Journal articles on the topic 'Security current'

To see the other types of publications on this topic, follow the link: Security current.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security current.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.

Full text
Abstract:
Recently, users have used open-source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial-of-service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If exploited in a negative manner, it is important to prepare countermeasures that can minimize the damage caused by cybercrimes. In this paper, the current status and security trends of OSINT will be explained. Specifically, we present security threats and cybercrimes that may occur if data gathered by OSINT are exploited by malicious users. Furthermore, to solve this problem, we propose security requirements that can be applied to the OSINT environment. The proposed security requirements are necessary for securely gathering and storing data in the OSINT environment and for securely accessing and using the data collected by OSINT. The goal of the proposed security requirements is to minimize the damage when cybercrimes occur in the OSINT environment.
APA, Harvard, Vancouver, ISO, and other styles
2

Tagarev, Todor. "Theory and Current Practice of Deterrence in International Security." Connections: The Quarterly Journal 18, no. 1-2 (2019): 5–10. http://dx.doi.org/10.11610/connections.18.1-2.00.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ponomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (June 22, 2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.

Full text
Abstract:
Ukrainian banking institutions conduct their activity under the influence of various risks, which create critical situations for them. In this context, banks should pay more attention to their own security. The article analyzes the theoretical approaches to the concept of “banking security”, examines the level of banking security as a component of the financial and economic security of the state, and determines the ways to improve it. Banking security was analyzed based on the data of the National Bank of Ukraine and other banks that are part of the banking system of the country.The current state of the banking system shows a decrease in the security since 2014 to the “danger zone”. This is facilitated by a great number of problem loans and foreign capital in the authorized capital of banks; the predominance of short-term lending over long-term one; continued unprofitableness and low liquidity of bank assets. Banking security was the guarantor of achieving financial security of the state. Therefore, the article outlines directions for improving the operation of banking institutions and the banking system as a whole, which will allow to improve banking security in the short term. This is, first of all, the legislative consolidation of the creditor rights protection, the expansion of the lending process, including in foreign currency, with the predomi-nance of long-term loans, the banks’ work in the direction of increasing their assets profitability, optimizing administrative costs, developing and using the latest informa¬tion technology to ensure the effective operation and information security of banks.
APA, Harvard, Vancouver, ISO, and other styles
4

Miyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Park, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (September 2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Full text
Abstract:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and investigate its level by the analysis of world rankings. Consequently, the Global Food Security Index, which measures the level of food security in four areas – food affordability, food availability, food quality and safety, and natural resources and resiliencies considered in this paper. According to this ranking, the first three places are occupied by the countries of Western Europe – Finland, Ireland, and the Netherlands. Except European countries, top 15 countries also include Israel, Japan, the United States of America, Canada, and New Zealand. Ukraine ranks 54th out of 113 countries. Positive changes occur only in the group «quality and safety». The rest of the groups of food security indicators for Ukraine show negative trends. In particular, in the group «food availability» indicators of «food security and access policy commitments» and «political and social barriers to access» decreased by more than thirty percent comparing with the previous year. Additionally, Global Hunger Index is considered. This index is based on four indicators – undernourishment, child wasting, child stunting, and child mortality. Despite the tendency of index improvement by the regions of the world, its value is particularly dangerous for the countries of Africa South of the Sahara, and South Asia. For Ukraine, the value of this indicator is less than 5, since 2006. This fact classifies Ukraine as a low-risk area. Accordingly, the analysis shows that currently the second goal of the Sustainable Development Plan – «Zero Hunger», is unattainable by 2030.
APA, Harvard, Vancouver, ISO, and other styles
7

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Full text
Abstract:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and investigate its level by the analysis of world rankings. Consequently, the Global Food Security Index, which measures the level of food security in four areas – food affordability, food availability, food quality and safety, and natural resources and resiliencies considered in this paper. According to this ranking, the first three places are occupied by the countries of Western Europe – Finland, Ireland, and the Netherlands. Except European countries, top 15 countries also include Israel, Japan, the United States of America, Canada, and New Zealand. Ukraine ranks 54th out of 113 countries. Positive changes occur only in the group «quality and safety». The rest of the groups of food security indicators for Ukraine show negative trends. In particular, in the group «food availability» indicators of «food security and access policy commitments» and «political and social barriers to access» decreased by more than thirty percent comparing with the previous year. Additionally, Global Hunger Index is considered. This index is based on four indicators – undernourishment, child wasting, child stunting, and child mortality. Despite the tendency of index improvement by the regions of the world, its value is particularly dangerous for the countries of Africa South of the Sahara, and South Asia. For Ukraine, the value of this indicator is less than 5, since 2006. This fact classifies Ukraine as a low-risk area. Accordingly, the analysis shows that currently the second goal of the Sustainable Development Plan – «Zero Hunger», is unattainable by 2030.
APA, Harvard, Vancouver, ISO, and other styles
8

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Full text
Abstract:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are and will remain the main sources of global insecurity and major threats to global security. The persistence and rapid evolution of these phenomena motivate us to investigate the field, to analyze the sources of instability that seriously threaten the security of the human evolutionary environment and to present to the informed public a study of current threats to global security.
APA, Harvard, Vancouver, ISO, and other styles
9

GABOR, Gabriel, Doina MURESAN, Laura UNGUREANU, and Alexandru CRISTIAN. "PROMOTING SECURITY INTERESTS OF ROMANIA IN THE CURRENT GEOSTRATEGIC CONTEXT." Review of the Air Force Academy 13, no. 3 (December 16, 2015): 123–28. http://dx.doi.org/10.19062/1842-9238.2015.13.3.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Full text
Abstract:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
APA, Harvard, Vancouver, ISO, and other styles
11

K.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (October 19, 2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.

Full text
Abstract:
Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.
APA, Harvard, Vancouver, ISO, and other styles
12

Horovyi, S. S., and V. Yu Priamitsyn. "CURRENT ISSUES OF LEGAL SECURITY OF CYBER SECURITY OF UKRAINE." Juridical scientific and electronic journal, no. 6 (2021): 120–22. http://dx.doi.org/10.32782/2524-0374/2021-6/32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Gu, Jiantao, Jinghong Fu, and Tao Wu. "Analysis of Current Wireless Network Security." International Journal of Education and Management Engineering 2, no. 10 (October 29, 2012): 34–38. http://dx.doi.org/10.5815/ijeme.2012.10.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yassir, Ammar, and Alaa A. "Current Computer Network Security Issues/Threats." International Journal of Computer Applications 155, no. 1 (December 15, 2016): 1–5. http://dx.doi.org/10.5120/ijca2016912255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tod, J. J. R. "UK perspectives of current security arrangements." RUSI Journal 139, no. 1 (February 1994): 31–35. http://dx.doi.org/10.1080/03071849408445782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Guoxing, Ji. "Current Security Issues in Southeast Asia." Asian Survey 26, no. 9 (September 1986): 973–90. http://dx.doi.org/10.1525/as.1986.26.9.01p0414t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zharovska, Iryna. "National and information security (current update)." Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki 7, no. 27 (May 10, 2020): 56–61. http://dx.doi.org/10.23939/law2020.27.056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Barnes, Richard. "Current Legal Developments UN Security Council." International Journal of Marine and Coastal Law 26, no. 2 (2011): 343–53. http://dx.doi.org/10.1163/157180811x560539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Plastun, Vladimir N. "Central Asia: The Current Security Issues." Oriental Studies 19, no. 4 (2020): 124–28. http://dx.doi.org/10.25205/1818-7919-2020-19-4-124-128.

Full text
Abstract:
The article discusses the security problems of the Central Asian region, closely related to the ongoing war in Afghanistan. The author sets out his understanding of the term “state security”, which includes the problems of the armed forces and security agencies, primarily responsible for the fight against terrorism and separatism. However, there is also an understanding of the current state of the economy, interethnic relations, the preservation of natural resources, and the balance of interests in international relations. In particular, an assessment is given of the mutual relations between the countries of Central Asia and China in connection with the implementation of the project “One belt – one way”. The situation in the region is characterized by a high degree of tension in neighboring Afghanistan, where armed conflicts continue between various local opposing forces, as well as American troops and the Taliban. Fighting in Afghanistan is an immediate threat to neighboring Central Asian states. In connection with the dangerous insecurity in Afghanistan, which negatively affects the situation in the entire Central Asian region, it is necessary to note the positive role of the Chinese leadership in its attempts to contribute to the settlement of the conflict. Beijing, interested in implementing its various infrastructure projects, provides its own platform for meetings between representatives of the warring parties, promoting mutual understanding.
APA, Harvard, Vancouver, ISO, and other styles
20

Poole, Vernon, and Dean Adams. "Current developments in open systems security." Computers & Security 14, no. 5 (January 1995): 420. http://dx.doi.org/10.1016/0167-4048(95)97125-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

STEZHKO, S., and T. SHEVCHENKO. "Current US experience in cyber security." INFORMATION AND LAW, no. 2(37) (June 23, 2021): 139–44. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238349.

Full text
Abstract:
The content and key aspects of the US Cyber Security Strategy are considered. The principles of the state cyber security policy of the USA are defined. Typical threats to the United States in cyberspace are outlined. The state priorities for strengthening the components of cyber defense in the United States are summarized. The issue of financing cyber security in the United States in 2021 is detailed. The principles of joint activities of American-Ukrainian relations in the field of cyber security are specified. The list of measures implemented in the United States to strengthen the state's capabilities in the field of cyber security has been identified.
APA, Harvard, Vancouver, ISO, and other styles
22

Avdeev, Vadim Avdeevich, Olga Anatolievna Avdeeva, Stanislav Vasilyevich Rozenko, Evgeny Aleksandrovich Kiselev, Igor Vyacheslavovich Kuleshov, and Aleksey Vital'yevich Morozov. "Current Directions of Legal Ensuring National Security." Cuestiones Políticas 39, no. 69 (July 17, 2021): 373–85. http://dx.doi.org/10.46398/cuestpol.3969.23.

Full text
Abstract:
The article reveals the problematic issues for ensuring financial security in the context of globalization in global financial systems. The modern stage of development of state financial systems is characterized by difficulties in ensuring national financial security. Despite the urgency of this problem, the international community is focusing on ensuring economic security during the formation of universal and regional legal instruments, leaving out of sight issues of legal and practice-oriented guidance in financial security. The article examines the main directions of implementation of state policy aimed at improving the effectiveness of legal and national and international means to ensure financial security in the context of the globalization of growing threats to economic security. The focus is on the modernization of legal instruments to regulate public relations related to financial security. Particular attention was paid to the correlation of international legal bases, national legislation, and regional laws. It is concluded that the development of state financial policy that guarantees the security of the budgetary system is fundamental.
APA, Harvard, Vancouver, ISO, and other styles
23

Tripathi, Anshu, and Umesh Kumar Singh. "Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape." International Journal of Computer Applications 51, no. 17 (August 30, 2012): 41–47. http://dx.doi.org/10.5120/8137-1882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Banovic, Bozidar. "Organized crime as a current security threat." Medjunarodni problemi 68, no. 2-3 (2016): 172–92. http://dx.doi.org/10.2298/medjp1603172b.

Full text
Abstract:
Scientific and professional community, and political subjects, both at national and at the international level have a unique position that organized crime is now one of the most dangerous security threats. However, such consent does not exist in terms of conceptual determination, identification, dimensions and of choice of methods to counter organized crime. The first part of this article describes the main trends in the conceptual definition of organized crime, social and political context of the use of this term and the subjects who have contributed to it becoming one of the main concepts of modern scientific and professional discussions about crime. The second part indicates the dynamics of organized crime as a security threat in the territory of Europe, and the last part presents and analyzes the development of organized crime in Serbia and attitudes of scientists and experts, political entities and state bodies and institutions towards this phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
25

Volkov, S. L., N. F. Kazakova, and Yu V. Shcherbina. "CURRENT PROBLEMS OF THE CYBERNETIC SPACE SECURITY." Key title: Zbìrnik naukovih pracʹ Odesʹkoï deržavnoï akademìï tehnìčnogo regulûvannâ ta âkostì, no. 2(13) (2018): 6–12. http://dx.doi.org/10.32684/2412-5288-2018-2-13-6-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Sharma, Avinash. "Current Status of Food Security in India." Indian Journal of Pure & Applied Biosciences 8, no. 1 (February 28, 2020): 293–302. http://dx.doi.org/10.18782/2582-2845.7980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lyon, Andrew B., and John L. Stell. "Analysis of Current Social Security Reform Proposals." National Tax Journal 53, no. 3, Part 1 (September 2000): 473–514. http://dx.doi.org/10.17310/ntj.2000.3.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Bondarchuk, Yulyia. "European energy security: current issues and chalenges." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 256–65. http://dx.doi.org/10.31861/mediaforum.2018.6.256-265.

Full text
Abstract:
The article highlights the current state of energy security of the European Union. The strategic approaches, as well as the directions of EU policy in the area of counteraction to the challenges of the European energy security, are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
29

Pataridze-Vyshynska, Marina. "Current status of agricultural enterprise financial security." Herald of Ternopil National Economic University, no. 4(94) (December 3, 2019): 29–41. http://dx.doi.org/10.35774/visnyk2019.04.029.

Full text
Abstract:
Introduction. The agrarian sector is an important strategic branch of the national economy that ensures food security and food independence of our country. The presence of risks and threats pose a risk to the entity. In this context, the relative importance of security should be emphasized, since the possibility of threats and their suddenness can hardly be ruled out if the subject seeks dynamic development, but can minimize their impact by planning and developing a security strategy. The study is aimed at assessing the financial security of Ukrainian agricultural enterprises, outlining threats at the macro and micro levels of the economy in order to formulate measures to minimize such threats. Methods. Such general philosophical and special methods as analysis, synthesis, scientific abstraction, historical, grouping, tabular, and arithmetic were used in the study. Results. The agricultural industry has a number of factors that have a positive impact on its financial security, but most of them affect the financial security of both macro and micro-level economies. For example, in 2019, agricultural exports, agricultural expenditures and support lines increased positively. However, environmental issues remain unresolved and exacerbate their situation. The need to review the state’s support for farmers was identified. Most agricultural enterprises do not have sufficient own resources and credit for innovative development. Conclusions. Ensuring of the economic security of agricultural enterprises requires effective management of available resources, which are capable to ensure the process of extended reproduction. Moreover, it is vital to ensure financial sustainability while preserving the environment, update the composition of fixed production facilities, attract and train qualified personnel, improve the competitiveness of agricultural products, and expand distribution channels. Prospects. Further research is needed by the measures of minimization of the educed threats to financial safety of agricultural enterprises.
APA, Harvard, Vancouver, ISO, and other styles
30

Fenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (November 10, 2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.

Full text
Abstract:
Purpose – The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate current risk management approaches regarding their capability of supporting cost-efficient decisions without unnecessary security trade-offs, outline current fundamental problems in risk management based on industrial feedback and academic literature and provide potential solutions and research directions to address the identified problems. Despite decades of research, the information security risk management domain still faces numerous challenges which hinder risk managers to come up with sound risk management results. Design/methodology/approach – To identify the challenges in information security risk management, existing approaches are compared against each other, and as a result, an abstracted methodology is derived to align the problem and solution identification to its generic phases. The challenges have been identified based on literature surveys and industry feedback. Findings – As common problems at implementing information security risk management approaches, we identified the fields of asset and countermeasure inventory, asset value assignment, risk prediction, the overconfidence effect, knowledge sharing and risk vs. cost trade-offs. The reviewed risk management approaches do not explicitly provide mechanisms to support decision makers in making an appropriate risk versus cost trade-offs, but we identified academic approaches which fulfill this need. Originality/value – The paper provides a reference point for professionals and researchers by summing up the current challenges in the field of information security risk management. Therefore, the findings enable researchers to focus their work on the identified real-world challenges and thereby contribute to advance the information security risk management domain in a structured way. Practitioners can use the research results to identify common weaknesses and potential solutions in information security risk management programs.
APA, Harvard, Vancouver, ISO, and other styles
31

Seegers, Annette. "Current Trends in South Mrica's Security Establishment." Armed Forces & Society 18, no. 2 (January 1992): 159–74. http://dx.doi.org/10.1177/0095327x9201800201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bennett, Fran. "Gender implications of current social security reforms." Fiscal Studies 23, no. 4 (February 2, 2005): 559–84. http://dx.doi.org/10.1111/j.1475-5890.2002.tb00073.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Harwell, Jonathan H. "Library Security Gates: Effectiveness and Current Practice." Journal of Access Services 11, no. 2 (April 3, 2014): 53–65. http://dx.doi.org/10.1080/15367967.2014.884876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Coppolino, Luigi, Salvatore D’Antonio, Giovanni Mazzeo, and Luigi Romano. "Cloud security: Emerging threats and current solutions." Computers & Electrical Engineering 59 (April 2017): 126–40. http://dx.doi.org/10.1016/j.compeleceng.2016.03.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hughes, John. "X.400 Security: Current and future usage." Computers & Security 14, no. 5 (January 1995): 422. http://dx.doi.org/10.1016/0167-4048(95)97128-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Bequai, August. "Biometric security: Current status and legal concerns." Computer Audit Update 1996, no. 8 (August 1996): 26–30. http://dx.doi.org/10.1016/0960-2593(96)84052-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Filippova, Anastasia. "Current security issues in the information society." SHS Web of Conferences 109 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110901014.

Full text
Abstract:
That scientific research highlights specific items of modernization in the field of public society information security. Taking into account professional and public orientation, government support is aimed at promotion of human recourse, provision of information support. Currently human mind is one the most valuable item. In this regard, jurists are responsible for explanation of political, economic and legal points. Moreover, it is rather important to reveal an experienced specialist in it. Among the new challenges and threats, the problem of information security is the main one. Information technologies cause considerable impact on management of humans being. Scientific analysis of problems in the field of information security has shown that there is an insufficient level of public awareness. More precisely the problem is in ability to use password with high degree of protection, spread of unnecessary information in social networks. In that research are touched upon various concepts of information society. Also, main theories and elements are analyzed, which are included into meaning of information society. The difference between main information and other types of social values are covered. Specifics of the above problem, its reasons and impact on development of society are outlined. The conclusion encompasses problems of legal regulation of information security (fragmentation, absence of system). In cognitive activity, scientific complex, including legal, economic, scientific and practical approaches was used.
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Senling, Shuichi Kameyama, and Hiroshi Takahashi. "JTAG Security Threats: Current Attacks and Countermeasures." Journal of The Japan Institute of Electronics Packaging 24, no. 7 (November 1, 2021): 668–74. http://dx.doi.org/10.5104/jiep.24.668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Edwards, Elizabeth. "Pricing lending in the current market: securing the capital — security value sensitivities." Briefings in Real Estate Finance 2, no. 2 (September 2002): 129–38. http://dx.doi.org/10.1002/bref.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Tofan, Dragoş Ovidiu. "Business Intelligence Security." Review of Economic and Business Studies 9, no. 1 (June 1, 2016): 157–69. http://dx.doi.org/10.1515/rebs-2016-0030.

Full text
Abstract:
AbstractExcess information characteristic to the current environment leads to the need for a change of the organizations’ perspective and strategy not only through the raw data processing, but also in terms of existing applications generating new information. The overwhelming evolution of digital technologies and web changes led to the adoption of new and adapted internal policies and the emergence of regulations at level of governments or different social organisms. Information security risks arising from the current dynamics demand fast solutions linked to hardware, software and also to education of human resources. Business Intelligence (BI) solutions have their specific evolution in order to bring their contribution to ensure the protection of data through specific components (Big Data, cloud, analytics). The current trend of development of BI applications on mobile devices brings with it a number of shortcomings related to information security and require additional protective measure regarding flows, specific processing and data storage.
APA, Harvard, Vancouver, ISO, and other styles
41

Yang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Full text
Abstract:
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
APA, Harvard, Vancouver, ISO, and other styles
42

Fatokun, Samson. "AIRPORT SECURITY: CURRENT PRACTICE AND PERSPECTIVES FOR 2030." Journal of Air Transport Studies 4, no. 2 (July 1, 2013): 26–39. http://dx.doi.org/10.38008/jats.v4i2.78.

Full text
Abstract:
The high profile of aviation has made it an attractive target to terrorist activities. The September 11 terrorist attack and subsequent failed terrorist attacks made safety and security top priorities for the aviation industry. A review of the current practice in airport security conducted by the author found that it was reactive, expensive and inefficient in some areas based on a “one-size-fits-all” principle. The forecast of a new approach to airport security conducted in this study predicted that by 2020-2030 airport security will be proactive and based on passenger differentiation.
APA, Harvard, Vancouver, ISO, and other styles
43

Орлов, Никита, and Nikita Orlov. "Current issues of economic security of budgetary organizations." Russian Journal of Management 6, no. 4 (December 25, 2018): 21–25. http://dx.doi.org/10.29039/article_5ca760b6f0cb57.26471899.

Full text
Abstract:
The article reveals topical issues of economic security of budgetary organizations in conditions of instability and fierce competition. It is necessary to approach the definition of external threats to the economic security of a budget organization, as well as their neutralization, individually for each business entity. Individual approach and the choice of mechanisms to ensure the economic security of the budgetary organization will increase the level of protection from potential threats and risks, ensure the functioning within the framework of current legislation. Ensuring economic security is a definite guarantee of the independence, stability and efficiency of society, in particular, and at the state level an important national priority.
APA, Harvard, Vancouver, ISO, and other styles
44

BRYHINETS, Oleksandr. "Current issues of legal environment of tax security of Ukraine." Economics. Finances. Law, no. 2 (February 26, 2021): 13–15. http://dx.doi.org/10.37634/efp.2021.2.3.

Full text
Abstract:
The paper notes that in order to effectively ensure financial the safety of citizens of Ukraine is extremely important to achieve an appropriate level of tax security of the state as a basic structural element of financial state security. Identified threats affecting the current state the domestic tax security of the state. A number of regulatory and legal acts regulating the provision of tax security in Ukraine. A set of actions has been determined that is optimal for increasing the level of tax security of Ukraine. Politics should become the basis of state tax security ensuring the safety of domestic producers, because they are the most payers of taxes and fees, guarantors of a developed economic system, a source of employment in a market economy. Many problems getting in the way the study of tax security is explained by the fact that «tax security state» as a term is practically not regulated in the legislation of our state, its specifics and the composition of threats that can cause him significant harm. The vast majority of domestic and foreign scientists, considering issues of tax security, focus on micro-level, namely on the tax security of enterprises. While this the problem requires in-depth development and a systematic approach to determining the concept of «tax security» is precisely at the macro level of the study of the tax state security. To ensure the proper level of tax security it is necessary to determine its current state, the main components and factors of influence, examining the features of the functioning of the domestic tax system. It was noted that the future cooperation of the State Tax Service of Ukraine and Bureau of Economic Security will help eliminate duplication of functions law enforcement and reducing unnecessary and unjustified pressure on taxpayers, and will also help improve efficiency investigation of economic crimes and improve Ukrainian investment attractiveness.
APA, Harvard, Vancouver, ISO, and other styles
45

Karanina, Elena, and Ksenia Kartavyh. "Economic security of modern Russia: the current state and prospects." MATEC Web of Conferences 170 (2018): 01003. http://dx.doi.org/10.1051/matecconf/201817001003.

Full text
Abstract:
In the conditions of instability of the world economy and the introduction of sanctions against Russia by a number of countries, the problem of ensuring national economic security has become particularly relevant. This topic also has a high scientific, practical and social significance, as it allows to identify possible gaps in the economic security of modern Russia and timely develop mechanisms to eliminate them to protect the national interests of the state. The purpose of this article is to determine the state and prospects of improving the economic security of modern Russia. This can be achieved by solving the following tasks: review of existing methods to evaluate the economic security of country, conduct a SWOT analysis of economic security of modern Russia, the development of suggestions for its improvement. This research analyzes various aspects of the economic security of modern Russia. As a result, the author developed an integrated method to ensuring the economic security of the country, as well as a matrix of economic security within this method. The way of increase of economic security of modern Russia is offered. Thus, to overcome the threats for the economic security of modern Russia, it is necessary to implement the recommendations developed by the authors, including the establishment of their own production and the construction of an innovatively oriented model of the economy. This will ensure the economic security of modern Russia and its stable development in the future.
APA, Harvard, Vancouver, ISO, and other styles
46

Kmeť, Roman. "Analysis of current practical solutions of crime mapping information systems." Defense and Security Studies 2 (May 7, 2021): 53–62. http://dx.doi.org/10.37868/dss.v2.id168.

Full text
Abstract:
Crime mapping information systems are currently a commonly used tool by public authorities, primarily for the police, security forces and services, local and regional government, as well as for the inhabitants of a certain territory. The main idea of ​​creating these systems is to monitor and evaluate the current security situation, which is significantly affected by the active or passive activities of the police or other entities dealing with security issues. An important part is also the knowledge of the security situation on the part of the population, in which a certain state of security can evoke a feeling of security and vice versa.
APA, Harvard, Vancouver, ISO, and other styles
47

Hošták, Daniel. "Discussion: How Should Europe Face Current Security Challenges?" Politické vedy 23, no. 3 (September 22, 2020): 185–89. http://dx.doi.org/10.24040/politickevedy.2020.23.3.185-189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Babin, Dmitriy. "FOOD SECURITY SYSTEM: CURRENT STATE AND DEVELOPMENT TRENDS." VESTNIK OF VORONEZH STATE AGRARIAN UNIVERSITY 48, no. 1 (March 2016): 183–92. http://dx.doi.org/10.17238/issn2071-2243.2016.1.183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Romanova, Viktoriya V. "CURRENT TASKS OF LEGAL REGULATION OF ENERGY SECURITY." Energy law forum 3 (September 25, 2019): 4–10. http://dx.doi.org/10.18572/2312-4350-2019-3-4-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Romanova, Viktoriya V. "Current Tasks of Legal Regulation of Energy Security." Energy law forum 3 (September 25, 2019): 66–70. http://dx.doi.org/10.18572/2410-4396-2019-3-66-70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography