Packet Key-Based End-to-End Security Management on a Blockchain Control Plane [PDF]
Sensors, 2019The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing ...
Younchan Jung+2 more
doaj +2 more sources
Categorizing Security for Security Management and Information Resource Management
Journal of Strategic Security, 2019There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the management of information resources about security. This research aims to study the problems of security
Wu, Yejun, Meng, Fansong
openaire +5 more sources
Assessment of the level of financial and economic security at machine-building enterprises: evidence from Ukraine [PDF]
Problems and Perspectives in Management, 2020Determining the level of financial and economic security of an enterprise allows assessing the real possibilities to confront internal and external challenges and defining the potential for future development. To develop proposals on assessing this level,
Alla Cherep+3 more
doaj +1 more source
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar +1 more source
European Security Management at the National Level. A Comparative Analysis of Strategies for the Development of Defence Capability in the United Kingdom and Poland [PDF]
Polish Political Science Yearbook, 2022The article presents the positions of the UK and Polish governments on the importance of European security management as a factor influencing and shaping the defence doctrine in both states.
Joanna Iwancz, Bartlomiej H. Toszek
doaj +1 more source
A process framework for information security management
International Journal of Information Systems and Project Management, 2022Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe+4 more
semanticscholar +1 more source
Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey
IEEE transactions on engineering management, 2021Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity.
Martha M Asante+5 more
semanticscholar +1 more source
Security management in the field of critical infrastructure protection in the Republic of Serbia: State and perspectives [PDF]
Zbornik Radova: Pravni Fakultet u Novom Sadu, 2020Term "critical infrastructure" became part of the post-Cold War security discourse when the first legal and political acts, containing this term, emerged.
Stajić Ljubomir S.+2 more
doaj +1 more source
QUALITY CRITERIA FOR THE PRIVATE SECURITY COMPANIES AND CHALLENGES FOR THEIR IMPLEMENTATION IN CONTEMPORARY ENVIRONMENT [PDF]
Bezbednosni Dijalozi, 2023In the past decades it is evident that the modern mega trends: globalization, urbanization, digitalization etc., and the new forms of security risks and threats had influenced and moderated the organization of state security.
Sanja Kermetchieva+1 more
doaj +1 more source