Results 31 to 40 of about 14,415,212 (341)
Legal Aspects of the Supply Chain Cybersecurity in the Context of 5G Technology
The 5G networks are considered to be crucial for the digital transformation of the economy and society and therefore will be subject to the regulations concerning the supply chain cybersecurity.
Agnieszka Besiekierska
doaj +1 more source
This article examines water awareness campaign messaging of the Water Efficiency and Public Information for Action (WEPIA) campaign. Using Jordanian government documents and structured interviews, it argues that the Ministry of Water and Irrigation (MWI)
S. Benedict, H. Hussein
semanticscholar +1 more source
LITIGATION WITH HUAWEI 5G CORP AND ICT SECURITY
Currently, there is an open discussion in the world on the introduction of new technologies to the lives of citizens and the economic sector. Doubts concern the impact of these technologies on the security of the individual and the state.
Norbert Malec +2 more
doaj +1 more source
Aim: The present study undertakes to briefly present the impact of the appearance of Carlos „the Jackal” in Hungary, and the cooperation of the Hungarian and East German state security services in the field of counter-terrorism.
József Beke
doaj +1 more source
Automated analysis of security protocols with global state [PDF]
Security APIs, key servers and protocols that need to keep the status of transactions, require to maintain a global, non-monotonic state, e.g., in the form of a database or register.
Kremer, Steve, Künnemann, Robert
core +8 more sources
Analysis of security protocols using finite-state machines [PDF]
This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more ...
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
Political crime in Polish systemic conditions in the 20th century
Political offences are a specific ‘set’ of prohibited acts listed by the legislator, undertaken by the perpetrator in specific political and normative conditions, and determined by the shape of the state’s political system.
Tomasz Kuczur
doaj +1 more source
Security: Collective good or commodity? [PDF]
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2008 Sage.The state monopoly on the legitimate use of violence in Europe and North America has been central to the development of security
Briggs, Rachel +43 more
core +2 more sources
NOTION OF STRATEGIC NATIONAL SECURITY MANAGEMENT
An analytical description of the community, national strategic management of national security as the foundation for shaping the security of the state with the display of combined actions of diplomacy, administration and generally understood management ...
Remigiusz Wiśniewski
doaj +1 more source
Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security.
Adams, A, Sasse, MA
core +2 more sources

