Results 21 to 30 of about 358,085 (333)

Analysis of security management activities and economic consequences of corruption in privatization of agricultural land in Serbia [PDF]

open access: yesEkonomika Poljoprivrede (1979), 2021
Security management does not make strategic decisions, but it significantly influences their decision-making by providing top management with information and assessments on the basis of which strategic goals are defined and operational decisions are made.
Đukić Stanimir, Avramović Nenad
doaj   +1 more source

Secure Knowledge Management [PDF]

open access: yes, 2006
As the world is getting more and more technology savvy, the collection and distribution of information and knowledge need special attention. Progress has been made on the languages and tools needed for effective knowledge management and on the legal issues concerning the consumption and dissemination of critical knowledge.
S. Upadhyaya   +2 more
openaire   +1 more source

CHALLENGES OF IMPLEMENTATION OF STATE SECURITY SERVICES

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2014
In the process of managing the country, it is advisable to look at broader measures of public administration in the implementation of specific national security services implemented to ensure existential and behavioral needs of society.
Marek Zbigniew KULISZ
doaj   +6 more sources

Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique

open access: yesIEEE Access, 2020
With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work.
Sung-Hoon Lee   +4 more
doaj   +1 more source

Aspects of Heat Supply Security Management Using Elements of Decision Theory

open access: yesEnergies, 2018
Security in heat supply systems plays an important role in social, technical and political terms. It includes three main components: energy security, security of heat supply, security of people.
Bożena Babiarz
doaj   +1 more source

Security training: where are we now? [PDF]

open access: yesForced Migration Review, 1999
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj  

Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum

open access: yesIEEE Access, 2021
The concept of identity has become one common research topic in security and privacy where the real identity of users must be preserved, usually covered by pseudonym identifiers.
Ivan Gutierrez-Aguero   +4 more
doaj   +1 more source

Categorizing Security for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2019
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the management of information resources about security. This research aims to study the problems of security
Wu, Yejun, Meng, Fansong
openaire   +4 more sources

Security Management Technology of Multilayer Satellite Internet Based on Blockchain

open access: yes天地一体化信息网络, 2022
Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite ...
Ruijie ZHU   +3 more
doaj  

The state defence system in the structure of managing internal security systems in Poland

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2023
The article focuses on the analysis of the defence structure of the Republic of Poland, presenting three key elements: management, militaristic and non-military subsystems.
Katrzyna Cyrkun   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy