Academic literature on the topic 'Component of corporate security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Component of corporate security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Component of corporate security"
Metodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.
Full textA. Manakhova. "Corporate Security as a Component of Russia's National Security." International Affairs 66, no. 003 (2020): 146–52. http://dx.doi.org/10.21557/iaf.60072925.
Full textTulchynska, Svitlana, Olha Popelo, Rostislav Tulchinskiy, Oleksandr Popelo, and Tetiana Tkachenko. "Innovative Development as Determinant of Corporate Economic Security." Opportunities and Challenges in Sustainability 1, no. 1 (2022): 52–60. http://dx.doi.org/10.56578/ocs010106.
Full textVolosnikova, N. M. "The Methodical Principles of Controlling the Information System of Corporate Security." Business Inform 5, no. 520 (2021): 141–46. http://dx.doi.org/10.32983/2222-4459-2021-5-141-146.
Full textWang, Weiye. "Research on High-Quality Development of Corporate Pensions from a Multi-Pillar Pension Perspective." SHS Web of Conferences 190 (2024): 02010. http://dx.doi.org/10.1051/shsconf/202419002010.
Full textHu, Yiluo. "The Impact of Social Security Fund Investment on Corporate ESG Performance." Advances in Economics, Management and Political Sciences 171, no. 1 (2025): 32–41. https://doi.org/10.54254/2754-1169/2025.21846.
Full textValiullina, Z. V. "Information security of corporate economics in the conditions of globalization." Bulletin of the Dnipropetrovsk University. Series: Management of Innovations, no. 6 (February 15, 2016): 34–43. https://doi.org/10.15421/191604.
Full textVolosnikova, Nataliia. "RESEARCH OF SUSTAINABILITY OF THE GENERAL CORPORATE SECURITY SYSTEM." Bulletin of the National Technical University "Kharkiv Polytechnic Institute" (economic sciences), no. 1 (February 15, 2021): 41–47. http://dx.doi.org/10.20998/2519-4461.2021.1.41.
Full textKubale, Valentina, Teja Lobnikar, Branko Gabrovec, and Miha Dvojmoč. "Ensuring Corporate Security and Its Strategic Communication in Healthcare Institutions in Slovenia." Healthcare 11, no. 11 (2023): 1578. http://dx.doi.org/10.3390/healthcare11111578.
Full textPodroiko, Ye V., and Yu M. Lysetskyi. "Network technologies: evolution and peculiarities. Mathematical machines and systems." Mathematical machines and systems 2 (2020): 14–29. http://dx.doi.org/10.34121/1028-9763-2020-2-14-29.
Full textDissertations / Theses on the topic "Component of corporate security"
Копча, Ю. Ю., та Yu Yu Kopcha. "Механізм формування потенціалу економічної безпеки підприємств: дисертація". Thesis, Національний авіаційний університет, 2020. http://dspace.lvduvs.edu.ua/handle/1234567890/3513.
Full textRudkovsky, O. V. "Corporate security organizations." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/36239.
Full textHetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Full textKelechi, Ugwu, Charles Maina, Sergio Silva, and Gabriel Vargas. "Corporate Identity:Communication as a key Component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1329.
Full textVargas, Gabriel, Sergio Silva, Ugwu Keliche, and Charles Maina. "Corporate Identity : Communication as a key component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1327.
Full textDyskant, Lucas Bubman. "The illiquidity component of corporate bond spreads." reponame:Repositório Institucional do FGV, 2017. http://hdl.handle.net/10438/19304.
Full textКрапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Tax security as a component of the financial security of a country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43525.
Full textThomson, Kerry-Lynn. "Integrating information security into corporate culture." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/132.
Full textPosthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Full textSohrakoff, Karen A. "Immigrant integration a missing component of Homeland Security strategy and policy /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSohrakoff.pdf.
Full textBooks on the topic "Component of corporate security"
Vavilina, Alla, and Lidiya Levanova. Corporate security. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/2170635.
Full textDeitelhoff, Nicole, and Klaus Dieter Wolf, eds. Corporate Security Responsibility? Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230277052.
Full textChasdi, Richard J. Corporate Security Surveillance. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-39550-5.
Full textLembaga Studi Pertahanan dan Studi Strategis Indonesia. Reserve component bill. Lembaga Studi Pertahanan dan Studi Strategis Indonesia, 2010.
Find full textLavell, Tom. Corporate security in Eastern Europe. The Economist Intelligence Unit, 1998.
Find full textPublications, Electronic Trend, ed. Corporate computer security issues & strategies. Electronic Trend Publications, 1990.
Find full text1930-, Maxwell David A., ed. Corporate security administration and management. Butterworths, 1987.
Find full textBook chapters on the topic "Component of corporate security"
Pedro, Emilio San, Ionuț Riza, Anca Bandoi, and Camelia-Maria Olari Perju. "Information Security: Component of Corporate Social Responsibility." In Essential Issues in Corporate Social Responsibility. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39229-1_7.
Full textShoemaker, Daniel, Ken Sigler, and Tamara Shoemaker. "Component Security." In Teaching Cybersecurity. CRC Press, 2022. http://dx.doi.org/10.1201/9781003187172-4.
Full textCassidy, Kevin A. "Corporate Security." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_19.
Full textMadsen, Tom. "Component Security Architecture." In Security Architecture – How & Why. River Publishers, 2022. http://dx.doi.org/10.1201/9781003339380-8.
Full textBlyth, Andrew, and Gerald L. Kovacich. "Corporate Security Functions." In Information Assurance. Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-3706-1_8.
Full textButton, Mark. "Corporate security management." In Private Policing. Routledge, 2019. http://dx.doi.org/10.4324/9781351240772-10.
Full textDeitelhoff, Nicole, and Klaus Dieter Wolf. "Corporate Security Responsibility: Corporate Governance Contributions to Peace and Security in Zones of Conflict." In Corporate Security Responsibility? Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230277052_1.
Full textFeil, Moira. "Here’s to Peace! Governance Contributions by Companies in Rwanda and the Democratic Republic of Congo." In Corporate Security Responsibility? Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230277052_2.
Full textZimmer, Melanie. "Oil Companies in Nigeria: Emerging Good Practice or Still Fuelling Conflict?" In Corporate Security Responsibility? Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230277052_3.
Full textWallbott, Linda. "Calling on Peace: The International ICT Sector and the Conflict in the Democratic Republic of Congo." In Corporate Security Responsibility? Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230277052_4.
Full textConference papers on the topic "Component of corporate security"
Sayfullaev, Sherzod, Dildora Valikulova, and Khasan Sabirov. "Modern Intelligent Security Analysis Systems for Corporate Networks." In 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN). IEEE, 2024. http://dx.doi.org/10.1109/icipcn63822.2024.00124.
Full textJ, Wijesinghe W. M. A., Abeysinghe Y. P. P, Rukshana M. A. F, Adhikari A. M. P. S, Kavinga Yapa Abeywardhana, and Deemantha Siriwardhana. "Polymorphic Security Enhancements for Corporate Environments Utilizing Behavior Analytics." In 2024 International Conference on Computer and Applications (ICCA). IEEE, 2024. https://doi.org/10.1109/icca62237.2024.10928161.
Full textSyrmoudis, Emmanuel, Stefan A. Mager, and Jens Grossklags. "A Longitudinal Analysis of Corporate Data Portability Practices Across Industries." In 2024 Annual Computer Security Applications Conference (ACSAC). IEEE, 2024. https://doi.org/10.1109/acsac63791.2024.00032.
Full textNwankwo, Chukwuemeka Pascal, Susan Konyeha, Glory Nosawaru Edegbe, et al. "Improving Open-Source Network Security Tooling for the Corporate Enterprise." In 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON). IEEE, 2024. https://doi.org/10.1109/nigercon62786.2024.10927387.
Full text"State Economic Security System and Its Components." In 4th International Conference on Research in Humanities, Sociology and Corporate Social Responsibility. International Centre of Economics, Humanities and Management, 2015. http://dx.doi.org/10.15242/icehmed915013.
Full textZhao, Lisa, Jamie Nairn, and Mark Jean. "Understanding Security Program Risk Assessments Through a Secure Asset Framework." In 2024 15th International Pipeline Conference. American Society of Mechanical Engineers, 2024. https://doi.org/10.1115/ipc2024-134028.
Full textIlijić, Ljeposava. "(Postmodernist) / Neoliberal Influence on Penal Policy and the Prison System vs. Prison Life Quality." In International Scientific Conference “LIFE IN PRISON: Criminological, Penological, Psychological, Sociological, Legal, Security and Medical Issues”. Institute of Criminological and Sociological Research, Belgrade, Serbia, 2024. https://doi.org/10.47152/prisonlife2024.02.
Full textDePasquale, Sal. "Corporate security: aligning a security program with corporate goals and objectives." In Enabling Technologies for Law Enforcement and Security, edited by A. Trent DePersia and John J. Pennella. SPIE, 1998. http://dx.doi.org/10.1117/12.334992.
Full textKapustyan, Maria. "Corporate Networks: Information Security." In 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science. IEEE, 2006. http://dx.doi.org/10.1109/tcset.2006.4404596.
Full textSzenes, Katalin. "Operational security — Security-based corporate governance." In 2013 IEEE 9th International Conference on Computational Cybernetics (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/icccyb.2013.6617622.
Full textReports on the topic "Component of corporate security"
Franklin, Joshua M., Gema Howell, Kaitlin Boeckl, et al. Mobile Device Security: Corporate-Owned Personally-Enabled (COPE). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.1800-21.
Full textTurke, Andy. Development and Demonstration of a Security Core Component. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1162156.
Full textSmith, Jeffrey A. United States Border Security and Reserve Component Forces. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada469373.
Full textBaroody, J. R. The Role of Corporate Defense Services in International Security Strategy. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada432149.
Full textKacsur, Charles J., and Jr. Economic Sanctions Targeting Yugoslavia - An Effective National Security Strategy Component. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada420059.
Full textGaydarski, Ivan, and Zlatogor Minchev. Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment. Procon, Ltd, 2019. http://dx.doi.org/10.11610/it4sec.0132.
Full textRivera, Asdrubal. Total Force Component: A Transformed Army Reserve for the 21st Century Security Environment. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada448797.
Full textKang, Jun-Koo, and Rene Stulz. How Different is Japanese Corporate Finance? An Investigation of the Information Content of New Security Issues. National Bureau of Economic Research, 1994. http://dx.doi.org/10.3386/w4908.
Full textOvcharov, A. V., and A. V. Kozlov. Protection of competition in the context of ensuring the military-economic component of national security. DOI СODE, 2023. http://dx.doi.org/10.18411/doicode-2023.083.
Full textBoyarchenko, Nina, and Leonardo Elias. Corporate Debt Structure over the Global Credit Cycle. Federal Reserve Bank of New York, 2024. https://doi.org/10.59576/sr.1139.
Full text