Results 1 to 10 of about 10,469,767 (410)

Packet Key-Based End-to-End Security Management on a Blockchain Control Plane [PDF]

open access: yesSensors, 2019
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing ...
Younchan Jung   +2 more
doaj   +2 more sources

Categorizing Security for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2019
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the management of information resources about security. This research aims to study the problems of security
Wu, Yejun, Meng, Fansong
openaire   +5 more sources

Assessment of the level of financial and economic security at machine-building enterprises: evidence from Ukraine [PDF]

open access: yesProblems and Perspectives in Management, 2020
Determining the level of financial and economic security of an enterprise allows assessing the real possibilities to confront internal and external challenges and defining the potential for future development. To develop proposals on assessing this level,
Alla Cherep   +3 more
doaj   +1 more source

Modelling information support for combating corruption in the economic security management system of the state

open access: yesSocial Legal Studios, 2023
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar   +1 more source

European Security Management at the National Level. A Comparative Analysis of Strategies for the Development of Defence Capability in the United Kingdom and Poland [PDF]

open access: yesPolish Political Science Yearbook, 2022
The article presents the positions of the UK and Polish governments on the importance of European security management as a factor influencing and shaping the defence doctrine in both states.
Joanna Iwancz, Bartlomiej H. Toszek
doaj   +1 more source

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2022
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
semanticscholar   +1 more source

Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

open access: yesIEEE transactions on engineering management, 2021
Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity.
Martha M Asante   +5 more
semanticscholar   +1 more source

Security management in the field of critical infrastructure protection in the Republic of Serbia: State and perspectives [PDF]

open access: yesZbornik Radova: Pravni Fakultet u Novom Sadu, 2020
Term "critical infrastructure" became part of the post-Cold War security discourse when the first legal and political acts, containing this term, emerged.
Stajić Ljubomir S.   +2 more
doaj   +1 more source

QUALITY CRITERIA FOR THE PRIVATE SECURITY COMPANIES AND CHALLENGES FOR THEIR IMPLEMENTATION IN CONTEMPORARY ENVIRONMENT [PDF]

open access: yesBezbednosni Dijalozi, 2023
In the past decades it is evident that the modern mega trends: globalization, urbanization, digitalization etc., and the new forms of security risks and threats had influenced and moderated the organization of state security.
Sanja Kermetchieva   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy