Results for 'security management'

971 found
Order:
  1. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  49
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines the works of domestic and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper (...) countermeasures can be devised. Ontologies are instruments developed to address these conceptual clarification and terminological systematization issues. Over the years, several ontologies have been proposed in Risk Management and Security Engineering. However, as shown in recent literature, they fall short in many respects, including generality and expressivity - the latter impacting on their interoperability with related models. We propose a Reference Ontology for Security Engineering (ROSE) from a Risk Treatment perspective. Our proposal leverages on two existing Reference Ontologies: the Common Ontology of Value and Risk and a Reference Ontology of Prevention, both of which are grounded on the Unified Foundational Ontology (UFO). ROSE is employed for modeling and analysing some cases, in particular providing clarification to the semantically overloaded notion of Security Mechanism. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  53
    Requiring Country managers to pay attention to human development from the viewpoint of Nahjolbalagheh.Seyedsaber Seyedi Fazlollahi & Naser Mohammadi - 2016 - Management, Economics, Accounting and Humanities 1 (Humanities):1.
    Nowadays the key to all aspects of development is human development, That Without it, development is not possible. In the Islamic system, the goal is the human resources And on the other hand is a key to development. The need to nurture body and soul has always been of interest to scholars at any time. From the beginning of creation until now, the issue of education, the most basic mission of the Prophet Followed by, in this context, intellectuals, imams and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Management of data in higher education and the quality of academic research of university lecturers : A case study in South-South Nigeria.Francisca Nonyelum Odigwe & Valentine Joseph Owan - 2020 - International Journal of Innovative Business Strategies (IJIBS) 6 (1):378-387.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. The study adopted a factorial research design. The population of this study includes all the Faculty of Education academic staff in both public and private universities situated in South-South Nigeria. Using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. (1 other version)Data management practices and educational research effectiveness of university lecturers in South-South Nigeria.Valentine Joseph Owan & Francisca N. Odigwe - 2019 - In Charles A. Shoniregun (ed.), Proceedings of the London International Conference on Education (LICE-2019). pp. 86-94.
    The dishonest practices in the conduct of educational research in South-South region particularly, and Nigeria generally, has called for urgent intervention. This study assessed data management practices and educational research effectiveness of University Lecturers in South-South Nigeria. A sample of 602 lecturers that were accessible during data collection responded to two questionnaires (Data Management Practices Questionnaire – DMPQ and "Educational Research Effectiveness Questionnaire – EREQ). Multiple regression was employed in the analysis of data. Findings revealed amongst others that; (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  13
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Ontological Analysis and Redesign of Security Modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), The Practice of Enterprise Modeling - 15th IFIP WG 8.1 Working Conference, PoEM 2022. Springer. pp. 82-98.
    Enterprise Risk Management and security have become a fundamental part of Enterprise Architecture, so several frameworks and modeling languages have been designed to support the activities associated with these areas. Archi- Mate’s Risk and Security Overlay is one of such proposals, endorsed by The Open Group. We investigate the capabilities of the proposed security-related con- structs in ArchiMate with regard to the necessities of enterprise security modeling. Our analysis relies on a well-founded reference ontology of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  66
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Strategies for Healthcare Disaster Management in the Context of Technology Innovation: the Case of Bulgaria.Radostin Vazov, R. Kanazireva, T. Grynko & Oleksandr P. Krupskyi - 2024 - Medicni Perspektivi 29 (2):215-228.
    In Bulgaria, integrating technology and innovation is crucial for advancing sustainable healthcare disaster management, enhancing disaster response and recovery, and minimizing long-term environmental and social impacts. The purpose of the study is to assess the impact of modern technological innovations on the effectiveness of disaster management in health care in Bulgaria with a focus on Health Information Systems (HIS), Telemedicine, Telehealth, e-Health, Electronic Health Records, Artificial Intelligence (AI), Public Communication Platforms, and Data Security and Privacy. These innovations, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. REVISITING THE HUMAN RESOURCE AND MANAGEMENT PROGRAM OF THE EARLY YEARS LEARNING CENTER IN MANDALUYONG CITY.Fe Jocelyn G. Dioquino, Albert S. Billones, Ana Katrina S. Caldeira, Melanie Carl T. Espe & Alfredo G. Sy Jr - 2023 - Get International Research Journal 1 (2).
    This study sought to investigate the Human Resource and Management (HRM) Program of a preschool hereinafter referred to as the Early Years Learning Center (EYLC) in Mandaluyong City for purposes of this research study. This is a qualitative case study that delved particularly into the issue of employee retention, especially of seasoned teachers and staff of the subject learning center. It used the interview method to generate an in-depth analysis as it revisited its HRM Program. To triangulate the data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Securing Political Accountability to Future Generations with Retrospective Accountability.Tyler M. John - forthcoming - In Jacob Barrett, Hilary Greaves & David Thorstad (eds.), Essays on Longtermism. Oxford University Press.
    Political short-termism costs the global economy hundreds of billions to trillions of dollars annually, and leads to many millions of deaths from disasters and suboptimal spending. In this paper, I propose a futures assembly explicitly incentivised to promote the interests of future generations as a promising strategy to ameliorate short-termism. The assembly I propose is governed by citizens randomly selected from among the populace, who are rewarded in the future to the extent that they successfully promote the welfare of future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  50
    Cloud-Enabled Risk Management of Cardiovascular Diseases Using Optimized Predictive Machine Learning Models.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-475.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. PERSONAL FINANCIAL MANAGEMENT PRACTICES AMONG SELECTED PERSONNEL OF THE BUREAU OF THE TREASURY – CENTRAL OFFICE.Daren D. Cortez - 2023 - Get International Research Journal 1 (2).
    The study aimed to determine the personal financial management practices among selected personnel of the Bureau of the Treasury – Central Office. It used the descriptive method of gathering data. The respondents of the study consisted of 183 personnel from 35 divisions of the Bureau and selected through simple random probability sampling technique. The study shown that most of the respondents aged 26 to 35 years old, female, single, bachelor’s degree holder, rank and file workers, permanent employees, have been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Institutional variables and the supervision of security in public secondary schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  27. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. An Analytical Study of the Reality of Electronic Documents and Electronic Archiving in the Management of Electronic Documents in the Palestinian Pension Agency (PPA).Mohammed Khair I. Kassab, Samy S. Abu Naser & Mazen J. Al Shobaki - 2017 - European Academic Research 4 (12):10052-10102.
    The study aims to identify the reality of management of electronic documents and electronic archiving retirement in the Palestinian Pension Agency -analytical study, as well as to recognize the reality of the current document management system in the Palestinian Pension Agency. The study found the following results: that the reality of the current system for the management of documents in the agency is weak and suffers from many jams. Employee in the agency understand the importance and benefits (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  30.  95
    Ethical Concerns in Computational Linguistic Field National Defense: A Philosophical Investigation of Language and Security.Mhd Halkis Malkis4 - 2024 - Linguistic and Philosophical Investigations 23 (1):386–396.
    This research examines ethical issues in computational linguistics that can be applied to national defense by analyzing philosophical and security language. The increasing use of language contexts, such as intelligence and communication data analysis, raises ethical and philosophical challenges related to privacy, control, and accuracy. This research aims to identify and analyze ethical issues, especially in the use of computational linguistics in defense applications, as well as their implications for the protection of individual rights and privacy. This method involves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Selection and application of appropriate analytical methods needed to assess the risks reducing the security of the protected system.Josef Reitšpís, Martin Mašľan & Igor Britchenko - 2021 - Baltic Journal of Economic Studies 7 (3):1 – 8.
    Risk assessment is one of the prerequisites for understanding its causes and possible consequences. We base our risk assessment on the principles described in the European standard EN 31000 - Risk Management Process. This standard comprehensively describes the continuous activities that are necessary in managing risks and minimizing their possible adverse effects on the operation of the system under investigation. In this activity, it is necessary to first identify the existing risks, then analyze and evaluate the identified risks. In (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Management of socio-economic transformations of business processes: current realities, global challenges, forecast scenarios and development prospects.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Sofia: Professor Marin Drinov Publishing House of Bulgarian Academy of Sciences.
    The authors of the scientific monograph have come to the conclusion that мanagement of socio-economic transformations of business processes requires the use of mechanisms to support of entrepreneurship, sectors of the national economy, the financial system, and critical infrastructure. Basic research focuses on assessment the state of social service provision, analysing economic security, implementing innovation and introducing digital technologies. The research results have been implemented in the different models of costing, credit risk and capital management, tax control, use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Assessment of the determinants of the financial security of railways in Ukraine.Igor Britchenko, N. I. Bohomolova, S. S. Pinchuk & O. O. Kravchenko - 2018 - Financial and Credit Activity: Problems of Theory and Practice 4 (27):270-282.
    The paper is devoted to the study of determinants determined the level of financial security of economic systems. It is shown that the financial security of an economic system implies the achievement of a level of financial stability that will contribute to simultaneously maintaining financial equilibrium and ensuring targeted growth in line with the development strategy. The level of financial security of rail transport in Ukraine was analyzed and it was determined that the decline in its (...) was the result of a complex interaction of external and internal factors, the main of which were tight government regulation, shifting the financial burden of social responsibilities to Ukrzaliznytsya, PJSC, lack of competition in the transportation of the main nomenclature of cargo and the unsatisfactory state of non-current assets. Based on the Argenti’s method, it is shown that the consequence of the inefficient financial management of Ukrzaliznytsia, PJSC are the reduction of its insolvency. Three main determinants of the financial security of rail enterprises were identified: a reduction in traffic volumes, an unstable capital structure and the impossibility of timely repayment of current liabilities. An additive model for assessing the impact of selected determinants on the level of financial security of Ukrzaliznytsia, PJSC is proposed. The analysis of the model parameters showed that the greatest impact has the index of industrial production, which is due to the predominant formation of its own financial resources of rail transport due to income from freight traffic. A complex of measures designed to improve the financial condition of rail enterprises was proposed. It is substantiated that in order to equalize existing threats, it is necessary to take political decisions aimed at improving the financial condition of Ukrzaliznytsia, PJSC by reducing the intensity of leaching of its financial resources, as well as implementing an anti-crisis financial strategy aimed at optimizing the capital structure and financial rehabilitation of rail enterprises. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an organized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Current issues of the management of socio-economic systems in terms of globalization challenges.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that the management of socio-economic systems in the terms of global challenges requires the use of mechanisms to ensure security, optimise the use of resource potential, increase competitiveness, and provide state support to economic entities. Basic research focuses on assessment of economic entities in the terms of global challenges, analysis of the financial system, migration flows, logistics and product exports, territorial development. The research results have been implemented (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Tackling the Corona pandemic: Managing nonknowledge in political decision-making.Jaana Parviainen, Anne Koski & Paula Alanen - 2022 - In Matthias Gross & Linsey McGoey (eds.), Routledge International Handbook of Ignorance Studies (2nd edition). Routledge. pp. 211–220.
    During the corona pandemic, politicians have been forced to make urgent decisions under pressure while balancing between challenging options: protecting citizens’ health or causing major social and economic difficulties through security measures. Part of the dilemma has been whether the chosen security measures are oversized, causing fundamental economic and social problems, or not sufficiently enough, thus putting people’s lives at risk. In illustrating our discussion with actions taken by press conferences (PCs) of the Finnish Government, we discuss how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. ROLE OF WOMEN IN ENVIRONMENTAL SECURITY AND CONSERVATION IN INDIA.Rashmee Yadav - 2020 - In Dr A. K. Verma (ed.), Environment and Society. Government P.G. College Saidabad, Prayagraj (U.P.). pp. 252-256.
    Women are significant actors in natural resources management and they are major contributors to environment rehabilitation and conservation. Women are not only knowledgeable about the environment; they are also protective and caring. Women being primarily responsible for domestic and household management interact more intensively with both the natural and built environment. This study was carried out on role of women in environmental security in India with the objective to socio-economic status of women.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Evaluating ICT utilization in education administration and management during the COVID-19 outbreak in Pakistan: An empirical review.Abdul Rahim Chandio - 2021 - Journal of Research in Instructional e-Issn: 2776-222X 1 (1):81 – 94.
    Abstract: This study aims to evaluate the utilization of ICT in education administration and management in a Pakistan context during the pandemic outbreak. Adoption of information and communication technologies (ICTs) has digitalized the learning process where education organizations were administrated by means of wireless-based instructions, electronic pedagogy, and online assessment in order to continue the educational activities while the government halted the physical appearance in education institutions. Data collection has been carried by three public universities in which teachers and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of dimensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Factors and conditions of the environmental and economic security formation in Ukraine.Igor Britchenko, Jozefína Drotárová, Oksana Yudenko, Larysa Holovina & Tetiana Shmatkovska - 2022 - Ad Alta: Journal of Interdisciplinary Research 2 (12):108-112.
    The article examines the peculiarities of the formation of the ecological and economic security system and the specifics of its principles. The relevance of the transformation of approaches to understanding the essence and principles of ecological and economic security in the context of the need to ensure sustainable development is substantiated. The levels of ecological and economic security and the peculiarities of changes in profits and costs during the transition of the economic system and business entities between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  44
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Prospects for sustainable development and ensuring the security of economic systems in the new geostrategic realities.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring sustainable development and security of economic systems in the new geostrategic realities requires the use of mechanisms for state protection of national economic interests, innovative outsourcing and digital technologies, and environmental protection. Basic research focuses on assessment the economic security of insurance companies, logistics processes, farms, healthcare organisations, retail and e-commerce, and tourist destinations. The research results have been implemented in the different decision-making models in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  53
    Scalable Cloud Solutions for Cardiovascular Disease Risk Management with Optimized Machine Learning Techniques.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):454-470.
    The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC). Our findings show that improved machine learning models perform better than conventional methods, offering trustworthy forecasts that can help medical practitioners with early diagnosis and individualized treatment planning. In order to achieve even higher predicted accuracy, the study's conclusion discusses the significance of its findings for clinical practice as well as future improvements that might be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Australia's Approach to AI Governance in Security and Defence.Susannah Kate Devitt & Damian Copeland - forthcoming - In M. Raska, Z. Stanley-Lockman & R. Bitzinger (eds.), AI Governance for National Security and Defence: Assessing Military AI Strategic Perspectives. Routledge. pp. 38.
    Australia is a leading AI nation with strong allies and partnerships. Australia has prioritised the development of robotics, AI, and autonomous systems to develop sovereign capability for the military. Australia commits to Article 36 reviews of all new means and method of warfare to ensure weapons and weapons systems are operated within acceptable systems of control. Additionally, Australia has undergone significant reviews of the risks of AI to human rights and within intelligence organisations and has committed to producing ethics guidelines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. New trends in the economic systems management in the context of modern global challenges (Vol. 2).M. Bezpartochnyi (ed.) - 2020 - VUZF Publishing House “St. Grigorii Bogoslov”.
    Modern global economic challenges caused by the COVID-19 pandemic and various changes in the structure of the world market of goods and services require the developing of new models of economic systems management based on appropriate strategic management methodology, implementation innovation, use of prospects for various risks caused by the pandemic, implementation mechanisms for ensuring the security of economic systems. Ensuring effective management of economic systems in the current global challenges is impossible without the introduction of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  16
    AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. The Epicureans on happiness, wealth, and the deviant craft of property management.Tim O'Keefe - 2016 - In Jennifer A. Baker & Mark D. White (eds.), Economics and the Virtues: Building a New Moral Foundation. Oxford University Press. pp. 37-52.
    The Epicureans advocate a moderately ascetic lifestyle on instrumental grounds, as the most effective means to securing tranquility. The virtuous person will reduce his desires to what is natural and necessary in order to avoid the trouble and anxiety caused by excessive desire. So much is clear from Epicurus' general ethics. But the later Epicurean Philodemus fills in far more detail about the attitude a wise Epicurean will take toward wealth in his treatise On Property Management. This paper explores (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Export logistics of agricultural products of Ukraine in the context of ensuring food security during martial law.Maksym Bezpartochnyi & Igor Britchenko - 2022 - In Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.), Current issues of security management during martial law. Vysoká škola bezpečnostného manažérstva v Košiciach. pp. 163-184.
    The study determined the dynamics of growing grain crops in Ukraine and the geography of their export. The problems of ensuring export logistics as a result of military aggression by russia in the context of ensuring food security are pointed out. The main directions of export logistics of grain crops from Ukraine and the peculiarities of transportation by railway, river and road transport were studied. The directions of diversification of export logistics of grain crops from Ukraine during martial law (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Editorial: Coronavirus Disease (COVID-19): Socio-Economic Systems in the Post-Pandemic World: Design Thinking, Strategic Planning, Management, and Public Policy.Andrzej Klimczuk, Eva Berde, Delali Dovie, Magdalena Klimczuk-Kochańska & Gabriella Spinelli - 2022 - Frontiers in Communication 7:1–5.
    The declaration of the COVID-19 pandemic by the World Health Organization on March 11, 2020, led to unprecedented events. All regions of the world participated in implementing preventive health measures such as physical distancing, travel restrictions, self-isolation, quarantines, and facility closures. The pandemic started global disruption of socio-economic systems, covering the postponement or cancellation of public events, supply shortages, schools and universities’ closure, evacuation of foreign citizens, a rise in unemployment and inflation, misinformation, the anti-vaccine movement, and incidents of discrimination (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 971