Specific food security policies [PDF]
In this article, the author has analyzed what types of food security policies need to be develop and implement depending on the dimensions of food security in order to improve the situation of food security.
OLEINIUC, Maria
doaj +3 more sources
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and ...
Ribeiro, Carlos +3 more
openaire +5 more sources
Commentary: The Czech Approach to Supply Chain Security in ICT [PDF]
Supply chain security is one of the challenges many countries are currently addressing. As this topic is a national security prerogative, the systems for screening also vary.
Veronika Netolicka
doaj +1 more source
Compilation of the strategic model of the sanctions policies of the United States towards the Islamic Republic of Iran with an emphasis on three major security discourses (Joe Biden's presidency) [PDF]
The hostile policies of the United States towards the Islamic Republic of Iran can be seen as having several bills and extensions. From policies of destroying the international currency to approaches based on threats and sanctions.
Jamshid Rezaei Mirghaed +2 more
doaj +1 more source
An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations.
Ahlam Fakieh, Aymen Akremi
doaj +1 more source
Despite the end of the civil war and the democratic transition, El Salvador remains one of the most violent countries in the world. Post-war Salvadoran governments have struggled to implement security policies that emphasize repression and heavy-handed ...
Viviana García Pinzón +1 more
doaj +1 more source
International normative framework for information protection in banks and financial institutions through the example of constituting Basel agreements and determining operational risks [PDF]
International coordination of banking policies can be seen through the work of the Basel Committee, where the importance of security and protection of information in banks and other financial institutions highlights the Basel II agreement, as it ...
Miletić Perica
doaj +1 more source
Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control.
Yoann Bertrand +2 more
doaj +1 more source
Pact for Life and the Reduction of Homicides in the State of Pernambuco
The Pact for Life, the Public Security Policy implemented in Pernambuco in 2007, is identified as a successful policy that produced a large reduction in homicides in Pernambuco.
José Luiz Ratton +2 more
doaj +1 more source
Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems
Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent
Sara N. Matheu +6 more
doaj +1 more source

