Results 21 to 30 of about 3,117,544 (197)

Svět disentu a Státní bezpečnosti jako souboj expertů [PDF]

open access: yesHistorie - Otázky - Problémy, 2023
The paper discusses the clash between State Security (Státní bezpečnost) and political dissent during Czechoslovak normalisation, or rather one of its aspects: the expert knowledge that both sides used in the conflict.
Jakub Hošek
doaj  

Military involvement in political disputesas a factor of institutional instability in Brazil

open access: yesBrasiliana: Journal for Brazilian Studies, 2022
This paper reports how the recent military`s involvement in political disputes raises instability in Brazil. As the country will have a presidential election in October 2022, the research sheds light on how President Bolsonaro abuses the armed forces ...
Plinio Cardoso
doaj   +1 more source

Legal Aspects of the Supply Chain Cybersecurity in the Context of 5G Technology

open access: yesReview of European and Comparative Law, 2022
The 5G networks are considered to be crucial for the digital transformation of the economy and society and therefore will be subject to the regulations concerning the supply chain cybersecurity.
Agnieszka Besiekierska
doaj   +1 more source

LITIGATION WITH HUAWEI 5G CORP AND ICT SECURITY

open access: yesBaltic Journal of Economic Studies, 2021
Currently, there is an open discussion in the world on the introduction of new technologies to the lives of citizens and the economic sector. Doubts concern the impact of these technologies on the security of the individual and the state.
Norbert Malec   +2 more
doaj   +1 more source

Source attack of decoy-state quantum key distribution using phase information [PDF]

open access: yes, 2013
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun   +9 more
core   +2 more sources

The system and forms of cooperation between the Hungarian and East German state security services in the Carlos case

open access: yesBelügyi Szemle, 2023
Aim: The present study undertakes to briefly present the impact of the appearance of Carlos „the Jackal” in Hungary, and the cooperation of the Hungarian and East German state security services in the field of counter-terrorism.
József Beke
doaj   +1 more source

Evaluation of Airport Security Training Programs: Perspectives and Issues [PDF]

open access: yes, 2013
While many governments and airport operators have emphasized the importance of security training and committed a large amount of budget to security training programs, the implementation of security training programs was not proactive but reactive ...
De Gramatica, Martina   +4 more
core   +1 more source

Political crime in Polish systemic conditions in the 20th century

open access: yesHumanities and Social Sciences, 2020
Political offences are a specific ‘set’ of prohibited acts listed by the legislator, undertaken by the perpetrator in specific political and normative conditions, and determined by the shape of the state’s political system.
Tomasz Kuczur
doaj   +1 more source

NOTION OF STRATEGIC NATIONAL SECURITY MANAGEMENT

open access: yesSecurity and Defence Quarterly, 2018
An analytical description of the community, national strategic management of national security as the foundation for shaping the security of the state with the display of combined actions of diplomacy, administration and generally understood management ...
Remigiusz Wiśniewski
doaj   +1 more source

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

Home - About - Disclaimer - Privacy