Journal articles on the topic 'Security subject'

To see the other types of publications on this topic, follow the link: Security subject.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security subject.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Korzeniowski, Leszek Fryderyk. "Securitology – security of a subject." Securitologia 23, no. 1 (June 30, 2016): 111–20. http://dx.doi.org/10.5604/01.3001.0009.2966.

Full text
Abstract:
Subjective security (security of a subject) is a state of a subject, his potential and abilities of adequate reaction to hazards as well as an issue of protecting a subject from any hazards. The first scientific analyses of security issue have been known for eighty years now, however, formally science on security as an academic subject was registered (in Poland) just in 2011, in a new distinguished area and field of social science. Science is an intentional activity of man aimed at exploring the world we live in. Scientific knowledge is based on searching constant relations between facts (colloquial knowledge restricts to occasional relations).
APA, Harvard, Vancouver, ISO, and other styles
2

Ruiz, Lester Edwin J. "The subject of security is the subject of security: APEC and the globalization of capital1." Pacifica Review: Peace, Security & Global Change 9, no. 2 (January 1997): 3–17. http://dx.doi.org/10.1080/14781159708412836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Babiński, Aleksander Cezary, Janos Mika, and Roman Ratusznyj. "Subject-Entity Scope of State Security." Internal Security 12, no. 1 (July 22, 2020): 23–34. http://dx.doi.org/10.5604/01.3001.0014.3184.

Full text
Abstract:
This study is based on the assumption that the primary aim of the emergence of states was to provide security and development opportunities for its citizens. This objective determines the method of exercising power, the applicable legal system reflecting the adopted norms of social coexistence, and the public administration system. It was also presumed that security is associated with a sense of threat and confidence. They can be both objective and subjective, which means that they can be measurable or not. Due to the fact that while there are no major problems with determining the definition of a state, there are still difficulties related to identifying the essence of security and, consequently, also the security of the state. Therefore, the paper is based on the results of the bibliographic method and presents an overview of representative outlooks on issues related to threats, security and national security. This was done by reference to works created on the basis of the law, political sciences, and security sciences. The work was divided into three parts. The first introduces the considerations. The second presents views allowing the nature of security to be determined, and the third part presents the subject-entity scope of state security and the determinants of that security.
APA, Harvard, Vancouver, ISO, and other styles
4

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Full text
Abstract:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
APA, Harvard, Vancouver, ISO, and other styles
5

Tylets, V. G., and T. M. Krasnyanskaya. "Psychological Peculiarities of Safety Concepts in Fans of Science Fiction and Detectives." Experimental Psychology (Russia) 13, no. 3 (2020): 180–93. http://dx.doi.org/10.17759/exppsy.2020130314.

Full text
Abstract:
This research is devoted to studying the views of fans of detective and fantasy media products about security in general and about the security subject in particular. It has been suggested that the preference for media products of the fantasy and detective genres contributes to the specification of representations about the security subject. The study was carried out using the semantic differential method with the participation of 400 subjects aged 18 to 22 years. Highlighted significant differences in the structure of ideas about the subject of security among fans of detective fiction and fantasy fans: if from the point of view of the first behavior and actions of the subject security must be based on a realistic assessment of the situation of danger and actualize their own resources, the main qualities of the subject security from the standpoint of the latter are flexibility of thinking, the ability to change behavior, ability to communicate with people, while maintaining the confidentiality of the received information (factor “variability”, “privacy”, “openness”). Common to both groups of subjects are such qualities inherent in the subject of safety as originality of approach to solving a difficult or dangerous situation and energy, activity of actions (factors “novelty” and “activity”). The proposed projective method of evaluating the strategies of the subject’s actions in the conditions of threat, risk and stress expands the diagnostic and predictive capabilities of security psychology.
APA, Harvard, Vancouver, ISO, and other styles
6

Lewandowski, Mateusz. "Energy security in the issues of national security." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (October 10, 2019): 168–85. http://dx.doi.org/10.34739/dsd.2019.01.13.

Full text
Abstract:
The subject of this article is energy security. An in-depth study of the literature on the subject and the analysis of normative documents allowed to formulate the main objective of the work, which is to describe energy security as a component of state security. The goal formulated in such a way creates the need to solve the main research problem of this study, presented in the form of a question: What is the significance of energy security as a component of state security? Achieving the assumed goal and solving the research problem was supported by studying the subject literature and normative documents, as well as the hypothesis that energy security is an important component of state security, and its role is constantly increasing, confirmed in the course of the study.
APA, Harvard, Vancouver, ISO, and other styles
7

Манукян, Артур Вазгенович. "SOCIAL SECURITY AS A SUBJECT SOCIOLOGICAL RESEARCH." STATE AND MUNICIPAL MANAGEMENT SCHOLAR NOTES OF SCAGS 1, no. 2 (July 2017): 225–28. http://dx.doi.org/10.22394/2079-1690-2017-1-2-225-228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Devyatkov, Andrey. "FROZEN CONFLICTSAS SUBJECT OF EUROPEAN SECURITY DIALOGUE." Security Index: A Russian Journal on International Security 17, no. 1 (March 2011): 119–21. http://dx.doi.org/10.1080/19934270.2011.553118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

TYKHOMYROV, D. O. "SECURITY AS A SUBJECT OF DOMESTIC LEGAL." Law and Society 4 (2019): 63–70. http://dx.doi.org/10.32842/2078-3736-2019-4-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Jatinder, and Jennifer Cobbe. "The Security Implications of Data Subject Rights." IEEE Security & Privacy 17, no. 6 (November 2019): 21–30. http://dx.doi.org/10.1109/msec.2019.2914614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hoogensen, Gunhild, and Svein Vigeland Rottem. "Gender Identity and the Subject of Security." Security Dialogue 35, no. 2 (June 2004): 155–71. http://dx.doi.org/10.1177/0967010604044974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Abdurazakov, М. М., and Z. О. Batygov. "Modern problems of ensuring information security in the educational and pedagogical sphere." Informatics and education, no. 10 (December 21, 2021): 57–64. http://dx.doi.org/10.32517/0234-0453-2021-36-10-57-64.

Full text
Abstract:
The article deals with the problems of information security and its provision in relation to society and its educational environment, processes and relations, subjects and objects. The necessity of forming the corresponding subject-information competence of subjects, personal culture of information security is shown.It is noted that the information security of educational subjects is a specific part of the general security of education as its qualitative development in the developing information society in accordance with its properties and requirements. The concept of information security in the field of education is formulated in the context of a general concept and in the aspect of its specificity in education, its educational and educational processes, as well as in the aspect of personal, psychological, age and other properties of subjects of education. This presupposes the presence of a corresponding purposefulness of general education, which also acquires the quality of informational education, and its expression in the content of education and subject-oriented educational training. In particular, this applies to the general education subject “Informatics” as the main resource of information education, in the process of forming the relevant knowledge, competencies and personal qualities.The necessity of mandatory inclusion of the relevant topics in the content of information education in the context of information security and information protection has been substantiated: the state and problems of information security, personal security; goals and objectives of information security; legal and other aspects of information protection, means of protecting electronic data in the field of education.
APA, Harvard, Vancouver, ISO, and other styles
13

Wiraszka, Piotr. "Formation of security culture in individual subjects from the perspective of the three pillars of security culture." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 38, no. 38 (December 18, 2020): 138–51. http://dx.doi.org/10.5604/01.3001.0014.5946.

Full text
Abstract:
Security has become a major object of research for multiple disciplines in the course of the last several decades. This is due to the interdisciplinary nature of the security sciences, in addition to the fact that our reality is undergoing rapid change due to globalisation, and that man attempts to stay abreast of these changes. However, security should never be taken for granted. Ensuring security is a constant process which requires the security subject to continue to act in multiple areas and in multiple dimensions. In the course of this process, the security subject collects impulses which enable it to develop, and rejects those which could potentially pose a threat. This paper is an attempt at presenting the process of security culture formation in individual human security subjects from the perspective of the three-energy stream (three-pillar) theory of security culture.
APA, Harvard, Vancouver, ISO, and other styles
14

Booth, Ken. "Security and emancipation." Review of International Studies 17, no. 4 (October 1991): 313–26. http://dx.doi.org/10.1017/s0260210500112033.

Full text
Abstract:
Our work Is our words, but our words do not work any more. They have not worked for some time. We can obviously start with the misleading label—‘International Politics’—which is given to our subject. As a result of this problem, I have wanted to use increasing numbers of inverted commas; but most have never seen the light of day because copy-editors have regarded them as an over-indulgence. Even so, the very temptation of these little scratches indicates that words at the heart of the subject are i n trouble:
APA, Harvard, Vancouver, ISO, and other styles
15

Snishchenko, Roman. "Definition of economic security of the subject of economic activity." Herald of Ternopil National Economic University, no. 4(94) (December 3, 2019): 70–78. http://dx.doi.org/10.35774/visnyk2019.04.070.

Full text
Abstract:
Introduction. Unstable Economy of Ukraine due to political and military factors accelerates the negative impact of the competitive environment in entities making their business vulnerable and unstable. The issue of companies’ economic security is becoming especially important. Gained experience is to be improved and further development of theoretical and methodological apparatus of companies’ economic security as an important direction of Security Studies is required. Goal. The article aims to study the author’s definition of economic security entities on the basis of acquired scientific experience. The object of the study is the processes of economic security. The subject of research is the theoretical bases of economic security at a separate business entity. Methods. Theoretical and methodological basis of the study is a systematic approach to the definition of economic security as a scientific category, scientific works of domestic and foreign scientists, the method of theoretical generalization, analysis, synthesis, abstract and logical, and others. Results. The article analyzes the current set of definitions of the company’s economic security. The basic approaches to the interpretation of the term are grounded. The expediency of refining classifications and increasing the number of approaches to the definition of economic security are substantiated. The author defines the complex economic category “economic security” as it relates to the business entity. Discussion. It is necessary to clarify purposes and principles of providing economic security of business entity under unstable economy.
APA, Harvard, Vancouver, ISO, and other styles
16

Petrenko, I. "Indicative System of General Security of Operating Subject." Voprosy Ekonomiki, no. 1 (January 20, 2008): 149–54. http://dx.doi.org/10.32609/0042-8736-2008-1-149-154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Maryoosh, Amal Abdulbaqi, Rana Saad Mohammed, and Raniah Ali Mustafa. "Subject Review: Cloud Computing Security Based on Cryptography." International Journal of Engineering Research and Advanced Technology 05, no. 09 (2019): 20–23. http://dx.doi.org/10.31695/ijerat.2019.3569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shinkevich, Vladimir Ye. "Security as a social phenomenon and research subject." Siberian Socium 5, no. 1 (2021): 101–4. http://dx.doi.org/10.21684/2587-8484-2021-5-1-101-104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Derevyanko, Artem. "PERSON AS A SPECIAL SUBJECT OF SOCIAL SECURITY." Knowledge, Education, Law, Management, no. 4 (2021): 206–10. http://dx.doi.org/10.51647/kelm.2021.4.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Tylets, V. G., T. M. Krasnyanskaya, and V. V. Iokhvidov. "Personal Security Scenarios of Subject of Conflict Interaction." Social Psychology and Society 13, no. 1 (2022): 159–73. http://dx.doi.org/10.17759/sps.2022130110.

Full text
Abstract:
Objective. Establishing the potential of reflexive image of personal security by subjects in the construction of scenarios of their conflict interaction.Background. The preservation and dissemination of the psychological practice of conflict interaction require further research aimed at improving the understanding of the factors of its occurrence and dynamic development. The authors of the article link their work in this direction with the introduction of the category of personal security into the research space of conflictology. The corresponding phenomenon, falling into the basic layers of the human need sphere, acquires a controlling status for its activity, including that in the form of conflict interaction.Study design. The paper demonstrates the possibility of constructing scenarios of personal security of subjects of conflict interaction and identifying their differences depending on the content of reflection. Procedures for comparing the quantitative distribution of different types of security scenarios were performed using the criterion φ* (Fisher’s angular transformation).Participants. Russian sample: 250 people (52.0% of girls and 48.0% of boys) aged 18 to 21 years (M=19.6, SD=19.5).Measurements. The main methods were the analysis of products and expert evaluation, the additional method was the clarifying conversation.Results. The reflection on personal security affects the quantitative and qualitative features of the interaction of conflict subjects. The scope and target pole of personal security are private parameters of reflection by subjects of conflict interaction and determine the scenario of its construction.Conclusions. The construction of scenarios of conflict interaction, taking into account the peculiarities of personal security reflection by its subjects, gives a new vision of the processes of initiation, planning, development and termination of the conflict. Scenarios of conflict interaction reveal the resource priorities of the subjects involved in it as a productive zone for applying efforts in the interests of overcoming it.
APA, Harvard, Vancouver, ISO, and other styles
21

Shopina, I. M. "Subject of national security law and military law." Analytical and Comparative Jurisprudence, no. 4 (April 28, 2022): 223–27. http://dx.doi.org/10.24144/2788-6018.2021.04.39.

Full text
Abstract:
The purpose of writing gender is to determine the range of legal relations included in the subject of national security law and military law. Criteria for the selection of branches of law are investigated. Attention is focused on theoretical approaches to understanding the structure and subject of national security law. The definition of the concept of military law is proposed. Arguments are given that the subject of regulation of military law is military legal relations, which are of a recurring nature and are the subject of a special type of control. The rationale is that the social necessity for the existence of military law is due to the long-term conduct of military (combat) operations on the territory of our state, the occupation of a significant part of the territory of Ukraine, the need to strengthen military formations to increase the level of defense capability and adequately rebuff the armed aggression of the Russian Federation, as well as solve problems adapting the functioning of the military organization of the state according to the standards of the North Atlantic Alliance. The article determines that the subject of military law is military legal relations, which are public relations regulated by legal norms that arise during the functioning of military formations, preparation for defense and implementation of the protection of the state in the event of armed aggression or armed conflict. A feature of military legal relations is their complex nature, which determines their simultaneous belonging to both the sphere of public law and private law relations. Attention is focused on the fact that the share of public law relations in the subject of military law is much larger. The conclusion is made that the definition of the subject matter of national security law and military law makes it possible to achieve stability in the formation of its doctrine and improve the quality of rule-making activities aimed at filling numerous legal gaps.
APA, Harvard, Vancouver, ISO, and other styles
22

Ryan, Caitlin. "The subjected non-subject: security, subjectification and resistance in the occupied Palestinian territories." Critical Studies on Security 1, no. 3 (November 2013): 295–310. http://dx.doi.org/10.1080/21624887.2013.826008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Baran, Мaria. "INFORMATION SECURITY AS A SUBJECT OF ADMINISTRATIVE AND LEGAL REGULATION." Social & Legal Studios 13, no. 3 (September 29, 2021): 50–56. http://dx.doi.org/10.32518/2617-4162-2021-3-50-56.

Full text
Abstract:
. Information security as a subject of administrative and legal regulation is considered. The basic method of the research is a comprehensive system approach, on the basis of which a general and structural study of information security issues faced by the individual, society and the state is conducted. A comprehensive systematic approach is used by the basic method of the research, on the basis of which a general and structural study of information security issues faced by the individual, society and the state. The multifaceted nature of information and security determines the complexity, importance and relevance of the research on the problem from the point of view of the science of administrative and information law. The interrelation of national and information security, sources of threats to information security and ways of counteraction are revealed. It is established that as a subject of activity aimed at ensuring information security, it is necessary to consider a set of social relations regulated by legal support, the administrative and legal regulation of which depends on possible external influences. The subject area of administrative and legal regulation of information security has the following features: the inseparability of information relations or their conditionality; interconnectedness and interdependence of information relations with objects of national interests in the information sphere; the relationship of administrative and legal regulation of information security, taking into account the emergence, detection and prevention of threats to national interests in the information sphere in order to develop and apply mechanisms to effectively combat threats. Information security activities are expressed in administrative and legal regulation, the subject orientation of which is determined by a set of public relations in the information sphere, aimed at strengthening equal strategic partnership in the field of information security with NATO and the EU, protection of Ukraine’s sovereignty in the information space.
APA, Harvard, Vancouver, ISO, and other styles
24

Sacovichi, Vasilii. "Innovative security as a subject of strategic management of innovative development." Moldoscopie, no. 2(93) (November 2021): 29–42. http://dx.doi.org/10.52388/1812-2566.2021.2(93).03.

Full text
Abstract:
This article examines the complexity of managing the innovative development process. The author demonstrates that the main role of change management belongs to the state, and the management system of innovative modernization must be organized only through the innovative security system. It is noted that only the innovative national security system, based on existing capabilities, structure, methods and tools, can objectively manage innovation development. As the practice of developed countries shows, based on the complexity of modern innovative development processes, the main role of change management belongs to the state. According to the author, in order to ensure national security in the conditions of innovative development and the formation of an equally innovative economy, it is necessary to form an innovative security system, which under these conditions is the basis of national security. Only in the context of innovative security is it possible to identify the factors that hinder the formation and development of an innovative economy, which makes it possible to develop an effective strategy for ensuring national security in the context of innovative development. At the same time, innovative security should not be an absolutely isolated phenomenon, but should find its place in the national security system and, together with economic, scientific and technical, scientific and technological security, ensure security throughout training and development cycle. of an innovative economy, reforming the whole society.
APA, Harvard, Vancouver, ISO, and other styles
25

Ćurčić, Slađana. "The contribution of the teaching contents of primary and secondary education to the development of the security culture of young people." Bezbednost, Beograd 63, no. 3 (2021): 163–86. http://dx.doi.org/10.5937/bezbednost2103163c.

Full text
Abstract:
The paper considers teaching contents in comparative systems of primary and secondary education, which are important for the development of security culture of young people and based on the expanded security agenda and new educational needs in that context. Methodologically, the paper is based on a review of the existing literature and the analysis of certain strategic documents in the field of education and security. Special focus was placed on the practice in the Republic of Serbia and previous activities in this field. The initial aim was to gain insight into certain foreign experiences and experiences of the Republic of Serbia, regarding the representation of security contents in primary and secondary education, and - on the basis of this - to try to consider the development of security culture in the educational context. It was found that among the analyzed countries Poland, Slovenia and Russia have a special subject dedicated to security topics within their education systems and it is noticeable that there is such an effort in other countries, but for now, security contents are mostly implemented in the existing subjects. Regarding the Republic of Serbia, it is concluded, that the potential introduction of a special subject dedicated to security topics in secondary schools and the enrichment of existing subjects with the security content in primary schools, may result in the improvement of general security of the youth.
APA, Harvard, Vancouver, ISO, and other styles
26

Jakubczyk, Tomasz. "Security sciences and their research areas." Scientific Journal of the Military University of Land Forces 188, no. 2 (June 30, 2018): 47–60. http://dx.doi.org/10.5604/01.3001.0012.2490.

Full text
Abstract:
The specificity of the 21st century filled with economic and social problems, acts of terror as well as armed conflicts downrightly necessitates undertaking the research in the field of security sciences. However, each time defining a subject of scientific research is of the utmost importance in order to systemize research works and mainly concretize interests. Such the aim was chosen by the author of the current article who, while presenting the orientations of individual scientific theoreticians and researchers dealing with security issues, answers the subject matter question: What does constitute the subject of the research in security sciences? The author’s inquiries were preceded by the explanation of the types of security and its scope within individual cases, which includes the essence of national and international security. In the further part of the article the author’s attention was focused on the sphere of methodology in security sciences. The author notices that the subject of research in the security science is of multidimensional character hence explanation, description, analyzing, assessing and forecasting the consequences of ongoing processes and events in the security sphere, together with initiation of activities which serve for ensuring security, require applying the knowledge from various scientific disciplines, domains and fields. In the following part of the article the attempt to define the subject of research in security sciences and drawing the conclusions within that field was undertaken. The author cites the orientations by A. Dawidczyk and T. Jemiolo according to whom the subject of research in security sciences is defined as the threat coming from human surroundings and all the activities aiming at ensuring and maintaining security for a man. The article is summarized by the conclusions where it was determined that in security sciences, the security, its components, ratio, level and relations with respect to the subject of research are studied.
APA, Harvard, Vancouver, ISO, and other styles
27

Makarov, I., and N. Kozyreva. "UNIVERSITY INFORMATION SECURITY AUDIT." Telecom IT 9, no. 4 (December 30, 2021): 56–67. http://dx.doi.org/10.31854/2307-1303-2021-9-4-56-67.

Full text
Abstract:
The paper presents the results of a search for information security vulnerabilities as a result of penetration testing carried out in the corporate networks of some higher education institut. Subject of study. The subject of the research is the information resources of various education organizations. Method. Methodology and requirements for conducting audits in accordance with the developed algorithm, as well as ISO27000, ISO017799, ISO15408 standards. Main results. Report on the specific vulnerabilities found typical for universities, as well as recommendations for their elimination. Practical significance. The results of the work can be used for modeling and assessing the security of networks and information systems of universities to solve information security problems.
APA, Harvard, Vancouver, ISO, and other styles
28

Kupiński, Jerzy. "PERCEPTION OF THE ENTITY'S SECURITY." Rocznik Bezpieczeństwa Morskiego XIII (January 24, 2020): 1–2. http://dx.doi.org/10.5604/01.3001.0013.7511.

Full text
Abstract:
The article analyzes the definition of security as the state of affairs in which the subject is located. Attention was focused on objective and subjective perception of security. On the basis of the quoted views, an attempt was made to create a conceptual apparatus enabling the assessment of safety states and danger in correlation with the right and wrong perception of the subject of perceiving opportunities and threats to its environment
APA, Harvard, Vancouver, ISO, and other styles
29

RUDENKO, Marina N. "Economic Security of Regions." Journal of Advanced Research in Law and Economics 8, no. 8 (September 5, 2018): 2568. http://dx.doi.org/10.14505//jarle.v8.8(30).29.

Full text
Abstract:
The urgency of the problem under investigation is caused by the need of regions (subjects of the Russian Federation) for economic security. In the conditions of the crisis, the recession in the economy, social problems in the regions of Russia are aggravated, the standard of living of the population is decreasing, and the tension in the labor market is increasing. To mitigate the negative factors affecting this, it is necessary to take decisions aimed at improving the structure of the regional economy, supporting certain industries, spheres, and attracting investments. This is all to ensure economic security. The purpose of the article is to develop recommendations of the region (subject of the federation) on the example of Perm Krai to ensure economic security. The leading methods of research of this problem are the analysis of theoretical sources, statistical analysis, comparison, SWOT-analysis. Statistical analysis occupies the most important place, since data on the economy state and social sphere of the region can be directly obtained from statistical databases. This article presents the main approaches to the concept of economic security in the region, defines the components of economic security, and compares the economic security of Perm Krai and a number of other regions. It was concluded that the economic security of Perm Krai is rather weak, which is connected with the influence of negative factors of the external environment (typical for the entire Russian economy in recent years), with unresolved problems in the region, which increase the negative influence of environmental factors. The materials of the article are of practical value for the organization of public administration at the regional level (at the level of the subject of the federation in Russia or at the level of regions in other countries), for making decisions related to ensuring the economic security of the region.
APA, Harvard, Vancouver, ISO, and other styles
30

Жовнір, Т. Л. "PECULIARITIES OF PARTICIPATION OF SELF-EMPLOYED PERSONS IN SOCIAL DIALOGUE." Juridical science, no. 1(103) (February 19, 2020): 414–21. http://dx.doi.org/10.32844/2222-5374-2020-103-1.50.

Full text
Abstract:
The relevance of the article is that the legal status of the subject of social security, regardless of whether it is a person who provides social security or receives such security, is a dynamic legal category. It is this feature that completes the final formation of a holistic view of this legal status. It reveals the property of legal status, which connects it with real legal relations allows to ensure continuous improvement of the rights and responsibilities of the subject of social security in view of changes in social reality, the emergence of new social risks in connection with the development and the introduction of new progressive ideas for the implementation of social security. It is the dynamism that allows us to consider the legal status of the subjects of social security law not only as an abstract theoretical category of social security law, but also a specific concept of legal practice. An important means for such development and improvement of the legal status of social security law subjects is the constant and systematic interaction of such subjects with each other and with the state as a guaranteeing subject of social security law in the form of social dialogue. The purpose of the article is to clarify the features of the legal regulation of the participation of self-employed persons in social dialogue. The article analyzes the understanding of the concept of social dialogue in accordance with the standards of the International Labor Organization and Ukrainian legislation, given the imperfection of the legal definition of the term in national law, and notes the impact of such wording on the legal status of self-employed persons. In the future, based on the disclosure of the legal regulation of social dialogue in Ukraine, the problems of participation of self-employed persons in social dialogue, their representativeness and the ability to protect their social rights in this form of public-private cooperation. In connection with the above, the desired and corresponding real state of legal regulation of the researched problems is determined.
APA, Harvard, Vancouver, ISO, and other styles
31

LUȚAI, Raluca, and Marius GRAD. "ROMANIAN`S SECURITY: EXPLAINING YOUNG CITIZENS’ PERCEPTIONS ABOUT NATIONAL SECURITY." STRATEGIES XXI - National Defence College 1, no. 72 (July 15, 2021): 66–79. http://dx.doi.org/10.53477/2668-5094-21-05.

Full text
Abstract:
Abstract: In the last decades the issue of national security has become more transparent and a subject of interest for the common citizen. Much scholarly attention is paid to how people perceive national security and issues related to it. However, we know very little about what young citizens, members of generation Z, believe about this aspect. This paper addresses this gap in the literature and analyzes how young citizens perceive subjects related to national security. It uses Romania as a single-case study and semi-structured interviews conducted in January 2021-March 2021 with young citizens coming from different socio-demographic profiles, to explain the variation in how they understand national security. The paper seeks to test the explanatory power of several variables such as knowledge about contemporary events, media exposure and threat assessment. The paper also controls for several socio-demographic characteristics such as age, gender, education and medium of residence. The findings indicate that citizens’ perceptions are influenced by a combination of general attitudes towards the political system and society, the education factor and specific attitudes about potential threats.Keywords: Generation Z; security perception, Romania, national security.
APA, Harvard, Vancouver, ISO, and other styles
32

Molodetska, Kateryna. "Social networking services as a national cyber security subject." Collection "Information technology and security" 4, no. 1 (June 30, 2016): 13–20. http://dx.doi.org/10.20535/2411-1031.2016.4.1.95915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Napalkova, I. G., A. N. Pozdnishov, S. I. Ulezko, and E. E. Barinov. "Legal-Institutional Typology of the Subject of Economic Security." EUROPEAN RESEARCH STUDIES JOURNAL XXI, Special Issue 1 (November 1, 2018): 315–23. http://dx.doi.org/10.35808/ersj/1182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Aradau, Claudia, and Tobias Blanke. "Governing others: Anomaly and the algorithmic subject of security." European Journal of International Security 3, no. 1 (November 1, 2017): 1–21. http://dx.doi.org/10.1017/eis.2017.14.

Full text
Abstract:
AbstractAs digital technologies and algorithmic rationalities have increasingly reconfigured security practices, critical scholars have drawn attention to their performative effects on the temporality of law, notions of rights, and understandings of subjectivity. This article proposes to explore how the ‘other’ is made knowable in massive amounts of data and how the boundary between self and other is drawn algorithmically. It argues that algorithmic security practices and Big Data technologies have transformed self/other relations. Rather than the enemy or the risky abnormal, the ‘other’ is algorithmically produced as anomaly. Although anomaly has often been used interchangeably with abnormality and pathology, a brief genealogical reading of the concept shows that it works as a supplementary term, which reconfigures the dichotomies of normality/abnormality, friend/enemy, and identity/difference. By engaging with key practices of anomaly detection by intelligence and security agencies, the article analyses the materialisation of anomalies as specific spatial ‘dots’, temporal ‘spikes’, and topological ‘nodes’. We argue that anomaly is not simply indicative of more heterogeneous modes of othering in times of Big Data, but represents a mutation in the logics of security that challenge our extant analytical and critical vocabularies.
APA, Harvard, Vancouver, ISO, and other styles
35

O'NEILL, KEVIN LEWIS. "LEFT BEHIND: Security, Salvation, and the Subject of Prevention." Cultural Anthropology 28, no. 2 (May 2013): 204–26. http://dx.doi.org/10.1111/cuan.12001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Demange, Gabrielle, and Guy Laroque. "Social Security with Heterogeneous Populations Subject to Demographic Shocks." Geneva Papers on Risk and Insurance Theory 26, no. 1 (June 2001): 5–24. http://dx.doi.org/10.1023/a:1011214423209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mlezivová, Michaela. "Unmanned Aircraft as a Subject of Safety and Security." MAD - Magazine of Aviation Development 6, no. 3 (July 20, 2018): 12–16. http://dx.doi.org/10.14311/mad.2018.03.02.

Full text
Abstract:
<p class="keywords">Currently increasing UAV operation significantly changes the view of conventional aviation. Unmanned aerial vehicles have become part of air traffic and therefore, its operation should be adequately controlled through related legislative framework and law enforcement procedures. Considering the fact, that single unmanned aircrafts will be soon replaced by swarms, it is necessary to get prepared for all possible UAs applications and define all rules including also emergency and law enforcement procedures in case that public safety is endangered.</p><p class="keywords">This paper summarizes recent regulatory framework for UAVs in EU and US and points out a concealed weakness of legislative requirements. The legislative scope addressed in this paper is limited primarily to civil aviation. The second part stresses the security threat created by an uncontrolled or violently-controlled UA. Aerial vehicles detection and disposal methods are described in the last part of paper.</p>
APA, Harvard, Vancouver, ISO, and other styles
38

Astakhova, L. V., and O. R. Utorov. "FUTURE SECURITY SPECIALIST AS A SUBJECT OF EDUCATIONAL ACTIVITY." Journal of the Ural Federal District. Information security 22, no. 1 (2022): 84–89. http://dx.doi.org/10.14529/secur220110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Bell, Colleen. "Subject to Exception : Security Certificates, National Security and Canada's Role in the “War on Terror”." Canadian journal of law and society 21, no. 1 (April 2006): 63–83. http://dx.doi.org/10.1353/jls.2006.0031.

Full text
Abstract:
RésuméCet article examine les valeurs que la procédure de certificats de sécurité de laLoi sur l'immigration et la protection des réfugiésattache à la vie de non citoyens ainsi que ses conséquences sur le pouvoir étatique et la liberté politique. Sous l'impératif de la sécurité nationale et la «guerre au terrorisme», le certificat de sécurité constitue un moment d'exception du pouvoir souverain et légitime. Ceci met en cause l'État de droit alors que la protection légale fondamentale est déniée à des détenus qui ne sont pas citoyens canadiens. Dans une première partie, les mécanismes et procédures du certificat de sécurité sont présentés, avec une attention particulière portée à la détention et aux exigences de preuve qui illustrent la dérogation des garanties légales. L'article aborde ensuite comment cette érosion de l'État de droit ouvre un espace d'exception à l'exercice souverain du pouvoir étatique fondé sur des critères discriminatoires du statut de citoyenneté afin d'associer étrangeté et danger. La dernière partie enfin montre comment le certificat de sécurité conçoit la liberté dans le cadre des objectifs nationaux de la «guerre au terrorisme» et les limites de la liberté libérale en lien avec le pouvoir de l'État moderne.
APA, Harvard, Vancouver, ISO, and other styles
40

Bezverkhov, A. G., and A. V. Yudin. "Prosecutor’s supervision in the field of transport security." Juridical Journal of Samara University 7, no. 2 (October 19, 2021): 7–13. http://dx.doi.org/10.18287/2542-047x-2021-7-2-7-13.

Full text
Abstract:
The article analyzes the issues of prosecutors supervision in the field of transport security from the standpoint of an integrated approach. The material was prepared in the wake of the All-Russian research and practical conference held on May 14, 2021, dedicated to the 300th anniversary of the Russian prosecutors office. Transport security as a subject of prosecutors supervision covers a variety of areas of relations related to administrative, criminal, civil and procedural branches of law. Railway, water and air communication is subject not only to special socio-economic laws, but also requires special legal regimes dictated by the significant remoteness and dynamics of the subjects under supervision, the increased risk of harm to legally protected relations, the need for constant and uninterrupted functioning of transport facilities, the importance of the transport segment for the entire economic life of the country. All this determines the need for very prompt and at the same time balanced supervisory decisions, which is possible due to the close cooperation of science and practice.
APA, Harvard, Vancouver, ISO, and other styles
41

Liu, Yi He. "Some New Security Strategies Description about Grid." Advanced Materials Research 255-260 (May 2011): 2296–300. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.2296.

Full text
Abstract:
The security strategy description is important contents of security access control research about grid. The strategy of traditional access control models has ignored the subject security, and can not be solved with the dynamic grid, and the characteristics of the coexistence of multiple security strategy etc problems. Regarding the concept of subject/ object decomposition and the organization classifications are defined, and the concepts of subject safe service, object safe service, and granularity control etc are expanded, Using the RBAC model and BLP the model basic principle, a group new access control security strategy based on the grid environment have be given in the paper. After discussion shows that the new rules emphasis on the subject security, and adapt to the dynamic nature of grid environment and characteristics of the coexistence of multiple security strategy. The new rules are compatibility with existing network access control model, they are secure and are also an expansion under the common network environment access control strategy, and this has certain positive significance to the grid security research.
APA, Harvard, Vancouver, ISO, and other styles
42

Ma, Jun, Zhi Ying Wang, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng, and Song Zhu Mei. "Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects." Applied Mechanics and Materials 48-49 (February 2011): 470–73. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.470.

Full text
Abstract:
The existence of trusted subjects is a major complication in implementing multilevel secure (MLS) systems. In MLS, trusted subjects are granted with privileges to perform operations possibly violating mandatory access control policies. It is difficult to prevent them from data leakage with out too strict confinement. This paper reconsiders the privilege from the view of sensitive data and presents a dynamic trusted domain (DTD) mechanism for trusted subjects. In DTD, a domain is associated with a special label structure (LabelVector) distinguishing security policies and builds an isolated environment based on virtualization for a certain trusted subject. The channel for the trusted subject to communicate with outsider is controlled by a trusted request decision maker (TRDM). Only the request satisfies the rules on domain label and security levels can be passed through.
APA, Harvard, Vancouver, ISO, and other styles
43

Piwowarski, Jacek A. "Introduction to the essence of security and security strategy." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 33, no. 33 (March 29, 2019): 65–80. http://dx.doi.org/10.5604/01.3001.0013.1947.

Full text
Abstract:
Ensuring freedom from threats to security subjects requires the elaboration of a security strategy. The relationship between security strategy and development strategy is the same as that between security and development themselves – one determines the other. For this reason, the purpose of this article is to discuss the essence of security and its basic conceptual categories, as well as the implementation of its provision through strategic efforts. At the beginning, the essence of the phenomenon of security is presented and the most important definitions are quoted. Similarly, the author discusses the concept of strategy and shows the evolution of its understanding. This allows to discuss the typology of security strategies and to mention the most important figures that became part of history thanks to their achievements in the theory of strategy, including Sun Tzu, Thucydides, Alexander the Great, Napoleon Bonaparte. A few of the most important principles formulated by these figures are recalled, which may be important hints for contemporary strategists as well. Finally, the author gives the most important definitions of ideas related to security: the security environment, the interests of the security subject, opportunities, challenges, risks, threats, rules and methods. Their essence is emphasized in the light of the considerations presented above. The author concludes that the strategic categories are superior to the respective political categories and distinguishes three types of contemporary strategic actions. He also recognizes that the biggest challenge in terms of security is the prevention of threats, e.g. by means of stabilization activities whose essence is to maintain and promote the stability of the security environment.
APA, Harvard, Vancouver, ISO, and other styles
44

Rathour, Navjot, Rajesh Singh, Anita Gehlot, Neeraj Priyadarshi, and Baseem Khan. "KlugOculus: A Vision-Based Intelligent Architecture for Security System." Computational Intelligence and Neuroscience 2022 (May 17, 2022): 1–13. http://dx.doi.org/10.1155/2022/3722527.

Full text
Abstract:
Vision-based system has gained significant attention in detecting the abnormal activities of intruders and alerting security with the amalgamation of adaptive video analytics techniques. The implementation of this kind of system works on face recognition, where the dedicated hardware with better computation power is limited in the previous studies. In this study, vision-based intelligent architecture and systems are proposed to detect intruders through facial recognition and sensors with customized hardware. As a part of the training, each subject was trained with 6 different pictures for a total of 120 images. Facial recognition implemented with machine learning (ML) inspired support vector machine (SVM) along with a histogram of oriented gradients (HOG). During the real-time implementation, the SVM model loaded in Raspberry Pi 3 has attained 99.9% accuracy for 20 different subjects. The proposed system can provide an accuracy of 99.9% even with tilted images of the subject, so it can be adopted by the different security personnel to boost the security system for the identification of intruders.
APA, Harvard, Vancouver, ISO, and other styles
45

Komissarov, Serhiy, and Dmytro Parkhomenko. "«National security», «system of national security», «types of national security», «forms of national security»: definitions." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 3, no. 3 (September 30, 2021): 166–73. http://dx.doi.org/10.31733/2078-3566-2021-3-166-173.

Full text
Abstract:
In the article, based on the analysis of theoretical provisions of national security and current legislation governing the system of national security, the author explores the basic concepts: «national security», «national security», «types and forms of national security». As a result of the study for further development of the theory of national security of Ukraine, its implementation in modern practice of Ukraine, ensuring effective protection of vital interests of man and citizen, society and state, the author proposed his own definitions of «national security», «national security system». «Type of national security», «form of national security». The author proved that it is more appropriate to use the concept of «national security system» which means a set of measures taken by national security actors in accordance with the tasks and powers assigned to them, for timely detection / management / disposal of threats or dangers of external and internal nature. The author also formulates certain concepts of specific types and forms of national security. Thus, the type of national security is an action or set of actions of state and non-state institutions that are aimed at maintaining a level of national security that is necessary and sufficient for society and that satisfies the vital interests of the individual. The form of national security is the implementation by the subject of national security of normatively fixed, peculiar only to him measures, by means of which his powers to ensure national security are realized in accordance with the set tasks.
APA, Harvard, Vancouver, ISO, and other styles
46

Stern, Maria. "‘We’ the Subject: The Power and Failure of (In)Security." Security Dialogue 37, no. 2 (June 2006): 187–205. http://dx.doi.org/10.1177/0967010606066171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Akimova, L. M. "Mechanisms of public administration of economic security of Ukraine: analysis of the factors of influence of systematized by individual spheres of its development." Public administration aspects 6, no. 6-7 (August 14, 2018): 5–13. http://dx.doi.org/10.15421/151833.

Full text
Abstract:
The article explores the approaches to the interpretation of the essence of the concept of «economic security ofthe state» and analyzes the main components of the economic security of the state. The external and internal factorsof economic security of the state are singled out. Factors that are a potential threat to the economic security of Ukraineare generalized. The subject, object and subject of economic security are characterized. A direction is proposed on theeffectiveness of ensuring Ukraine’s economic security.It was revealed that negative economic phenomena are gaining an even larger scale due to the lack of a scientificallybased national development strategy based on economically sound guidelines that envisage the development oftheoretical foundations and the use of other scientific approaches to the formation of the state’s economic securityin the public administration system. Ignoring measures to ensure economic security can lead to negative social andeconomic consequences, the negative state of the economic branches, the increase in the level of import dependenceand the like.It is established that the realization of the national interests of Ukraine is possible only on the basis of sustainableeconomic development. The place, role and value of each of the security elements are determined by circumstancesthat actually develop for a certain period of time inside and outside the facility. Therefore, the problem of Ukraine’seconomic security, which is crucial in the context of the existence and development of Ukraine as a sovereign state,is becoming very important today.
APA, Harvard, Vancouver, ISO, and other styles
48

ROGOVA, Tat'yana N. "A methodology for assessing the level of financial and economic security of the region." Economic Analysis: Theory and Practice 20, no. 6 (June 30, 2021): 1043–65. http://dx.doi.org/10.24891/ea.20.6.1043.

Full text
Abstract:
Subject. The article considers a methodology for assessing the level of financial and economic security as an integral indicator of particular types of security, which include budget and tax security, investment security, banking and credit security, and price security. Objectives. The purpose is to test the methodology for assessing the level of financial and economic security of the subjects of the Russian Federation, which makes it possible to rank the regions and distribute them into appropriate groups that characterize different levels of security. Methods. The study draws on general scientific methods of cognition and statistical methods of research. Results. The results of calculations enabled to rank the regions according to the level of financial and economic security. The analysis shows that there have been no drastic qualitative changes in the level of security over the past decade. The regions demonstrate a relatively stable state of security. Conclusions. The study reveals significant differentiation of regions in terms of financial and economic security, reflecting the uneven socio-economic development of the subjects of the Russian Federation and significant territorial disparities. It is crucial to develop a new management approach that takes into account the new environmental conditions characterized by ongoing transformational processes in the society and the State. A methodology enabling to assess the subjects of the Russian Federation by the level of financial and economic security will determine the place of each region in the overall security system and facilitate informed management decisions.
APA, Harvard, Vancouver, ISO, and other styles
49

URYCH, Ilona. "On Security Education in Poland. The Essence and Content of the Subject of Education." Safety & Defense 5, no. 2 (January 24, 2020): 22–27. http://dx.doi.org/10.37105/sd.52.

Full text
Abstract:
The purpose of this article is to highlight the essence and content of teaching this subject, which was introduced in Polish schools on 1 September 2009. To achieve this goal, the importance of education and, specifically, security education is discussed. The essence of security education is then presented, and it replacing the currently implemented defense adaptation is explained. Subsequently, the educational content of security education was discussed. The aim of the study was based on theoretical research methods such as analysis, synthesis, comparison, and inference.The conclusion encourages further reflection on this subject because education is an important area for ensuring security; hence, education in security from pre-school education to adult education can be found in Polish education. The tendency toward change testifies to broader cognitive perspectives, especially in the area of personnel and structural security of individuals and social groups. It also testifies to the understanding of the essence and importance of education itself.
APA, Harvard, Vancouver, ISO, and other styles
50

Shiblee, Mohammed Abdullah, and Mufassir Rashid. "Environmental Security of the Arctic: A Human Security Perspective." Research in Social Change 13, no. 1 (December 1, 2021): 158–64. http://dx.doi.org/10.2478/rsc-2021-0008.

Full text
Abstract:
Abstract The Arctic region has been the subject of immense interest and speculation for the past four to five decades due to its vast mineral deposits and potential as a new sea-route that would connect the West with the Far East. Evidently, massive globalization and infrastructural development are also taking place in this region, affecting the traditional way of life. However, beneath all those potentials and possibilities, the Arctic environment is degrading, and having further reinforced by the negative impacts of globalization, it adversely impacts the human security dynamics of the region, not to mention the harm being repetitively done to the flora and fauna that dwells there. Under the rubric of human security, we analyze the environmental security issues of the Arctic from the standpoints of pollution, climate change, health concerns and natural hazards, respectively.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography