Статті в журналах з теми "Security current"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security current.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security current".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.

Повний текст джерела
Анотація:
Recently, users have used open-source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial-of-service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If exploited in a negative manner, it is important to prepare countermeasures that can minimize the damage caused by cybercrimes. In this paper, the current status and security trends of OSINT will be explained. Specifically, we present security threats and cybercrimes that may occur if data gathered by OSINT are exploited by malicious users. Furthermore, to solve this problem, we propose security requirements that can be applied to the OSINT environment. The proposed security requirements are necessary for securely gathering and storing data in the OSINT environment and for securely accessing and using the data collected by OSINT. The goal of the proposed security requirements is to minimize the damage when cybercrimes occur in the OSINT environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Tagarev, Todor. "Theory and Current Practice of Deterrence in International Security." Connections: The Quarterly Journal 18, no. 1-2 (2019): 5–10. http://dx.doi.org/10.11610/connections.18.1-2.00.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ponomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (June 22, 2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.

Повний текст джерела
Анотація:
Ukrainian banking institutions conduct their activity under the influence of various risks, which create critical situations for them. In this context, banks should pay more attention to their own security. The article analyzes the theoretical approaches to the concept of “banking security”, examines the level of banking security as a component of the financial and economic security of the state, and determines the ways to improve it. Banking security was analyzed based on the data of the National Bank of Ukraine and other banks that are part of the banking system of the country.The current state of the banking system shows a decrease in the security since 2014 to the “danger zone”. This is facilitated by a great number of problem loans and foreign capital in the authorized capital of banks; the predominance of short-term lending over long-term one; continued unprofitableness and low liquidity of bank assets. Banking security was the guarantor of achieving financial security of the state. Therefore, the article outlines directions for improving the operation of banking institutions and the banking system as a whole, which will allow to improve banking security in the short term. This is, first of all, the legislative consolidation of the creditor rights protection, the expansion of the lending process, including in foreign currency, with the predomi-nance of long-term loans, the banks’ work in the direction of increasing their assets profitability, optimizing administrative costs, developing and using the latest informa¬tion technology to ensure the effective operation and information security of banks.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Miyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Park, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (September 2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Повний текст джерела
Анотація:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and investigate its level by the analysis of world rankings. Consequently, the Global Food Security Index, which measures the level of food security in four areas – food affordability, food availability, food quality and safety, and natural resources and resiliencies considered in this paper. According to this ranking, the first three places are occupied by the countries of Western Europe – Finland, Ireland, and the Netherlands. Except European countries, top 15 countries also include Israel, Japan, the United States of America, Canada, and New Zealand. Ukraine ranks 54th out of 113 countries. Positive changes occur only in the group «quality and safety». The rest of the groups of food security indicators for Ukraine show negative trends. In particular, in the group «food availability» indicators of «food security and access policy commitments» and «political and social barriers to access» decreased by more than thirty percent comparing with the previous year. Additionally, Global Hunger Index is considered. This index is based on four indicators – undernourishment, child wasting, child stunting, and child mortality. Despite the tendency of index improvement by the regions of the world, its value is particularly dangerous for the countries of Africa South of the Sahara, and South Asia. For Ukraine, the value of this indicator is less than 5, since 2006. This fact classifies Ukraine as a low-risk area. Accordingly, the analysis shows that currently the second goal of the Sustainable Development Plan – «Zero Hunger», is unattainable by 2030.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Повний текст джерела
Анотація:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and investigate its level by the analysis of world rankings. Consequently, the Global Food Security Index, which measures the level of food security in four areas – food affordability, food availability, food quality and safety, and natural resources and resiliencies considered in this paper. According to this ranking, the first three places are occupied by the countries of Western Europe – Finland, Ireland, and the Netherlands. Except European countries, top 15 countries also include Israel, Japan, the United States of America, Canada, and New Zealand. Ukraine ranks 54th out of 113 countries. Positive changes occur only in the group «quality and safety». The rest of the groups of food security indicators for Ukraine show negative trends. In particular, in the group «food availability» indicators of «food security and access policy commitments» and «political and social barriers to access» decreased by more than thirty percent comparing with the previous year. Additionally, Global Hunger Index is considered. This index is based on four indicators – undernourishment, child wasting, child stunting, and child mortality. Despite the tendency of index improvement by the regions of the world, its value is particularly dangerous for the countries of Africa South of the Sahara, and South Asia. For Ukraine, the value of this indicator is less than 5, since 2006. This fact classifies Ukraine as a low-risk area. Accordingly, the analysis shows that currently the second goal of the Sustainable Development Plan – «Zero Hunger», is unattainable by 2030.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Повний текст джерела
Анотація:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are and will remain the main sources of global insecurity and major threats to global security. The persistence and rapid evolution of these phenomena motivate us to investigate the field, to analyze the sources of instability that seriously threaten the security of the human evolutionary environment and to present to the informed public a study of current threats to global security.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

GABOR, Gabriel, Doina MURESAN, Laura UNGUREANU, and Alexandru CRISTIAN. "PROMOTING SECURITY INTERESTS OF ROMANIA IN THE CURRENT GEOSTRATEGIC CONTEXT." Review of the Air Force Academy 13, no. 3 (December 16, 2015): 123–28. http://dx.doi.org/10.19062/1842-9238.2015.13.3.21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Повний текст джерела
Анотація:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

K.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (October 19, 2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.

Повний текст джерела
Анотація:
Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Horovyi, S. S., and V. Yu Priamitsyn. "CURRENT ISSUES OF LEGAL SECURITY OF CYBER SECURITY OF UKRAINE." Juridical scientific and electronic journal, no. 6 (2021): 120–22. http://dx.doi.org/10.32782/2524-0374/2021-6/32.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Gu, Jiantao, Jinghong Fu, and Tao Wu. "Analysis of Current Wireless Network Security." International Journal of Education and Management Engineering 2, no. 10 (October 29, 2012): 34–38. http://dx.doi.org/10.5815/ijeme.2012.10.06.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Yassir, Ammar, and Alaa A. "Current Computer Network Security Issues/Threats." International Journal of Computer Applications 155, no. 1 (December 15, 2016): 1–5. http://dx.doi.org/10.5120/ijca2016912255.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Tod, J. J. R. "UK perspectives of current security arrangements." RUSI Journal 139, no. 1 (February 1994): 31–35. http://dx.doi.org/10.1080/03071849408445782.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Guoxing, Ji. "Current Security Issues in Southeast Asia." Asian Survey 26, no. 9 (September 1986): 973–90. http://dx.doi.org/10.1525/as.1986.26.9.01p0414t.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Zharovska, Iryna. "National and information security (current update)." Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki 7, no. 27 (May 10, 2020): 56–61. http://dx.doi.org/10.23939/law2020.27.056.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Barnes, Richard. "Current Legal Developments UN Security Council." International Journal of Marine and Coastal Law 26, no. 2 (2011): 343–53. http://dx.doi.org/10.1163/157180811x560539.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Plastun, Vladimir N. "Central Asia: The Current Security Issues." Oriental Studies 19, no. 4 (2020): 124–28. http://dx.doi.org/10.25205/1818-7919-2020-19-4-124-128.

Повний текст джерела
Анотація:
The article discusses the security problems of the Central Asian region, closely related to the ongoing war in Afghanistan. The author sets out his understanding of the term “state security”, which includes the problems of the armed forces and security agencies, primarily responsible for the fight against terrorism and separatism. However, there is also an understanding of the current state of the economy, interethnic relations, the preservation of natural resources, and the balance of interests in international relations. In particular, an assessment is given of the mutual relations between the countries of Central Asia and China in connection with the implementation of the project “One belt – one way”. The situation in the region is characterized by a high degree of tension in neighboring Afghanistan, where armed conflicts continue between various local opposing forces, as well as American troops and the Taliban. Fighting in Afghanistan is an immediate threat to neighboring Central Asian states. In connection with the dangerous insecurity in Afghanistan, which negatively affects the situation in the entire Central Asian region, it is necessary to note the positive role of the Chinese leadership in its attempts to contribute to the settlement of the conflict. Beijing, interested in implementing its various infrastructure projects, provides its own platform for meetings between representatives of the warring parties, promoting mutual understanding.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Poole, Vernon, and Dean Adams. "Current developments in open systems security." Computers & Security 14, no. 5 (January 1995): 420. http://dx.doi.org/10.1016/0167-4048(95)97125-t.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

STEZHKO, S., and T. SHEVCHENKO. "Current US experience in cyber security." INFORMATION AND LAW, no. 2(37) (June 23, 2021): 139–44. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238349.

Повний текст джерела
Анотація:
The content and key aspects of the US Cyber Security Strategy are considered. The principles of the state cyber security policy of the USA are defined. Typical threats to the United States in cyberspace are outlined. The state priorities for strengthening the components of cyber defense in the United States are summarized. The issue of financing cyber security in the United States in 2021 is detailed. The principles of joint activities of American-Ukrainian relations in the field of cyber security are specified. The list of measures implemented in the United States to strengthen the state's capabilities in the field of cyber security has been identified.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Avdeev, Vadim Avdeevich, Olga Anatolievna Avdeeva, Stanislav Vasilyevich Rozenko, Evgeny Aleksandrovich Kiselev, Igor Vyacheslavovich Kuleshov, and Aleksey Vital'yevich Morozov. "Current Directions of Legal Ensuring National Security." Cuestiones Políticas 39, no. 69 (July 17, 2021): 373–85. http://dx.doi.org/10.46398/cuestpol.3969.23.

Повний текст джерела
Анотація:
The article reveals the problematic issues for ensuring financial security in the context of globalization in global financial systems. The modern stage of development of state financial systems is characterized by difficulties in ensuring national financial security. Despite the urgency of this problem, the international community is focusing on ensuring economic security during the formation of universal and regional legal instruments, leaving out of sight issues of legal and practice-oriented guidance in financial security. The article examines the main directions of implementation of state policy aimed at improving the effectiveness of legal and national and international means to ensure financial security in the context of the globalization of growing threats to economic security. The focus is on the modernization of legal instruments to regulate public relations related to financial security. Particular attention was paid to the correlation of international legal bases, national legislation, and regional laws. It is concluded that the development of state financial policy that guarantees the security of the budgetary system is fundamental.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Tripathi, Anshu, and Umesh Kumar Singh. "Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape." International Journal of Computer Applications 51, no. 17 (August 30, 2012): 41–47. http://dx.doi.org/10.5120/8137-1882.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Banovic, Bozidar. "Organized crime as a current security threat." Medjunarodni problemi 68, no. 2-3 (2016): 172–92. http://dx.doi.org/10.2298/medjp1603172b.

Повний текст джерела
Анотація:
Scientific and professional community, and political subjects, both at national and at the international level have a unique position that organized crime is now one of the most dangerous security threats. However, such consent does not exist in terms of conceptual determination, identification, dimensions and of choice of methods to counter organized crime. The first part of this article describes the main trends in the conceptual definition of organized crime, social and political context of the use of this term and the subjects who have contributed to it becoming one of the main concepts of modern scientific and professional discussions about crime. The second part indicates the dynamics of organized crime as a security threat in the territory of Europe, and the last part presents and analyzes the development of organized crime in Serbia and attitudes of scientists and experts, political entities and state bodies and institutions towards this phenomenon.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Volkov, S. L., N. F. Kazakova, and Yu V. Shcherbina. "CURRENT PROBLEMS OF THE CYBERNETIC SPACE SECURITY." Key title: Zbìrnik naukovih pracʹ Odesʹkoï deržavnoï akademìï tehnìčnogo regulûvannâ ta âkostì, no. 2(13) (2018): 6–12. http://dx.doi.org/10.32684/2412-5288-2018-2-13-6-12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Sharma, Avinash. "Current Status of Food Security in India." Indian Journal of Pure & Applied Biosciences 8, no. 1 (February 28, 2020): 293–302. http://dx.doi.org/10.18782/2582-2845.7980.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Lyon, Andrew B., and John L. Stell. "Analysis of Current Social Security Reform Proposals." National Tax Journal 53, no. 3, Part 1 (September 2000): 473–514. http://dx.doi.org/10.17310/ntj.2000.3.10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Bondarchuk, Yulyia. "European energy security: current issues and chalenges." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 256–65. http://dx.doi.org/10.31861/mediaforum.2018.6.256-265.

Повний текст джерела
Анотація:
The article highlights the current state of energy security of the European Union. The strategic approaches, as well as the directions of EU policy in the area of counteraction to the challenges of the European energy security, are analyzed.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Pataridze-Vyshynska, Marina. "Current status of agricultural enterprise financial security." Herald of Ternopil National Economic University, no. 4(94) (December 3, 2019): 29–41. http://dx.doi.org/10.35774/visnyk2019.04.029.

Повний текст джерела
Анотація:
Introduction. The agrarian sector is an important strategic branch of the national economy that ensures food security and food independence of our country. The presence of risks and threats pose a risk to the entity. In this context, the relative importance of security should be emphasized, since the possibility of threats and their suddenness can hardly be ruled out if the subject seeks dynamic development, but can minimize their impact by planning and developing a security strategy. The study is aimed at assessing the financial security of Ukrainian agricultural enterprises, outlining threats at the macro and micro levels of the economy in order to formulate measures to minimize such threats. Methods. Such general philosophical and special methods as analysis, synthesis, scientific abstraction, historical, grouping, tabular, and arithmetic were used in the study. Results. The agricultural industry has a number of factors that have a positive impact on its financial security, but most of them affect the financial security of both macro and micro-level economies. For example, in 2019, agricultural exports, agricultural expenditures and support lines increased positively. However, environmental issues remain unresolved and exacerbate their situation. The need to review the state’s support for farmers was identified. Most agricultural enterprises do not have sufficient own resources and credit for innovative development. Conclusions. Ensuring of the economic security of agricultural enterprises requires effective management of available resources, which are capable to ensure the process of extended reproduction. Moreover, it is vital to ensure financial sustainability while preserving the environment, update the composition of fixed production facilities, attract and train qualified personnel, improve the competitiveness of agricultural products, and expand distribution channels. Prospects. Further research is needed by the measures of minimization of the educed threats to financial safety of agricultural enterprises.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Fenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (November 10, 2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.

Повний текст джерела
Анотація:
Purpose – The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate current risk management approaches regarding their capability of supporting cost-efficient decisions without unnecessary security trade-offs, outline current fundamental problems in risk management based on industrial feedback and academic literature and provide potential solutions and research directions to address the identified problems. Despite decades of research, the information security risk management domain still faces numerous challenges which hinder risk managers to come up with sound risk management results. Design/methodology/approach – To identify the challenges in information security risk management, existing approaches are compared against each other, and as a result, an abstracted methodology is derived to align the problem and solution identification to its generic phases. The challenges have been identified based on literature surveys and industry feedback. Findings – As common problems at implementing information security risk management approaches, we identified the fields of asset and countermeasure inventory, asset value assignment, risk prediction, the overconfidence effect, knowledge sharing and risk vs. cost trade-offs. The reviewed risk management approaches do not explicitly provide mechanisms to support decision makers in making an appropriate risk versus cost trade-offs, but we identified academic approaches which fulfill this need. Originality/value – The paper provides a reference point for professionals and researchers by summing up the current challenges in the field of information security risk management. Therefore, the findings enable researchers to focus their work on the identified real-world challenges and thereby contribute to advance the information security risk management domain in a structured way. Practitioners can use the research results to identify common weaknesses and potential solutions in information security risk management programs.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Seegers, Annette. "Current Trends in South Mrica's Security Establishment." Armed Forces & Society 18, no. 2 (January 1992): 159–74. http://dx.doi.org/10.1177/0095327x9201800201.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Bennett, Fran. "Gender implications of current social security reforms." Fiscal Studies 23, no. 4 (February 2, 2005): 559–84. http://dx.doi.org/10.1111/j.1475-5890.2002.tb00073.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Harwell, Jonathan H. "Library Security Gates: Effectiveness and Current Practice." Journal of Access Services 11, no. 2 (April 3, 2014): 53–65. http://dx.doi.org/10.1080/15367967.2014.884876.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Coppolino, Luigi, Salvatore D’Antonio, Giovanni Mazzeo, and Luigi Romano. "Cloud security: Emerging threats and current solutions." Computers & Electrical Engineering 59 (April 2017): 126–40. http://dx.doi.org/10.1016/j.compeleceng.2016.03.004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Hughes, John. "X.400 Security: Current and future usage." Computers & Security 14, no. 5 (January 1995): 422. http://dx.doi.org/10.1016/0167-4048(95)97128-w.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Bequai, August. "Biometric security: Current status and legal concerns." Computer Audit Update 1996, no. 8 (August 1996): 26–30. http://dx.doi.org/10.1016/0960-2593(96)84052-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Filippova, Anastasia. "Current security issues in the information society." SHS Web of Conferences 109 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110901014.

Повний текст джерела
Анотація:
That scientific research highlights specific items of modernization in the field of public society information security. Taking into account professional and public orientation, government support is aimed at promotion of human recourse, provision of information support. Currently human mind is one the most valuable item. In this regard, jurists are responsible for explanation of political, economic and legal points. Moreover, it is rather important to reveal an experienced specialist in it. Among the new challenges and threats, the problem of information security is the main one. Information technologies cause considerable impact on management of humans being. Scientific analysis of problems in the field of information security has shown that there is an insufficient level of public awareness. More precisely the problem is in ability to use password with high degree of protection, spread of unnecessary information in social networks. In that research are touched upon various concepts of information society. Also, main theories and elements are analyzed, which are included into meaning of information society. The difference between main information and other types of social values are covered. Specifics of the above problem, its reasons and impact on development of society are outlined. The conclusion encompasses problems of legal regulation of information security (fragmentation, absence of system). In cognitive activity, scientific complex, including legal, economic, scientific and practical approaches was used.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Wang, Senling, Shuichi Kameyama, and Hiroshi Takahashi. "JTAG Security Threats: Current Attacks and Countermeasures." Journal of The Japan Institute of Electronics Packaging 24, no. 7 (November 1, 2021): 668–74. http://dx.doi.org/10.5104/jiep.24.668.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Edwards, Elizabeth. "Pricing lending in the current market: securing the capital — security value sensitivities." Briefings in Real Estate Finance 2, no. 2 (September 2002): 129–38. http://dx.doi.org/10.1002/bref.60.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Tofan, Dragoş Ovidiu. "Business Intelligence Security." Review of Economic and Business Studies 9, no. 1 (June 1, 2016): 157–69. http://dx.doi.org/10.1515/rebs-2016-0030.

Повний текст джерела
Анотація:
AbstractExcess information characteristic to the current environment leads to the need for a change of the organizations’ perspective and strategy not only through the raw data processing, but also in terms of existing applications generating new information. The overwhelming evolution of digital technologies and web changes led to the adoption of new and adapted internal policies and the emergence of regulations at level of governments or different social organisms. Information security risks arising from the current dynamics demand fast solutions linked to hardware, software and also to education of human resources. Business Intelligence (BI) solutions have their specific evolution in order to bring their contribution to ensure the protection of data through specific components (Big Data, cloud, analytics). The current trend of development of BI applications on mobile devices brings with it a number of shortcomings related to information security and require additional protective measure regarding flows, specific processing and data storage.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Yang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Повний текст джерела
Анотація:
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Fatokun, Samson. "AIRPORT SECURITY: CURRENT PRACTICE AND PERSPECTIVES FOR 2030." Journal of Air Transport Studies 4, no. 2 (July 1, 2013): 26–39. http://dx.doi.org/10.38008/jats.v4i2.78.

Повний текст джерела
Анотація:
The high profile of aviation has made it an attractive target to terrorist activities. The September 11 terrorist attack and subsequent failed terrorist attacks made safety and security top priorities for the aviation industry. A review of the current practice in airport security conducted by the author found that it was reactive, expensive and inefficient in some areas based on a “one-size-fits-all” principle. The forecast of a new approach to airport security conducted in this study predicted that by 2020-2030 airport security will be proactive and based on passenger differentiation.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Орлов, Никита, and Nikita Orlov. "Current issues of economic security of budgetary organizations." Russian Journal of Management 6, no. 4 (December 25, 2018): 21–25. http://dx.doi.org/10.29039/article_5ca760b6f0cb57.26471899.

Повний текст джерела
Анотація:
The article reveals topical issues of economic security of budgetary organizations in conditions of instability and fierce competition. It is necessary to approach the definition of external threats to the economic security of a budget organization, as well as their neutralization, individually for each business entity. Individual approach and the choice of mechanisms to ensure the economic security of the budgetary organization will increase the level of protection from potential threats and risks, ensure the functioning within the framework of current legislation. Ensuring economic security is a definite guarantee of the independence, stability and efficiency of society, in particular, and at the state level an important national priority.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

BRYHINETS, Oleksandr. "Current issues of legal environment of tax security of Ukraine." Economics. Finances. Law, no. 2 (February 26, 2021): 13–15. http://dx.doi.org/10.37634/efp.2021.2.3.

Повний текст джерела
Анотація:
The paper notes that in order to effectively ensure financial the safety of citizens of Ukraine is extremely important to achieve an appropriate level of tax security of the state as a basic structural element of financial state security. Identified threats affecting the current state the domestic tax security of the state. A number of regulatory and legal acts regulating the provision of tax security in Ukraine. A set of actions has been determined that is optimal for increasing the level of tax security of Ukraine. Politics should become the basis of state tax security ensuring the safety of domestic producers, because they are the most payers of taxes and fees, guarantors of a developed economic system, a source of employment in a market economy. Many problems getting in the way the study of tax security is explained by the fact that «tax security state» as a term is practically not regulated in the legislation of our state, its specifics and the composition of threats that can cause him significant harm. The vast majority of domestic and foreign scientists, considering issues of tax security, focus on micro-level, namely on the tax security of enterprises. While this the problem requires in-depth development and a systematic approach to determining the concept of «tax security» is precisely at the macro level of the study of the tax state security. To ensure the proper level of tax security it is necessary to determine its current state, the main components and factors of influence, examining the features of the functioning of the domestic tax system. It was noted that the future cooperation of the State Tax Service of Ukraine and Bureau of Economic Security will help eliminate duplication of functions law enforcement and reducing unnecessary and unjustified pressure on taxpayers, and will also help improve efficiency investigation of economic crimes and improve Ukrainian investment attractiveness.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Karanina, Elena, and Ksenia Kartavyh. "Economic security of modern Russia: the current state and prospects." MATEC Web of Conferences 170 (2018): 01003. http://dx.doi.org/10.1051/matecconf/201817001003.

Повний текст джерела
Анотація:
In the conditions of instability of the world economy and the introduction of sanctions against Russia by a number of countries, the problem of ensuring national economic security has become particularly relevant. This topic also has a high scientific, practical and social significance, as it allows to identify possible gaps in the economic security of modern Russia and timely develop mechanisms to eliminate them to protect the national interests of the state. The purpose of this article is to determine the state and prospects of improving the economic security of modern Russia. This can be achieved by solving the following tasks: review of existing methods to evaluate the economic security of country, conduct a SWOT analysis of economic security of modern Russia, the development of suggestions for its improvement. This research analyzes various aspects of the economic security of modern Russia. As a result, the author developed an integrated method to ensuring the economic security of the country, as well as a matrix of economic security within this method. The way of increase of economic security of modern Russia is offered. Thus, to overcome the threats for the economic security of modern Russia, it is necessary to implement the recommendations developed by the authors, including the establishment of their own production and the construction of an innovatively oriented model of the economy. This will ensure the economic security of modern Russia and its stable development in the future.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Kmeť, Roman. "Analysis of current practical solutions of crime mapping information systems." Defense and Security Studies 2 (May 7, 2021): 53–62. http://dx.doi.org/10.37868/dss.v2.id168.

Повний текст джерела
Анотація:
Crime mapping information systems are currently a commonly used tool by public authorities, primarily for the police, security forces and services, local and regional government, as well as for the inhabitants of a certain territory. The main idea of ​​creating these systems is to monitor and evaluate the current security situation, which is significantly affected by the active or passive activities of the police or other entities dealing with security issues. An important part is also the knowledge of the security situation on the part of the population, in which a certain state of security can evoke a feeling of security and vice versa.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Hošták, Daniel. "Discussion: How Should Europe Face Current Security Challenges?" Politické vedy 23, no. 3 (September 22, 2020): 185–89. http://dx.doi.org/10.24040/politickevedy.2020.23.3.185-189.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Babin, Dmitriy. "FOOD SECURITY SYSTEM: CURRENT STATE AND DEVELOPMENT TRENDS." VESTNIK OF VORONEZH STATE AGRARIAN UNIVERSITY 48, no. 1 (March 2016): 183–92. http://dx.doi.org/10.17238/issn2071-2243.2016.1.183.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Romanova, Viktoriya V. "CURRENT TASKS OF LEGAL REGULATION OF ENERGY SECURITY." Energy law forum 3 (September 25, 2019): 4–10. http://dx.doi.org/10.18572/2312-4350-2019-3-4-10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Romanova, Viktoriya V. "Current Tasks of Legal Regulation of Energy Security." Energy law forum 3 (September 25, 2019): 66–70. http://dx.doi.org/10.18572/2410-4396-2019-3-66-70.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії