmental, and other factors, such as migration and refugee flows should be taken into consideration in order to define the Mediterranean region. It also claims that the Mediterranean security complex includes three sub-complexes. The first is an eastern Mediterranean sub-complex that revolves mainly - albeit not exclusively - around three conflicts: the Greek-Turkish conflict, the Syrian conflict, and the Israeli-Palestinian/Arab conflict. The second is a central Mediterranean sub-complex that includes Italy, Libya, Albania and Malta and which revolves mainly around migration with Italy playing a dominant role due to its historical ties to both Libya and Albania. The third is a western Mediterranean security sub-complex that includes France, Algeria, Tunisia, Morocco, Spain and Portugal. This sub-complex it centered around France, the migration question and its associated threats, such as terrorism, radicalism, and human trafficking. In conclusion, it is concluded that the Mediterranean security complex is very dynamic as there are states (i.e. Turkey) that seem eager and capable of challenging the status quo thereby contributing to the process of the complexs internal transformation.
APA, Harvard, Vancouver, ISO, and other styles
32

Kozachenko, Hanna, Svitlana Onychshenko, and Oleksandra Masliy. "Region Building Complex Social and Economic Security Threats." International Journal of Engineering & Technology 7, no. 3.2 (June 20, 2018): 215. http://dx.doi.org/10.14419/ijet.v7i3.2.14405.

Full text
Abstract:
The basic threats of region building complex social and economic security were investigated. From the standpoint of protective approach established negative factors, which provoke the appearance, threats and significantly reduce the level of region building complex social and economic security. It was found real threats to region building complex economic security. On the basis of multi-material division threats to region building complex economic security were systematized. It was underlined that the proposed division of threats can solve a set of problems in ensuring region building complex economic security.
APA, Harvard, Vancouver, ISO, and other styles
33

Simon, Stephanie, and Marieke de Goede. "Cybersecurity, Bureaucratic Vitalism and European Emergency." Theory, Culture & Society 32, no. 2 (January 14, 2015): 79–106. http://dx.doi.org/10.1177/0263276414560415.

Full text
Abstract:
Securing the internet has arguably become paradigmatic for modern security practice, not only because modern life is considered to be impossible or valueless if disconnected, but also because emergent cyber-relations and their complex interconnections are refashioning traditional security logics. This paper analyses European modes of governing geared toward securing vital, emergent cyber-systems in the face of the interconnected emergency. It develops the concept of ‘bureaucratic vitalism’ to get at the tension between the hierarchical organization and reductive knowledge frames of security apparatuses on the one hand, and the increasing desire for building ‘resilient’, dispersed, and flexible security assemblages on the other. The bureaucratic/vital juxtaposition seeks to capture the way in which cybersecurity governance takes emergent, complex systems as object and model without fully replicating this ideal in practice. Thus, we are concerned with the question of what happens when security apparatuses appropriate and translate vitalist concepts into practice. Our case renders visible the banal bureaucratic manoeuvres that seek to operate upon security emergencies by fostering connectivities, producing agencies, and staging exercises.
APA, Harvard, Vancouver, ISO, and other styles
34

Kruglikov, Sergey, Sergey Kasanin, and Yuri Kuleshov. "Methodical Approach to the Complex Description of Information Protection Object." Voprosy kiberbezopasnosti, no. 4(50) (2022): 39–51. http://dx.doi.org/10.21681/2311-3456-2022-4-39-51.

Full text
Abstract:
Purpose: on the basis of analysis of a comprehensive approach to the assessment of threats to information security to substantiate a methodological approach to a comprehensive description of the object of information protection with an assessment of its risks. Offer a tool for building private models and information security management system. Research method: use of partial integral index of security, which reflects the average risk of damage during the implementation of a threat of a certain type and characterizes the degree of danger. Analysis of the architecture of the object of assessment in relation to possible violations of information security, information security risk assessment using the apparatus of the theory of fuzzy sets when considering the methodological approach to a comprehensive description of the object of information security with an assessment of its risks. Result: proposed a comprehensive approach to assessing threats to the security of information. The assessment of the state of the protection object in case of violation of security is carried out with the help of particular integral index of security, which characterizes the possibility of inflicting damage in its implementation, according to which the ranking is made. On the basis of this methodical approach to complex description of the object of information protection with an assessment of its risks, using analysis of architecture of the object in application to possible violations of information security, and also making an assessment of risk using the apparatus of the theory of fuzzy sets is substantiated. This methodical approach is a formal tool for building private models and information security management system as a whole. On the basis of these models, it is possible to develop: methods of quantitative estimation of security; methods and approaches to the description of the factors influencing security; methods of security estimation of operating systems with use of the methodological approach to information systems security.
APA, Harvard, Vancouver, ISO, and other styles
35

Cho, Sung-Kwon. "Bioterrorism and Complex Security in the 21st Century : A Focus on Health Security." Journal of Political Science & Communication 19, no. 2 (June 30, 2016): 1. http://dx.doi.org/10.15617/psc.2016.06.19.2.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Waterman, Kerry. "How Small States Work Together for Regional Security in Complex Security Threat Environments." Journal of Intelligence, Conflict, and Warfare 3, no. 3 (October 19, 2021): 194–98. http://dx.doi.org/10.21810/jicw.v3i3.3728.

Full text
Abstract:
On November 23, 2020, Major Kerry Waterman of the Regional Security System (RSS) presented at the 2020 CASIS West Coast Security Conference on the topic of, How Small States Work Together for Regional Security in Complex Security Threat Environments. The presentation was followed by a group panel for questions & answers.
APA, Harvard, Vancouver, ISO, and other styles
37

CORNISH, PAUL, and ANDREW M. DORMAN. "Complex security and strategic latency: the UK Strategic Defence and Security Review 2015." International Affairs 91, no. 2 (March 2015): 351–70. http://dx.doi.org/10.1111/1468-2346.12239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Boldizsár, Gábor. "Complex Challenges, Complex Responses and the State." International conference KNOWLEDGE-BASED ORGANIZATION 23, no. 1 (June 20, 2017): 53–60. http://dx.doi.org/10.1515/kbo-2017-0008.

Full text
Abstract:
Abstract After the Cold War, military challenges were generated on the periphery of Europe and beyond. Europe and NATO dealt with such challenges within the framework of crisis response and peace support operations. During the development of operations in the increasingly complex environments military actors carried out increasingly complex tasks and missions. The top of the efforts is state building affecting almost all of the governmental and state organizations and actors. Today in Central Europe and in the Carpathian Basin we are facing new threats. The massive and uncontrolled migration, terrorism and hybrid threats pose new challenges for the states. Today the physical and internal security in the homeland has to be reconsidered by the state. The new threats require a new type of response. The military and law enforcement organizations, vital governmental authorities have to effectively act together in order to provide safe and secure environment in the country. This joint effort is a new type of home- and collective defence. The complex security of the state and citizens can be guaranteed by coordinated cooperation based on mutual trust and knowledge among organizations only. This activity is labelled as Inter-agency Operations, in which the intent and capability of interoperability are required from all actors.
APA, Harvard, Vancouver, ISO, and other styles
39

Babkin, A. V. "POSSIBLE WAYS OF IMPROVING COMPLEX OF TRANSPORT SECURITY OF METRO." Issues of radio electronics, no. 5 (June 8, 2019): 93–97. http://dx.doi.org/10.21778/2218-5453-2019-5-93-97.

Full text
Abstract:
The article describes the possible directions of improving the complex to ensure compliance with the requirements of the Federal law «On transport security» of 09.02.2007 № 16‑FZ on the transport infrastructure of the metro. The new decree of the Government of the Russian Federation dated April 5, 2017 No. 410 «On approval of requirements for transport security, including requirements for anti‑terrorist security of metro facilities» includes requirements for anti‑terrorist security of facilities (territories), which take into account the security levels of different categories of subways» specifies the basic requirements for technically equipped technical means of transport security. In order to implement the requirements set out in the regulatory documents to ensure the requirements of transport security, in the presence of a sufficient number of restrictions (lack of opportunities for the installation of technical means of transport security at the facilities of early construction, the requirements for maintaining the level of passenger traffic, etc.), the approach outlined in the article is proposed.
APA, Harvard, Vancouver, ISO, and other styles
40

Dmytro Busariev. "ESSENCE OF ECONOMICAL SAFETY SYSTEM OF FUEL AND ENERGY COMPLEX AS ONE OF THE TYPES OF A COMPLEX SOCIAL-ECONOMICAL SYSTEM." World Science 3, no. 5(45) (May 31, 2019): 4–8. http://dx.doi.org/10.31435/rsglobal_ws/31052019/6518.

Full text
Abstract:
The main purpose of the article is to define the essence of the economic security system of the fuel and energy complex. The essential features of the concept «system» are defined. The concept of «system of economic security» in the context of essential features has been formed as a divergence. The main approaches to the interpretation of the concept of «economic security system» are defined. The interdependence of the hierarchy of goals of the economic security system of a complex socio- economic system is determined.
APA, Harvard, Vancouver, ISO, and other styles
41

Alexandrescu, Mihai. "Central Europe as a regional security (sub)complex in the interwar period." Studia Universitatis Babeș-Bolyai Historia 67, no. 1 (September 30, 2022): 101–14. http://dx.doi.org/10.24193/subbhist.2022.1.05.

Full text
Abstract:
"This article proposes the use of a tool for analyzing the evolution of the balance of power in interwar Central Europe, taking over the theory of the regional security complex formulated by the Copenhagen School. This study starts from the premise that in from 1921 to 1938, it can be affirmed that the ephemeral existence of a central European security complex was distinct from the classical security complex of Europe. Next, the analysis criteria specific to the regional security complex and the diplomatic developments that created the Central European security complex are presented. Keywords: Central Europe, the interwar balance of powers, Regional Security Complex, regional alliances, Locarno Agreements"
APA, Harvard, Vancouver, ISO, and other styles
42

Burdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva, and Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia." Revista Amazonia Investiga 10, no. 46 (October 25, 2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.

Full text
Abstract:
There is a new meaningful interpretation of the concept of "integrated economic security of industrial enterprise"; the problems of analyzing complex economic security are substantiated. Based on the study of the regulatory and legal and methodological support of the process of managing economic security in modern economic and political conditions, generalizations and analysis of existing practice in Russia and abroad, the main shortcomings in approaches to assessing the integrated economic security of industrial enterprises have been identified. The article examines the methods for assessing economic security: matrix, product, operational, dynamic one and methods of assessment based on the market value of the company. The parameters of the integrated economic security of industrial enterprise are classified: financial and economic security, information, technological, material and technical, personnel, epidemiological security, conceptual model for assessing financial and economic and integrated security of enterprise has been developed. The practical implementation of the proposed developments has been carried out. It is recommended to use the developed model of economic security management as enterprise resource planning (ERP) module of the enterprise system.
APA, Harvard, Vancouver, ISO, and other styles
43

Malyarenko, O., and Gul'nara Kushebina. "Sustainable development of the agro-industrial complex of Kazakhstan as the basis of the country's food security." Agrarian Bulletin of the 216, no. 01 (January 30, 2022): 86–91. http://dx.doi.org/10.32417/1997-4868-2022-216-01-86-91.

Full text
Abstract:
Abstract. Goal. Assessment of the current state of the agro-industrial complex of Kazakhstan, its role in ensuring the country's food security, substantiation of the directions of its development and minimization of threats to food security. Methods. In the course of the study, analytical and economic-statistical methods, general scientific methods of systemic, comparative and structural-logical analysis were used. Results. The article presents the results of an assessment of the current state of agriculture in the Republic of Kazakhstan and the main criteria for the country's food security: dynamics and volume of sown areas, livestock and poultry, crop yields, dynamics of crop and livestock production, volumes and dynamics of imports and exports of food products, the level depreciation of fixed assets and provision of agricultural producers with machinery. The main problems of agricultural production are identified, the threats to the country's food security are identified. Measures of state support and state regulation of the agro-industrial complex of the country aimed at its further development, increasing the efficiency of its activities, increasing the competitiveness of domestic products in the domestic and foreign markets, saturating the domestic market with socially significant food products in order to ensure the country's food security are disclosed. The trends in the development of the agro-industrial complex within the framework of the main state development programs are given: Concepts for the development of the agro-industrial complex of Kazakhstan for 2021–2030 and the National project for the development of the agro-industrial complex for 2021–2025. Scientific novelty lies in the study of the problems of the country's food security and the sustainable development of the agro-industrial complex, and the determination of the main directions for the development and state support of agricultural production in order to increase the level of the country's food security.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.

Full text
Abstract:
Risk assessment is the key and core technologies ensuring IT system security. Based on the comprehensive analysis to complex information systems, this paper first summarizes the typical characters of complex information systems and then gives new risk factors that complex system need to face. Furthermore, a new risk assessment method is proposed to evaluate the complex information systems. The method takes full account of the effect of complexity of complex information systems in each process of risk assessment, and utilizes multi-level risk views to carry out in-depth analysis to the risk of complex system.
APA, Harvard, Vancouver, ISO, and other styles
45

Farid, Faiza. "Necessity of Maritime Security in Gwadar Port Complex." Polaris – Journal of Maritime Research 2, no. 1 (December 20, 2020): 1–22. http://dx.doi.org/10.53963/pjmr.2020.005.2.

Full text
Abstract:
In the changing global scenario of international politics, the growing attention following the end of the Cold War, has been directed towards oceans. Indian Ocean and its region has gained immense attention in the past few years. Due to the presence of strategic Sea Lines of Communications (SLOCs) and choke points-Indian Ocean has crucial importance to drive international politics. The level of competition in the region has increased. With China’s rise as a global economic power, the hegemonic status of USis beingchallenged. In this regard, China’s String of Pearls strategy comes to light with special reference to the One Belt, One Road (BRI). The China-Pakistan Economic Corridor (CPEC) is the most potent part of the Belt-Road Initiative. Thesurmounting attention owes to the geostrategic location of Gwadar. Connecting Gwadar with Xinjiang-it would provide China with an alternate route to reach the Middle Eastern and North African markets, ending its Malacca Dilemma. CPEC in this regard, requires a diverse map for maritime security which sees the interplay of four major navies in the region-US, PLA Navy, Pakistan and the Indian Navy.
APA, Harvard, Vancouver, ISO, and other styles
46

Aghazada, Mirmehdi Mirkamil ogly. "Greater Mediterranean Regional Security Complex: Myth or Reality?" Vestnik RUDN. International Relations 21, no. 3 (September 20, 2021): 429–40. http://dx.doi.org/10.22363/2313-0660-2021-21-3-429-440.

Full text
Abstract:
The study of regional dimensions, including the role of individual regions in the international system, plays a significant role in understanding the formation of a new multipolar world order. Undoubtedly, one of the most important regions is the Great Mediterranean, which is considered to be the cradle of civilization. Located at the crossroads of Asia, Africa and Europe, it has a special status in global economic and political events. The author first defines the concept of the Greater Mediterranean, analyzing it in the short, medium and long term and, accordingly, in a narrow regional, wide regional and global scale. Then the analysis is carried out from the point of view of the regional security complex theory. The purpose of the study is to identify the territory covered by the Greater Mediterranean, as well as the type of regional security complex that it is part of. Since there is no clear, unified definition among Russian and foreign scholars about the geographical boundaries of this region and what it represents, the theoretical justification allows the author not only to determine the limits of the region, but also to give its characteristics, which in turn conditions the relevance of the research. In summary, it is concluded that the Greater Mediterranean constitutes a global-level security complex as it includes states, such as Russia, France, and Great Britain, which have a significant influence in world politics, as well as Turkey, Italy, Israel, and Iran with considerable powerful capabilities that extend beyond their neighbors.
APA, Harvard, Vancouver, ISO, and other styles
47

Lomsak, Daniel, and Jay Ligatti. "PoliSeer: A Tool for Managing Complex Security Policies." Journal of Information Processing 19 (2011): 292–306. http://dx.doi.org/10.2197/ipsjjip.19.292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Anisin, Alexei. "Unravelling the complex nature of security force defection." Global Change, Peace & Security 32, no. 2 (May 3, 2020): 135–55. http://dx.doi.org/10.1080/14781158.2020.1767046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mastrogiannakis, Diamantis, and Christian Dorville. "Security and sport mega-events: a complex relation." Sport in Society 16, no. 2 (March 2013): 133–39. http://dx.doi.org/10.1080/17430437.2013.776246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Shiler, Alexander, and Elizaveta Stepanova. "Complex security problems of the internet of things." MATEC Web of Conferences 265 (2019): 07014. http://dx.doi.org/10.1051/matecconf/201926507014.

Full text
Abstract:
At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography