Results 21 to 30 of about 358,085 (333)
Analysis of security management activities and economic consequences of corruption in privatization of agricultural land in Serbia [PDF]
Security management does not make strategic decisions, but it significantly influences their decision-making by providing top management with information and assessments on the basis of which strategic goals are defined and operational decisions are made.
Đukić Stanimir, Avramović Nenad
doaj +1 more source
Secure Knowledge Management [PDF]
As the world is getting more and more technology savvy, the collection and distribution of information and knowledge need special attention. Progress has been made on the languages and tools needed for effective knowledge management and on the legal issues concerning the consumption and dissemination of critical knowledge.
S. Upadhyaya+2 more
openaire +1 more source
CHALLENGES OF IMPLEMENTATION OF STATE SECURITY SERVICES
In the process of managing the country, it is advisable to look at broader measures of public administration in the implementation of specific national security services implemented to ensure existential and behavioral needs of society.
Marek Zbigniew KULISZ
doaj +6 more sources
With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work.
Sung-Hoon Lee+4 more
doaj +1 more source
Aspects of Heat Supply Security Management Using Elements of Decision Theory
Security in heat supply systems plays an important role in social, technical and political terms. It includes three main components: energy security, security of heat supply, security of people.
Bożena Babiarz
doaj +1 more source
Security training: where are we now? [PDF]
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj
Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum
The concept of identity has become one common research topic in security and privacy where the real identity of users must be preserved, usually covered by pseudonym identifiers.
Ivan Gutierrez-Aguero+4 more
doaj +1 more source
Categorizing Security for Security Management and Information Resource Management
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the management of information resources about security. This research aims to study the problems of security
Wu, Yejun, Meng, Fansong
openaire +4 more sources
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite ...
Ruijie ZHU+3 more
doaj
The state defence system in the structure of managing internal security systems in Poland
The article focuses on the analysis of the defence structure of the Republic of Poland, presenting three key elements: management, militaristic and non-military subsystems.
Katrzyna Cyrkun+3 more
doaj +1 more source