Статті в журналах з теми "Security-oriented management"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security-oriented management.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security-oriented management".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Yu, Zhi Wei, and Zhong Yuan Ji. "Study on Security Management-Oriented Business Process Model." Advanced Materials Research 267 (June 2011): 183–88. http://dx.doi.org/10.4028/www.scientific.net/amr.267.183.

Повний текст джерела
Анотація:
Information systems security is important for the day-to-day operations of business process. The current business process modeling can’t describe all the factors that the security management concerns on. A tri-layer business process model is presented in this paper from agent layer, activity layer and asset layer. This tri-layer model, which is based on business process and is convenient for security requirements analysis, expresses the relationship between activities, agents and assets. The essence that information systems are used to support the business process to fulfill the organizational functions is expressed in this tri-layer model. Such elements as assets, personnel, business activities the security management cares about are included in this model, which forms the basis and communication platform of security management. Finally, the pragmatic value of this tri-layer model is validated through a case of security management project of a manufacturing enterprise in China.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Niu, Qiu Na. "Distributed Group Key Management for Secure Electronic Communication." Applied Mechanics and Materials 385-386 (August 2013): 1591–94. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1591.

Повний текст джерела
Анотація:
With the popularity of group-oriented applications, secure electronic communication among all group members has become a major issue. This paper proposes a distributed group-oriented key management scheme for secure electronic communication. The scheme deploys Elliptic Curve Diffie-Hellman (ECDH) which is more lightweight as compared to regular Diffie-Hellman. According to the security analysis, the proposed scheme provides a number of desirable security properties, including group key secrecy, forward secrecy and backward secrecy.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Momot, Tetiana, Olena Filonych, Antonina Kosiak, and Olena Lobach. "BALANCED SCORECARD OF SAFETY-ORIENTED MANAGEMENT FOR THE CONSTRUCTION INDUSTRY ENTERPRISES." Innovative Technologies and Scientific Solutions for Industries, no. 2 (16) (July 6, 2021): 54–62. http://dx.doi.org/10.30837/itssi.2021.16.054.

Повний текст джерела
Анотація:
The article is devoted to the study of the theoretical and methodological foundations for the development of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry. The subject of the research is a set of theoretical, methodological and practical aspects to ensure the formation of the balanced scorecard development to ensure safe-oriented management of enterprises in the construction industry. The purpose of the article is to develop theoretical and methodological provisions and substantiate practical recommendations for the formation of a model of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry, taking into account the interests of all groups of stakeholders. Objectives of the work: to analyze modern trends in the development of enterprises in the construction industry in Ukraine; to generalize approaches to the definition of the concept of safety-oriented management; explore and organize the elements of safety-oriented management; to develop a model of a balanced scorecard for ensuring safe-oriented management in the corporate security system of enterprises in the construction industry. In the course of the study, the following methods were used: abstract-logical analysis, theoretical generalization and systematization, system analysis. The paper analyzes the dynamics of the development of enterprises in the construction industry in Ukraine in the context of the introduction of quarantine measures related to COVID-19. Factors constraining construction activities have been identified, which include financial constraints, insufficient demand, labor shortage, and weather conditions. Approaches to the definition of security-oriented management have been generalized and the definition of security-oriented management in the corporate security system has been improved. The elements of safety-oriented management are systematized with the specification of such components as risk assessment, development and implementation of security policy, definition of requirements, establishment of control and monitoring of the external and internal environment. A model of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry has been developed. Conclusions. In the course of the study, the expediency of forming a balanced system of indicators for ensuring safe-oriented management of enterprises in the construction industry was substantiated, taking into account the dynamics of the performance of construction work during 2019-2021. The elements of the system of safe-oriented management are presented in detail and the expediency of the formation of a balanced system of indicators for ensuring the safe-oriented management of enterprises in the construction industry is substantiated. The sequence of the formation of a balanced scorecard for ensuring safety-oriented management is detailed with the specification of a scorecard for assessing strategic goals for the components of a balanced scorecard: finance, customers, internal business processes, training and development.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gandotra, Vandana, Archana Singhal, and Punam Bedi. "Threat-Oriented Security Framework: A Proactive Approach in Threat Management." Procedia Technology 4 (2012): 487–94. http://dx.doi.org/10.1016/j.protcy.2012.05.078.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang, and Sumit Sharma. "Threat-oriented security framework in risk management using multiagent system." Software: Practice and Experience 43, no. 9 (June 7, 2012): 1013–38. http://dx.doi.org/10.1002/spe.2133.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dudziak-Gajowiak, Dominika, Grzegorz Kolaczek, and Krzysztof Juszczyszyn. "Solving problems relating to ICT security management systems including various characteristics of the environment and system." Scientific Journal of the Military University of Land Forces 192, no. 2 (April 1, 2019): 321–34. http://dx.doi.org/10.5604/01.3001.0013.2607.

Повний текст джерела
Анотація:
The work presents the essence of problems appearing in the ICT security management process in the context of systems characterized by significant dynamics of configuration and heterogeneity of resources both in the hardware and software layer. Basic differences in security management in systems with traditional centralized and monolithic architecture as well as in systems with service-oriented architecture have been presented. A layered reference model for service-oriented systems taking account of the basic goals of ICT security for dynamic information systems has been discussed. The basic assumptions of the multi-agent ICT security analysis system in service-oriented systems as well as the results of the safety analysis, including the correlation between events observed in low and high layers of the reference model have been discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Primost, Stephen. "Applying Security within a Service-Oriented Architecture." Information Security Journal: A Global Perspective 17, no. 1 (March 24, 2008): 26–32. http://dx.doi.org/10.1080/19393550801929257.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Zúquete, André, Hélder Gomes, João Amaral, and Carlos Oliveira. "Security-Oriented Architecture for Managing IoT Deployments." Symmetry 11, no. 10 (October 19, 2019): 1315. http://dx.doi.org/10.3390/sym11101315.

Повний текст джерела
Анотація:
Assuring security and privacy is one of the key issues affecting the Internet of Things (IoT), mostly due to its distributed nature. Therefore, for the IoT to thrive, this problem needs to be tackled and solved. This paper describes a security-oriented architecture for managing IoT deployments. Our main goal was to deal with a fine-grained control in the access to IoT data and devices, to prevent devices from being manipulated by attackers and to avoid information leaking from IoT devices to unauthorized recipients. The access control is split: the management of authentication and access control policies is centered on special components (Authentication, Authorization, and Accounting Controllers), which can be distributed or centralized, and the actual enforcement of access control decisions happens on the entities that stay in the path to the IoT devices (Gateways and Device Drivers). The authentication in the entire system uses asymmetric cryptography and pre-distributed unique identifiers derived from public keys; no Public Key Infrastructure (PKI) is used. A Kerberos-like ticket-based approach is used to establish secure sessions.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cherevko, Oleksandr, Serhiy Nazarenko, Nataliia Zachosova, and Nataliia Nosan. "Financial and economic security system strategic management as an independent direction of management." SHS Web of Conferences 65 (2019): 03001. http://dx.doi.org/10.1051/shsconf/20196503001.

Повний текст джерела
Анотація:
The scientific views of domestic researchers regarding the definition of financial and economic security using the basics of the systematic approach are generalized. The author's vision on the definition of financial and economic security system is proposed. The main shortcomings of existing approaches to the process of formation of financial and economic security system as an object of management are revealed and systematized. The main defects and miscalculations in security management both – at the micro and macro levels are identified. The 16-component model of management of financial and economic security (PROM) was proposed. The conceptual foundations of security oriented strategic management are specified. Three strategies offered for achieving economic and financial security: Strategy for achieving financial and economic security on the basis of branding, image and reputation (BIR strategy), Strategy for achieving financial and economic security through partnerships with stakeholders and ensuring their interests (Strategy of PIS), Strategy for achieving the state of financial and economic security through the interconnection of experts, control and standardization (Strategy of ECS).
Стилі APA, Harvard, Vancouver, ISO та ін.
10

von Solms, S. H., and Isak van der Merwe. "The management of computer security profiles using a role-oriented approach." Computers & Security 13, no. 8 (January 1994): 673–80. http://dx.doi.org/10.1016/0167-4048(94)90049-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Petrova, І. "RISK-ORIENTED MANAGEMENT AS A SOCIAL INNOVATION IN ENSURING ECONOMIC SECURITY." "Scientific notes of the University"KROK", no. 3(59) (2020): 243–48. http://dx.doi.org/10.31732/2663-2209-2020-59-243-248.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Neal, Russ. "Service-Oriented Security Architecture and its Implications for Security Department Organization Structures." Information Security Journal: A Global Perspective 17, no. 4 (October 7, 2008): 188–200. http://dx.doi.org/10.1080/19393550802369818.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Ding, Jun Mei, Tian Rui Zhang, Sha Wang, and Wan Shan Wang. "Electronic Document Management System Oriented Collaborative Design." Applied Mechanics and Materials 44-47 (December 2010): 2036–39. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.2036.

Повний текст джерела
Анотація:
According to the practical requirements of collaboration and document management in enterprises, the paper presents the methods of products of electronic document management, automation and networking to ensure product data integrity, unity, sharing and security, and does the research on key points of architecture, version management and electronic countersignature of collaborative design oriented document management. Besides, based on the theoretical study, a prototype system of collaborative design oriented electronic document management is developed. The operated results of the system verify the correctness of theoretical research and technical feasibility.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Dimitrov, Miroslav Vergilov, and Nataliya Venelinova. "Smart, Secure and Safe Energy Management Approach – An Education Framework Improving the Competence Grid of the Professionals in the Energy Sector." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 1 (June 1, 2019): 213–18. http://dx.doi.org/10.2478/kbo-2019-0034.

Повний текст джерела
Анотація:
Abstract The paper presents evidence based brand new approach of the permanent rise of the competences and know-how transfer between researchers, teachers and professionals aiming to ensure the specific expertise of the human resources engaged in energy security management. The approach has a collaborative and integrative nature and relies on the hybridization between energy management, urban development planning, environmental management, civil protection, protection of critical infrastructure and the national security applied fields. The authors redefine the conventional understanding of the energy security by describing a practically oriented integrated approach of teaching energy security, based on 3 separately existing concepts: the concept for smart energy security grid, those for the smart cities and the standard operative procedures applied to energy security management. Smart, Secure and Safe Energy Management (3SEMA) is both behaviorally and technically oriented and presented in a circular chart, involving all actors on certain territory with the purpose to apply smart, secure and safe approach in governing the energy sector, taking into consideration the dynamic technological changes and the concept of intelligent urban use.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Wibowo, Andry. "CROWDS MANAGEMENT IN INDONESIAN FOOTBALL EVENT CASE STUDY : POLICING MANAGEMENT." Econosains Jurnal Online Ekonomi dan Pendidikan 15, no. 2 (January 10, 2018): 249–72. http://dx.doi.org/10.21009/econosains.0152.07.

Повний текст джерела
Анотація:
Crowds become an important issue in policing research and practice.Crowds phenomena become a challenge for police management to make an order, safety and security in public issue.Crowds in football event bring some problemsrelated to problem of order, safety and security and become a developing research object in football industry.This paper describe crowds problems in sport could transforms into identity problem.Problem orientated policing is a modern thought who give police to understand root of causes from social problem. This paper describe and explore condition from group of crowds Viking (Persib) and Jakmania (Persija) in Indonesia whohave an identity conflict among them and have been distrubing public order, safety and security for almost to decade until now. Relate to those problems this paper alsodescribe and explorw how Indonesian police management handle this problem as part of a policing models. Keywords: crowds; incident drivent policing; identity conflict; problem oriented policing; crowds cycle
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Choi, Youngkeun. "Human Resource Management and Security Policy Compliance." International Journal of Human Capital and Information Technology Professionals 8, no. 3 (July 2017): 68–81. http://dx.doi.org/10.4018/ijhcitp.2017070105.

Повний текст джерела
Анотація:
Given the regulatory requirements imposed on organizations within numerous industries, research in the area of employee compliance with organizational security and privacy regulations remains necessary and highly desirable. Therefore, the objective of this study provides a unique framework for understanding the influence of HRM practices on individual security policy compliance outcomes. The unit of analysis for this research project is the individual employee of a bank organization. With the survey of 257 bank employees, a components-based approach to structural equation modeling was taken. The results of this study indicate that developmental-oriented appraisal, externally or internally equitable reward, selective staffing and training for career development are positively associated with employees' behavioral intent to comply security policy through their affective commitment.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Герасименко, Олена Михайлівна, та Наталія Володимирівна Зачосова. "ОЦІНКА РІВНЯ ЗРІЛОСТІ УПРАВЛІННЯ РИЗИКАМИ В ПРОЦЕСІ ЗАБЕЗПЕЧЕННЯ ЕКОНОМІЧНОЇ БЕЗПЕКИ ПІДПРИЄМСТВА: АНАЛІТИЧНЕ ДОСЛІДЖЕННЯ". Bulletin of the Kyiv National University of Technologies and Design. Series: Economic sciences 135, № 3 (19 серпня 2019): 66–81. http://dx.doi.org/10.30857/2413-0117.2019.3.7.

Повний текст джерела
Анотація:
The article seeks to explore and evaluate the level of risk management maturity in Ukrainian enterprises in the process of ensuring their economic security. The study presents the results of an analytical survey on risk management practices to ensure enterprise economic security. To achieve the research objectives, the following methods have been employed: to obtain data for the analytical research, the method of questionnaire-based expert evaluation on the Google Forms platform; the method of comparison, the graphical method – to evaluate previously received analytical data on the risk management maturity level. The findings revealed that the implementation of a risk-based approach is perceived as a tool to increase the company value and achieve strategic goals. The survey results showed the distribution of expert opinions, indicating the willingness of Ukrainian companies to implement risk-oriented management approaches to ensure their economic security. It is demonstrated that the major objective of the risk-oriented approach is to ensure the effective and lawful business operation in the long run which may come into a conflict with the operational management priority, i. e. short term profit maximization. The analytical survey argues that a risk-oriented approach challenges the use of impartial methods to risk identification, taking risk management actions, and the search for an optimal solution between profit raising here and now, and the long-term sustainable development and protection of shareholders’ interests. The study on the latest tools for assessing the level of economic security using a risk-oriented approach is a critical instrument in enhancing corporate management practices at different management levels, providing further nation-wide implications on stabilization of domestic business performance to improve the overall national security indicators in the international economic and political arenas.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Tarlow, Peter. "Security challenges in tourism oriented economies: lessons from the Caribbean." Worldwide Hospitality and Tourism Themes 11, no. 6 (December 2, 2019): 731–42. http://dx.doi.org/10.1108/whatt-09-2019-0054.

Повний текст джерела
Анотація:
Purpose The paper aims to use the Caribbean as a backdrop in understanding the importance of tourism safety, security and surety. Design/methodology/approach The paper examines several Caribbean nations and these forms of tourism security enhance the visitor experience. Findings Good tourism security not only enhances the value of the product but also can be a major motivator to increase tourism. Originality/value This paper provides an overview on the importance and major security challenges in tourism oriented economies.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Meland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.

Повний текст джерела
Анотація:
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, the authors address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis. The authors show that this effort is not trivial and a trade-off between visual expressiveness, usability and usefulness has to be considered. Specifically, the authors integrate threat modelling with the socio-technical security modelling language (STS-ml), introduce automated analysis techniques that propagate threats in the combined models, and present tool support that enables reuse of threats facilitated by a threat repository. The authors illustrate their approach on a case study from the Air Traffic Management (ATM) domain, from which they extract some practical challenges. The authors conclude that threats provide a useful foundation and justification for the security requirements that the authors derive from goal modelling, but this should not be considered as a replacement to risk assessment. The usage of goals and threats early in the development process allows raising awareness of high-level security issues that occur regardless of the chosen technology and organizational processes.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Bashynska, I. O. "Risk Tolerance as a Criterion for Security-Oriented Management of Industrial Enterprise." Business Inform 11, no. 502 (November 2019): 330–36. http://dx.doi.org/10.32983/2222-4459-2019-11-330-336.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Prytys, V. I. "Terms of the Security-Oriented Enterprise Management in Response to Existing Threats." Business Inform 3, no. 506 (2020): 453–59. http://dx.doi.org/10.32983/2222-4459-2020-3-453-459.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Medve, Anna. "Model-based Framework for Change Management and Integrated Development of Information Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 5, no. 3 (September 15, 2013): 586–97. http://dx.doi.org/10.24297/ijmit.v5i3.4225.

Повний текст джерела
Анотація:
This paper introduces a business process-based goal-oriented framework which consists of generic and specific model repositories, and of methodology for integrated change management of business and IT evolutions. Sets of generic models of ISO/IEC 27001 and 27002 standards for information security support developers and decision makers in MDE process. The techniques and tools used are from the User Requirements Notation technologies for model compositions and traceability assessments of goal-oriented and scenario-based models. An example is given from the instantiation of framework for B2B change management with empirical validation within a commercial SME. The framework supports MDE process of enterprise architecture re-engineering integrating the development of information security
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Medve, Anna. "Model-based Framework for Change Management and Integrated Devlopment of Information Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 5, no. 3 (September 15, 2018): 586–97. http://dx.doi.org/10.24297/ijmit.v5i3.759.

Повний текст джерела
Анотація:
This paper introduces a business process-based goal-oriented framework which consists of generic and specific model repositories, and of methodology for integrated change management of business and IT evolutions. Sets of generic models of ISO/IEC 27001 and 27002 standards for information security support developers and decision makers in MDE process. The techniques and tools used are from the User Requirements Notation technologies for model compositions and traceability assessments of goal-oriented and scenario-based models. An example is given from the instantiation of framework for B2B change management with empirical validation within a commercial SME. The framework supports MDE process of enterprise architecture re-engineering integrating the development of information security.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Karlsson, Martin, Thomas Denk, and Joachim Åström. "Perceptions of organizational culture and value conflicts in information security management." Information & Computer Security 26, no. 2 (June 11, 2018): 213–29. http://dx.doi.org/10.1108/ics-08-2017-0058.

Повний текст джерела
Анотація:
Purpose The purpose of this paper is to investigate the occurrence of value conflicts between information security and other organizational values among white-collar workers. Further, analyzes are conducted of the relationship between white-collar workers’ perceptions of the culture of their organizations and value conflicts involving information security. Design/methodology/approach Descriptive analyses and regression analyses were conducted on survey data gathered among two samples of white-collar workers in Sweden. Findings Value conflicts regarding information security occur regularly among white-collar workers in the private and public sectors and within different business sectors. Variations in their occurrence can be understood partly as a function of employees’ work situations and the sensitivity of the information handled in the organization. Regarding how perceived organizational culture affects the occurrence of value conflicts, multivariate regression analysis reveals that employees who perceive their organizations as having externally oriented, flexible cultures experience value conflicts more often. Research limitations/implications The relatively low share of explained variance in the explanatory models indicates the need to identify alternative explanations of the occurrence of value conflicts regarding information security. Practical implications Information security managers need to recognize that value conflicts occur regularly among white-collar workers in different business sectors, more often among workers in organizations that handle sensitive information, and most often among white-collar workers who perceive the cultures of their organizations as being externally oriented and flexible. Originality/value The study addresses a gap in the information security literature by contributing to the understanding of value conflicts between information security and other organizational values. This study has mapped the occurrence of value conflicts regarding information security among white-collar professionals and shows that the occurrence of value conflicts is associated with work situation, information sensitivity and perceived organizational culture.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Łyczkowska-Hanćkowiak, Anna. "Sharpe’s Ratio for Oriented Fuzzy Discount Factor." Mathematics 7, no. 3 (March 16, 2019): 272. http://dx.doi.org/10.3390/math7030272.

Повний текст джерела
Анотація:
The analysis presented in this paper regards the security of a present value given as an ordered fuzzy number. The present value was estimated in an imprecise manner and supplemented by the forecast of its coming changes. A discount factor of such security is an ordered fuzzy number of the orientation identical to the oriented present value that determines it. All classical methods of portfolio analysis are based on the definition of the return rate. In the case of securities with a fuzzy present value, a discount factor is a better tool for portfolio analysis than the return rate, which implies the chosen methods of management of securities should be revised and transformed to equivalent methods based on a discount factor. This would enable the use of those methods in the case of a financial instrument of the oriented fuzzy present value. This paper presents example results of the realization of such a postulate. The main aim of the paper is to generalize Sharpe’s ratio to a case of investment recommendations management formulated for a security characterized by an oriented discount factor. A five-degree rating scale was used. The whole deliberation is illustrated by broad numerical examples.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Kovalenko, A., and V. Grynenko. "Personnel Policy as Effective Tool for Security-Oriented Personnel Management of the Organization." Modern Economics 24, no. 1 (December 16, 2020): 75–80. http://dx.doi.org/10.31521/modecon.v24(2020)-12.

Повний текст джерела
Анотація:
Annotation. Introduction. In modern business conditions to increase the efficiency of human resources of the organization it is necessary to use a variety of tools. The basis of effective management of human resources of the organization is a system of personnel policy. With the rational use of available human resources, the time of implementation of the main strategy of the organization is significantly reduced. Purpose. The aim of the article is to determine personnel policy as effective tool for personnel management of the organization. Results. Personnel policy from the point of view of its formation is considered. The main problems of functioning and implementation of personnel policy of the organization are revealed. The role and place of personnel policy in the process of strategic personnel management are determined. The growth of the value of the employee, who acquires new forms of manifestation for the owner and head of the organization, is proved. The main content and goals of the personnel policy of the organization are substantiated, taking into account the strategy of its development, aimed at achieving not only economic but also social effect. Conclusions. Personnel policy plays a key role in building an effective management system for a security-oriented enterprise. An effective personnel policy should be implemented in stages, taking into account the risks and strategy of the organization. Given the growing value of the employee, it is necessary to build a progressively growing system of employee motivation, provided by personnel policy. Since the competitiveness of the enterprise depends on the tools of personnel policy, it is necessary to determine the operational and strategic goals of the organization as a whole, defining specific goals for each employee. Only if the right personnel policy is built, it is possible to build an effective management system for a security-oriented organization. Keywords: personnel policy, personnel management, enterprise strategy, management tools, human resources.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Nestoryshen, Ihor, Ivan Berezhnyuk, and Alina Brendak. "Customs Risk Management System in the Context of Clearance of Customs Procedures." Modern Economics 22, no. 1 (August 27, 2020): 59–63. http://dx.doi.org/10.31521/modecon.v22(2020)-09.

Повний текст джерела
Анотація:
Introduction. The article emphasizes that the current features of the implementation of foreign economic activity require consideration of two factors that are contradictory to each other. In particular, on the one hand, the growth of external threats is forcing the governments of many countries to tighten control measures when crossing the state border of goods and commercial vehicles. On the other hand, according to international conventions and agreements (Kyoto Convention, WMO Framework Standards for Security, WTO Facilitation Agreement), measures to reduce the interference of regulatory authorities in the operational activities of economic operators are envisaged. In this context, the use of risk-oriented customs control tools, which allow simplifying business without reducing the level of national security, is becoming especially important. Purpose. The purpose of the article is to generalize and systematize foreign and domestic approaches to simplification of customs procedures through the use of risk-oriented instruments of customs control, as well as to develop their own proposals for simplification of foreign trade entities in the domestic regulatory field by using subject-oriented criteria. Results. The authors analyzed the provisions of the International Convention on the Simplification and Harmonization of Customs Procedures, the Framework Standards for Security and Facilitation of International Trade, the WTO Agreement on Trade Facilitation, which are provided for significant simplification of international trade procedures by reducing the share of customs inspections and controls. Сustoms security, customs clearance of goods and vehicles on the territory of the subjects of foreign economic activity or in another place permitted by the customs, without the direct participation of customs officials. These measures are based on the widespread use of risk-oriented instruments of customs control. It is noted that some of the provisions of international conventions and agreements on the use of risk-oriented instruments of customs control and simplification of economic operators have been implemented in domestic customs legislation, namely Art. 320 of the Customs Code of Ukraine introduced selective customs control, it is determined that the forms and scope of control sufficient to ensure compliance with legislation on state customs and international treaties of Ukraine in customs clearance are selected by customs (customs posts) based on the results of risk management. Conclusion. The study analyzes the peculiarities of the customs risk management system application in customs control in Ukraine, and offers proposals for the use of subject-oriented criteria of customs control as a simplification for honest economic operators to reduce the selectivity of risk profiles ASUR.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Yung Chou, Shih, Bo Han, and Xiaohu Zhang. "Effect of guanxi on Chinese subordinates' work behaviors: a conceptual framework." Asia-Pacific Journal of Business Administration 6, no. 1 (April 1, 2014): 18–35. http://dx.doi.org/10.1108/apjba-04-2013-0033.

Повний текст джерела
Анотація:
Purpose – This study aims to investigate a subordinate's perception of supervisor-subordinate guanxi and its impact on the subordinate's work-related outcomes. Design/methodology/approach – This study draws upon relevant literature and develops a theoretical framework that investigates the relationships among a subordinate's perceived supervisor-subordinate guanxi, loyalty to supervisor, challenge-oriented organizational citizenship behaviour (OCB), affiliation-oriented OCB, job security perception, and task performance. Findings – This study suggests first, subordinate-supervisor guanxi will have a positive impact on a subordinate's loyalty to supervisor. Second, subordinate-supervisor guanxi will negatively affect a subordinate's challenge-oriented OCB, but will positively affect a subordinate's affiliation-oriented OCB. Third, a subordinate's loyalty to supervisor will negatively influence his or her challenge-oriented OCB, but will positively influence his or her affiliation-oriented OCB. Fourth, challenge-oriented OCB will negatively affect job security perception, whereas affiliation-oriented OCB will positively affect job security perception. Finally, job security perception will positively influence task performance. Research limitations/implications – This study has several limitations. First, it does not consider the role of personality traits in determining work-related behaviours. Second, it only considers a one-to-one guanxi relationship. Thus, the results of this study could be different when a supervisor has one-to-many guanxi relationships. Practical implications – This study suggests that a supervisor should take how to create quality informal relationships with subordinates into account when attempting to motivate Chinese subordinates' task and extra-role performance. Moreover, managers should manage effective informal social networks with subordinates proactively. Originality/value – This study is one of the few studies that examine the impact of subordinate-supervisor guanxi on both extra-role and in-role performance from the perspective of singular view of subordinate-supervisor guanxi.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Elahi, Golnaz, and Eric Yu. "Modeling and analysis of security trade-offs – A goal oriented approach." Data & Knowledge Engineering 68, no. 7 (July 2009): 579–98. http://dx.doi.org/10.1016/j.datak.2009.02.004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Mushnikova, S. A. "Risk-oriented thinking as the basis for innovation of enterprise security management system." Economic Bulletin of the National Mining University 68 (2019): 93–101. http://dx.doi.org/10.33271/ev/68.093.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Masloboev, A. V. "A multi-agent technology for network-centric control information support of regional security." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2018): 92–102. http://dx.doi.org/10.21499/2409-1650-2018-2-92-102.

Повний текст джерела
Анотація:
The article represents research and work-out results in the field of applied agent-based decision support system development for regional security management. General problem statement of the regional security management information support is carried out. Modeling and automation tools of security manager activities within the region safeguarding process, interacting in the unified information environment, are proposed. A multi-agent technology for network-centric control information support of regional security has been developed. The technology is based on agent-oriented and system dynamics methodologies integration and use hybrid smart agents with integrated simulation toolkit.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Skokljev, Ivan, and Viktor Maksimovic. "Congestion management utilizing concentric relaxation." Serbian Journal of Electrical Engineering 4, no. 2 (2007): 189–206. http://dx.doi.org/10.2298/sjee0702189s.

Повний текст джерела
Анотація:
In the market-oriented power system environment, congestion management is a novel term connoting the power system steady state security functions. A large number of transmission transactions are dispatched in the regional day-ahead market and traverse the network adding to the power flow loading of the grid elements. Congestion is defined as a network security limit violation prospective due to transactions. Congestion management is a set of measures aimed at solving the congestion problem. This paper devises the concentric relaxation assisted approach to open access transmission network congestion management. The DC load flow symbolic simulator generates line power transfer functions. Congestion management is a systematic procedure based on linear programming. The DC load flow symbolic simulator generates all constraints and the black-box optimization library function is used to solve the problem of congestion on a sample IEEE RTS power system.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Liu, Tao, Ya Wen Guan, Yi Qun Yan, Li Liu, and Qi Chao Deng. "A WSN-Oriented Key Agreement Protocol in Internet of Things." Applied Mechanics and Materials 401-403 (September 2013): 1792–95. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1792.

Повний текст джерела
Анотація:
Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Zhao, Fang, Lei Wang, and Xuan Tian. "Design and Implementation of Authorization Management System Based on RBAC." Advanced Materials Research 532-533 (June 2012): 586–90. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.586.

Повний текст джерела
Анотація:
Authorization Management is one of the key components in Management Information Systems (MIS) for the security consideration. The adopting of Role-Based Access Control (RBAC) approach makes Authorization Management more efficiency and security. In this paper, we present a way to manage user’s privilege by constructing user’s function menu in the tree pattern based on RBAC in web-oriented system. The architecture of the Authorization Management System, the design of the database, the constructing of dynamic resource tree and the verification of user’s privilege are mainly introduced. The development of the system is under MyEclipse IDE and using MVC pattern.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Chucklyaev, Ilya. "Methodical Providing Complex Management of Risks of Informational Security of Function-Oriented Information Resources Management Information Systems." Voprosy kiberbezopasnosti, no. 4(17) (2016): 61–71. http://dx.doi.org/10.21681/2311-3456-2016-4-61-71.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Olsson, Inger, Patrick Millet, Stig Vinberg, Göran Olsson, Alf Bergroth, and Bodil J. Landstad. "Social Welfare in Singapore and Sweden: Differences in Organisational Systems of Health Care, Social Security and Rehabilitation." International Journal of Disability Management 3, no. 1 (April 1, 2008): 30–38. http://dx.doi.org/10.1375/jdmr.3.1.30.

Повний текст джерела
Анотація:
AbstractThe aim of the study is to describe and compare the health care, social security and rehabilitation systems in Singapore and Sweden. Two fundamental differences can be identified. First, the system in Singapore are strongly oriented towards a free market system, while Sweden's demonstrates strong public control. Second, following from how the systems are oriented, Singaporeans are expected to have a higher degree of independence and control over their health care, social security and rehabilitation. It appears that Singapore has had greater success in attaining and maintaining a system of health promotion, which influences the three systems. However, the Swedish welfare system provides greater security to those who are in need of health care, social security and rehabilitation.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Masloboev, A. V. "Decision-making support technology in regional security network-centric control system." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2019): 117–26. http://dx.doi.org/10.21499/2409-1650-2019-2-117-126.

Повний текст джерела
Анотація:
The paper considers decision support problems in management of regional socio-economic system development. A decision-making support technology for regional security network-centric control, differing by the structure and implementation technique of coordination and prediction formal procedures of regional security indicators within the decision-making unit of the regional management system, has been developed. The technology is oriented to situational center information-analytical support in the region.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Belsis, Petros, Christos Skourlas, and Stefanos Gritzalis. "Secure Electronic Healthcare Records Management in Wireless Environments." Journal of Information Technology Research 4, no. 4 (October 2011): 1–17. http://dx.doi.org/10.4018/jitr.2011100101.

Повний текст джерела
Анотація:
Wireless technologies have lately been integrated in many types of environments; their development is able to provide innovative services minimizing costs and the time necessary to identify the necessary information. However medical information is very sensitive since it contains critical personal data. Security and privacy preservation are very critical parameters. Lately, innovative technologies such as software agents’ technology have been utilized to support distributed environments. Presented is an architecture that allows secure medical related information management using software agents; this work expands previous research (Belsis, Skourlas, & Gritzalis, 2011). The authors present a security oriented solution and also provide experimental evidence about the capability of the platform to operate in wireless environments with large number of users.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Martin, Steve, David C. Yen, and David C. Chou. "Object-oriented technology for electronic commerce systems." Human Systems Management 20, no. 2 (August 29, 2001): 161–69. http://dx.doi.org/10.3233/hsm-2001-20209.

Повний текст джерела
Анотація:
Although HTML and XML languages are commonly used for Web browsing purpose, object-oriented technology made a significant impact to e-commerce systems. By using CORBA standard and concepts such as objects, classes, and messages, object-oriented technology has contributed to e-commerce systems with reusability of code, data hiding, systems openness, and cost-efficiency. This article discusses the necessity of adopting object-oriented technology for e-commerce implementation. The architecture, advantages and disadvantages, and standards and security issues concerning object-oriented technology are also included.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Zhang, Ping, Yamin Li, and Huanhuan Chi. "An Elliptic Curve Signcryption Scheme and Its Application." Wireless Communications and Mobile Computing 2022 (May 6, 2022): 1–11. http://dx.doi.org/10.1155/2022/7499836.

Повний текст джерела
Анотація:
Two basic security requirements in communication are confidentiality and authentication. Signcryption is an ideal technique to transmit encrypted and authenticated data. In view of the shortcomings of existing signcryption schemes and the high security of elliptic curve cryptography (ECC), we design a ECC-based signcryption scheme and evaluate it in terms of security, computational overhead, and communication overhead. Finally, we consider the application of our secure and efficient signcryption scheme in the smart lock key management system and analyze the bit-oriented performance of the designed key management scheme.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Shkreben, R. P., M. V. Kharnam, and I. P. Otenko. "The Strategic Potential Formation of the Security-Oriented Development of an Enterprise." PROBLEMS OF ECONOMY 4, no. 46 (2020): 256–64. http://dx.doi.org/10.32983/2222-0712-2020-4-256-264.

Повний текст джерела
Анотація:
The development of information economy, Ukraine’s integration into the world economic space, globalization processes and the resulting increase in competition exacerbate the problem of high-quality and efficient management of business processes at industrial enterprises. The necessity to increase the scale of high-tech production, to expand the range of innovative products and new requirements for their quality, cause attention focusing on the processes of forming the strategic potential of enterprises, namely, learning and finding new strategic opportunities, implementing organizational forms and tools, creating conditions for sustainable innovation and security-oriented development of domestic enterprises. The formation of strategic potential as an object of development management begins at the stage of intentions emergence and goals selection. Strategies, mechanisms (coordination, training, regulation, preservation and protection), organizational methods, forms of strategic management of economic security, as well as methods of selecting and coordinating adaptive measures that meet the guidelines of enterprise development are the strategic tools for security-oriented enterprise development. The division of development security strategies into types includes, first of all, the types of passive and active strategic behavior of an enterprise in the market. Passive survival strategies use available opportunities and are a typical course of action for a company in a stable and predictable environment; this "passivity" is determined by the fact that a company does not try to influence the external environment. Active survival strategies are aimed at actively searching for enterprise opportunities and effectively using them, and are implemented through transforming the internal structure of an enterprise and using complex strategic forms of behavior in the market. Strategies of actively influencing the external environment are realized through actively searching for new opportunities for innovative enterprise development and creating them.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Zhang, Jian, Xiao Yu, and Yanzhe Zhang. "Policy-Oriented Learning: A Case on Initiating Long-Term Care Insurance in China’s Social Security Sector." Sustainability 13, no. 6 (March 15, 2021): 3233. http://dx.doi.org/10.3390/su13063233.

Повний текст джерела
Анотація:
This paper explores the initiation process of the long-term care insurance (LTCI) policy in China’s social security sector, and focuses on policy-oriented learning activities to develop initiatives from German lessons. It presents a case from the LTCI pilot program, which serves as a new policy product that provides care to the elderly and disabled and upgrades the social security sector’s performance. This study implements policy-oriented learning to construct an analytical framework and applies it to China’s social security system. This research suggests that policy-oriented learning is a rational tool used to manufacture policy products that enable intellectual development and can provide roadmaps for administrative reform. The findings contribute to the current knowledge on policy-oriented learning by offering new insights from China’s experience with LTCI, thus helping to fill the gaps that are created when policy-oriented learning is applied to different systems and contexts, with unique cultural, traditional, and political characteristics.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Xiao, Dian Min. "Software Design of Personnel Management System in University." Applied Mechanics and Materials 568-570 (June 2014): 1565–68. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1565.

Повний текст джерела
Анотація:
This paper presents a unified personnel management system modeling language design. Unified Modeling Language is the use of object-oriented visualization, documentation and other standardized modeling language. The system uses the most popular B / S architecture, the choice of Microsoft's ASP.NET web development carried foreground, background database selected Microsoft SQL2005, through a combination of the two can give full play to the efficiency of personnel management software and have security features.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Grandry, Eric, Christophe Feltus, and Eric Dubois. "A Risk Integration Framework for the Service-Oriented Enterprise." International Journal of Information Systems in the Service Sector 10, no. 3 (July 2018): 1–19. http://dx.doi.org/10.4018/ijisss.2018070101.

Повний текст джерела
Анотація:
Enterprise architecture management provides the mechanism for governing enterprise transformations required by changes in the environment. In this article, the authors focus on changes that result from the analysis of information system risks and of their impacts on the services delivered by the enterprise. The authors present how the concepts of an information system risks management domain can be integrated into the ArchiMate enterprise architecture modelling language. This article approaches the conceptual integration in two design cycles: first, this article will consider information security risks, and then the authors generalize to information system risks. Additionally, the authors illustrate the application of the proposed approach and demonstrate the benefits of the integrated model through the handling of a case study, first in the domain of information security, and then in the domain of information privacy. The generalized risk-oriented EA model leads to a risk integration framework for the service-oriented enterprise.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

CHOU, I.-HSIN, and CHIN-FENG FAN. "AN OBJECT-ORIENTED SECURITY KNOWLEDGE FRAMEWORK FOR THE NUCLEAR SAFETY SYSTEM PROJECT." International Journal of Software Engineering and Knowledge Engineering 20, no. 03 (May 2010): 347–65. http://dx.doi.org/10.1142/s0218194010004797.

Повний текст джерела
Анотація:
As computers are used in nuclear safety systems, security engineering is becoming more and more important in the nuclear industry. Like all highly technical endeavours, the development of nuclear safety systems is a knowledge intensive task. Unfortunately, not only do nuclear scientists and software engineers lack the security knowledge, they are also not familiar with the new security requirements. Besides, few young people are studying nuclear science, nuclear engineering and related fields. Therefore, knowledge management can play a central role in encapsulating, storing and spreading the related discipline and knowledge more efficiently in the nuclear industry. In this paper, we propose a security knowledge framework to gather and store security knowledge from those regulatory-based security activities. We adopt an object-oriented paradigm which is easy for software engineers to understand and to express tacit and explicit knowledge. Its aim is intended to decouple between platform-independent security knowledge and platform-specific security controls. Finally, an example is presented to demonstrate the feasibility of linking between security controls and knowledge ontology in our framework.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Költzsch, Gregor. "INNOVATIVE METHODS TO ENHANCE TRANSACTION SECURITY OF BANKING APPLICATIONS." Journal of Business Economics and Management 7, no. 4 (December 31, 2006): 243–49. http://dx.doi.org/10.3846/16111699.2006.9636145.

Повний текст джерела
Анотація:
The increasing number of identity theft incidents such as credit card fraud, card duplication and internet attacks threaten the banking business that is mainly based on customer trust. Information and communication technologies create new business opportunities and innovative applications but do also enable new attack scenarios. Therefore, maintaining security and integrity is essential for the future economic success of banking. Biometric technologies such as fingerprint and facial recognition provide the means to enhance banking security. They are concerned with the measurement and evaluation of human physiological or behavioral data. Although the security‐oriented use of biometric technologies has become the most important field of development, they also enable a variety of convenience‐oriented use cases and applications. The article describes the security issues raised by technology‐based banking applications and outlines the idea of biometric technologies. Eventually, potential security and convenience‐driven use cases for biometrics in banking are illustrated based on examples given by a variety of professional project reports, magazines and other sources.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Zo, Hangjung, Derek L. Nazareth, and Hemant K. Jain. "Security and performance in service-oriented applications: Trading off competing objectives." Decision Support Systems 50, no. 1 (December 2010): 336–46. http://dx.doi.org/10.1016/j.dss.2010.09.002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Mourad, Azzam, Marc-André Laverdière, and Mourad Debbabi. "A High-level Aspect-oriented-based Framework for Software Security Hardening." Information Security Journal: A Global Perspective 17, no. 2 (May 9, 2008): 56–74. http://dx.doi.org/10.1080/19393550801911230.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Fan, Ya Qin, Ge Zhang, Fei Fei Li, and Xin Zhang. "Design of SSL VPN System Based on RBAC Access." Advanced Materials Research 765-767 (September 2013): 1299–302. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1299.

Повний текст джерела
Анотація:
Abstract: in order to solve the access control system loopholes, can appear the problem of chaotic management, security failure and conflict of competence, this paper studies the access control model, on the basis of the design of a SSL VPN oriented access control system, the authentication module, access control module, role access module and security detection module design. The realization technology of system user identity. This has practical reference significance to the personnel security technology research network.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Pencheva, Evelina, Ivaylo Atanasov, and Ventsislav Trifonov. "Identity Management in Future Railway Mobile Communication System." Applied Sciences 12, no. 9 (April 24, 2022): 4293. http://dx.doi.org/10.3390/app12094293.

Повний текст джерела
Анотація:
The Future Railway Mobile Communication System (FRMCS) has emerged as a worldwide standard for railway communication. This technology enables the operational efficiency and safety of railways to be improved by providing mission critical communications, machine-type communication for the railway system on board, in addition to trackside telemetry and broadband connectivity for passengers. Different equipment types, users, and functional identities can be involved in communication, and each of them is uniquely identified. Identity management is an important part of the security functions provided by the FRMCS system. This paper presents a service-oriented approach to identity management functionality, enabling service composition for railway applications and service virtualization. This paper studies functionality for the initial registration and subsequent deregistration of railway devices, users, and their functional identities, in addition to the transfer of the registered identities between different FRMCS serving areas while the train moves. Two FRMCS services that follow the principles of representational state transfer architecture are proposed. Services’ functionality is illustrated by use cases, data types, and application programming interfaces that enable services to be interacted with. Identity registration status models are developed, formally described, and mathematically verified. Discussion of the applicability of the proposed services for the implementation of FRMCS security and safety functions is provided. The presented service-oriented approach features a satisfactory level of flexibility and versatility.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії