Results 31 to 40 of about 1,932,514 (209)

Reconciling the "Bittersweet Chemistry" between Technology and Corporate Takeovers through Reinforcing National Security Interests in Merger Control

open access: yesPotchefstroom Electronic Law Journal, 2021
This article argues that company takeover regulation regimes must carefully balance two opposing notions. On the one hand, the regime must be designed to enable or facilitate the initiation and successful implementation of takeovers and mergers in the ...
Justice Mudzamiri, Patrick Osode
doaj   +1 more source

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

open access: yesEntropy, 2022
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors.
Hisham Ali   +7 more
doaj   +1 more source

APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2021
With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource.
Bohdan Nikolaienko, Serhii Vasylenko
doaj   +1 more source

The Strategic Measures for the Industrial Security of Small and Medium Business

open access: yesThe Scientific World Journal, 2014
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage.
Chang-Moo Lee
doaj   +1 more source

Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things

open access: yesSensors, 2020
The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection.
Evangelina Lara   +3 more
doaj   +1 more source

Informational Support of Civilian Intelligence for Heavy Industry (Including Machine Industry) and the Energy Sector in the Polish People’s Republic in the Years 1970–1990

open access: yesStudia Historiae Oeconomicae, 2019
Throughout the existence of the Polish People’s Republic (PPR), its scientific and technical intelligence (S&TI) supported Polish mining, energy, metallurgy, and machine industries.
Mirosław Sikora
doaj   +1 more source

Cyber Threat Actors for the Factory of the Future

open access: yesApplied Sciences, 2020
The increasing degree of connectivity in factory of the future (FoF) environments, with systems that were never designed for a networked environment in terms of their technical security nature, is accompanied by a number of security risks that must be ...
Mirko Sailio   +2 more
doaj   +1 more source

The Concept of Sustainable Development in the Projection of Modern Transformational Trends: A New Reality and New Opportunities for Business

open access: yesУправленческое консультирование, 2022
The relevance of the topic of the article is due to the importance of the concept of sustainable development for the successful functioning of enterprises in the new reality.
E. A. Kuklina
doaj   +1 more source

DE LA IMPRENTA MANUAL A LA MECÁNICA: PRIMEROS INTENTOS DE CAMBIO EN ESPAÑA

open access: yesCuadernos de Ilustración y Romanticismo, 2018
The change from manual to mechanical printing was gradual and took place between the end of the eighteenth century and the first decades of the nineteenth century, being the latter the years that marked the transition.
Fermín de los Reyes Gómez
doaj   +1 more source

Open-source intelligence as a tool supplementing the activity in the field of a forensic technique

open access: yesActa Universitatis Lodziensis Folia Iuridica, 2018
Modern collection of information from open sources like state, press and private ones come under open-source intelligence and it is a complement to operation activities carried out in criminology.
Agata Ziółkowska
doaj   +1 more source

Home - About - Disclaimer - Privacy