Results 91 to 100 of about 2,405,806 (209)

Synergy of National Food Security System

open access: yesJurnal Penelitian Pendidikan IPA
The high population will have an impact on the food crisis and poverty if it is not balanced with food security. The Indonesian government must be able to formulate a national food policy that can improve food security. The food policy includes the availability of food Supplies in good quantity and quality as well as affordable food prices by the ...
Mitra Musika Lubis   +4 more
openaire   +1 more source

Implementation and Development of Vehicle Tracking and Immobilization Technologies [PDF]

open access: yes, 2010
Since the mid-1980s, limited use has been made of vehicle tracking using satellite communications to mitigate the security and safety risks created by the highway transportation of certain types of hazardous materials.
Butterworth, Bruce Robert   +2 more
core   +1 more source

Som Based Assurance Assessment for Information Security Management System in Organization [PDF]

open access: yes, 2010
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core  

Social Security Programs Throughout the World: Africa, 2011 [PDF]

open access: yes, 2011
[Excerpt] This third issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of Africa. The combined findings of this series, which also includes volumes on Europe, Asia and the Pacific, and the ...
International Social Security Association   +1 more
core   +2 more sources

Hybrid Warfare and Operations in the Context of the National Security System: A Chinese Perspective

open access: yesRUDN Journal of Political Science
The relevance of the topic of the study lies in the fact that the problems of hybrid warfare, hybrid operations, hybrid influence have become especially important in the context of the complicated geopolitical situation in the world after February 2022 ...
Leonid G. Abdrakhimov, Alina O. Liksok
doaj   +1 more source

Deliberative Constitutionalism in the National Security Setting [PDF]

open access: yes, 2018
Deliberative democracy theory maintains that authentic deliberation about matters of public concern is an essential condition for the legitimacy of political decisions. Such deliberation has two features. The first is deliberative rigor.
DeRosa, Mary B., Regan, Milton C.
core   +1 more source

DEVELOPING A NATIONAL SECURITY STRATEGY BASED ON THE PRINCIPLES OF NATIONAL RESILIENCE

open access: yesСтратегічна панорама, 2019
The article explores the methodological principles of the national security strategy development and the ways of their improvement in order to more effectively respond to modern challenges, threats and changes in the security environment.
O. Reznikova
doaj  

Resilient Health Systems and National Security

open access: yesNational Security: A Journal of the National Defence University-Kenya
The COVID-19 pandemic exposed critical vulnerabilities in both global and national health systems. It underscored the intricate relationship between public health and national security, emphasising the need for robust preparedness frameworks. This study examined how inefficiencies in the medical supply chain could impact Kenya's national security and ...
Lorna Ndirangu Ndirangu, David Wambulwa
openaire   +1 more source

Analysis of National Security Advisory System in True Communication of National Security Issues

open access: yesInternational Journal of Politics and Security
The media has an influence on the stages of national security policy formulation and decision-making. In this context, the national security advisory system is also effective in policy adaptation. National security is inherently filled with case studies as part of a broader whole.
Muhammet Mağat, Bekir Parlak
openaire   +2 more sources

Methodology for a security audit of ERTMS [PDF]

open access: yes, 2012
In this paper we discuss the methodology we used for a security audit of the European Railway Traffic Management System (ERTMS) specifications. ERTMS is a major industrial project that aims at replacing the many different national train control and ...
Gashi, I., Stroud, R.
core  

Home - About - Disclaimer - Privacy