Results 31 to 40 of about 8,813,848 (351)

Security training: where are we now? [PDF]

open access: yesForced Migration Review, 1999
In recent years, concern for the security of aid personnel working in violent environments has grown rapidly.
Koenraad Van Brabant
doaj  

Aspects of Heat Supply Security Management Using Elements of Decision Theory

open access: yesEnergies, 2018
Security in heat supply systems plays an important role in social, technical and political terms. It includes three main components: energy security, security of heat supply, security of people.
Bożena Babiarz
doaj   +1 more source

Organizational practices as antecedents of the information security management performance

open access: yesInformation Technology and People, 2019
Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance.
Daniel Perez González   +2 more
semanticscholar   +1 more source

Security Management Technology of Multilayer Satellite Internet Based on Blockchain

open access: yes天地一体化信息网络, 2022
Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite ...
Ruijie ZHU   +3 more
doaj  

Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum

open access: yesIEEE Access, 2021
The concept of identity has become one common research topic in security and privacy where the real identity of users must be preserved, usually covered by pseudonym identifiers.
Ivan Gutierrez-Aguero   +4 more
doaj   +1 more source

The state defence system in the structure of managing internal security systems in Poland

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2023
The article focuses on the analysis of the defence structure of the Republic of Poland, presenting three key elements: management, militaristic and non-military subsystems.
Katrzyna Cyrkun   +3 more
doaj   +1 more source

Countering hybrid warfare as ontological security management: the emerging practices of the EU and NATO

open access: yesOntological Insecurity in the European Union, 2018
What are the ethical pitfalls of countering hybrid warfare? This article proposes an ontological security-inspired reading of the EU and NATO’s engagement with hybrid threats.
M. Mälksoo
semanticscholar   +1 more source

Analyzing the delays of target lane vehicles caused by vehicle lane-changing operation

open access: yesScientific Reports, 2021
Vehicle lane-changing on urban roads is the most common traffic behavior, in which the driver changes the direction or increases the speed of the vehicle by changing its trajectory.
Quantao Yang   +4 more
doaj   +1 more source

Integrated Security Management System for Enterprises in Industry 4.0

open access: yesInformation & Security An International Journal, 2019
This paper presents results from the analysis of methodologies and standards aiming to meet the requirements to security management of enterprises implementing Industry 4.0 principles.
S. Dotsenko   +3 more
semanticscholar   +1 more source

Blockchain for Healthcare Management Systems: A Survey on Interoperability and Security

open access: yesIEEE Access
n recent years it has been shown that the secure exchange of medical information significantly benefits people’s life quality, improving their care and treatment.
E. Villarreal   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy