Results 31 to 40 of about 13,481,561 (335)

Legal Aspects of the Supply Chain Cybersecurity in the Context of 5G Technology

open access: yesReview of European and Comparative Law, 2022
The 5G networks are considered to be crucial for the digital transformation of the economy and society and therefore will be subject to the regulations concerning the supply chain cybersecurity.
Agnieszka Besiekierska
doaj   +1 more source

LITIGATION WITH HUAWEI 5G CORP AND ICT SECURITY

open access: yesBaltic Journal of Economic Studies, 2021
Currently, there is an open discussion in the world on the introduction of new technologies to the lives of citizens and the economic sector. Doubts concern the impact of these technologies on the security of the individual and the state.
Norbert Malec   +2 more
doaj   +1 more source

The system and forms of cooperation between the Hungarian and East German state security services in the Carlos case

open access: yesBelügyi Szemle, 2023
Aim: The present study undertakes to briefly present the impact of the appearance of Carlos „the Jackal” in Hungary, and the cooperation of the Hungarian and East German state security services in the field of counter-terrorism.
József Beke
doaj   +1 more source

Evaluation of Airport Security Training Programs: Perspectives and Issues [PDF]

open access: yes, 2013
While many governments and airport operators have emphasized the importance of security training and committed a large amount of budget to security training programs, the implementation of security training programs was not proactive but reactive ...
De Gramatica, Martina   +4 more
core   +1 more source

Political crime in Polish systemic conditions in the 20th century

open access: yesHumanities and Social Sciences, 2020
Political offences are a specific ‘set’ of prohibited acts listed by the legislator, undertaken by the perpetrator in specific political and normative conditions, and determined by the shape of the state’s political system.
Tomasz Kuczur
doaj   +1 more source

Internal and external perceptions of small state security: the case of Estonia

open access: yesEuropean Security, 2019
This article concerns small state security from a cognitive perspective and investigates Estonia as a security actor as perceived by all littoral Baltic Sea states.
Jana Wrange, Rikard Bengtsson
semanticscholar   +1 more source

Automation for Network Security Configuration: State of the Art and Research Trends

open access: yesACM Computing Surveys, 2023
The size and complexity of modern computer networks are progressively increasing, as a consequence of novel architectural paradigms such as the Internet of Things and network virtualization.
Daniele Bringhenti   +3 more
semanticscholar   +1 more source

NOTION OF STRATEGIC NATIONAL SECURITY MANAGEMENT

open access: yesSecurity and Defence Quarterly, 2018
An analytical description of the community, national strategic management of national security as the foundation for shaping the security of the state with the display of combined actions of diplomacy, administration and generally understood management ...
Remigiusz Wiśniewski
doaj   +1 more source

Unconditional security at a low cost [PDF]

open access: yes, 2006
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by ...
C. H. Bennett   +9 more
core   +3 more sources

The regulatory security state in Europe

open access: yesJournal of European Public Policy, 2023
The ‘regulatory state’ has prevailed in almost every sector of European public policy. The provision of security, however, is still widely viewed as the domain of the ‘positive state’, which rests on political authority and autonomous capacities ...
Andreas Kruck, Moritz Weiss
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy