Results 21 to 30 of about 3,117,544 (197)
Svět disentu a Státní bezpečnosti jako souboj expertů [PDF]
The paper discusses the clash between State Security (Státní bezpečnost) and political dissent during Czechoslovak normalisation, or rather one of its aspects: the expert knowledge that both sides used in the conflict.
Jakub Hošek
doaj
Military involvement in political disputesas a factor of institutional instability in Brazil
This paper reports how the recent military`s involvement in political disputes raises instability in Brazil. As the country will have a presidential election in October 2022, the research sheds light on how President Bolsonaro abuses the armed forces ...
Plinio Cardoso
doaj +1 more source
Legal Aspects of the Supply Chain Cybersecurity in the Context of 5G Technology
The 5G networks are considered to be crucial for the digital transformation of the economy and society and therefore will be subject to the regulations concerning the supply chain cybersecurity.
Agnieszka Besiekierska
doaj +1 more source
LITIGATION WITH HUAWEI 5G CORP AND ICT SECURITY
Currently, there is an open discussion in the world on the introduction of new technologies to the lives of citizens and the economic sector. Doubts concern the impact of these technologies on the security of the individual and the state.
Norbert Malec +2 more
doaj +1 more source
Source attack of decoy-state quantum key distribution using phase information [PDF]
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun +9 more
core +2 more sources
Aim: The present study undertakes to briefly present the impact of the appearance of Carlos „the Jackal” in Hungary, and the cooperation of the Hungarian and East German state security services in the field of counter-terrorism.
József Beke
doaj +1 more source
Evaluation of Airport Security Training Programs: Perspectives and Issues [PDF]
While many governments and airport operators have emphasized the importance of security training and committed a large amount of budget to security training programs, the implementation of security training programs was not proactive but reactive ...
De Gramatica, Martina +4 more
core +1 more source
Political crime in Polish systemic conditions in the 20th century
Political offences are a specific ‘set’ of prohibited acts listed by the legislator, undertaken by the perpetrator in specific political and normative conditions, and determined by the shape of the state’s political system.
Tomasz Kuczur
doaj +1 more source
NOTION OF STRATEGIC NATIONAL SECURITY MANAGEMENT
An analytical description of the community, national strategic management of national security as the foundation for shaping the security of the state with the display of combined actions of diplomacy, administration and generally understood management ...
Remigiusz Wiśniewski
doaj +1 more source
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna +9 more
core +3 more sources

