To see the other types of publications on this topic, follow the link: Component Security.

Journal articles on the topic 'Component Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Component Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nikolenko, Tamara. "Investment security as a component of the state's economic security." Vìsnik Marìupolʹsʹkogo deržavnogo unìversitetu. Serìâ: Ekonomìka 10, no. 20 (2020): 101–13. http://dx.doi.org/10.34079/2226-2822-2020-10-20-101-113.

Full text
Abstract:
The article is devoted to the study of the peculiarities of investment security of the country as a component of economic security, and the development of general recommendations for improving its level. In particular, the dynamics of foreign direct investment of Ukraine is studied and forecasted, the geographical structure of foreign direct investment of Ukraine is assessed, the most attractive types of economic activity in the economy of Ukraine are considered, the dynamics of main macroeconomic investment security indicators is analyzed, namely fixed capital investment investment growth to GDP growth rates, estimated dynamics of the country's investment attractiveness index and highlighted the factors that affect it, indicated what threats foreign investments may pose to national economic security and suggested ways to minimize them.
APA, Harvard, Vancouver, ISO, and other styles
2

Alguliyev, Rasim M., Yadigar N. Imamverdiyev, Rasim Sh Mahmudov, and Ramiz M. Aliguliyev. "Information security as a national security component." Information Security Journal: A Global Perspective 30, no. 1 (July 20, 2020): 1–18. http://dx.doi.org/10.1080/19393555.2020.1795323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blakyta, Ganna, and Tetiana Ganushchak. "Enterprise financial security as a component of the economic security of the state." Investment Management and Financial Innovations 15, no. 2 (June 14, 2018): 248–56. http://dx.doi.org/10.21511/imfi.15(2).2018.22.

Full text
Abstract:
The article deals with problems of economic and financial security ensuring both in companies and state. The Corruption Perceptions Index has been analyzed as one of the most important indicators in this sphere. The following research methods have been used: generalizing theoretical knowledge, comparison method, method of analysis and synthesis, statistical analysis, factual analysis. The authors give their own definitions to such concepts as “security”, “financial security of the enterprise”, “economic security of the enterprise”. There have been also systemized the threats to the economic security of the enterprise, as well as means of its strengthening. The rating of Ukraine according to the Corruption Perceptions Index has been identified. Also, the perspectives of future research have been defined.
APA, Harvard, Vancouver, ISO, and other styles
4

CHEN, JINFU, YANSHENG LU, and HUANHUAN WANG. "COMPONENT SECURITY TESTING APPROACH BASED ON EXTENDED CHEMICAL ABSTRACT MACHINE." International Journal of Software Engineering and Knowledge Engineering 22, no. 01 (February 2012): 59–83. http://dx.doi.org/10.1142/s0218194012500039.

Full text
Abstract:
Unreliable component security hinders the development of component technology. Component security testing is rarely researched with comprehensive focus; several approaches or technologies for detecting vulnerabilities in component security have been proposed, but most are infeasible. A testing approach for component security, which is based on the chemical abstract machine, is proposed for detecting explicit and implicit component security vulnerabilities. We develop an extended chemical abstract machine model, called eCHAM, and generate a state transfer tree and testing sequence for components based on the proposed model. The model can help test the explicit security exceptions of components according to the testing approach of interface fault injection. Condition and state mutation algorithms for identifying implicit security exceptions are also proposed. Vulnerability testing reports are obtained according to the test results. Experiments were conducted in an integration testing platform to verify the applicability of the proposed approach. Results show that the approach is effective and practicable. The proposed approach can detect explicit and implicit security exceptions of components.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Jinfu, Yansheng Lu, Huanhuan Wang, and Chengying Mao. "A Quantitative Assessment Approach to COTS Component Security." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/165029.

Full text
Abstract:
The vulnerability of software components hinders the development of component technology. An effective assessment approach to component security level can promote the development of component technology. Thus, the current paper proposes a quantitative assessment approach to COTS (commercial-off-the-shelf) component security. The steps of interface fault injection and the assessment framework are given based on the internal factors of the tested component. The quantitative assessment algorithm and formula of component security level are also presented. The experiment results show that the approach not only can detect component security vulnerabilities effectively but also quantitatively assess the component security level. The score of component security can be accurately calculated, which represents the security level of the tested component.
APA, Harvard, Vancouver, ISO, and other styles
6

GOUSIOS, G., E. AIVALOGLOU, and S. GRITZALIS. "Distributed component architectures security issues." Computer Standards & Interfaces 27, no. 3 (March 2005): 269–84. http://dx.doi.org/10.1016/s0920-5489(04)00098-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hwalla, Nahla, Sibelle El Labban, and Rachel A. Bahn. "Nutrition security is an integral component of food security." Frontiers in Life Science 9, no. 3 (July 2, 2016): 167–72. http://dx.doi.org/10.1080/21553769.2016.1209133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

A. Manakhova. "Corporate Security as a Component of Russia's National Security." International Affairs 66, no. 003 (June 30, 2020): 146–52. http://dx.doi.org/10.21557/iaf.60072925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Matsui, Elena A., and Ekaterina V. Kryukova. "Energy security is an important component of national security." SHS Web of Conferences 110 (2021): 01049. http://dx.doi.org/10.1051/shsconf/202111001049.

Full text
Abstract:
The article deals with the issues of energy security as an important component of the national security of the country. There is growing uncertainty about safe access to reliable energy supplies at reasonable prices.
APA, Harvard, Vancouver, ISO, and other styles
10

Grynko, Tatyana, and Anna Klymenko. "ENSURING THE ECONOMIC SECURITY OF ECONOMIC ENTITIES: A PERSONNEL COMPONENT." Scientific Notes of Ostroh Academy National University, "Economics" Series 1, no. 15(43) (December 19, 2019): 4–8. http://dx.doi.org/10.25264/2311-5149-2019-15(43)-4-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zaharkina, L., and O. Zaitsev. "FINANCIAL LEVERAGE ENVIRONMENTAL SECURITY AS A COMPONENT UKRAINE'S NATIONAL SECURITY." Vìsnik Sumsʹkogo deržavnogo unìversitetu, no. 1 (2019): 19–25. http://dx.doi.org/10.21272/1817-9215.2019.1-3.

Full text
Abstract:
The article deals with the use of financial leverages to ensure environmental security as a component of Ukraine's national security. Scientific approaches to the concept and constituents of environmental security, peculiarities of its legislative regulation are analyzed. The dynamics of budget revenues using environmental taxation mechanisms have been investigated. The conclusions of its effectiveness are made. Structural analysis of the Consolidated Budget expenditures on environmental protection was also conducted. It is concluded that there is an imbalance in budgetary policy in the field of environmental security. And it is an indicator for decreasing the state's environmental security in the future.
APA, Harvard, Vancouver, ISO, and other styles
12

Horbachenko, S. "Cyber security as a component of economic security of Ukraine." Galic'kij ekonomičnij visnik 66, no. 5 (2020): 180–86. http://dx.doi.org/10.33108/galicianvisnyk_tntu2020.05.180.

Full text
Abstract:
The main essential aspects of the country economic security as a foundation for structural change and sustainable development of the national economy, strengthening its competitiveness, improvement of the economic entities efficiency are formulated in this paper. The processes affecting the economic security at the state, regions and individual enterprises levels are identified. Taking into account the available classifications of the economic security components, the role of information and cybersecurity is highlighted. It is determined that almost in all classifications of information security in one form or another is considered as an opportunity for information support and protection of confidential information of the socio-economic system. It is proved that «cybersecurity» category is gradually shifting from micro to macro level, from the problems of information protection on individual devices in local networks to the creation of a single cybersecurity system as a full component of national security at the state level. The assessment of cyberspace as the environment for potential criminal actions in the field of unauthorized access to the confidential information, software failures, automated systems functional breakdowns is carried out. It is identified how such characteristics of economic security as countermeasures resistance to internal and external threats, economic independence, self-reproduction and self-development, national interests, can be supported and protected in cyberspace Proposals for creating an effective system of cybersecurity state regulation and conditions for online information exchange within «public authorities – private sector – civil society», triangle, optimization of staffing cyber protection, development of the system of economic indicators of cyberspace functioning are introduced. Emphasis is placed on the research prospects concerning the stimulation of innovative activity aimed at the creation of effective organizational and technological model of the national cybersecurity system, the implementation of human resources, optimization of domestic legislation.
APA, Harvard, Vancouver, ISO, and other styles
13

TIKHOMIROV, S. N. "IMPORTANT COMPONENT OF GLOBAL ECONOMIC SECURITY." World Economy and International Relations 63, no. 3 (2019): 76–82. http://dx.doi.org/10.20542/0131-2227-2019-63-3-76-82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hrybinenko, Olha. "Environmental component of international economic security." Vìsnik Marìupolʹsʹkogo deržavnogo unìversitetu. Serìâ: Ekonomìka 9, no. 18 (2019): 51–61. http://dx.doi.org/10.34079/2226-2822-2019-9-18-51-61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Prokopyev, M. G. "The ecological component of food security." Market Economy Problems, no. 4 (2018): 64–68. http://dx.doi.org/10.33051/2500-2325-2018-4-64-68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Salayev, K. "INFORMATION COMPONENT OF AZERBAIJAN'S ECONOMIC SECURITY." Investytsiyi: praktyka ta dosvid, no. 21 (November 19, 2018): 60. http://dx.doi.org/10.32702/2306-6814.2018.21.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

A. Albaroodi, Hala, Aseel Ismael, and Mohammed Abomaali. "High-Assurance Security in Swift Component." Journal of Engineering and Applied Sciences 14, no. 7 (October 31, 2019): 10186–94. http://dx.doi.org/10.36478/jeasci.2019.10186.10194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Trevett, Andrew. "Household water security - the quality component." Waterlines 21, no. 4 (April 2003): 2–4. http://dx.doi.org/10.3362/0262-8104.2003.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bracciali, A., A. Brogi, G. Ferrari, and E. Tuosto. "Security Issues in Component-based Design." Electronic Notes in Theoretical Computer Science 54 (August 2001): 49–57. http://dx.doi.org/10.1016/s1571-0661(04)00234-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Serohina, N. O. "STATE-MANAGEMENT COMPONENT OF NATIONAL SECURITY." "Public management and administration in Ukraine" 14 (2019): 98–102. http://dx.doi.org/10.32843/2663-5240-2019-14-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Westing, Arthur H. "The Environmental Component of Comprehensive Security." Bulletin of Peace Proposals 20, no. 2 (April 1989): 129–34. http://dx.doi.org/10.1177/096701068902000203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Nobelis, N., K. Boudaoud, C. Delettre, and M. Riveill. "Designing Security Properties-Centric Communication Protocols using a Component-Based Approach." International Journal of Distributed Systems and Technologies 3, no. 1 (January 2012): 1–16. http://dx.doi.org/10.4018/jdst.2012010101.

Full text
Abstract:
Numerous communication protocols have been designed offering a set of security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and security properties they offer. To solve this problem, the authors propose to use a component-based approach; more specifically the authors introduce the notion of high-level security component where each component provides an atomic security property. This approach will facilitate the design of new protocols that fulfill any specific set of security properties by assembling the appropriate components. At the same time, users using a protocol designed with these security components will have the assurance that the protocol satisfies the security properties required for the electronic document transfer. The authors validate the approach by showing how the integrity property can be added to the HTTP protocol to design a security property-centric HTTPS and in this case an integrity-only HTTPS.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Jibin, Shah Nazir, Ansheng Huang, and Abdullah Alharbi. "Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview." Security and Communication Networks 2020 (September 10, 2020): 1–14. http://dx.doi.org/10.1155/2020/8886877.

Full text
Abstract:
Components are the significant part of a system which plays an important role in the functionality of the system. Components are the reusable part of a system which are already tested, debugged, and experienced based on the previous practices. A new system is developed based on the reusable components, as reusability of components is recommended to save time, effort, and resources as such components are already made. Security of components is a significant constituent of the system to maintain the existence of the component as well as the system to function smoothly. Component security can protect a component from illegal access and changing its contents. Considering the developments in information security, protecting the components becomes a fundamental issue. In order to tackle such issues, a comprehensive study report is needed which can help practitioners to protect their system. The current study is an endeavor to report some of the existing studies regarding component security evaluation based on multicriteria decision and machine learning algorithms in the popular searching libraries.
APA, Harvard, Vancouver, ISO, and other styles
24

Lewandowski, Mateusz. "Energy security in the issues of national security." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (October 10, 2019): 168–85. http://dx.doi.org/10.34739/dsd.2019.01.13.

Full text
Abstract:
The subject of this article is energy security. An in-depth study of the literature on the subject and the analysis of normative documents allowed to formulate the main objective of the work, which is to describe energy security as a component of state security. The goal formulated in such a way creates the need to solve the main research problem of this study, presented in the form of a question: What is the significance of energy security as a component of state security? Achieving the assumed goal and solving the research problem was supported by studying the subject literature and normative documents, as well as the hypothesis that energy security is an important component of state security, and its role is constantly increasing, confirmed in the course of the study.
APA, Harvard, Vancouver, ISO, and other styles
25

Nabi, Faisal, Jianming Yong, and Xiaohui Tao. "A Security Review of Event-Based Application Function and Service Component Architecture." International Journal of Systems and Software Security and Protection 11, no. 2 (July 2020): 58–70. http://dx.doi.org/10.4018/ijsssp.2020070104.

Full text
Abstract:
The term service component is derived from SCA (service component architecture) for event based distributed system design. Although service component pattern offers composite application development and support application reusability functionality. However, security in event based communication in components interaction model mostly discussed on upper layer in SCA while developing service oriented component application logic. This layer is called application business process logic layer, which produces the application's rendering logic, having being authenticated from ACL.The need for such a comprehensive security review is required in this field that could possibly elaborate the issues in composite application and Event based attack in service component architecture model. The paper achieves this target by analysing, reviewing the security issues, modelling techniques in service component application functionality, while application components, that produces, consume, and processing events.
APA, Harvard, Vancouver, ISO, and other styles
26

Snishchenko, R., and V. Grynchutskyi. "INFORMATION SECURITY AS A COMPONENT OF ECONOMIC SECURITY OF BUSINESS ENTITIES." Economic Analysis, no. 30(1, Part 1) (2020): 241–48. http://dx.doi.org/10.35774/econa2020.01.01.241.

Full text
Abstract:
The article is devoted to the definition and substantiation of the role of the information component in the economic security of the business entity. The object of study is the economic, managerial and regulatory processes of the subject of economic activity in its operation under the influence of destabilizing factors. The subject of the study are the theoretical foundations of economic security of the business entity. It is determined that the strengthening of the role of the information component in ensuring economic security is due to digitalization, informatization and globalization of business processes. It is claimed that the use of the results of scientific and technological progress causes the emergence of new types, tools and products of business, accelerates production processes, intensifies trade and exchange. With the development of new technologies, the number of incidents related to information leaks and cyberattacks in various fields: in financial and media companies, in the field of nuclear energy and others increases with geometric dependence. It is emphasized that a significant part of companies does not pay enough attention to the creation of full-fledged protection systems. It is determined that with the participating enterprise is not only a technical and technological complex for the production of material goods and services. Most economic security researchers view the enterprise primarily as an association of individuals to achieve a common goal. The staff of the enterprise is both a factor of production and a source of its development. It is emphasized that together with a large number of positive effects of the introduction of new technologies opens up many opportunities to harm business. In this case, the subjective factor in information security plays a crucial role, and can both harm the business and lead to its prosperity. Due to the fact that the issues of information security of economic entities as a component of their economic security have long gone beyond sectoral problems and require further careful study at the level of the state and society as a whole.
APA, Harvard, Vancouver, ISO, and other styles
27

Battalova, Alina. "Food Security as a Component of Economic Security System of Russia." Procedia Economics and Finance 27 (2015): 235–39. http://dx.doi.org/10.1016/s2212-5671(15)00996-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Diatlova, Yuliia Volodymyrivna. "ASSESSMENT METHODOLOGY OF FOOD COMPONENT ECONOMIC SECURITY: REGIONAL ASPECT." SCIENTIFIC BULLETIN OF POLISSIA 1, no. 2(14) (March 1, 2018): 196–202. http://dx.doi.org/10.25140/2410-9576-2018-1-2(14)-196-202.

Full text
Abstract:
Urgency of the research. In the terms of globalization and integration processes, there is an urgent need for scientific research on the problem of ensuring the state security in the economic sphere. Target setting. The issues of measuring the ensuring economic security system at the state and regional levels remains unresolved because of the inconsistency of thought about its components and approaches as for assessing. It raises the need for their research and scientific justification. Actual scientific researches and issues analysis. Issues related to the economic security of the state are highlighted in the writings of such scholars as T. Vasyltsiv, O. Vlasyuk, A. Kachinsky, O. Liashenko, V. Marhasova, L. Shevchenko and others. Uninvestigated parts of general matters defining. Despite the attention of scientists to the problems of state economic security, the issues of the security components in the economic sphere at the regional level and the methodology of their assessment need further research. The research objective. The purpose of the article is to provide scientific substantiation of the assessment methodology of food component economic security at the regional level. The statement of basic materials. The differences in the list of security components in the economic sphere have been shown in the article. The methodology of assessment the level of food component economic security has been improved. The stages of its implementation have been determined. It is proposed to use an expanded nomenclature for group and individual indicators for assessment; their hierarchy is substantiated. It is recommended to use differential and integral methods to calculate the complex indicator. Gradations of its level have been proposed. The functionality of the assessment methodology of the food component economic security level has been proved via approbation. Conclusions. The application of a justified methodological approach and an improved methodology of assessment the individual security components in the economic sphere in practice will allow formulating effective influence mechanisms at the state and regional levels.
APA, Harvard, Vancouver, ISO, and other styles
29

Min, Byungho, and Vijay Varadharajan. "Rethinking Software Component Security: Software Component Level Integrity and Cross Verification." Computer Journal 59, no. 11 (August 10, 2016): 1735–48. http://dx.doi.org/10.1093/comjnl/bxw047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Drach, Tetjana Oleksandrivna, and Oleksandr Evgenovich Goloskokov. "An intellectual component recognition for security subsystem." Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, no. 28 (September 7, 2017): 49–52. http://dx.doi.org/10.20998/2079-0023.2017.28.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bulatova, Olena, Mykola Trofymenko, Oleksandr Karpenko, and Eduard Fedorov. "The External Component of National Economic Security." Przegląd Strategiczny, no. 13 (December 31, 2020): 425–37. http://dx.doi.org/10.14746/ps.2020.1.26.

Full text
Abstract:
The purpose of this paper is to determine the impact of the foreign trade component on the formation of national economic security. Transformations occurring in the world’s economic development, the deterioration of the global financial environment, and increasing geopolitical tensions have intensified the main risks to the development of the global economy in today’s conditions. Therefore, national governments are actively using a wide range of tools to ensure economic growth and the appropriate level of competitiveness of their respective economies while ensuring national security, which is relevant for the study of the external component of national economic security. To achieve the aim, general scientific and specific research methods are used, such as methods of analysis, abstraction and synthesis (in the study of protectionism as a policy and practice, instruments of neo-protectionism); methods of classification and systematic generalization (to systematize the forms of protectionism and neo-protectionism); economic and statistical methods (to assess the impact of foreign trade on the development of national economic security). It is demonstrated that the intensification of the risks to the development of the global economy has led to the transformation of trade policies, changes in the use of foreign trade regulation instruments, which affects the economic security of various countries as a major component of their national security. The modern trade and economic policy toolbox used by various countries to ensure national security is analyzed. A comparative analysis of the development of foreign trade of the EU and Ukraine has been carried out, and the features of the influence of the foreign trade component on the formation of economic security have been determined. It is demonstrated that, in the conditions of a global economic crisis, hidden forms of protectionism implemented at various levels of economic policy (global, regional, national), have spread. A classification of specific features and forms of neo-protectionism, that distinguish it from protectionism, is proposed. It is substantiated that global processes encourage national governments to implement deregulatory measures and improve the quality of institutions, while regulated economies contribute to the spread of corruption and grey areas in national economies.
APA, Harvard, Vancouver, ISO, and other styles
32

Cook, Judith A., and Kim T. Mueser. "Economic security: An essential component of recovery." Psychiatric Rehabilitation Journal 36, no. 1 (2013): 1–3. http://dx.doi.org/10.1037/h0094739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Fan, Xing Ming Zhang, and Ke Song. "Design of the Security Component in Reconfigurable Network." Advanced Materials Research 718-720 (July 2013): 2120–24. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.2120.

Full text
Abstract:
New threats to and requirements of security come forth endlessly while the network technology progresses continually. Security equipment has little adaptive capacity in the existing rigid network. It has bad influence on network security in Mainland China. A reconfigurable security component is designed in this paper. It can fit the coming requirements of network development in the future. A prototype of this security component is implemented and analyzed.
APA, Harvard, Vancouver, ISO, and other styles
34

Aruljothi, A., N. Prabhu, and N. M. Mallika. "Network Security Based on Component for Information Network." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 15–17. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1986.

Full text
Abstract:
It is a difficult building to ensure the security of data arrange, so it is important to consider out a new security control design and model in the viewpoint of foundational control. As indicated by the attributes and security requests of data net, another security control viewpoint and its engineering dependent on parts is proposed, the security control framework is made-up, and insights regarding the structure of control system, its different kinds, and capacities and spread methods of security control parts are presented, at that point the highlights of the control framework are outlined at last.
APA, Harvard, Vancouver, ISO, and other styles
35

Slipchenko, Tetiana. "Cyber Security as a Component of National Security Protection System: European Experience." Aktual’ni problemi pravoznavstva 1, no. 1 (2020): 128–33. http://dx.doi.org/10.35774/app2020.01.128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mykytenko, D. O. "INFORMATION PROTECTION AND CYBER SECURITY AS A COMPONENT OF UKRAINE’S NATIONAL SECURITY." Juridical scientific and electronic journal, no. 8 (2020): 381–85. http://dx.doi.org/10.32782/2524-0374/2020-8/94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Gronvall, Gigi, Crystal Boddie, Rickard Knutsson, and Michelle Colby. "One Health Security: An Important Component of the Global Health Security Agenda." Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science 12, no. 5 (September 2014): 221–24. http://dx.doi.org/10.1089/bsp.2014.0044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bodnar, N. R. "Labor resource security as a component of economic security of the state." Scientific Papers (Ukrainian Academy of Printing) 1, no. 58 (2019): 89–94. http://dx.doi.org/10.32403/1998-6912-2019-1-58-89-94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Menshakova, Daria. "ECONOMIC COMPONENT OF FRENCH NUCLEAR STATUS." Epistemological Studies in Philosophy Social and Political Sciences 2, no. 2 (December 30, 2019): 142–53. http://dx.doi.org/10.15421/341934.

Full text
Abstract:
The article reveals the significance of the economic component of the French Republic’s nuclear status notion in the context of ensuring its security and support of military power, and especially the financial support of this concept, as one of the most effective methods of guaranteeing security and independence in the modern world. The author emphasizes the fact that in present conditions, considering growing instability and international relations turbulence, the economic component tends to be a vital requirement for the development of state nuclear safety, on the example of France. Relying on the analysis of the economic component and the definition of the French nuclear power notion, it is possible to predict and assess the main trends in the development of the state security system and its defence strategy, as well as to formulate ideas about threats and national interests. It has been argued that the economic component of nuclear status is inextricably associated not only with the formation of a state security strategy but also with the development of the image and geopolitical component of security, aimed at providing the necessary conditions for the realization of French national interests.
APA, Harvard, Vancouver, ISO, and other styles
40

Hrybinenko, Olha, Olena Bulatova, and Olha Zakharova. "EVALUATION OF DEMOGRAPHIC COMPONENT OF COUNTRIES’ ECONOMIC SECURITY." Business, Management and Education 18, no. 2 (August 25, 2020): 307–30. http://dx.doi.org/10.3846/jbem.2020.12309.

Full text
Abstract:
Purpose – The article is aimed at evaluation of the patterns of demographic processes development in terms of their impact on shaping the level of countries’ economic security. Research methodology – The study is based on a multidimensional estimation technique, which proposes the development of an integral indicator of the demographic component of countries’ economic security. Stochastic research methods, in particular the t-test method, were used to identify and justify different hazard zones. Findings – On the basis of the formed sample of the countries, the integral indices of the level of the demographic component of countries’ economic security for the period of 2000–2018 were calculated. The thresholds of demographic security indicators were identified and reasoned; the countries’ security risks by demographic indicators were assessed; systematisation of countries according to the level of the demographic component of security was provided. Research limitations – It is proposed to include ten indicators in the structure of the index of the demographic component of economic security; these indicators characterise different aspects of the demographic processes development. However, this is not a complete list of possible valuation indicators. This determines the necessity of further studies in terms of justifying the advisability of including various parameters and assessing the degree of their importance in the structure of the demographic security index. Practical implications – The practical value of the results of the comprehensive analysis of the demographic processes development in the system of ensuring countries’ economic security is the possibility of identifying real or potential threats to the sustainable social and economic development of countries and regions of the world. Originality/Value – The authors’ improved methodology for assessing the level of economic security based on the demographic component consideration, taking into account the system of proposed indices, allows to assess the level of security, to monitor its changes and to identify factors that pose risks not only for one country but also for groups of countries both in regional dimension and in terms of the level of their development.
APA, Harvard, Vancouver, ISO, and other styles
41

Savchenko, Olena. "THE MODEL OF PERSONAL PSYCHOLOGICAL SECURITY AS A COMPLEX PHENOMENON." PSYCHOLOGICAL JOURNAL 6, no. 12 (December 30, 2020): 66–79. http://dx.doi.org/10.31108/1.2020.6.12.7.

Full text
Abstract:
Increasing number and frequency of threatening factors that occur in the world raises the issue of the necessity to study psychological security as a complex phenomenon that combines a number of components, determines human behavior in uncertain and threatening situations. The article analyzes the main approaches to the study of personality`s psychological security as a separate psychological phenomenon: 1) the study of the behavior of the safe type of personality; 2) the analysis of security as a characteristic of the environment where an individual grows and interacts; 3) axiological approach broadcasting of the safe living values; 4) a comprehensive psychological approach. The authors propose to consider the personality`s psychological security as a complex personal formation that combines motivational, cognitive, emotional and behavioral components that ensure the resilience of an individual to environmental factors, the optimal level of their functioning and the integrated type of interaction with the world, other individuals, themselves. The purpose of the study is to develop a model of personality`s psychological security, to analyze its internal structure. The methodological basis of the study is a systematic approach. The following diagnostic methods were used in the study: the method "Diagnosis of the degree of basis needs satisfaction" (V. Skvorczov, modification by I. Akindinova), "Scale of basic beliefs" (R. Janoff-Bulman, adaptation by O. Kravczova), test-questionnaire "Sensitivity to threats" (V. Maralov, E. Maly`sheva, O. Nifontova, E. Perchenko, I. Tabunov), test-questionnaire "Identifying of the ways of responding to situations of danger" (V. Maralov, E. Maly`sheva, O. Smirnova, E. Perchenko, I. Tabunov). The study has been conducted on the sample of 43 university students in Kyiv (Ukraine). A proposed conceptual model of personality`s psychological security combines 4 components: 1) the need for security (motivational component); 2) beliefs about the security of the world and one's own ability to interact constructively with others (cognitive component); 3) experiencing one's own security (emotional component); 4) readiness to activate self-defense tactics in the threatening situation (behavioral component). The use of factor analysis (Principal components method, Varimax normalized rotation procedure) has allowed to identify 3 independent factors that explain 68.6% of the total variance. The following components have been identified: motivational-cognitive, emotional-behavioral (constructive), destructive behavioral component that confirms the importance of behavioral aspects of psychological security, which reflect the means of human interaction with the world and other people in situations of real or imagined threat. The results of the application of correlation analysis have revealed the independence of the three components of personality`s psychological security. A general indicator that reflects the development level of psychological security as a complex phenomenon has been introduced. Students who demonstrate a high level of psychological security have the following characteristics: adequate satisfaction of the need for security, positive beliefs about the goodness of the world and the reliability of others, high sensitivity to threats, they often use adequate or uncertain means of responding to threats, try to avoid the anxious and ignoring behavioral strategies in threatening situations.
APA, Harvard, Vancouver, ISO, and other styles
42

Shagoyan, Svitlana. "Security component of development strategies of mining TNCs." Vìsnik Marìupolʹsʹkogo deržavnogo unìversitetu. Serìâ: Ekonomìka 9, no. 18 (2019): 61–70. http://dx.doi.org/10.34079/2226-2822-2019-9-18-61-70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Reshetnikova, Y. G. "Improvement of the institutional component of food security." Agrarian Scientific Journal, no. 4 (April 20, 2018): 82–87. http://dx.doi.org/10.28983/asj.v0i4.315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hong, Jin-Keun. "Framework of Security Development Method based on Component." Journal of the Korea Academia-Industrial cooperation Society 11, no. 3 (March 31, 2010): 926–30. http://dx.doi.org/10.5762/kais.2010.11.3.926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Smelik, Roman. "Economic Security of the Organisation: Financial Component Management." Financial Law Review, no. 18 (2) (2020): 32–47. http://dx.doi.org/10.4467/22996834flr.20.008.12430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hirschberg, Rona, John La Montagne, and Anthony S. Fauci. "Biomedical Research — An Integral Component of National Security." New England Journal of Medicine 350, no. 21 (May 20, 2004): 2119–21. http://dx.doi.org/10.1056/nejmp048123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Davies, Gloria, Ingrid Nielsen, Chris Nyland, Russell Smyth, Cherrie Zhu, and Judith Zhu. "The “X component” in Shanghai's social security reforms." International Social Security Review 62, no. 2 (April 2009): 31–54. http://dx.doi.org/10.1111/j.1468-246x.2009.01328.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Polzun, D. "ECONOMIC SECURITY OF THE REGION AS A COMPONENT OF NATIONAL SECURITY OF UKRAINE." Ekonomika ta derzhava, no. 8 (August 28, 2020): 89. http://dx.doi.org/10.32702/2306-6806.2020.8.89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mir, Irshad Ahmad, and S. M. K. Quadri. "Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework." International Journal of Computer Network and Information Security 4, no. 11 (October 9, 2012): 21–31. http://dx.doi.org/10.5815/ijcnis.2012.11.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Liao, Zitian, Shah Nazir, Habib Ullah Khan, and Muhammad Shafiq. "Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions." Security and Communication Networks 2021 (February 15, 2021): 1–22. http://dx.doi.org/10.1155/2021/6677867.

Full text
Abstract:
Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The use of such components in a newly developed software system can save effort, time, and many resources. Due to the practice of using components for new developments, security is one of the major concerns for researchers to tackle. Security of software components can save the software from the harm of illegal access and damages of its contents. Several existing approaches are available to solve the issues of security of components from different perspectives in general while security evaluation is specific. A detailed report of the existing approaches and techniques used for security purposes is needed for the researchers to know about the approaches. In order to tackle this issue, the current research presents a systematic literature review (SLR) of the present approaches used for assessing the security of software components in the literature by practitioners to protect software systems for the Internet of Things (IoT). The study searches the literature in the popular and well-known libraries, filters the relevant literature, organizes the filter papers, and extracts derivations from the selected studies based on different perspectives. The proposed study will benefit practitioners and researchers in support of the report and devise novel algorithms, techniques, and solutions for effective evaluation of the security of software components.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography