Results 31 to 40 of about 14,415,212 (341)

Legal Aspects of the Supply Chain Cybersecurity in the Context of 5G Technology

open access: yesReview of European and Comparative Law, 2022
The 5G networks are considered to be crucial for the digital transformation of the economy and society and therefore will be subject to the regulations concerning the supply chain cybersecurity.
Agnieszka Besiekierska
doaj   +1 more source

An Analysis of Water Awareness Campaign Messaging in the Case of Jordan: Water Conservation for State Security

open access: yesWater, 2019
This article examines water awareness campaign messaging of the Water Efficiency and Public Information for Action (WEPIA) campaign. Using Jordanian government documents and structured interviews, it argues that the Ministry of Water and Irrigation (MWI)
S. Benedict, H. Hussein
semanticscholar   +1 more source

LITIGATION WITH HUAWEI 5G CORP AND ICT SECURITY

open access: yesBaltic Journal of Economic Studies, 2021
Currently, there is an open discussion in the world on the introduction of new technologies to the lives of citizens and the economic sector. Doubts concern the impact of these technologies on the security of the individual and the state.
Norbert Malec   +2 more
doaj   +1 more source

The system and forms of cooperation between the Hungarian and East German state security services in the Carlos case

open access: yesBelügyi Szemle, 2023
Aim: The present study undertakes to briefly present the impact of the appearance of Carlos „the Jackal” in Hungary, and the cooperation of the Hungarian and East German state security services in the field of counter-terrorism.
József Beke
doaj   +1 more source

Automated analysis of security protocols with global state [PDF]

open access: yes, 2014
Security APIs, key servers and protocols that need to keep the status of transactions, require to maintain a global, non-monotonic state, e.g., in the form of a database or register.
Kremer, Steve, Künnemann, Robert
core   +8 more sources

Analysis of security protocols using finite-state machines [PDF]

open access: yes, 2015
This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more ...
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

Political crime in Polish systemic conditions in the 20th century

open access: yesHumanities and Social Sciences, 2020
Political offences are a specific ‘set’ of prohibited acts listed by the legislator, undertaken by the perpetrator in specific political and normative conditions, and determined by the shape of the state’s political system.
Tomasz Kuczur
doaj   +1 more source

Security: Collective good or commodity? [PDF]

open access: yes, 2008
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2008 Sage.The state monopoly on the legitimate use of violence in Europe and North America has been central to the development of security
Briggs, Rachel   +43 more
core   +2 more sources

NOTION OF STRATEGIC NATIONAL SECURITY MANAGEMENT

open access: yesSecurity and Defence Quarterly, 2018
An analytical description of the community, national strategic management of national security as the foundation for shaping the security of the state with the display of combined actions of diplomacy, administration and generally understood management ...
Remigiusz Wiśniewski
doaj   +1 more source

Users are not the enemy [PDF]

open access: yes, 1999
Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security.
Adams, A, Sasse, MA
core   +2 more sources

Home - About - Disclaimer - Privacy