To see the other types of publications on this topic, follow the link: Intelligence and security services.

Journal articles on the topic 'Intelligence and security services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Intelligence and security services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ilic, Predrag. "Intelligence services and national security." Vojno delo 68, no. 3 (2016): 108–21. http://dx.doi.org/10.5937/vojdelo1603108i.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kudors, Andis. "Transformation of Security and Intelligence Services in Latvia." Connections: The Quarterly Journal 18, no. 3-4 (2019): 105–24. http://dx.doi.org/10.11610/connections.18.3-4.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Michálek, Luděk, and Ladislav Pokorný. "Transformation of the Security and Intelligence Services in the Czech Republic." Connections: The Quarterly Journal 18, no. 3-4 (2019): 65–86. http://dx.doi.org/10.11610/connections.18.3-4.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trifunović, Darko. "Medical Safety, Security And Intelligence." Security science journal 5, no. 2 (2024): 21–32. http://dx.doi.org/10.37458/ssj.5.2.2.

Full text
Abstract:
The COVID-19 pandemic was not only medical and health services, as their name suggests, have the task of informing their governments about all possible threats and risks that come from the internal or external arena. In order to be able to inform and for the state to be able to react readily, numerous conditions and preconditions must be met, which will be discussed in this article. By analyzing the content of educational institutions that deal with medical sciences, security science, or intelligence, numerous shortcomings in the education process itself can be easily identified, which certain
APA, Harvard, Vancouver, ISO, and other styles
5

Kovacevic, Filip. "Glorified Images of Soviet State Security and Intelligence Services." Journal of Cold War Studies 26, no. 4 (2024): 135–73. https://doi.org/10.1162/jcws_a_01243.

Full text
Abstract:
Abstract This survey article critically evaluates books about the Soviet-era state security and intelligence services published in Russia over the past quarter century by eight major pro-regime publishers. The article underscores the publishing houses’ efforts to foster a laudatory image of Soviet-era security and intelligence services in the broader context of the return of “Chekism” (idolization of state security agencies) under Russian President Vladimir Putin, who himself was a product of the Soviet State Security Committee (KGB), and the restoration of a repressive, authoritarian system i
APA, Harvard, Vancouver, ISO, and other styles
6

Kuchuk, Nina, Roman Udyansky, Vladyslav Usichenko, Pavlo Buslov, and Artem Huk. "MOBILE APPLICATION SECURITY ANALYSIS MODEL BASED ON ARTIFICIAL INTELLIGENCE." Системи управління, навігації та зв’язку. Збірник наукових праць 1, no. 79 (2025): 188–92. https://doi.org/10.26906/sunz.2025.1.188-192.

Full text
Abstract:
This article analyzes and studies holographic services, which established that the growth of traffic generated by holographic services will increase several times in the foreseeable future. The main features inherent in the holographic type of communication are identified. A study was conducted of innovative technologies for recording holographic copies, data compression methods to ensure holographic communication, and the transmission of holographic copies to the end user with high-quality reproduction. An analysis of the traffic of multimedia and holographic services, as well as Internet of
APA, Harvard, Vancouver, ISO, and other styles
7

Dimitrijević, Bojan. "Intelligence and Security Services in Tito's Yugoslavia 1944-1966." Istorija 20. veka 37, no. 2/2019 (2019): 9–28. http://dx.doi.org/10.29362/ist20veka.2019.2.dim.9-28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goscha, Christopher E. "Three documents on early Vietnamese intelligence and security services." Intelligence and National Security 22, no. 1 (2007): 139–46. http://dx.doi.org/10.1080/02684520701200863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dalip, Andrew. "Intelligence and Corruption." Journal of Intelligence, Conflict, and Warfare 3, no. 3 (2021): 34–54. http://dx.doi.org/10.21810/jicw.v3i3.2516.

Full text
Abstract:
The Journal of Intelligence, Conflict, and Warfare is pleased to publish the following thought piece from one of our esteemed Speakers from the 2020 West Coast Security Conference. The author, Mr. Dalip, is a lawyer working in the financial crime and corruption sphere. From 2015 to 2018, Mr. Dalip was a chairman at the Steering Group Planning Committee for the Caribbean Financial Action Task Force (CFATF); and from 2014 to 2018, he was a special legal advisor to the Ministry of Attorney General Trinidad and Tobago. The intersection between corruption and intelligence is gaining increased focus
APA, Harvard, Vancouver, ISO, and other styles
10

Kamiński, Mariusz Antoni. "Intelligence and counterintelligence in the structure of the state organs of the Republic of Estonia." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (2019): 121–34. http://dx.doi.org/10.34739/dsd.2019.01.09.

Full text
Abstract:
The article presents an analysis of the legal status, organization and powers of the special services of the Republic of Estonia. The author presents the mission and tasks of the Estonian Internal Security Service (Kaitsepolitsei), the Estonian Foreign Intelligence Service (Välisluureamet) and the Military Intelligence Centre (Luurekeskus). The article show the historical aspect of the Estonian special services and their location in the structure of state organs responsible for national security. In addition, the author presents a surveillance system on the activities of intelligence and count
APA, Harvard, Vancouver, ISO, and other styles
11

FRĂȚILĂ, Oana-Cătălina. "PRESENCE OF INTELLIGENCE SERVICES ON FACEBOOK." Strategic Impact 82, no. 1 (2022): 52–64. http://dx.doi.org/10.53477/1842-9904-22-5.

Full text
Abstract:
This study is based on the need to demonstrate the opportunity that social networks represent for the recruitment of human resources in terms of information that is constantly shared by users. We chose to focus on intelligence services because they are more reluctant than the other structures empowered to ensure national security in terms of social media activity.
 Through this analysis we discovered that although many intelligence services own official pages on social networks, there are few intelligence services that share content on them. Of the 12 Facebook pages analyzed, we identifie
APA, Harvard, Vancouver, ISO, and other styles
12

Sadiku, MA Fisnik, and MA Besnik Lokaj. "Activities of Intelligence Services as a Synonymous of Fear and Intimidation." ILIRIA International Review 5, no. 2 (2015): 279. http://dx.doi.org/10.21113/iir.v5i2.93.

Full text
Abstract:
Intelligence services are an important factor of national security. Their main role is to collect, process, analyze, and disseminate information on threats to the state and its population.Because of their “dark” activity, intelligence services for many ordinary citizens are synonymous of violence, fear and intimidation. This mostly comes out in theRepublicofKosovo, due to the murderous activities of the Serbian secret service in the past. Therefore, we will treat the work of intelligence services in democratic conditions, so that the reader can understand what is legitimate and legal of these
APA, Harvard, Vancouver, ISO, and other styles
13

Chopra, Varun. "Cyber Intelligence in Smart Vehicles." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (2021): 144–51. http://dx.doi.org/10.35940/ijrte.c6464.0910321.

Full text
Abstract:
In the embryonic stage, the usage of vehicle tracking systems were primarily restricted to getting the geographical location of the vehicular units. This scenario, however, was not perennial and with the escalation from a rudimentary stage to a highly complex archi- tecture for vehicular administration that we witness today, the standards for the vehicles security have also become monumental. With the development of V2X communications, the gamut of facilities provided by smart vehicle services has expanded prodigiously. These technological advancements, however have come at a cost. The gargant
APA, Harvard, Vancouver, ISO, and other styles
14

Varun, Chopra. "Cyber Intelligence in Smart Vehicles." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (2021): 144–51. https://doi.org/10.35940/ijrte.C6464.0910321.

Full text
Abstract:
In the embryonic stage, the usage of vehicle tracking systems were primarily restricted to getting the geographical location of the vehicular units. This scenario, however, was not perennial and with the escalation from a rudimentary stage to a highly complex archi- tecture for vehicular administration that we witness today, the standards for the vehicles security have also become monumental. With the development of V2X communications, the gamut of facilities provided by smart vehicle services has expanded prodigiously. These technological advancements, however have come at a cost. The gargant
APA, Harvard, Vancouver, ISO, and other styles
15

Usher, Graham. "The Politics of Internal Security: The PA's New Intelligence Services." Journal of Palestine Studies 25, no. 2 (1996): 21–34. http://dx.doi.org/10.2307/2538181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Weller, Geoffrey R. "Political Scrutiny and Control of Scandinavia's Security and Intelligence Services." International Journal of Intelligence and CounterIntelligence 13, no. 2 (2000): 171–92. http://dx.doi.org/10.1080/08850600050129709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Louis, WM R. "Empires of Intelligence: Security Services and Colonial Disorder after 1914." English Historical Review CXXV, no. 512 (2010): 238–39. http://dx.doi.org/10.1093/ehr/cep376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wilson, Peter. "Analysis: The contribution of intelligence services to security sector reform." Conflict, Security & Development 5, no. 1 (2005): 87–107. http://dx.doi.org/10.1080/14678800500103317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Usher, Graham. "The Politics of Internal Security: The PA's New Intelligence Services." Journal of Palestine Studies 25, no. 2 (1996): 21–34. http://dx.doi.org/10.1525/jps.1996.25.2.00p00946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pedersen, Susan. ":Empires of Intelligence: Security Services and Colonial Disorder after 1914." American Historical Review 114, no. 1 (2009): 153–54. http://dx.doi.org/10.1086/ahr.114.1.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Jacob, W. C. "Empires of Intelligence: Security Services and Colonial Disorder after 1914." Comparative Studies of South Asia, Africa and the Middle East 29, no. 2 (2009): 336–37. http://dx.doi.org/10.1215/1089201x-2009-015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Usov, Dmytro. "Analysis of national security threats by NATO intelligence agencies: trends and experience." Political Science and Security Studies Journal 5, no. 4 (2024): 90–95. https://doi.org/10.33445/psssj.2024.5.4.8.

Full text
Abstract:
This article analyzes the approaches of NATO member states intelligence agencies towards assessing threats that have a destructive impact on their and Ukraine's national security, considering the full-scale Russian invasion of Ukraine, the consequences of Russian aggression, and changes in the international policies of leading countries. It has been proved that special services of the above-mentioned states prioritize the following destabilizing factors of influence: unlawful interference in the country's internal affairs, sponsorship of extremism and terrorism, numerous cyberattacks on variou
APA, Harvard, Vancouver, ISO, and other styles
23

Adesola Oluwatosin Adelaja, Oluwatoyin Funmilayo Ayodele, Stanley Chidozie Umeorah, and Raimat Olamide Amosu. "Enhancing consumer trust in financial services: the role of technological security innovations." Finance & Accounting Research Journal 6, no. 10 (2024): 1746–59. http://dx.doi.org/10.51594/farj.v6i10.1610.

Full text
Abstract:
The financial services industry increasingly relies on technological advancements to maintain and enhance consumer trust. Consumer trust is a critical component influencing customer loyalty, financial inclusion, and overall economic stability. This paper explores the impact of technological security innovations on consumer trust in financial services. Fundamental innovations such as blockchain, advanced encryption, biometric authentication, artificial intelligence, and cloud security play significant roles in addressing security challenges. Blockchain technology provides a decentralized, tampe
APA, Harvard, Vancouver, ISO, and other styles
24

Olowonihi, Ayodele P., and Dr M. O. Musa. "THE ROLE OF INTELLIGENCE IN NIGERIA'S NATIONAL SECURITY: A CRITICAL ASSESSMENT (2011-2023)." American Journal of Interdisciplinary Innovations and Research 6, no. 11 (2024): 113–41. http://dx.doi.org/10.37547/tajiir/volume06issue11-08.

Full text
Abstract:
This paper systematically analyses the function of intelligence in Nigeria's national security between 2011 and 2023, with a specific emphasis on countering both established and developing risks including terrorism, insurgency, banditry, cybercrime, and oil theft. The analysis reveals notable deficiencies in inter-agency cooperation, technology integration, and the incorporation of community-based intelligence, which have impeded the efficacy of intelligence operations, despite substantial investments in intelligence infrastructure. Based on Rational Choice Theory, this analysis assesses the m
APA, Harvard, Vancouver, ISO, and other styles
25

Molnar, Vitalii, and Dmytro Sabodashko. "Enhancing Methods of Protection in the Amazon Web Services Cloud with Artificial Intelligence and Machine Learning." Journal of Scientific Papers "Social development and Security" 15, no. 2 (2025): 174–84. https://doi.org/10.33445/sds.2025.15.2.14.

Full text
Abstract:
Purpose: To investigate protection methods in the Amazon Web Services cloud environment using artificial intelligence and machine learning and to assess the effectiveness of AI-based security tools compared to traditional approaches. Method: The study employs an experimental approach in the Amazon Web Services (AWS) cloud environment. Simulated cyberattacks, including unauthorized access, data exfiltration, web-based attacks, and privilege escalation, were performed to assess security effectiveness. A comparative analysis was conducted between traditional security mechanisms (CloudTrail, WAF)
APA, Harvard, Vancouver, ISO, and other styles
26

S.S., Ibragimov, and Najmiddinov M.B. "The Role and Importance of Digital Transformation in Banking Services." European International Journal of Pedagogics 5, no. 5 (2025): 104–9. https://doi.org/10.55640/eijp-05-05-22.

Full text
Abstract:
Digital transformation has become a pivotal aspect of the banking sector, reshaping traditional processes and customer interactions. By integrating advanced technologies such as artificial intelligence (AI), blockchain, and big data analytics, banks are enhancing operational efficiency, improving customer experience, and ensuring robust security. This paper explores the role and significance of digital transformation in banking services, highlighting its benefits, challenges, and future prospects in a rapidly evolving financial ecosystemDigital transformation has become a pivotal aspect of the
APA, Harvard, Vancouver, ISO, and other styles
27

Abiodun, Dr Temitope Francis, and Dr Joshua Olatunde Fajimbola. "Security and Intelligence Challenges in Guinea-Bissau, Africa’s Narco-State and Issues Beyond Borders." Advances in Social Sciences Research Journal 8, no. 6 (2021): 71–82. http://dx.doi.org/10.14738/assrj.86.10316.

Full text
Abstract:
This paper focuses on the international security concerns in relation to the disquiets in the tiny West African state, Guinea-Bissau since independence. The country famously known as “narco-state” faces formidable challenges with weak governance negatively impacting on intelligence services. Intelligence and security reform is a building block of democracy, but this has been habitually weakened in Guinea-Bissau during the last four decades. The state remains one of the most fragile nations in the world having had its security culture totally perturbed, occasioned by the military rule since ind
APA, Harvard, Vancouver, ISO, and other styles
28

B N, Mr Roopesh Kumar. "Automated Dashboard for AWS Services Monitoring." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 1386–91. http://dx.doi.org/10.22214/ijraset.2023.56690.

Full text
Abstract:
Abstract: Cloud computing has become an integral part of modern business operations, offering flexibility, scalability, and costefficiency. However, the migration to the cloud brings forth a new set of challenges, with security being a top concern. Organizations need to continuously monitor and audit their cloud environments to identify vulnerabilities, detect threats, and ensure compliance with security standards. In today's digital landscape, cloud computing has become the backbone of many organizations, offering scalability, flexibility, and cost-effectiveness. However, with the increasing
APA, Harvard, Vancouver, ISO, and other styles
29

Bot, Danladi. "The National Security and Intelligence Nexus in Nigeria: A Historical Analysis." Indonesian Journal of Education and Social Sciences 2, no. 2 (2023): 74–85. http://dx.doi.org/10.56916/ijess.v2i2.487.

Full text
Abstract:
Since the return to democracy in 1999, security has been a major issue in Nigeria in view of the continued ethno-religious conflicts, insurgency & terrorism, banditry, kidnappings, pipe-line vandalization and oil bunkering, sea piracy, and militancy that have continued to occur in the country. The detrimental effects of these national security challenges, has forced government and academics to direct their attention towards finding feasible solutions to Nigeria’s security conundrum. A close examination of existing academic works on National security challenges in the country reveals that v
APA, Harvard, Vancouver, ISO, and other styles
30

Raakesh Dhanasekaran. "Generative AI Integration with Cloud Services: Revolutionizing Cybersecurity Frameworks." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1619–25. https://doi.org/10.30574/wjaets.2025.15.3.1086.

Full text
Abstract:
The integration of generative artificial intelligence with cloud computing has fundamentally transformed cybersecurity frameworks, enabling unprecedented capabilities in threat detection and automated incident response. This technological convergence allows organizations to shift from reactive to proactive security postures through sophisticated anomaly detection and predictive analytics. Major cloud providers have embedded AI-driven security tools that analyze vast datasets to identify subtle patterns indicative of potential threats before they materialize into breaches. While delivering sign
APA, Harvard, Vancouver, ISO, and other styles
31

Cojocaru, Aurelia, and Libi Bubuioc. "The psychotherapeutic approach of artificial intelligence vs human intelligence. Artificial intelligence in the psychotherapeutic approach." Vector European, no. 2 (November 2024): 189–93. https://doi.org/10.52507/2345-1106.2024-2.34.

Full text
Abstract:
This article presents an analysis of the integration of artificial intelligence into psychotherapy and clinical practice, providing insights into the benefits and challenges of this integration. It also analyzes the future potential of AI to revolutionize the way we deliver and access mental health services. The article explores the advantages of using AI in psychotherapy, as well as the ethical and security challenges. It also analyzes current applications and the future potential of AI in the psychotherapeutic approach.
APA, Harvard, Vancouver, ISO, and other styles
32

Kołaczek, Grzegorz, and Krzysztof Juszczyszyn. "SMART SECURITY ASSESSMENT OF COMPOSED WEB SERVICES." Cybernetics and Systems 41, no. 1 (2010): 46–61. http://dx.doi.org/10.1080/01969720903408797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Abdel Mahmoud, Abbas. "التحديات المعاصرة لرجل الأمن العربـي". ARAB JOURNAL FOR SECURITY STUDIES 40, № 2 (2024): 250–61. https://doi.org/10.26735/apdm1926.

Full text
Abstract:
This study includes some contemporary challenges for the Arab man, created by modern models such as artificial intelligence, cybersecurity crimes, and digital evidence. This is a man who challenges John to the Arab policeman to advance workers invested through society and interact with absorbing and partnering in some activities of the security services, and the security partnership in various social activities, public benefit committees, volunteer work and sports activities. Some of the modern Arab security men in the security services have rushed - in the past decades - to implement perfecti
APA, Harvard, Vancouver, ISO, and other styles
34

Romanyuk, Yuriy, and Volodymyr Palyvoda. "THE ROLE OF NON-GOVERNMENTAL INSTITUTIONS IN STRENGTHENING THE SECURITY AND DEFENSE SECTOR OF THE STATE." Strategic Panorama, no. 1-2 (December 15, 2020): 21–28. http://dx.doi.org/10.53679/2616-9460.1-2.2020.03.

Full text
Abstract:
The article considers the problems of special and intelligence services, defines the role of civil society in expanding the intelligence community of Ukraine.
 Examples of advanced countries’ best foreign practices in the engagement of NGOs in national security problems solutions are given. Essential for our State national security priority tasks have been identified. These include: "rebooting" the security sector, strengthening mutual trust, promoting democratic institutions, and building an active civil society.
 Areas and ways of non-governmental institutions and public organizati
APA, Harvard, Vancouver, ISO, and other styles
35

Luttikhuis, Bart. "Generating distrust through intelligence work: Psychological terror and the Dutch security services in Indonesia, 1945–1949." War in History 25, no. 2 (2018): 151–71. http://dx.doi.org/10.1177/0968344516652421.

Full text
Abstract:
In insurgent wars, gaining reliable intelligence is of essential importance to both sides of the conflict. This paper examines the functioning of Dutch intelligence and security services in the Indonesian decolonization war (1945–1949), focusing in particular on their practices of arresting people to be questioned or interrogated. On the basis of interrogation reports produced by the various intelligence and security services, it argues that the arrest and interrogation practices of the intelligence apparatus itself should be seen as a form of violence. These practices created a psychological
APA, Harvard, Vancouver, ISO, and other styles
36

Smith, A. T. H. "SECURITY SERVICES, LEAKS AND THE PUBLIC INTEREST." Cambridge Law Journal 61, no. 3 (2002): 499–544. http://dx.doi.org/10.1017/s0008197302281702.

Full text
Abstract:
Once upon a time, the Crown faced almost no difficulties in securing convictions for breaches of the Official Secrets Act 1911, particularly section 2. After the somewhat embarrassing decision to proceed had been taken, it was like shooting fish in a barrel. Occasionally, the jury revolted, as they did in Ponting [1985] Crim. L.R. 315, producing something like a perverse verdict in the face of the judicial direction that it was no defence that the defendant believed himself to be acting in the public interest. That decision, and the ruling of the House of Lords in the Spycatcher litigation [19
APA, Harvard, Vancouver, ISO, and other styles
37

Shrivastava, Dr Manish. "The Role of Artificial Intelligence in Enhancing Banking Services." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44871.

Full text
Abstract:
Artificial Intelligence (AI) has transformed banking services by improving efficiency, security, customer experience, and risk management. AI-driven applications, such as chatbots, fraud detection systems, and predictive analytics, have streamlined banking operations and enhanced service quality. This paper explores the various roles AI plays in banking and its impact on financial institutions. Keywords: Artificial Intelligence, Banking Services, Automation, Fraud Detection
APA, Harvard, Vancouver, ISO, and other styles
38

Rampášek, Michal. "AI CYBERSECURITY STANDARDISATION AND ITS OVERLAP WITH DSA AND CRA." Acta Facultatis Iuridicae Universitatis Comenianae 42, no. 2 (2023): 14. http://dx.doi.org/10.62874/afi.2023.2.08.

Full text
Abstract:
The provision of digital products and digital services has in common that it integrates more and more artificial intelligence (AI) systems and, above all, the so-called foundation models. Using these elements of artificial intelligence brings several cybersecurity challenges. The key element in achieving the cyber security of digital products and digital services is, firstly, the achievement of a high level of standardization of artificial intelligence and subsequent technical standardization. AI cybersecurity is key to achieving trustworthiness of AI and vice versa. The mentioned facts are al
APA, Harvard, Vancouver, ISO, and other styles
39

Hughes, Matthew. "Empires of Intelligence: Security Services and Colonial Disorder after 1914 (review)." Journal of Military History 72, no. 2 (2008): 546–47. http://dx.doi.org/10.1353/jmh.2008.0091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Trim, Peter R. J. "Disaster management and the role of the intelligence and security services." Disaster Prevention and Management: An International Journal 12, no. 1 (2003): 6–15. http://dx.doi.org/10.1108/09653560310463801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Park, Jong Hyuk. "Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities." Mathematical Biosciences and Engineering 21, no. 8 (2024): 7012–15. http://dx.doi.org/10.3934/mbe.2024307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Stan, Lavinia, and Marian Zulean. "Intelligence Sector Reforms in Romania: A Scorecard." Surveillance & Society 16, no. 3 (2018): 298–313. http://dx.doi.org/10.24908/ss.v16i3.6880.

Full text
Abstract:
Since 1989, reforms have sought to align the Romanian post-communist intelligence community with its counterparts in established democracies. Enacted reluctantly and belatedly at the pressure of civil society actors eager to curb the mass surveillance of communist times and international partners wishing to rein in Romania’s foreign espionage and cut its ties to intelligence services of non-NATO countries, these reforms have revamped legislation on state security, retrained secret agents, and allowed for participation in NATO operations, but paid less attention to oversight and respect for hum
APA, Harvard, Vancouver, ISO, and other styles
43

Tan, Juan Jim, Stefan Poslad, and Leonid Titkov. "A SEMANTIC APPROACH TO HARMONIZING SECURITY MODELS FOR OPEN SERVICES." Applied Artificial Intelligence 20, no. 2-4 (2006): 353–79. http://dx.doi.org/10.1080/08839510500484298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Бенуашан, Хассан. "Artificial Intelligence in Social Security: Opportunities and Challenges." Journal of Social Policy Studies 20, no. 3 (2022): 407–18. http://dx.doi.org/10.17323/727-0634-2022-20-3-407-418.

Full text
Abstract:
Artificial intelligence (AI) is shaping up to be the transformative technology of our time and has become a powerful driver for social change. Social security institutions are progressively applying emerging technologies, including big data analysis, artificial intelligence, blockchain, and biometrics. The increasing use of AI by social security institutions is enabling more proactive and automated deliveries of social services. Although the potential of these technologies has not yet been fully tested nor explored, they are already providing relevant outcomes in key social security areas such
APA, Harvard, Vancouver, ISO, and other styles
45

Trbojević, Milovan, and Branislav Svirčević. "The role of the security services in preventing political coups." Politika nacionalne bezbednosti 28, no. 1 (2025): 149–65. https://doi.org/10.5937/pnb28-51019.

Full text
Abstract:
States achieve their foreign policy goals and intentions in different ways, including methods contrary to the norms of international law. Namely, suppose one wants to destabilize a country's economic, political, security and social-social system to implement one's own will, intentions, and interests. In that case, subversive activity is one of the most effective mechanisms. Such activities often cause and maintain various crises, including coups, which aim to impose one's own will on other countries and direct their socio-political flows according to national interests. Countries that carry ou
APA, Harvard, Vancouver, ISO, and other styles
46

Swapna Reddy Anugu. "AI in Financial Services: Revolutionizing Fraud Detection and Risk Management." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 208–17. https://doi.org/10.32628/cseit25112354.

Full text
Abstract:
This comprehensive article examines the transformative impact of artificial intelligence and machine learning technologies on financial institutions' approaches to fraud detection, risk management, and regulatory compliance. The article explores how cloud-powered AI solutions are revolutionizing security measures and operational efficiency in the financial sector. From advanced fraud detection systems to automated regulatory compliance, the article demonstrates how AI-driven solutions are enabling financial organizations to enhance their security posture while streamlining operations. The arti
APA, Harvard, Vancouver, ISO, and other styles
47

Călinoiu, Robert, and Dănuț Chiriac. "ASYMMETRIC OPERATIONS OF THE HOSTILE MILITARY INTELLIGENCE SERVICES ON THE ALLIED STATES TERRITORIES." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (2021): 118–27. http://dx.doi.org/10.53477/2668-2001-21-14.

Full text
Abstract:
Globalization and technological developments brought to societies huge benefits, but also new security challenges. State or private entities, having access to new, advanced technologies, and benefiting of the rapid and free movement, developed methods and strategies to harm their perceived enemies. National security, considered alone or in conjunction with those of the allied states or within the security organizations is challenged lately by hostile acts performed by various entities, aimed at weakening societies, value systems, beliefs or even the simply well-being of the citizens. Intellige
APA, Harvard, Vancouver, ISO, and other styles
48

Sampara, Said, Nurul Qamar, and Arri Abdi Syalman. "Directorate of Security Intelligence based on Organization Structure and Work Procedure of the Regional Police." Sovereign: International Journal of Law 2, no. 2 (2020): 27–39. http://dx.doi.org/10.37276/sijl.v2i2.30.

Full text
Abstract:
This study aims to determine the effectiveness of the function of the Directorate of Security Intelligence based on Organization Structure and Work Procedure of the South Sulawesi Regional Police. This research was conducted in South Sulawesi Province, with 92 respondents. Data analysis in this study uses a qualitative approach, which processes the output of the questionnaire, and is presented in the form of frequency tabulation (F) and percentage distribution (%). The results of this study show that the effectiveness of the function of the Directorate of Security Intelligence based on Organiz
APA, Harvard, Vancouver, ISO, and other styles
49

Waller, Michael J., and Victor J. Yasmann. "Russia's Great Criminal Revolution: The Role of the Security Services." Journal of Contemporary Criminal Justice 11, no. 4 (1995): 276–97. http://dx.doi.org/10.1177/104398629501100407.

Full text
Abstract:
Russian law enforcement agencies, security organs, and intelligence services, far from being reliable instruments in the fight against organized crime and corruption, are institutionally part of the problem, due not only to their co-optation and penetration by criminal elements, but to their own absence of a legal bureaucratic culture and their use of crime as an instrument of state policy.
APA, Harvard, Vancouver, ISO, and other styles
50

Pohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES." Herald of criminal justice, no. 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.

Full text
Abstract:
The article substantiates that the guarantees of rights and freedoms in the activity of the Security Service of Ukraine are: the procedure established by legislation and departmental legal acts for conducting counter-intelligence, operative-search, administrative and criminal-procedural measures by authorized structural units and their officials; effective departmental control, prosecutorial supervision, judicial, parliamentary, presidential and public control over the activities of the SBU; high professionalism and intolerance to corruption of all SBU employees; independence of the court in U
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!