Results for 'Security Studies'

987 found
Order:
  1. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  3. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. The Effects of Fake News on Consumers’ Brand Trust: An Exploratory Study in the Food Security Context.Farte Gheorghe-Ilie & Obadă Rareș - 2021 - Romanian Journal of Communication and Public Relations 23 (3):47-61.
    The aim of this study is to explore the effects of fake news on consumers’ brand trust in the food security context. The starting point of our research is the finding that issues related to food security cannot be addressed without the contribution of multinational food corporations. The efficiency of their intervention depends on their capacity to build and preserve their brand trust despite the multifarious fake news stories that contaminate the information flow. Is brand trust sensitive to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. AI Security: A Unified Risk Governance Framework for Cybersecurity Compliance.Tripathi Praveen - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (4):1691-1693.
    Cloud security remains a top concern for enterprises. This study introduces AI Security, a risk governance framework integrating AI, DevSecOps, and predictive analytics to enhance compliance automation and threat intelligence in cloud environments.
    Download  
     
    Export citation  
     
    Bookmark  
  7.  74
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Security, Local Community, and the Democratic Political Culture in Africa.Krzysztof Trzcinski - 2021 - In Olajumoke Yacob-Haliso Adeshina Afolayan (ed.), Pathways to Alternative Epistemologies in Africa. Springer Verlag. pp. 111-122.
    In this study, the idea of the local African community as a social structure ensuring the security of its members is presented. An understanding of the concept of security is first briefly discussed, followed by the meaning of the concept of the local African community. The chapter also makes an a priori distinction between what one can call “moderate” and “radical” types of communal life and two case studies exemplifying them are presented. The chapter aims to analyze (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  28
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Global security and economic asymmetry: a comparison of developed and developing countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. (1 other version)White Supremacy as an Existential Threat: A Response to Rita Floyd’s 'The Morality of Security: A Theory of Just Securitization'.Jessica Wolfendale - 2022 - European Journal of International Security 1:9-18.
    Rita Floyd’s "The Morality of Security: A Theory of Just Securitization" is an important and insightful book that delineates a theory of just securitization (modified from the jus ad bellum and jus in bello criteria in just war theory) involving three sets of principles governing the just initiation of securitization, just conduct of securitization, and just desecuritization. This book is a much-needed addition to the security studies and just war scholarship. -/- Here, I explore the potential of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  15. Motivational Strategies and Security Service Delive ry in Universities in Cross River State, Nigeria.Comfort Robert Etor & Michael Ekpenyong Asuquo - 2021 - International Journal of Educational Administrati on, Planning, and Research 13 (1):55-65.
    This study assessed two motivational strategies and their respective ties to the service delivery in public universities in Cross River State. In achieving the central and specific targets of this research, four research questions and two null hypotheses were answered and tested in the study. The entire population of 440 security personnel in two public universities was studied, based on the census approach and following the ex-post facto research design. Three sets of expert-validated questionnaires, with Cronbach reliability estimates of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  17. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the intelligent (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  19. Internal Instability as a Security Challenge for Vietnam.Nguyen Hoang Tien, Nguyen Van Tien, Rewel Jimenez Santural Jose, Nguyen Minh Duc & Nguyen Minh Ngoc - 2020 - Journal of Southwest Jiaotong University 55 (4):1-13.
    National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. In the contemporary world with advanced technology and rapid globalization process taking place, beside many extant economic, social and political benefits there are many appearing challenges and threats that could endanger and destabilize the current socio-economic and political system of any country, including Vietnam. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  21. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  22.  9
    SECURITY AND PRIVACY TECHNIQUE IN BIG DATA: A REVIEW.Pamarthi Kartheek - 2024 - North American Journal of Engineering Research 5 (1).
    The importance of Big Data as a foundational component of the AI and ML landscape is not going away anytime soon. As a result, the past fifteen years have seen a tremendous investment in Big Data research. The purpose of this literature review is to compile the most recent results from Big Data studies conducted over the past fifteen years. The study will address questions about the main applications of Big Data analytics, the main challenges and limitations encountered by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Perceived Influence of Entrepreneurship Education Methods on Economic Security in Cross River State.Stephen Bepeh Undie, Ezekiel Usip Mfon, Lydia Ochuole Ogbudu, Ubong Edet Uko & Joseph Ogbaji Ebiale - 2023 - Prestige Journal of Education 6 (1):158-171.
    This study investigated the perception of how methods of entrepreneurial education predict the level of economic security in the Southern Senatorial District of Cross River State. It was guided by two research questions and two hypotheses, tested at a significant level of 0.05. The research design was a survey. The study had 350 participants. A 40-item "Entrepreneurship Education and Economic Security Questionnaire" (EEESQ) was validated by five experts from the University of Calabar and used in data collection. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  40
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. ENSURING ECONOMIC SECURITY OF TRADE ENTERPRISES IN THE FORMATION OF PRICING POLICY.Maksym Bezpartochnyi & Igor Britchenko - 2022 - Financial and Credit Activity: Problems of Theory and Practice 43 (2):146-156.
    The article considers the problem of ensuring the economic security of trade enterprises by forming an optimal pricing policy. The methodology of formation the minimum and maximum selling prices of trade enterprise, maintenance of margin of economic security, which is based on research of turnover costs and working capital of trade enterprise is offered. Based on statistical data of trade enterprises, the types of prices by product range are determined, which form a stable economic situation and ensure economic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  24
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  23
    ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):7-12.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, a novel hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Older adults' safety and security online: A post-pandemic exploration of attitudes and behaviors.Edgar Pacheco - 2024 - Journal of Digital Media and Interaction 7 (17):107-126.
    Older adults’ growing use of the internet and related technologies, further accelerated by the COVID-19 pandemic, has prompted not only a critical examination of their behaviors and attitudes about online threats but also a greater understanding of the roles of specific characteristics within this population group. Based on survey data and using descriptive and inferential statistics, this empirical study delves into this matter. The behaviors and attitudes of a group of older adults aged 60 years and older (n=275) regarding different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was found (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Export logistics of agricultural products of Ukraine in the context of ensuring food security during martial law.Maksym Bezpartochnyi & Igor Britchenko - 2022 - In Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.), Current issues of security management during martial law. Vysoká škola bezpečnostného manažérstva v Košiciach. pp. 163-184.
    The study determined the dynamics of growing grain crops in Ukraine and the geography of their export. The problems of ensuring export logistics as a result of military aggression by russia in the context of ensuring food security are pointed out. The main directions of export logistics of grain crops from Ukraine and the peculiarities of transportation by railway, river and road transport were studied. The directions of diversification of export logistics of grain crops from Ukraine during martial law (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of dimensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Tracer Study of Teacher Education Graduates of Western Philippines University - Puerto Princesa Campus: Basis for Curriculum Review and Revision.Jupeth Pentang, David R. Perez, Katherine H. Cuanan, Mailyn B. Recla, Romelyn T. Dacanay, Rastanura M. Bober, Cheche E. Dela Cruz, Susana P. Egger, Ruth L. Herrera, Carolyn M. Illescas, Josephine M. Salmo, Manuel L. Bucad Jr, Joann V. Agasa & Nur-Aina A. Abaca - 2022 - International Journal of Multidisciplinary: Applied Business and Education Research 3 (3):419-432.
    Graduates' employability indicates the excellent education and relevant preparation they obtained from their respective degrees. Tracer studies have enabled higher education institutions to profile their graduates while also reflecting on the quality of education they provide. With the foregoing, a tracer study determined the demographic and academic profile of teacher education graduates from 2017 to 2020 in a state university in the West Philippines. It also ascertained the advanced studies they attended after college, their employment data, the relevance (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  37. Research of the intelligent resource security of the nanoeconomic development innovation paradigm.Tetiana Ostapenko, Igor Britchenko & Peter Lošonczi - 2021 - Baltic Journal of Economic Studies 7 (5):159-168.
    The resources and resource potential of the innovative component of nanoeconomics are analyzed. The factors of production – classical types of resources such as land, labor, capital and technology – are described. Ways of influencing the security resources of nanoeconomics within the innovation paradigm are evaluated. The purpose of the study is to identify the factor of nanoeconomics in the formation of resource security potential in the innovation paradigm. To achieve this goal, the following tasks were set: to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Institutional variables and the supervision of security in public secondary schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  39. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an organized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):138-157.
    Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To tackle (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  67
    Advancements in AI-Driven Communication Systems: Enhancing Efficiency and Security in Next-Generation Networks (13th edition).Palakurti Naga Ramesh - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (1):28-36.
    The increasing complexity and demands of next-generation networks necessitate the integration of Artificial Intelligence (AI) to enhance their efficiency and security. This article explores advancements in AI-driven communication systems, focusing on optimizing network performance, ensuring robust security measures, and addressing the challenges of scalability and real-time adaptability. By analyzing case studies, emerging technologies, and recent research, this study highlights AI's transformative potential in redefining communication systems for future applications.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Assessment of the determinants of the financial security of railways in Ukraine.Igor Britchenko, N. I. Bohomolova, S. S. Pinchuk & O. O. Kravchenko - 2018 - Financial and Credit Activity: Problems of Theory and Practice 4 (27):270-282.
    The paper is devoted to the study of determinants determined the level of financial security of economic systems. It is shown that the financial security of an economic system implies the achievement of a level of financial stability that will contribute to simultaneously maintaining financial equilibrium and ensuring targeted growth in line with the development strategy. The level of financial security of rail transport in Ukraine was analyzed and it was determined that the decline in its (...) was the result of a complex interaction of external and internal factors, the main of which were tight government regulation, shifting the financial burden of social responsibilities to Ukrzaliznytsya, PJSC, lack of competition in the transportation of the main nomenclature of cargo and the unsatisfactory state of non-current assets. Based on the Argenti’s method, it is shown that the consequence of the inefficient financial management of Ukrzaliznytsia, PJSC are the reduction of its insolvency. Three main determinants of the financial security of rail enterprises were identified: a reduction in traffic volumes, an unstable capital structure and the impossibility of timely repayment of current liabilities. An additive model for assessing the impact of selected determinants on the level of financial security of Ukrzaliznytsia, PJSC is proposed. The analysis of the model parameters showed that the greatest impact has the index of industrial production, which is due to the predominant formation of its own financial resources of rail transport due to income from freight traffic. A complex of measures designed to improve the financial condition of rail enterprises was proposed. It is substantiated that in order to equalize existing threats, it is necessary to take political decisions aimed at improving the financial condition of Ukrzaliznytsia, PJSC by reducing the intensity of leaching of its financial resources, as well as implementing an anti-crisis financial strategy aimed at optimizing the capital structure and financial rehabilitation of rail enterprises. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  37
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key challenges associated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  33
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. Network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  21
    Fortifying Financial Systems: Exploring the Intersection of Microservices and Banking Security.Roshan Mahant Sumit Bhatnagar - 2024 - International Research Journal of Engineering and Technology 11 (8):748-758.
    As part of their digital transformation, financial service companies can greatly benefit from the implementation of a microservice architecture. We can build a service-oriented architecture (SOA) application using the architecture to enhance its overall performance and maintainability. This enables the application to consist of several smaller components that operate independently and simultaneously. In the financial services industry, the accuracy of artifact states holds immense significance. Given that an inaccurate artifact state or anomalous artifact operation(s) could potentially ruin the entire application, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  47. Understanding Terrorism in the context of Global Security.Shreyasi Ghosh - 2014 - SOCRATES 2 (JUNE 2014):89-106.
    Understanding Terrorism in the context of Global Security -/- Author / Authors : Shreyasi Ghosh Page no. 89-106 Discipline : Political Science/Polity/ Democratic studies Script/language : Roman/English Category : Research paper Keywords: Terrorism, Violence, Threat, Global Security, Globalization.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. An Analytical Study of the Reality of Electronic Documents and Electronic Archiving in the Management of Electronic Documents in the Palestinian Pension Agency (PPA).Mohammed Khair I. Kassab, Samy S. Abu Naser & Mazen J. Al Shobaki - 2017 - European Academic Research 4 (12):10052-10102.
    The study aims to identify the reality of management of electronic documents and electronic archiving retirement in the Palestinian Pension Agency -analytical study, as well as to recognize the reality of the current document management system in the Palestinian Pension Agency. The study found the following results: that the reality of the current system for the management of documents in the agency is weak and suffers from many jams. Employee in the agency understand the importance and benefits of the management (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  9
    Protecting the Hadoop Cluster on the Basis of Big Data Security.Pamarthi Kartheek - 2023 - Journal of Artificial Intelligence, Machine Learning and Data Science 1 (3):831-837.
    Gathering and analyzing enormous volumes of data is known as "big data," and it includes information from users, sensors, healthcare providers, and companies. Using the Hadoop framework, large amounts of data are stored, managed, and dispersed across multiple server nodes. Big Data issues, including security holes in the Hadoop Distributed File System (HDFS), the architecture's core layer, are highlighted in this article. The methodology includes setting up a Hadoop environment, integrating Kerberos for authentication, enabling HDFS encryption zones, implementing SSL/TLS (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 987