Academic literature on the topic 'Security subject'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security subject.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security subject"

1

Korzeniowski, Leszek Fryderyk. "Securitology – security of a subject." Securitologia 23, no. 1 (June 30, 2016): 111–20. http://dx.doi.org/10.5604/01.3001.0009.2966.

Full text
Abstract:
Subjective security (security of a subject) is a state of a subject, his potential and abilities of adequate reaction to hazards as well as an issue of protecting a subject from any hazards. The first scientific analyses of security issue have been known for eighty years now, however, formally science on security as an academic subject was registered (in Poland) just in 2011, in a new distinguished area and field of social science. Science is an intentional activity of man aimed at exploring the world we live in. Scientific knowledge is based on searching constant relations between facts (colloquial knowledge restricts to occasional relations).
APA, Harvard, Vancouver, ISO, and other styles
2

Ruiz, Lester Edwin J. "The subject of security is the subject of security: APEC and the globalization of capital1." Pacifica Review: Peace, Security & Global Change 9, no. 2 (January 1997): 3–17. http://dx.doi.org/10.1080/14781159708412836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Babiński, Aleksander Cezary, Janos Mika, and Roman Ratusznyj. "Subject-Entity Scope of State Security." Internal Security 12, no. 1 (July 22, 2020): 23–34. http://dx.doi.org/10.5604/01.3001.0014.3184.

Full text
Abstract:
This study is based on the assumption that the primary aim of the emergence of states was to provide security and development opportunities for its citizens. This objective determines the method of exercising power, the applicable legal system reflecting the adopted norms of social coexistence, and the public administration system. It was also presumed that security is associated with a sense of threat and confidence. They can be both objective and subjective, which means that they can be measurable or not. Due to the fact that while there are no major problems with determining the definition of a state, there are still difficulties related to identifying the essence of security and, consequently, also the security of the state. Therefore, the paper is based on the results of the bibliographic method and presents an overview of representative outlooks on issues related to threats, security and national security. This was done by reference to works created on the basis of the law, political sciences, and security sciences. The work was divided into three parts. The first introduces the considerations. The second presents views allowing the nature of security to be determined, and the third part presents the subject-entity scope of state security and the determinants of that security.
APA, Harvard, Vancouver, ISO, and other styles
4

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Full text
Abstract:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
APA, Harvard, Vancouver, ISO, and other styles
5

Tylets, V. G., and T. M. Krasnyanskaya. "Psychological Peculiarities of Safety Concepts in Fans of Science Fiction and Detectives." Experimental Psychology (Russia) 13, no. 3 (2020): 180–93. http://dx.doi.org/10.17759/exppsy.2020130314.

Full text
Abstract:
This research is devoted to studying the views of fans of detective and fantasy media products about security in general and about the security subject in particular. It has been suggested that the preference for media products of the fantasy and detective genres contributes to the specification of representations about the security subject. The study was carried out using the semantic differential method with the participation of 400 subjects aged 18 to 22 years. Highlighted significant differences in the structure of ideas about the subject of security among fans of detective fiction and fantasy fans: if from the point of view of the first behavior and actions of the subject security must be based on a realistic assessment of the situation of danger and actualize their own resources, the main qualities of the subject security from the standpoint of the latter are flexibility of thinking, the ability to change behavior, ability to communicate with people, while maintaining the confidentiality of the received information (factor “variability”, “privacy”, “openness”). Common to both groups of subjects are such qualities inherent in the subject of safety as originality of approach to solving a difficult or dangerous situation and energy, activity of actions (factors “novelty” and “activity”). The proposed projective method of evaluating the strategies of the subject’s actions in the conditions of threat, risk and stress expands the diagnostic and predictive capabilities of security psychology.
APA, Harvard, Vancouver, ISO, and other styles
6

Lewandowski, Mateusz. "Energy security in the issues of national security." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (October 10, 2019): 168–85. http://dx.doi.org/10.34739/dsd.2019.01.13.

Full text
Abstract:
The subject of this article is energy security. An in-depth study of the literature on the subject and the analysis of normative documents allowed to formulate the main objective of the work, which is to describe energy security as a component of state security. The goal formulated in such a way creates the need to solve the main research problem of this study, presented in the form of a question: What is the significance of energy security as a component of state security? Achieving the assumed goal and solving the research problem was supported by studying the subject literature and normative documents, as well as the hypothesis that energy security is an important component of state security, and its role is constantly increasing, confirmed in the course of the study.
APA, Harvard, Vancouver, ISO, and other styles
7

Манукян, Артур Вазгенович. "SOCIAL SECURITY AS A SUBJECT SOCIOLOGICAL RESEARCH." STATE AND MUNICIPAL MANAGEMENT SCHOLAR NOTES OF SCAGS 1, no. 2 (July 2017): 225–28. http://dx.doi.org/10.22394/2079-1690-2017-1-2-225-228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Devyatkov, Andrey. "FROZEN CONFLICTSAS SUBJECT OF EUROPEAN SECURITY DIALOGUE." Security Index: A Russian Journal on International Security 17, no. 1 (March 2011): 119–21. http://dx.doi.org/10.1080/19934270.2011.553118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

TYKHOMYROV, D. O. "SECURITY AS A SUBJECT OF DOMESTIC LEGAL." Law and Society 4 (2019): 63–70. http://dx.doi.org/10.32842/2078-3736-2019-4-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Jatinder, and Jennifer Cobbe. "The Security Implications of Data Subject Rights." IEEE Security & Privacy 17, no. 6 (November 2019): 21–30. http://dx.doi.org/10.1109/msec.2019.2914614.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security subject"

1

Bian, Desong. "An Expert-based Approach for Demand Curtailment Allocation Subject to Communications and Cyber Security Limitations." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/74930.

Full text
Abstract:
A smart grid is different from a traditional power system in that it allows incorporation of intelligent features and functions, e.g., meter reading, adaptive demand response, integration of distributed energy sources, substation automation, etc. All these intelligent features and functions are achieved by choosing appropriate communication technologies and network structures for the smart grid appropriately. The objective of this dissertation is to develop an AHP (analytic hierarchy process) - based strategy for demand curtailment allocation that is subject to communications and cyber security limitations. Specifically, it: (1) proposes an electrical demand curtailment allocation strategy to keep the balance between supply and demand in case of the sudden supply shortage; (2) simulates the operation of the proposed demand curtailment allocation strategy considering the impact from communication network limitations and simultaneous operations of multiple smart grid applications sharing the same communication network; and (3) analyzes the performance of the proposed demand curtailment allocation strategy when selected cyber security technologies are implemented. These are explained in more details below. An AHP-based approach to electrical demand curtailment allocation management is proposed, which determines load reduction amounts at various segments of the network to maintain the balance between generation and demand. Appropriate communication technologies and the network topology are used to implement these load reduction amounts down to the end-user. In this proposed strategy, demand curtailment allocation is quantified taking into account the demand response potential and the load curtailment priority of each distribution substation. The proposed strategy helps allocate demand curtailment (MW) among distribution substations or feeders in an electric utility service area based on requirements of the central load dispatch center. To determine how rapidly the proposed demand curtailment strategy can be implemented, the capability of the communication network supporting the demand curtailment implementation needs to be evaluated. To evaluate the capability of different communication technologies, selected communication technologies are compared in terms of their latency, throughput, reliability, power consumption and implementation costs. Since a number of smart grid applications share the same communication network, the performance of this communication network is also evaluated considering simultaneous operation of popular smart grid applications. Lastly, limitations of using several cyber security technologies based on different encryption methods - 3EDS (Triple Data Encryption Standard), AES (Advanced Encryption Standard), Blowfish, etc. - in deploying the proposed demand curtailment allocation strategy are analyzed.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
2

Kabatoff, Mathew. "Subject to predicate risk, governance and the event of terrorism within post-9/11 U.S. border security." Thesis, London School of Economics and Political Science (University of London), 2010. http://etheses.lse.ac.uk/496/.

Full text
Abstract:
As a result of the 9/11 terror attacks, a new and far-reaching form of security governance has emerged within the United States under the heading of 'homeland security'. While this mode of security has brought with it a range of domestic counter-terrorism efforts, such as new methods of preparedness in the event of attacks on American cities, as well as mechanisms to seize and cut off terrorist assets, it has also predominantly been oriented towards the development of a new legal, institutional and technological regime responsible for the management and risk assessment of individual identity and the identities of foreign nationals passing through U.S. borders. Although this mode of security provides new powers as well as more flexible and collaborative methods for U.S. customs, law enforcement and intelligence to address the threat of terrorism, it has also created political controversy. This controversy has rested upon the perception that homeland security methods embody an unchecked extension of executive power negatively impacting the rights and liberties of the individuals that these very security techniques were established to protect. In order to interrogate this controversy and analyse how this new form of security performs within an extended field of sovereign power, this thesis takes into account the laws, policies and technologies – biometric, datamining, database – that shape this new form of security at the border. This new form of security arguably not only embodies a mobilisation and empowerment of U.S. intelligence and law enforcement agencies which understand terrorism as catastrophic and generational, but it can fundamentally be seen as creating a new infrastructure that allows U.S. security institutions to become more 'informationally' aware of the identities of individuals entering and exiting the country. How U.S. security institutions access such identity information, along with how this data is used, is what constitutes the new social and political reality at the border.
APA, Harvard, Vancouver, ISO, and other styles
3

Фостяк, В. І., and V. I. Fostiak. "Управління безпековою діяльністю промислових підприємств: дисертація." Thesis, ЛьвДУВС, 2020. http://dspace.lvduvs.edu.ua/handle/1234567890/3507.

Full text
Abstract:
Фостяк В. І. Управління безпековою діяльністю промислових підприємств: дисертація на здобуття ступеня доктора філософії за спеціальністю 073 – «Менеджмент» / Фостяк Володимир Ігорович. – Львів: Львівський державний університет внутрішніх справ МВС України, 2020. - 290 с.
Дисертаційна робота присвячена вирішенню наукового завдання, що полягає в теоретичному обґрунтуванні та розробленні науково-прикладних засад управління безпековою діяльністю промислових підприємств. У першому розділі «Теоретичні та методичні аспекти управління безпековою діяльністю підприємств» розглянуто сутність базових понять для забезпечення безпеки підприємств таких як: «безпека», «розвиток», «діяльність», «підприємство», що дало змогу обґрунтувати трактування безпекової діяльності підприємства як діяльності підприємства у співпраці із зовнішніми суб’єктами безпеки для забезпечення власної динамічної стійкості функціонування та формування безпечних умов розвитку через захищеність від дії зовнішніх і внутрішніх загроз та мінімізацію ризиків. Доведено, що безпекова діяльність не є аналогом операційної, інвестиційної чи фінансової, водночас вона уможливлює їх здійснення. Визначено ключові підходи та сформовано власне розуміння таких термінів як «небезпека» (будучи результатом реалізації загроз, спричиняє зниження рівня безпеки; негативний вплив, наслідком чого може бути руйнування системи, зокрема банкрутство підприємства), «ризик» (характерний для підприємницької діяльності загалом та у процесі прийняття кожного управлінського рішення, результати реалізації якого можуть бути як позитивними, так і негативними та нейтральними), «загроза» (форма небезпеки, що виникає у зовнішньому та внутрішньому середовищі, результат реалізації якої є завжди негативним, що виявляться у зменшенні величини очікуваного прибутку, втрат та отриманої реальної шкоди), що дало змогу визначити сукупність цілей безпекової діяльності підприємства, які загалом передбачають моніторинг рівня безпеки, мінімізацію ризиків, ідентифікацію і протидію внутрішнім і зовнішнім загрозам. Обґрунтовано трактування безпекового потенціалу як сукупної здатності використати наявні ресурси і можливості для формування безпечних умов розвитку через зниження ризиків та протидію внутрішнім та зовнішнім загрозам. Визначено місце безпекового потенціалу у структурі економічного потенціалу підприємства, охарактеризовано його складові та розглянуто процес формування в умовах українських підприємств, що створює необхідне теоретичне підґрунтя для їх безпечного розвитку. Доведено, що управління безпековою діяльністю доцільно трактувати як процес планування, організації, мотивації й контролю систематичних та цілеспрямованих дій суб’єктів безпеки стосовно об’єктів безпеки для збереження підприємства як системи та формування безпечних умов розвитку для досягнення пріоритетних інтересів. Сформовано значення системи управління безпековою діяльністю підприємства в системі управління підприємством. Доведено, що в процесі управління кожною функціональною складовою системи управління підприємством (виробництво, маркетинг, фінанси, інновації та кадри) має враховуватися безпековий аспект, тобто як розроблення та прийняття управлінських рішень менеджерами в різних сферах господарської діяльності може вплинути на рівень безпеки підприємства як системи та його частин. Визначено основні пріоритети системи управління безпековою діяльністю: тактичні (захист об’єктів безпеки та підприємства як системи вищого порядку від негативної дії зовнішніх та внутрішніх викликів, ризиків і загроз) та стратегічні (забезпечення гнучкості управління підприємством через формування необхідного інформаційного забезпечення із урахуванням безпекового аспекту), статичні (стійкість підприємства як соціальноекономічної системи) і динамічні (розвиток безпекової діяльності відповідно до зміни зовнішніх умов та потреб підприємства). Сформовано концептуальні основи управління безпековою діяльністю підприємств, які формулюють ключові засади управління безпековою діяльністю українських підприємств, відповідно до мети, що визначає здатність реалізовувати взаємопов’язані заходи, спрямовані на мінімізацію ризиків та протидію негативному впливу зовнішніх та внутрішніх загроз, тобто захист бізнесу як основа для його розвитку. Розроблено модель системи економічної безпеки підприємства, в якій одночасно із принципами, функціями, методами, засобами та забезпеченням обґрунтовано зміст та місце механізму управління безпековою діяльністю, механізмів взаємодії, розроблення та реалізації управлінських рішень суб’єктами безпеки. У другому розділі «Аналітичне підґрунтя управління безпековою діяльністю промислових підприємств» сформовано інформаційне підгрунтя управління безпековою діяльністю промислових підприємств. Докладно розглянуто та охарактеризовано динаміку діяльності підприємств харчової, легкої, хімічної та машинобудівної промисловості. Встановлено перелік ключових загроз, які негативно впливають на економічну безпеку підприємств окремих видів економічної діяльності, серед яких виокремлено: зниження купівельної спроможності населення; щорічне зменшення трудового потенціалу; низька ефективність господарської діяльності через збитковість та недостатній рівень рентабельності виробництва промислової продукції; мала частка інноваційно активних підприємств; зростаюча конкуренція зі сторони іноземних товаровиробників; низька конкурентоспроможність виготовленої продукції не лише на зовнішніх, але й на внутрішньому ринку; застарілість основних засобів, що спричиняє зниження якості та зростання собівартості промислової продукції. Розроблено методичний підхід до управління безпековою діяльністю промислових підприємств, що ґрунтується на методі функціонального моделювання і структурного аналізу на основі IDEF0. Застосування розробленого методичного підходу дає можливість істотно підвищити ефективність визначення та протидії зовнішнім та внутрішнім загрозам. Сформовано науково-методичний підхід, який передбачає оцінювання управління безпековою діяльністю, відповідно до системного підходу, у розрізі керуючої та керованої підсистем та управлінських рішень. Здійснена апробація в умовах десяти промислових підприємств дала змогу виявити, що для більшості з них характерна недостатня результативність функціонування керуючої системи, низький рівень безпеки щодо керованої підсистеми та незадовільна ефективність прийняття і реалізації управлінських рішень у системі управління безпековою діяльністю. Апробацію розробленого науково-методичного підходу було здійснено в умовах десяти промислових підприємств. Результати досліджень дали змогу дійти висновків про недостатню результативність функціонування керуючої системи, низький рівень безпеки щодо керованої підсистеми та незадовільну ефективність прийняття та реалізації управлінських рішень у системі управління безпековою діяльністю, що були характерні для більшості із досліджуваних підприємств. У третьому розділі «Методичні підходи до управління безпековою діяльністю промислових підприємств» розроблено механізм управління безпековою діяльністю промислових підприємств як сукупності взаємопов’язаних складових, що включають суб’єкти й об’єкти безпеки, цілі та інтереси, функції, принципи, методи, ресурсне забезпечення, які, об’єднуючись у систему, спрямовані на формування безпечних умов розвитку підприємства. Розроблено механізм взаємодії суб’єктів безпеки, який складається з вибору інструментів управління взаємодією суб’єктів безпеки, напрямів підвищення результативності взаємодії, розроблення та реалізації програми підвищення результативності взаємодії внутрішніх та зовнішніх суб’єктів безпеки, що в сукупності уможливлює формування безпечних умов розвитку підприємства з ефективним використанням наявних ресурсів та за результатами взаємодії із зовнішніми суб’єктами безпеки. Запропоновано механізм розроблення та реалізації управлінських рішень суб’єктами безпеки, який передбачає послідовне виконання трьох етапів: формування необхідного інформаційного підґрунтя; розроблення альтернативних варіантів управлінських рішень; реалізацію рішення із необхідною оцінкою та можливістю коригування процесу здійснення захисних заходів. Розроблено науково-практичний підхід до формування безпекового потенціалу промислових підприємств, який дає можливість, на основі застосування методу багатокритеріального оцінювання альтернатив, вибрати найраціональніший варіант ресурсного забезпечення безпекової діяльності підприємств за різної потреби у матеріально-фінансових, кадрових та організаційних ресурсах для досягнення поставлених перед суб’єктами безпеки завдань. Розроблено теоретичні положення щодо управління безпековою діяльністю промислових підприємств, що передбачають застосування матриці вибору стратегії управління безпековою діяльністю підприємства, в основі якої міститься потреба врахування двох параметрів – рівня безпеки та варіанту стратегії розвитку підприємства; охарактеризовано зміст можливих альтернативних варіантів стратегій. Обґрунтовано ключові методичні засади реалізації певної стратегії, дотримання яких уможливлює досягнення стратегічних цілей стратегії розвитку певного підприємства. Здійснена апробація дала змогу встановити найдоцільнішу стратегію управління безпековою діяльністю для кожного із досліджуваних промислових підприємств. Обґрунтовано ключові теоретичні основи реалізації певної стратегії, дотримання яких уможливлює досягнення стратегічних цілей стратегії розвитку певного підприємства. The dissertation is devoted to the solution of the scientific problem, which consists in theoretical substantiation and development of scientific and applied bases of management of safety activity of industrial enterprises. The first section "Theoretical and methodological aspects of enterprise security management" discusses the essence of basic concepts to ensure the security of enterprises as "security", "development", "activity", "enterprise", which allowed to justify the interpretation of the security activity of the enterprise as an enterprise in cooperation with external security entities for ensuring their own dynamic stability of functioning and formation of safe conditions for development through protection against external and internal threats and minimizing risks. It is proved that security activity is not an analogue of "operational", "investment" or "financial", it makes it possible for them to be implemented. Key approaches have been identified and their own understanding of terms such as ‘danger’ has been identified (being the result of threats, resulting in a decline in security; a negative impact that could result in the destruction of the system, including bankruptcy of the enterprise), ‘risk’ (inherent in business activity in general and in the process of making every management decision, the results of which can be positive, negative and neutral), "Threat" (a form of danger that arises in the external and internal environment, the result of which is always negative, resulting in a decrease in the amount of expected profits, losses and real damage received), which made it possible to determine the purposefulness of goals without the specific activity of the enterprise, which in general provide for monitoring of security level, minimization of risks, identification and counteraction of internal and external threats. The interpretation of the security potential as a combined ability to use the available resources and opportunities to create safe conditions for development by reducing risks and counteracting internal and external threats is substantiated. The place of the security potential in the structure of the economic potential of the enterprise is determined, its components are characterized and the process of formation in the conditions of Ukrainian enterprises is considered, which creates the necessary theoretical foundation for their safe development. It is proved that the management of security activities should be interpreted as the process of planning, organizing, motivating and controlling the systematic and purposeful actions of security subjects with respect to security objects in order to preserve the enterprise as a system and to create safe conditions for development in order to achieve priority interests. The place of place of management system of security activity of enterprise in the system of enterprise management is determined. It is proved that in the process of managing every functional component of the enterprise management system (production, marketing, finance, innovations and personnel) the safety aspect should be taken into account, that is, how the development and decision making of managers in different spheres of economic activity can affect the level of enterprise security as a system and its parts. The main priorities of the security management system are identified: tactical (protection of security objects and enterprises as a higher order system from the negative effects of external and internal challenges, risks and threats) and strategic (providing flexibility of managing the enterprise by forming the necessary information support taking into account the security aspect ), static (firm sustainability as a socio-economic system) and dynamic (development without a specific activity in accordance with changing external conditions t needs of the enterprise). Conceptual frameworks for enterprise security management have been formed, defining key principles for managing Ukrainian companies’ security activities, based on the goal that defines the ability to implement interrelated measures aimed at minimizing risks and counteracting the negative impact of external and internal threats, ie the protection of business its development. The model of the economic security system of the enterprise is developed in which, along with the principles, functions, methods, means and provision, the content and place of the security management mechanism, the interaction mechanism and the mechanism of development and implementation of management decisions by the security entities are substantiated. In the second section "Analytical basis of management of safety of industrial enterprises" the information basis of management of safety activity of industrial enterprises is formed. The dynamics of activity of the enterprises of food, light, chemical and machine-building industry are carefully considered and characterized. The list of key threats that adversely affect the economic security of enterprises of certain types of economic activity, among which were identified: reduction of purchasing power; annual reduction of labor potential; low efficiency of economic activity due to loss-making and insufficient level of profitability of industrial production; small share of innovative enterprises; growing competition from foreign producers; low competitiveness of manufactured products not only in foreign but also in the domestic market; obsolescence of fixed assets, which causes a decrease in the quality and increase in the cost of industrial products. A methodological approach to the safety management of industrial enterprises has been developed, based on the method of functional modeling and structural analysis based on IDEF0. The application of the developed methodological approach makes it possible to significantly increase the effectiveness of identifying and counteracting external and internal threats. A scientific and methodological approach has been formed, which provides for the evaluation of safety management, in accordance with the systematic approach, in the context of the managed and managed subsystems and management decisions. Testing in ten industrial enterprises revealed that most of them are characterized by insufficient performance of the management system, low level of security of the managed subsystem, and unsatisfactory efficiency in making and implementing management decisions in the safety management system. The development of the developed scientific and methodological approach was carried out in the conditions of ten industrial enterprises. The results made it possible to conclude that the performance of the management system was not effective, the security of the managed subsystem was low, and that management decisions in the safety management system, which were typical for most of the surveyed enterprises, were unsatisfactory. In the third section "Methodical approaches to the management of the safety of industrial enterprises" developed a mechanism for managing the safety of industrial enterprises as a set of interrelated components that include security entities, security objects, goals and interests, functions, principles, methods, resource security, which, being integrated into the system, are aimed at creating safe conditions for enterprise development. Mechanism of interaction of security subjects is developed, which includes: choice of tools of management of interaction of security subjects, directions of increase of effectiveness of interaction, development and implementation of the program of increase of efficiency of interaction of internal and external security entities, which in total makes it possible to form safe conditions for enterprise development from effective use of available resources and the results of interaction with external security actors. A mechanism for the development and implementation of management decisions by security entities is proposed, which envisages the sequential implementation of three stages: formation of the necessary information base; development of alternative management decisions; implementation of the decision with the necessary assessment and possibility to adjust the process of implementation of protective measures. The scientific and practical approach to the formation of the security potential of industrial enterprises has been developed, which allows, based on the use of the multicriteria evaluation method of alternatives, to select the most rational option of securing the security of enterprises with different needs in material, financial, personnel and organizational resources to achieve the set in front of the subjects of task security. Theoretical provisions on the safety management of industrial enterprises have been developed, which provide for the application of the matrix of choice of the strategy of management of the security activity of the enterprise, based on the necessity to take into account two parameters: the level of security and the variant of the enterprise development strategy, and the content of possible alternative options of strategies is characterized. The key methodological foundations of the implementation of a certain strategy are substantiated, the observance of which makes it possible to achieve the strategic goals of the strategy of the development of a certain enterprise. The performed testing allowed us to determine the most appropriate safety management strategy for each of the studied industrial enterprises. The key theoretical foundations for the implementation of a certain strategy are substantiated, the observance of which makes it possible to achieve the strategic goals of the strategy of the development of a certain enterprise.
APA, Harvard, Vancouver, ISO, and other styles
4

Громова, О. М. "Правове забезпечення захисту економічної безпеки суб’єктів господарювання." Thesis, Донецький юридичний інститут, 2015. http://essuir.sumdu.edu.ua/handle/123456789/51749.

Full text
Abstract:
Relations among participants of protecting activity have been classified; creating a body on coordinating issues as for working out standarts in the sphere of providing subjects of econimy’s economic security has been suggested in the thesis. It has been proposed to limit the range of founders of non-state security service by residents of Ukraine. The aim of system of defending economic security has been given more accurate definition; guarding services have been classified. Definition of defending economic security mechanism functions has been proposed; giving licence to all security sevices with permitting them to use special aids and fire-arms have been proposed. It has been proposed to complete legislation on the basis of model Law of CIS. Definition of “self-provision of economic security by subjects of economy”; types of private detective activity and groups of tasks classification; propositions as for economic security of state and municipal property subjects; as for coordinating efforts between non-state and state security bodies; argumentations as for broadening competence of non-state security services; classification of main stages sertificating systems of management of information on security and so on have been further develoed.
У роботі класифіковано відносини між учасниками охоронної діяльності; запропоновано створення органу з координації питань із розробки стандартів в галузі забезпечення економічної безпеки суб’єктів господарювання; запропоновано обмежити коло засновників недержавної охоронної служби резидентами України. Уточнено визначення мети системи захисту економічної безпеки; класифіковано охоронні служби. Удосконалено визначення функцій механізму захисту економічної безпеки; пропозицію щодо ліцензування усіх служб безпеки з наданням їм дозволу на використання і застосування спеціальних засобів та вогнепальної зброї. Запропоновано доповнити законодавство на основі норм модельного Закону СНД. Дістали подальшого розвитку: визначення «самозабезпечення економічної безпеки суб’єктами господарювання»; класифікація видів приватної детективної діяльності та груп завдань; пропозиції про економічну безпеку об’єктів державної та комунальної власності, про координацію зусиль між недержавними службами безпеки та державними органами; аргументація доцільності розширення компетенції недержавних служб безпеки; класифікація основних стадій процесу сертифікації систем управління менеджментом інформаційної безпеки та ін.
APA, Harvard, Vancouver, ISO, and other styles
5

Almeida, Germana Pinheiro de. "A aporia da exclusão ou o paradoxo do capital: uma análise sobre o auxílio reclusão na sociedade do espetáculo." Universidade Catolica de Salvador, 2015. http://hdl.handle.net/123456730/203.

Full text
Abstract:
Submitted by Jamile Barbosa da Cruz (jamile.cruz@ucsal.br) on 2016-10-25T14:46:21Z No. of bitstreams: 1 Versao Final (111115) 7 para impressão (2).pdf: 1013938 bytes, checksum: 6401e7cf6a19764c7a2f2015f98e8b94 (MD5)
Approved for entry into archive by Maria Emília Carvalho Ribeiro (maria.ribeiro@ucsal.br) on 2016-12-28T20:41:51Z (GMT) No. of bitstreams: 1 Versao Final (111115) 7 para impressão (2).pdf: 1013938 bytes, checksum: 6401e7cf6a19764c7a2f2015f98e8b94 (MD5)
Made available in DSpace on 2016-12-28T20:41:51Z (GMT). No. of bitstreams: 1 Versao Final (111115) 7 para impressão (2).pdf: 1013938 bytes, checksum: 6401e7cf6a19764c7a2f2015f98e8b94 (MD5) Previous issue date: 2015-11-30
A presente dissertação pretende abarcar criticamente o conceito e aplicação do auxílio-reclusão na sociedade do espetáculo, entendido como alegoria na democracia liberal brasileira, em antinomia com a idéia de justiça e o atual estágio da crise estrutural do capital. Deste modo, a partir da pergunta central: o que é de fato o auxílio reclusão serão apontados quais são os princípios previdenciários norteadores e como se delineia a Previdência Social no Brasil, com destaque para a contextualização histórica, retratando, com especial ênfase, o período compreendido entre a Constituição Federal de 1988 a 2013. A resposta para referida pergunta está muito longe de ser simples, portanto, a abordagem dos meios de comunicação - desde revistas periódicas até as redes sociais, sem olvidar das demais fontes de/para (des) informação – considera os motivos que realmente motivam esses discursos excludentes e que levaram, inclusive, a uma proposta de emenda constitucional, a PEC 304, que retrata exatamente os argumentos lançados, ainda que desprovidos de sustentação teórica e compreensão do fenômeno em apreço. Pretende-se, ainda, desvelar outros fundamentos e motivações que justificam a forma com que esta questão é evidenciada nestas abordagens midiáticas. Um viés a ser desnudado com a pesquisa em voga. Não obstante, insistimos que não parece existir, a principio, uma resposta fácil para esta indagação. A velha dicotomia entre o bem e o mal não pode ser diluída facilmente, ainda mais se as respostas se mostram subservientes à lógica do capital - a mercantilização de todas as esferas da vida. Neste contexto, o papel e o propósito do Estado serão concomitantementes avaliados sob a égide do sujeito ético-moral ser suplantando pelo sujeito mercadoria.
This thesis aims to critically address the concept and implementation of aid-seclusion in the society of the spectacle, with the allegory of the Brazilian liberal democracy in contradiction with the idea of justice and the current stage of capital's structural crisis. However, what is in fact the aid seclusion will be singled out which are the guiding social security principles and how it outlines the Social Security, with special emphasis on the period between the Brazil Federal Constitution of 1988 to 2013 The answer to that question is far from simple, nevertheless, we insist that there seems to be, at first, an easy answer to this question. The old dichotomy between good and evil can not be easily diluted, even if the answers are shown subservient to the logic of capital. In this context, the role and purpose of the State shall be concomitantementes evaluated under the aegis of the ethical-moral subject is supplanting the subject-commodity.
APA, Harvard, Vancouver, ISO, and other styles
6

Bankole, Bamidele Adetokunbo. "Distinguishing Leadership of Information Assurance Teams." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1187.

Full text
Abstract:
Information assurance (IA) projects are essential components of the information technology industry and often fail due to budget overruns, missed deadlines, and lack of performance by the project teams. The purpose of this phenomenological study was to explore the strategies necessary to improve IA project team performance. Lewin's situational leadership theory was used as the conceptual framework for this study. Interviews were conducted with 20 IA professionals located in the Washington, DC Metropolitan area. The data were transcribed, coded, and clustered for the identification of common patterns based on the Moustakas' modified van Kaam analysis. The major themes that emerged from the interview data included the importance of: communication and teamwork, technical knowledge, training, hiring of skilled resources, and balanced project teams. An organization-wide internal training program emerged as an overarching best practice to improve the leadership strategies within the IA sector. The study results may help improve project success and grow the IA industry by creating more jobs.
APA, Harvard, Vancouver, ISO, and other styles
7

Meini, Méndez Iván Fabio. "The penalty: function and requirements." Pontificia Universidad Católica del Perú, 2013. http://repositorio.pucp.edu.pe/index/handle/123456789/116002.

Full text
Abstract:
Legitimacy of criminal sanction is originated on its own purposes pursued in a state governed by the Rule of Law. That legitimacy should include the penalty as well as security measures, bearing in mind that both are imposed to someone breaking a rule of conduct, and therefore, someone capable to do it. Reviewing penal capacity or criminal liability concepts is required because if penal capacity means the capacity to understand the reality and adjust the behavior to it, and if every legitimate criminal sanction have to be imposed to someone who have the capacity of break it, then security measures also have to be imposed only to people responsible, capable to understand rules and act in accordance. With regard to people not subject to criminal liability they are standing outside Criminal Law and punish them would be illegitimate. In this line, criminal liability should be seen not only as a crime assumption but also as a basic statement for any dialogue the state shall have with the citizens: at the level of crime itself, proceedings and sentence execution .
La legitimación de la sanción penal se deriva de los fines que persigue en un Estado de derecho. Dicha legitimación debe abarcar tanto a la pena como a la medida de seguridad, y tener en cuenta que tanto la pena como la medida de seguridad se imponen a quien infringe una norma de conducta y, por tanto, a quien tiene capacidad para infringirla. Esto presupone revisar el concepto de capacidad penal o imputabilidad,pues si imputabilidad es capacidad para comprender la realidad y adecuar el comportamiento a dicha comprensión, y toda sanción penal legítima ha de imponerse a quien tiene dicha capacidad, también las medidas de seguridad han de ser impuestas solo a imputables. Los verdaderos inimputables son aquellos que están al margen del derecho penal y a quienes resulta ilegítimo imponer alguna sanción. En esta línea, la imputabilidad ha de ser vista no solo como presupuesto del delito, sino como presupuesto de cualquier diálogo que tenga el Estado con el ciudadano con respecto al delito, al proceso y a la ejecución de la pena.
APA, Harvard, Vancouver, ISO, and other styles
8

Шеховцова, Є. А. "Цивільний позов в кримінальному провадженні." Thesis, Чернігів, 2020. http://ir.stu.cn.ua/123456789/20114.

Full text
Abstract:
Шеховцова, Є. А. Цивільний позов в кримінальному провадженні: 081 Право / Є. А. Шеховцова; керівник роботи Пузирний В. Ф.; Національний університет «Чернігівська політехніка», кафедра кримінального права та правосуддя. – Чернігів, 2020. – 87 с.
Будь яке кримінальне правопорушення заподіює шкоду суспільним відносинам, які виступають в якості об’єкта відповідного посягання. Але людська природа влаштована таким чином, що достатньо рідко винна особа добровільно визнає свою неправомірну поведінку, повністю розкаюється і повертає майно, чи іншим способом компенсує заподіяну шкоду. Така особа вимагає подання доказів, перш за все самого факту заподіяння шкоди, її розміру та інших, пов’язаних з цим фактом, обставин. І це досить природна і заснована на законі вимога підозрюваного чи обвинуваченого у вчинені протиправного кримінально-караного діяння, що спричинило шкоду (комплексну шкоду). В кримінальному процесуальному законодавстві наявний інститут, який має назву цивільний позов в кримінальному провадженні. Він регулює підстави, умови та правила розгляду цивільних позовів, порядок визнання позивачем і відповідачем, рішення, прийняті по заявленому позову, а також забезпечення цивільного позову і виконання вироку в частині конфіскації майна. Розділ 1 роботи присвячений дослідженню поняття та правової природи цивільного позову в кримінальному провадженні. В межах розділу 2 досліджується правовий статус суб’єктів доказування цивільного позову в кримінальному провадженні. Розділ 3 присвячений аналізу сучасного стану та проблем забезпечення цивільного позову в кримінальному провадженні. Основні положення і висновки роботи обговорювались на Міжкафедральному науково-практичному семінарі на тему «Правнича наука: традиції та вектори розвитку» (м. Чернігів, 23 квітня 2020 року). Основні результати проведеного дослідження викладені в одній науковій праці.
Be what criminal offence causes harm to the public relations that come forward as an object of corresponding encroachment. But human nature is arranged so that sufficiently a rarely guilty person acknowledges the illegal behavior voluntarily, fully repents and returns property, or by another method compensates the caused harm. Such person requires presentation of proofs, foremost fact of damnification, his size and other, related to this fact, circumstances. And it is a natural enough and based on a law requirement suspected or defendant in perfect illegal criminally-punishable act that entailed harm (complex harm). In a criminal judicial legislation present institute that has the name civil action in criminal realization. He regulates grounds, terms and rules of consideration of civil actions, order of confession a plaintiff and defendant, decisions accepted on the declared lawsuit, and also securities for a civil claim and implementations of sentence, in part of confiscation of property. Section 1 of the sanctified to research of concept and legal nature of civil action in criminal realization. Within this section 2 legal status of subjects of finishing telling of civil action is investigated in criminal realization. Section 3 is devoted to the analysis of the problems of security for a civil claim is in criminal realization. The scientific novelty of the got results consists in that first: it is offered in the century of article 127 The Criminal Procedural Code of Ukraine and to envisage the duty of investigator at establishment in criminal realization, on the stage of pre-trial investigation, consequences of perfect criminal offence - infliction of property harm to the physical and legal persons, and to the citizens, - moral harm, to explain to the marked persons their right to give a civil action and require his compensation in case of presence of corresponding grounds to consider, that harm be caused directly criminal. The main provisions and conclusions of the work were discussed at the interdepartmental scientific-practical seminar «Legislative science: traditions and vectors of development» (Chernihiv, 2020). The main results of the study are outlined in 1 scientific paper.
APA, Harvard, Vancouver, ISO, and other styles
9

Wassbro, Sandra. "”I brist på vaccin har vi kommunikation” : Att skydda det mänskliga omdömet för att rädda liv under covid-19-infodemin." Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9612.

Full text
Abstract:
This thesis makes use of biopolitical theory to examine the governmental and organizational response to the covid-19-infodemic. It aims to answer the puzzling research question as to why the infodemic – whose inherent problem is an overabundance of information – is responded to and met with even greater amounts of information by governments and health organizations, and what implications these measures may have on the population. The analysis finds that the question can partly be answered by derivation to previous research within the field of crisis communication: the most efficient way to respond to mis- and disinformation is to respond with correct information and with counter arguments. To answer the question in full an analysis of the subject of security is conducted where what can be interpreted from the material, following a modified version of Carol Lee Bacchi’s “What’s the Problem Represented to be?” method, is that the human judgement can be understood as the subject of security. The idea is that by securing the human judgment through improving people’s health literacy, people can be taught to act in a manner which is coherent with the state’s biopolitical goals, i.e. to secure the survival of the population. The analysis also shows that while these measures are made in an effort to secure the population, the measures themselves risk becoming a threat to the very population it is supposed to protect.
APA, Harvard, Vancouver, ISO, and other styles
10

Bordovský, Lukáš. "Optimální dispozice pracovišť bezpečnostní kontroly cestujících." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-229908.

Full text
Abstract:
The final master’s thesis analyzes the individual elements of Security control workplace and solves their optimization with respect to the rulemaking side of things, and integration into the existing space layout with a vision of the increasing demand for transport. Solves the issue of electromagnetic interference elimination in the detection equipment and suggests possible solutions to overcome them. The work is primarily related to the Prague - Ruzyne airport.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security subject"

1

Canadian Institute for International Peace and Security. Information Services. Peace and security thesaurus. Ottawa: The Institute, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

The ethical subject of security: Geopolitical reason and the threat against Europe. Milton Park, Abingdon, Oxon, [England]: Routledge, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cameron, Robin. Subjects of Security. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137274366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Evan. Race, gender and the body in British immigration control: Subject to examination. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stormorken, Bjørn. Human rights terminology in international law: A thesaurus. Dordrecht: M. Nijhoff, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcomittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Littke, Grant. Subjects of security: Community, identity, and the dynamics of ethnic conflict. Toronto, Ont: Centre for International and Strategic Studies, York University, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. House. A bill to amend title XVIII of the Social Security Act to prevent overpayment for hospital discharges to post-acute care services by eliminating the limitation on the number of diagnosis-related groups (DRGs) subject to the special transfer policy. Washington, D.C: United States Government Printing Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security subject"

1

Cameron, Robin. "Sovereignty and the Modern Subject: Theory as Practice." In Subjects of Security, 15–36. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137274366_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weeks, Sindiso Mnisi. "Controversial subject matter." In Access to Justice and Human Security, 79–106. New York, NY : Routledge, 2017. | Series: Cultural diversity and law: Routledge, 2017. http://dx.doi.org/10.4324/9781315162898-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ferreira, Ana, and Rui Chilro. "What to Phish in a Subject?" In Financial Cryptography and Data Security, 597–609. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70278-0_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boniface, Coline, Imane Fouad, Nataliia Bielova, Cédric Lauradoux, and Cristiana Santos. "Security Analysis of Subject Access Request Procedures." In Privacy Technologies and Policy, 182–209. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21752-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

da Mota, Sarah. "Individualising Civilisation: The Civilised Subject of Security." In NATO, Civilisation and Individuals, 45–68. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74409-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Jacqueline, Duminda Wijesekera, and Sushil Jajodia. "Subject Switching Algorithms for Access Control in Federated Databases." In Database and Application Security XV, 61–74. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35587-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Haoze, Tianwei Xu, and Juxiang Zhou. "Mathematical Subject Information Entity Recognition Method Based on BiLSTM-CRF." In Machine Learning for Cyber Security, 259–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Burkert, Christian, Maximilian Blochberger, and Hannes Federrath. "Compiling Personal Data and Subject Categories from App Data Models." In ICT Systems Security and Privacy Protection, 242–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thonnard, Olivier, Leyla Bilge, Anand Kashyap, and Martin Lee. "Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks." In Financial Cryptography and Data Security, 13–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tuccari, Francesco Fabrizio. "Considerations on the Subject of Food Security and Food Safety." In LITES - Legal Issues in Transdisciplinary Environmental Studies, 229–41. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75196-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security subject"

1

Carvalho, Marcelo. "Bonds to the subject." In 2013 International Carnahan Conference on Security Technology (ICCST). IEEE, 2013. http://dx.doi.org/10.1109/ccst.2013.6922035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Desai, Sachi, and Shafik Quoraishee. "Algorithms exploiting ultrasonic sensors for subject classification." In SPIE Europe Security + Defence, edited by Edward M. Carapezza. SPIE, 2009. http://dx.doi.org/10.1117/12.835631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sokratova, I. V. "FEATURES OF ECONOMIC SECURITY SUBJECT OF MANAGING." In Modern Technologies in Science and Education MTSE-2020. Ryazan State Radio Engineering University, 2020. http://dx.doi.org/10.21667/978-5-6044782-6-4-92-95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sun, Zhu-Mei. "Resource Organization of Subject Information Gateway Based on the Subject Domain Ontology." In 2012 4th International Conference on Multimedia Information Networking and Security (MINES). IEEE, 2012. http://dx.doi.org/10.1109/mines.2012.192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nadeem, Muhammad, Byron J. Williams, Gary L. Bradshaw, and Edward B. Allen. "Human Subject Evaluation of Computer-Security Training Recommender." In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2016. http://dx.doi.org/10.1109/compsac.2016.130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"ISI 2020 Subject Index Page." In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2020. http://dx.doi.org/10.1109/isi49825.2020.9280543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"ISCISC 2020 Subject Index Page." In 2020 17th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 2020. http://dx.doi.org/10.1109/iscisc51277.2020.9261915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Allen, Matthew R., Jae Jun Kim, and Brij Agrawal. "Control of a deformable mirror subject to structural disturbance." In SPIE Defense and Security Symposium, edited by Steven L. Chodos and William E. Thompson. SPIE, 2008. http://dx.doi.org/10.1117/12.783758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"ISCISC 2017 Subject Index." In 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, 2017. http://dx.doi.org/10.1109/iscisc.2017.8488374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tahmoush, Dave. "An automated analysis of wide area motion imagery for moving subject detection." In SPIE Defense + Security, edited by Daniel J. Henry, Gregory J. Gosian, Davis A. Lange, Dale Linne von Berg, Thomas J. Walls, and Darrell L. Young. SPIE, 2015. http://dx.doi.org/10.1117/12.2177361.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security subject"

1

Kaminski, Michael D., Katrina McConkey, Matthew Magnuson, Sang Don Lee, Benjamin Stevenson, and Orly Amir. Subject Matter Expert Workshop for the Use of Municipal and Commercial Equipment for Radiological Response and Recovery: National Urban Security Technology Laboratory Workshop Summary Report. Office of Scientific and Technical Information (OSTI), May 2018. http://dx.doi.org/10.2172/1494805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v1.

Full text
Abstract:
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and consistent with law, agency mission, resource constraints, and U.S. national, homeland, and economic security, NIST will promote the deposit of scientific data arising from unclassified research and programs, funded wholly or in part by NIST, except for Standard Reference Data, free of charge in publicly accessible databases. Subject to the same conditions and constraints listed above, NIST also intends to make freely available to the public, in publicly accessible repositories, all peer-reviewed scholarly publications arising from unclassified research and programs funded wholly or in part by NIST. This Special Publication represents the work of researchers at professional conferences, as reported in Fiscal Year 2019. More information on public access to NIST research is available at https://www.nist.gov/ open.
APA, Harvard, Vancouver, ISO, and other styles
3

Miller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v2.

Full text
Abstract:
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and consistent with law, agency mission, resource constraints, and U.S. national, homeland, and economic security, NIST will promote the deposit of scientific data arising from unclassified research and programs, funded wholly or in part by NIST, except for Standard Reference Data, free of charge in publicly accessible databases. Subject to the same conditions and constraints listed above, NIST also intends to make freely available to the public, in publicly accessible repositories, all peer-reviewed scholarly publications arising from unclassified research and programs funded wholly or in part by NIST. This Special Publication represents the work of researchers at professional conferences, as reported in Fiscal Year 2019. More information on public access to NIST research is available at https://www.nist.gov/ open.
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v3.

Full text
Abstract:
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and consistent with law, agency mission, resource constraints, and U.S. national, homeland, and economic security, NIST will promote the deposit of scientific data arising from unclassified research and programs, funded wholly or in part by NIST, except for Standard Reference Data, free of charge in publicly accessible databases. Subject to the same conditions and constraints listed above, NIST also intends to make freely available to the public, in publicly accessible repositories, all peer-reviewed scholarly publications arising from unclassified research and programs funded wholly or in part by NIST. This Special Publication represents the work of researchers at professional conferences, as reported in Fiscal Year 2019. More information on public access to NIST research is available at https://www.nist.gov/ open.
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Nicole S., Jeri D. Ropero-Miller, Heather Waltke, Danielle McLeod-Henning, Danielle Weiss, and Hannah Barcus. Proceedings of the International Forensic Radiology Research Summit May 10–11, 2016, Amsterdam, The Netherlands. RTI Press, September 2017. http://dx.doi.org/10.3768/rtipress.2017.cp.0005.1709.

Full text
Abstract:
On May 10–11, 2016, the US Department of Justice (DOJ) National Institute of Justice (NIJ), the Netherlands Forensic Institute (NFI; Dutch Ministry of Security and Justice of the Netherlands), the International Society for Forensic Radiology and Imaging (ISFRI), the International Association of Forensic Radiographers (IAFR), and NIJ’s Forensic Technology Center of Excellence (FTCoE) at RTI International organized and convened the International Forensic Radiology Research Summit (IFRRS) at the Academic Medical Center in Amsterdam. The summit assembled 40 international subject matter experts in forensic radiology, to include researchers, practitioners, government employees, and professional staff from 14 countries. The goal of this 2-day summit was to identify gaps, challenges, and research needs to produce a road map to success regarding the state of forensic radiology, including formulating a plan to address the obstacles to implementation of advanced imaging technologies in medicolegal investigations. These proceedings summarize the meeting’s important exchange of technical and operational information, ideas, and solutions for the community and other stakeholders of forensic radiology.
APA, Harvard, Vancouver, ISO, and other styles
6

Kucherova, Hanna, Anastasiia Didenko, Olena Kravets, Yuliia Honcharenko, and Aleksandr Uchitel. Scenario forecasting information transparency of subjects' under uncertainty and development of the knowledge economy. [б. в.], October 2020. http://dx.doi.org/10.31812/123456789/4469.

Full text
Abstract:
Topicality of modeling information transparency is determined by the influence it has on the effectiveness of management decisions made by an economic entity in the context of uncertainty and information asymmetry. It has been found that information transparency is a poorly structured category which acts as a qualitative characteristic of information and at certain levels forms an additional spectrum of properties of the information that has been adequately perceived or processed. As a result of structuring knowledge about the factor environment, a fuzzy cognitive model of information transparency was constructed in the form of a weighted digraph. Structural analysis and scenario forecasting of optimal alternatives of the fuzzy cognitive model made it possible to evaluate the classes of factors, identify their limited relations, establish the centrality of the roles of information transparency and information and communication security in the system built and evaluate their importance when modeling the situation self-development. Information visibility, reliability and availability have been found to have the strongest impact on the system. Taking into account different initial weights of the key factors — information transparency and information and communication security — the study substantiates the strategic ways for economic entities to achieve their goals in the context of uncertainty and information asymmetry, which allows us to use this approach as a tool for strategic management in the information environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Full text
Abstract:
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
APA, Harvard, Vancouver, ISO, and other styles
8

Polyakova, Tatiyana An, Ignat S. Boychenko, and Nataliya An Troyan. Information and legal support of information security in the transport sector in the context of digital development. DOI CODE, 2021. http://dx.doi.org/10.18411/2021-0339-1001-46156.

Full text
Abstract:
The current paper deals with the information and legal support of information security in the transport sector in the context of digital development. Thus, the development of information and telecommunication technologies and the digitalization of public relations have also affected the field of transport and transport services. There have appeared not only new Транспортное право и безопасность. 2021. № 3(39) 148 transportation means, such as unmanned aircraft, but there are also being introduced information systems related to the identification of passengers in transport. The development of electronic interaction between various subjects of information exchange in transport is a consequence of the global digitalization of public relations, which creates certain risks of enforcing information security, a threat to the information transport infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
9

Burniske, Jessica, Dustin Lewis, and Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, October 2015. http://dx.doi.org/10.54813/nrmd2833.

Full text
Abstract:
In 2014, reports suggested that a surge of foreign jihadists were participating in armed conflicts in Syria, Iraq, and elsewhere. The United Nations Security Council responded by imposing in Resolution 2178 (2014) an array of obligations on member states to counter the threat posed by “foreign terrorist fighters” (FTFs). In the intervening year, those states have taken a range of actions — though at various speeds and with varying levels of commitment — to implement the FTF obligations imposed by the Council. Meanwhile, many states continue to fund and otherwise throw their support behind life-saving humanitarian relief for civilians in armed conflicts around the world — including conflicts involving terrorists. Yet, in recent years, members of the humanitarian community have been increasingly aware of the real, perceived, and potential impacts of counterterrorism laws on humanitarian action. Part of their interest stems from the fact that certain counterterrorism laws may, intentionally or unintentionally, adversely affect principled humanitarian action, especially in regions where terrorist groups control territory (and thus access to civilians, too). The effects of these laws may be widespread — ranging from heightened due diligence requirements on humanitarian organizations to restrictions on travel, from greater government scrutiny of national and regional staff of humanitarian organizations to decreased access to financial services and funding. Against that backdrop, this briefing report has two aims: first, to provide a primer on the most salient issues at the intersection of counterterrorism measures and humanitarian aid and assistance, with a focus on the ascendant FTF framing. And second, to put forward, for critical feedback and assessment, a provisional methodology for evaluating the following question: is it feasible to subject two key contemporary wartime concerns — the fight against FTFs and supporting humanitarian aid and assistance for civilians in terrorist-controlled territories — to meaningful empirical analysis?
APA, Harvard, Vancouver, ISO, and other styles
10

Quak, Evert-jan. Russia’s Approach to Civilians in the Territories it Controls. Institute of Development Studies (IDS), March 2022. http://dx.doi.org/10.19088/k4d.2022.041.

Full text
Abstract:
This rapid review synthesises the literature from academic sources, knowledge institutions, non-governmental organisations (NGOs), and trusted independent media outlets on the approach used by the Russian government to provide any support or services to civilians in the territories it controls. The rapid review concludes that Russia provides economic, social, government, and military support to de facto states that it controls, such as Abkhazia, South Ossetia, Transnistria and the Donbas region. Russia covers large parts of the state’s budget of these separatist regions. This review uses the term aid referring to a wide range of support, such as humanitarian, social safety nets, basic services, infrastructure, state development, and security. Due to the lack of transparency on the Russian aid money that flows into the regions that are the subject of this review, it is impossible to show disaggregated data, but rather a broader overview of Russian aid to these regions. Russia used humanitarian aid and assistance to provide for civilians. During armed conflict it provided, to some extent, food, and medicines to the people. However, from the literature Russia has used humanitarian aid and assistance as an instrument to pursue broader policy goals that could not be defined as humanitarian in nature. Russia often relied on the language of humanitarianism to strengthen its credentials as a neutral and impartial actor and to justify its continued support for the residents and de facto authorities of Abkhazia, South Ossetia, and Transnistria, to secure its aim to strengthen the political and social ties with these regions while weakening their allegiance to Georgia and Moldova. As the humanitarian activities to the Donbas region in eastern Ukraine demonstrate, the Russian state is not willing to allow scrutiny of their humanitarian aid by independent organisations. Mistrust, corruption, and the use of aid for propaganda, even smuggling arms into the separatist region, are commonly mentioned by trusted sources. After a conflict becomes more stabilised, Russia’s humanitarian aid becomes more of a long-term strategic “friendship”, often sealed in a treaty to integrate the region into the Russian sphere, such as the cases of South Ossetia, Abkhazia, and Transnistria clearly show. Although all these separatist regions rely on Russia (economically, politically, and through Russia’s military presence), this does not mean that they always do exactly what Russia wants, which is particularly the case for Abkhazia and Transnistria.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography