Results 1 to 10 of about 1,730,610 (176)

Specific food security policies [PDF]

open access: yesJournal of Social Sciences, 2019
In this article, the author has analyzed what types of food security policies need to be develop and implement depending on the dimensions of food security in order to improve the situation of food security.
OLEINIUC, Maria
doaj   +3 more sources

Security Policy Consistency

open access: yes, 2000
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and ...
Ribeiro, Carlos   +3 more
openaire   +5 more sources

Commentary: The Czech Approach to Supply Chain Security in ICT [PDF]

open access: yesApplied Cybersecurity & Internet Governance, 2022
Supply chain security is one of the challenges many countries are currently addressing. As this topic is a national security prerogative, the systems for screening also vary.
Veronika Netolicka
doaj   +1 more source

Compilation of the strategic model of the sanctions policies of the United States towards the Islamic Republic of Iran with an emphasis on three major security discourses (Joe Biden's presidency) [PDF]

open access: yesرهیافتهای سیاسی و بین المللی, 2023
The hostile policies of the United States towards the Islamic Republic of Iran can be seen as having several bills and extensions. From policies of destroying the international currency to approaches based on threats and sanctions.
Jamshid Rezaei Mirghaed   +2 more
doaj   +1 more source

An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks

open access: yesApplied Sciences, 2022
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations.
Ahlam Fakieh, Aymen Akremi
doaj   +1 more source

La política de seguridad en El Salvador: la construcción del enemigo y sus efectos en la violencia y el orden social

open access: yesRevista de Estudios Sociales, 2020
Despite the end of the civil war and the democratic transition, El Salvador remains one of the most violent countries in the world. Post-war Salvadoran governments have struggled to implement security policies that emphasize repression and heavy-handed ...
Viviana García Pinzón   +1 more
doaj   +1 more source

International normative framework for information protection in banks and financial institutions through the example of constituting Basel agreements and determining operational risks [PDF]

open access: yesMegatrend Revija, 2021
International coordination of banking policies can be seen through the work of the Basel Committee, where the importance of security and protection of information in banks and other financial institutions highlights the Basel II agreement, as it ...
Miletić Perica
doaj   +1 more source

What Do You Think About Your Company’s Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms

open access: yesFrontiers in Big Data, 2020
Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control.
Yoann Bertrand   +2 more
doaj   +1 more source

Pact for Life and the Reduction of Homicides in the State of Pernambuco

open access: yesStability : International Journal of Security and Development, 2014
The Pact for Life, the Public Security Policy implemented in Pernambuco in 2007, is identified as a successful policy that produced a large reduction in homicides in Pernambuco.
José Luiz Ratton   +2 more
doaj   +1 more source

Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems

open access: yesSensors, 2020
Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent
Sara N. Matheu   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy