To see the other types of publications on this topic, follow the link: Security instruments.

Journal articles on the topic 'Security instruments'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security instruments.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jayalakshmi, R., and Dr N. Lakshmi. "Determinants of Investment Decisions in Security Market Instruments." Journal of Advanced Research in Dynamical and Control Systems 11, no. 10-SPECIAL ISSUE (October 31, 2019): 904–10. http://dx.doi.org/10.5373/jardcs/v11sp10/20192886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ekardt, Felix, Beatrice Garske, Jessica Stubenrauch, and Jutta Wieding. "Legal Instruments for Phosphorus Supply Security." Journal for European Environmental & Planning Law 12, no. 3-4 (December 8, 2015): 343–61. http://dx.doi.org/10.1163/18760104-01204007.

Full text
Abstract:
This article will show which legal measures could lead to more sound use of phosphorus, and which might not. From the perspective of natural science, there are varying accounts as to how long phosphorus will still be available. It is, however, undisputed that phosphorus is a finite resource with vital importance to humankind. It is also certain that overusing phosphorus causes environmental damage further increased by permanent application. In this context, the usage of phosphorus from stocks contaminated by heavy metals might increasingly become an issue. Regulatory policy incentives are required towards establishing more sound phosphorus use with increased focus on recycling. So far, phosphorus has involved tentative proclamations rather than legally binding measures. However, classical regulatory measures directed at single actions – the command-and-control approach – will not suffice in addressing resource and environmental problems, as phosphorus problems are more appropriately viewed as quantity problems. Additional economic instruments are needed in order to avoid enforcement deficits, rebound and shifting effects, and to promote recycling while decreasing phosphorus consumption. These economic instruments would also help in addressing several environmental problems regarding land use, resources, biodiversity loss and climate change all at once.
APA, Harvard, Vancouver, ISO, and other styles
3

Чумак, Д. В. "International instruments on strengthening nuclear security." Odesa National University Herald. Sociology and Politics 19, no. 2(21) (March 23, 2015): 94–103. http://dx.doi.org/10.18524/2304-1439.2014.2(21).39708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Anisimova, Marina, Nadezhda Yurchenko, and Nataliia Kopytets. "Improving antitrust instruments for food security." E3S Web of Conferences 282 (2021): 01005. http://dx.doi.org/10.1051/e3sconf/202128201005.

Full text
Abstract:
The study aims to substantiate the fact that the development of agro-industrial complex imposes new requirements for the formation of anti-monopoly regulation tools. The authors point out the threat of cartelization of the industry to food security. It is shown that the cartel violations are systemic in the markets of agroindustrial complex. New features typical of cartel behavior of companies have been identified. It was found that the emergence of new software algorithms greatly facilitates collusion on the market, opens up the possibility of changing the nature of competition, which imposes new requirements for the formation of antitrust regulation tools. It has been marked that it is difficult to suppress anticompetitive practices to develop a complex of measures in order to counteract the cartels: modern technologies of data analysis, application of mathematical modeling methods, economic analysis and also prohibition for development and distribution of price algorithms, their use for establishing of price control.
APA, Harvard, Vancouver, ISO, and other styles
5

Fakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (February 28, 2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.

Full text
Abstract:
It is argued that the advancement of Information, Communication and Technology went hand in hand with the emergence of certain threats and vulnerabilities to cybersecurity. In several cases, cyber attacks have targeted the information, communication and infrastructure networks of numerous organizations. Today, hackers and intruders have advanced technology within their scope that lets them access the organizational information system. The present study highlights numerous internet security related problems, it offers a broad-based overview of internet threats from the perspective of business enterprises, along with prevention measures and enhanced safety strategies. A systematic analysis of secondary literature was introduced by researchers, the study found that it is critical for organizations to choose an IT security management tool that can be categorized as best practices and standards. The Security Incident Event Management (SIEM) framework is one key instrument proposed here. SIEM instruments help security analysts gain insight into the security threats targeting the IT structures of a given organization.
APA, Harvard, Vancouver, ISO, and other styles
6

Constantinescu, Maria. "The National Security Strategy in the Current Environment: from DIME to a DIME-T Approach." International conference KNOWLEDGE-BASED ORGANIZATION 27, no. 1 (June 1, 2021): 20–25. http://dx.doi.org/10.2478/kbo-2021-0004.

Full text
Abstract:
Abstract The contemporary security environment is characterized by Volatility, Uncertainty, Complexity and Ambiguity (VUCA), the use of hybrid warfare and grey zone conflicts, generating the need to adapt the national security strategies to the changes demands of the environment. In this context, the instruments of national power (diplomatic, information, economic, military) should be used in an integrated manner, in order to provide a more comprehensive approach to national security. The technology has become an integral part of the life of the society, and as such it should be taken into consideration as an instrument of power and highlighted as a major component of a national security strategy. The paper proposes a DIME-T approach to national instruments of power, by analysing the complex implications of technology on all the areas of security.
APA, Harvard, Vancouver, ISO, and other styles
7

Holland, Anna C., Matthew C. Kennedy, and Stephen W. Hwang. "The assessment of food security in homeless individuals: a comparison of the Food Security Survey Module and the Household Food Insecurity Access Scale." Public Health Nutrition 14, no. 12 (July 11, 2011): 2254–59. http://dx.doi.org/10.1017/s1368980011001327.

Full text
Abstract:
AbstractObjectiveTo compare the Household Food Insecurity Access Scale (HFIAS), the US Food Security Survey Module (US FSSM) and a modified version of the US FSSM in which references to buying food were changed to references to getting food, in terms of their classification of food security levels among homeless individuals, and to determine which of these instruments was most preferred by homeless individuals.DesignA cross-sectional survey.SettingRecruitment of participants took place at seven shelters and from three drop-in programmes that serve homeless individuals in Toronto, Canada.SubjectsFifty individuals who were ≥18 years of age, able to communicate in English and currently homeless.ResultsThe modified US FSSM assigned 20 % of participants to a lower ordinal food security category compared with the US FSSM, and only 8 % to a higher food security category. The HFIAS assigned 30 % of participants to a lower food security category compared with either the US FSSM or the modified US FSSM, and only 10–16 % of participants to a higher food security category. When asked to compare all three instruments, the majority of respondents (62 %) selected the HFIAS as the best instrument for people who are homeless.ConclusionsA majority of homeless individuals selected the HFIAS as the best food security instrument for people who are homeless. Our findings suggest that the HFIAS is a more appropriate instrument than the US FSSM for measuring food security in the homeless population.
APA, Harvard, Vancouver, ISO, and other styles
8

Subramanian, Hemang. "Security tokens: architecture, smart contract applications and illustrations using SAFE." Managerial Finance 46, no. 6 (August 13, 2019): 735–48. http://dx.doi.org/10.1108/mf-09-2018-0467.

Full text
Abstract:
Purpose Blockchain technologies have pervaded modern crowdfunding and capital sourcing through a variety of financial instruments implemented as smart contracts. Smart contracts provide a unique mechanism not only to create a unique one-of-a-type financial instrument, but also to enable unique innovations atop existing financial instruments due to underlying efficiencies. The smartness comes from the flexibility that programs provide which can create extremely unique financial instruments that are often complex to implement, yet easy to create, maintain through versioning, trade and destroy. The purpose of this paper is to describe the security token architecture as an application of smart contracts. Further, the author illustrates the implementation and design of a commonly used financial instrument known as Simple Agreement for Future Equity (SAFE) using the security token architecture proposed and smart contract functionality. The author then models the transaction using relational algebra, and, models the utility maximization. The author shows how on account of reduced information asymmetry between the investors and SAFE users (i.e. startups) utility is positive when smart contract-based security tokens are deployed for each state in the SAFE contract. Design/methodology/approach Using an existing well-adopted instrument called a SAFE contract, the author illustrates the architecture of a smart contract-based security token system. The author illustrates how different components of a SAFE contract can be implemented as a smart contract and discusses the advantages and disadvantages of applying blockchain-based smart contracts to design SAFE instruments. The author deploys two methods: a state space diagram to explain state transitions and a utility model to explain the utilities. Findings The key findings of this research study are the design of a security token architecture, which can be used to convert any the physical or contract-based financial instrument to a smart contract that runs on the blockchain. However, there are limitations to the implementation of the same which can be overcome. The model illustrates the positive utilities derived for all economic actors, i.e. the contractors, the utility providers, etc., in the market. Originality/value This paper is an original paper. For the very first time, the author explored the architecture of a security token system. Using a well-known financial instrument, namely the SAFE, the author describes various components, e.g. the four contracts that form SAFE and then model the utilities for the system.
APA, Harvard, Vancouver, ISO, and other styles
9

Waller, Michael J., and Victor J. Yasmann. "Russia's Great Criminal Revolution: The Role of the Security Services." Journal of Contemporary Criminal Justice 11, no. 4 (December 1995): 276–97. http://dx.doi.org/10.1177/104398629501100407.

Full text
Abstract:
Russian law enforcement agencies, security organs, and intelligence services, far from being reliable instruments in the fight against organized crime and corruption, are institutionally part of the problem, due not only to their co-optation and penetration by criminal elements, but to their own absence of a legal bureaucratic culture and their use of crime as an instrument of state policy.
APA, Harvard, Vancouver, ISO, and other styles
10

Nawrot, Justyna, and Zuzanna Pepłowska Dąbrowska. "International liability and compensation regimes as a tool of strengthening the balance between shipping economy and marine environment protection." SHS Web of Conferences 57 (2018): 01022. http://dx.doi.org/10.1051/shsconf/20185701022.

Full text
Abstract:
The basic requirements concerning the marine environmental protection introduced under auspices of the IMO refers to ship’s construction and ship’s operation and are recognized as a technical in nature or connected with seafarers qualifications. The aim of the article is to emphasis the importance of private law instruments, especially financial security instruments as a tool of strengthening the maritime safety and marine environmental protection in the recent IMO’ works. Attempts to create global system of liability and compensation, especially by introducing the financial security instruments, stays in line with the IMO’s public policy and aims to increase the effectiveness of the international safety standards at sea. Firstly that new instrument has been introduced as a response to environmental threats inherent in carriage of oil as cargo. Soon it became a standard provision of many others environmental threats, such as hazardous and noxious substances, bunker oil or wreck removal and lately introduced to Maritime Labour Convention prepared under ILO’s auspices. By analyzing provisions of selected maritime conventions, Authors aim to demonstrate that the financial security instruments are seen not only as a commercial tools supporting the claimants chance to obtain full/adequate compensation but also as an element of strengthening public goals.
APA, Harvard, Vancouver, ISO, and other styles
11

Stekić, Nenad. "Instruments of quantification of the political regime types within the security studies." Годишњак Факултета безбедности, no. 1 (2018): 75–94. http://dx.doi.org/10.5937/gfb1801075x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Pandey, Pankaj, and Einar Snekkenes. "Using Financial Instruments to Transfer the Information Security Risks." Future Internet 8, no. 4 (May 17, 2016): 20. http://dx.doi.org/10.3390/fi8020020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Owsiak, Katarzyna. "The Instruments of Financial Security of Local Government Units." Annales Universitatis Mariae Curie-Skłodowska, sectio H, Oeconomia 51, no. 6 (April 13, 2018): 263. http://dx.doi.org/10.17951/h.2017.51.6.263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Peters, Daniel, Patrick Scholz, and Florian Thiel. "Software Separation in Measuring Instruments through Security Concepts and Separation Kernels." ACTA IMEKO 7, no. 1 (April 1, 2018): 13. http://dx.doi.org/10.21014/acta_imeko.v7i1.510.

Full text
Abstract:
<p class="Abstract">In the age of the Internet of Things and Industry 4.0, more and more embedded systems are connected through open networks, which also concerns measuring instruments under legal control (e.g. smart meters). Therefore, cyber-security for measuring instruments is becoming increasingly important. In this paper, possibilities to design secure measuring software running on general-purpose operating systems are analyzed according to legal requirements set up by European Directives, e.g., the Measuring Instruments Directive (2014/32/EU), which define the mandatory security level. Technical interpretations for the security concepts described in this paper are derived from these legal requirements with the aim to provide manufacturers the architectural guidance to construct systems which easily pass a conformity assessment at a Notified Body. In this paper security concepts, i.e., SELinux, AppArmor and Mandatory Integrity Control (MIC) are being described, which are based on Mandatory Access Control (MAC) strategies. Additionally, high-security methodologies and concepts, e.g., MILS and security kernels, are highlighted. In the examples given, software separation, which enhances overall security, is achieved by using SELinux mechanisms in the modules (virtual machines) atop a separation kernel.</p>
APA, Harvard, Vancouver, ISO, and other styles
15

Goloborod’ko, A. Yu. "Cultural Security: The Notion, Resources and the Instruments of Implimentation." Comparative Politics Russia 6, no. 4(21) (January 1, 2015): 10–19. http://dx.doi.org/10.18611/2221-3279-2015-6-4(21)-10-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Loktionova, E. A. "Innovative financial instruments as a driver of financial market security." Finance and Credit 25, no. 10 (October 30, 2019): 2236–49. http://dx.doi.org/10.24891/fc.25.10.2236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Chu, Amanda M. Y., and Patrick Y. K. Chau. "Development and validation of instruments of information security deviant behavior." Decision Support Systems 66 (October 2014): 93–101. http://dx.doi.org/10.1016/j.dss.2014.06.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Strban, Grega. "Member States’ approaches to bilateral social security agreements." European Journal of Social Security 20, no. 2 (June 2018): 129–47. http://dx.doi.org/10.1177/1388262718771789.

Full text
Abstract:
Bilateral social security agreements are the oldest instruments which provide social security entitlements to persons moving between the countries. EU Member States’ approaches to distinctive bilateral agreements with Non-EU States are analysed herein. Bilateral social security agreements are not only the oldest coordination instruments, but remain the most important ones linking social security systems of MS and Non-EU States. They are tailored to the social security systems of the two contracting states. Nevertheless, bilateral social security agreements might be neither comprehensive in their scope of application nor complete in covering all coordination principles. Moreover, they do not create a uniform coordination system. Under the modified migration patterns - i.e. movements for shorter period of time and between many countries - a more comprehensive social security coordination mechanism might be required.
APA, Harvard, Vancouver, ISO, and other styles
19

Mykhailo, Makarenko, and Yana Smolova. "ANALYSIS OF INSTRUMENTAL SECURITY OF MACROPRUDENTIAL POLICY IN UKRAINE." Economic Analysis, no. 30(1, Part 2) (2020): 83–90. http://dx.doi.org/10.35774/econa2020.01.02.083.

Full text
Abstract:
Introduction. The issue of protecting the national economy from systemic risks is burning nowadays. Over the past two decades, systemic crises that periodically occur in financial markets have caused significant losses to the economies of many countries. And Ukraine is not an exception. Its losses from the last crisis of 2014-2015 amounted to about 40% of GDP. Ithas reflected in reduction of economic growth and bank lending. As a result, the function of ensuring financial stability has been included in the NBU's mandate. In the article the main objectives of macroprudential policy for the implementation of regulatory instruments have been identified. The most effective macroprudential instruments used in foreign practice have been studied.The degree of its implementation and efficiency in Ukraine has been analyzed. The potential benefits of macroprudential tools that are going to be emplementedin the near future have been considered. Purpose. The purpose of the article is to study theoretical and practical aspects of macroprudential instruments implementation inUkraine. Method (methodology). In the article the general and special research methods were used, in particular, logical generalization – in characterizing macroprudential policy, identifying its goals and tools, comparative analysis – in comparing thepractice of macroprudential instruments in Ukraine and abroad, determining the benefits of tools, systematization – while grouping the tools according to certain criteria. Results. Based on theresults of the study, conclusions and recommendations were formulated. In particular, the refend to accelerate the process of implementing macroprudential instruments, focusing on the tools that NBU already has in its arsenal, was considered. Possible difficulties for the banking system caused by capital requirements increase have been identified.
APA, Harvard, Vancouver, ISO, and other styles
20

Zatonatska, T. G., and A. V. Stavytskyy. "The influence of budget policy on economic security and socio-economic development in the Ukraine." Ekonomika 85 (January 30, 2009): 29–36. http://dx.doi.org/10.15388/ekon.2009.0.5121.

Full text
Abstract:
The consolidation of economic security of the state, its protection against all external threats should become one of the main directions in the realization of budget expenses in short-term and in long-term prospects. According to this conception, budget expenses are to finance top-priority components of economic security.Some theoretical and methodological approaches concerning the analysis of the influence of budget instruments on parameters of economic security and socio-economic development of the country are suggested.For conducting this investigation, certain econometric models with the best functional forms have been selected and analysed. The most important instruments in budget policy such as state buying, expenses for fundamental investigations, expenses for economic development and expenses for social sphere have been considered under the condition of the Ukrainian economy. The influence of budget instruments on certain parameters that characterize the economic security of the state has been worked out in detail. As a result of the investigation, the main threats for the Ukrainian economic security have been formulated and the ways out have been proposed.The authors state that in the process of the investigation almost all budget instruments have a positive influence on the level of Ukrainian economic security, they stimulate economic development and increasing of social living standards of the population.
APA, Harvard, Vancouver, ISO, and other styles
21

Farmery, Anna K., Amy White, and Edward H. Allison. "Identifying Policy Best-Practices to Support the Contribution of Aquatic Foods to Food and Nutrition Security." Foods 10, no. 7 (July 8, 2021): 1589. http://dx.doi.org/10.3390/foods10071589.

Full text
Abstract:
The relationship between aquatic foods and food nutrition and security is increasingly recognised in policy and practice, yet many governance instruments do not acknowledge or support this important connection. The most effective policy approaches to support the link between these sectors, or ‘best practices’ are currently unknown. We reviewed relevant governance instruments from multiple countries to identify how these instruments linked fisheries, aquaculture and food security and nutrition, including the policy framing and evidence of political commitment. Of the documents connecting the sectors (65%), the majority did so in the context of developing the fisheries/aquaculture sector to increase aquatic food availability and/or access (51%), followed by developing the fisheries/aquaculture sector as a livelihoods approach to indirectly improve food security (33%), for example, through income generation. Sectoral links established in the context of nutrition-sensitive approaches to fisheries and aquaculture were less common (5%). Almost one third (29%) of instruments supported the connection between aquatic foods and food security and nutrition across three or more different contexts relevant to food security or food systems, while 12% indicated a very high level of commitment. We recommend some key attributes for future policy development to help build coherence between sectors and to help frame coherent food system-based policies.
APA, Harvard, Vancouver, ISO, and other styles
22

Golosov, Mikhail, Ali Shourideh, Maxim Troshkin, and Aleh Tsyvinski. "Optimal Pension Systems with Simple Instruments." American Economic Review 103, no. 3 (May 1, 2013): 502–7. http://dx.doi.org/10.1257/aer.103.3.502.

Full text
Abstract:
We analyze optimal pension systems relying on simple policy instruments in a lifecycle environment which admits endogenous decisions of how much to work as well as when to retire. The optimality in this context means the highest welfare that can be achieved within a restricted set of instruments, while keeping the total cost of the pension system unchanged. The policy instruments we consider are the optimized retirement benefit functions modeled after a stylized version of the current US Social Security.
APA, Harvard, Vancouver, ISO, and other styles
23

Baniya, Dharma Bahadur. "Soft Power in the Contemporary World: Recommendations to the Small States’ Security." Unity Journal 2 (August 11, 2021): 54–69. http://dx.doi.org/10.3126/unityj.v2i0.38809.

Full text
Abstract:
Since the emergence of the New World Order in the international relations, the pursuit of national interests through traditional hard power has come under intense criticism. Employment of military instrument in foreign soil in particular, has been questioned. Examples of Afghanistan, Korean Peninsula, Iraq, and Middle-East demonstrate that hard power approach alone, has been barely successful to handle multi-dimensional security challenges in the contemporary world. Although the hard power remains as important instruments of national power, its employment is becoming less significant due to its legitimacy and effectiveness in the changing global environment. Hence, the concept of soft power has been advanced as an alternative approach because of its potential of securing national interest without using force or coercion. Though the smart power, as an appropriate combination of hard and smart powers, has its implications in the international politics; soft power constitutes a very real power. This article argues on why soft power has been a more relevant instrument for the states being blessed or lacking the military might. Finally, the article presents its analysis with implications and recommends on ways in which small states like Nepal need to resort to soft power to ensure their foreign policy objectives and security in the changing international order.
APA, Harvard, Vancouver, ISO, and other styles
24

Avdeev, Vadim Avdeevich, Olga Anatolievna Avdeeva, Stanislav Vasilyevich Rozenko, Evgeny Aleksandrovich Kiselev, Igor Vyacheslavovich Kuleshov, and Aleksey Vital'yevich Morozov. "Current Directions of Legal Ensuring National Security." Cuestiones Políticas 39, no. 69 (July 17, 2021): 373–85. http://dx.doi.org/10.46398/cuestpol.3969.23.

Full text
Abstract:
The article reveals the problematic issues for ensuring financial security in the context of globalization in global financial systems. The modern stage of development of state financial systems is characterized by difficulties in ensuring national financial security. Despite the urgency of this problem, the international community is focusing on ensuring economic security during the formation of universal and regional legal instruments, leaving out of sight issues of legal and practice-oriented guidance in financial security. The article examines the main directions of implementation of state policy aimed at improving the effectiveness of legal and national and international means to ensure financial security in the context of the globalization of growing threats to economic security. The focus is on the modernization of legal instruments to regulate public relations related to financial security. Particular attention was paid to the correlation of international legal bases, national legislation, and regional laws. It is concluded that the development of state financial policy that guarantees the security of the budgetary system is fundamental.
APA, Harvard, Vancouver, ISO, and other styles
25

PLAGERSON, SOPHIE, TESSA HOCHFELD, and LAUREN STUART. "Social Security and Gender Justice in South Africa: Policy Gaps and Opportunities." Journal of Social Policy 48, no. 2 (July 5, 2018): 293–310. http://dx.doi.org/10.1017/s004727941800048x.

Full text
Abstract:
AbstractIf gender is neglected in the design and implementation of mainstream social welfare models, unequal social and economic outcomes for men and women tend to be reproduced. This paper contributes to debates about how social protection can contribute to promoting gender equality by considering the gendered redistributive and transformative effects of three types of social security instruments in South Africa: social assistance, unemployment insurance and public employment programmes. All the instruments have some pro-poor and gendered design innovations. The Child Support Grant has had better outcomes than the other instruments, but redistributive and transformative gender effects across the social security spectrum are disappointing. Limited social transformation is largely due to implementation inefficiencies and unresponsive institutions. To serve both economically redistributive and socially transformative ends, gender-sensitive synergies between social security instruments and with other multisectoral interventions could be strengthened, such as access to social services (especially quality child care) and access to basic services (such as water, electricity, transport and internet services).
APA, Harvard, Vancouver, ISO, and other styles
26

Wiśniewski, Bernard. "Public Security in the Polish Law on State of Emergency." Internal Security 8, no. 1 (January 30, 2016): 91–100. http://dx.doi.org/10.5604/20805268.1231520.

Full text
Abstract:
This article presents the essential issues in the provisions of the law relating to public security in force in the Republic of Poland which are used in conditions of extraordinary internal threats that cannot be dealt with using ordinary legal tools. The considerations are based on an analysis of the legally regulated obligations of the state as a political organisation to society for securing the conditions for its survival in a changing security environment. This serves to present the basic issues of public security and the rules for the use of the State instruments for states of emergency. The rest of this article presents the relationship between issues of public security and a state of emergency. In this part of the article it is essential to discuss the circumstances that must exist to be able to employ specific legal measures in the conditions of threats to the constitutional order of the State and threats affecting the security of the citizens or of public order (including those caused by terrorist activities). Consequently, it discusses the impact of the rigours of a state of emergency in relation to the potential for limiting the escalation of these threats. The final part of the article also presents other instruments, apart from the state of emergency which, in the Polish legal system, can be used in the fight against threats which endanger public security and that are related to prohibited activities in cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
27

Crocombe, Richard A. "Portable Spectroscopy." Applied Spectroscopy 72, no. 12 (October 18, 2018): 1701–51. http://dx.doi.org/10.1177/0003702818809719.

Full text
Abstract:
Until very recently, handheld spectrometers were the domain of major analytical and security instrument companies, with turnkey analyzers using spectroscopic techniques from X-ray fluorescence (XRF) for elemental analysis (metals), to Raman, mid-infrared, and near-infrared (NIR) for molecular analysis (mostly organics). However, the past few years have seen rapid changes in this landscape with the introduction of handheld laser-induced breakdown spectroscopy (LIBS), smartphone spectroscopy focusing on medical diagnostics for low-resource areas, commercial engines that a variety of companies can build up into products, hyphenated or dual technology instruments, low-cost visible-shortwave NIR instruments selling directly to the public, and, most recently, portable hyperspectral imaging instruments. Successful handheld instruments are designed to give answers to non-scientist operators; therefore, their developers have put extensive resources into reliable identification algorithms, spectroscopic libraries or databases, and qualitative and quantitative calibrations. As spectroscopic instruments become smaller and lower cost, “engines” have emerged, leading to the possibility of being incorporated in consumer devices and smart appliances, part of the Internet of Things (IOT). This review outlines the technologies used in portable spectroscopy, discusses their applications, both qualitative and quantitative, and how instrument developers and vendors have approached giving actionable answers to non-scientists. It outlines concerns on crowdsourced data, especially for heterogeneous samples, and finally looks towards the future in areas like IOT, emerging technologies for instruments, and portable hyphenated and hyperspectral instruments.
APA, Harvard, Vancouver, ISO, and other styles
28

Nkosi, Gugulethu. "The International Evolution of the Right of Children to Social Security." Southern African Public Law 30, no. 2 (December 1, 2017): 484–503. http://dx.doi.org/10.25159/2522-6800/3590.

Full text
Abstract:
This article seeks to provide an analysis of the right of children to social security as provided for in the various international legal instruments, and as assimilated in other legal documents. Furthermore, it argues that scarcity of resources prevents children from enjoying socio-economic rights, including the right to social security adopted through international instruments and entrenched in domestic laws. The Convention on the Rights of a Child provides for the right to social security in the event of lack of resources to benefit the child. So does the International Covenant on Economic, Social and Cultural Rights and the African Charter on the Rights and Welfare of the Child. In all the said legal instruments, the clauses on social security do not explicitly prescribe the rights that ought to be promoted through it. However, since the jurisprudence on socio-economic rights= emphasises the view that socio-economic rights are interrelated, interdependent and indivisible, it can also be safely said that through social security, beneficiaries, that is children, should be able to enjoy access to other socio-economic rights in general. Therefore, the significance of the right to social security as a means to address poverty and facilitate the development of children is explored.
APA, Harvard, Vancouver, ISO, and other styles
29

Lim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (April 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.

Full text
Abstract:
There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instruments of measurement by which organizations can assess their security management practices. The paper identifies nine security practice constructs from the literature and develops measurement items for organizations to assess the adequacy of their security management practices. The study uses a multiple case study approach followed by interviews with a panel of four security experts to validate and refine these security practice constructs and their associated measures.
APA, Harvard, Vancouver, ISO, and other styles
30

Kurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (January 2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.

Full text
Abstract:
This study provides an understanding of cyber security and further analyses the Cyber Security and Data Protection Bill of Zimbabwe. The internet and other technological developments have provided a variety of platforms for increased and sometimes unrestricted exercise of freedom of expression, association, online transactions, and access to information rights. Zimbabwe has faced increased threats from cyber activities. This has necessitated the country to enact the Cyber Security and Data Protection Bill. The purpose of the Cyber Security and Data Protection Bill is to increase cyber security in order to build confidence and trust in the secure use of information and communication technologies by data controllers, their representatives, and data subjects. This study relied on data gathered through key informant interviews and documentary search. The key informants were drawn from various institutions that deal with cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
31

Vasmant, Alexis. "International Legal Instruments Promoting Synergies in Nuclear Safety, Security and Safeguards." Nuclear Law Bulletin 2009, no. 2 (December 24, 2009): 81–102. http://dx.doi.org/10.1787/nuclear_law-v2009-art16-en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Sercu, Piet, and Cynthia Van Hulle. "Financing instruments, security design, and the efficiency of takeovers: A note." International Review of Law and Economics 15, no. 4 (December 1995): 373–93. http://dx.doi.org/10.1016/0144-8188(95)00036-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kahn, Charles M., José M. Liñares-Zegarra, and Joanna Stavins. "Are there Social Spillovers in Consumers’ Security Assessments of Payment Instruments?" Journal of Financial Services Research 52, no. 1-2 (January 18, 2017): 5–34. http://dx.doi.org/10.1007/s10693-017-0270-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Beckman, Robert, and Zhen Sun. "The Relationship between unclos and imo Instruments." Asia-Pacific Journal of Ocean Law and Policy 2, no. 2 (December 9, 2017): 201–46. http://dx.doi.org/10.1163/24519391-00202003.

Full text
Abstract:
The 1982 United Nations Convention on the Law of the Sea (unclos) is widely viewed as a “constitutive” instrument that provides a legal framework that is being filled in, rounded out and complemented by existing and subsequently enacted international agreements and customary international law. The International Maritime Organization (imo) is the preeminent international organization with competence to establish international rules and standards for the safety, security and environmental performance of international shipping. In other words, on matters relating to international shipping, unclos outlines the rights and obligations of States parties in various maritime zones that must be exercised and fulfilled through implementation instruments under the auspices of imo. This article will examine and discuss the relationship between unclos and imo instruments. First, it will provide an overview of imo, including its historical background, its mandates and structure, and the major instruments that are under its auspices. It will then look at the relationship between unclos and imo, and discuss how imo and its instruments have been incorporated into unclos. Furthermore, it will discuss the role of imo and its instruments in assisting States to exercise their rights and fulfil their obligations under unclos.
APA, Harvard, Vancouver, ISO, and other styles
35

Kane, Thomas R. "The Validity of Prison Classification: An Introduction to Practical Considerations and Research Issues." Crime & Delinquency 32, no. 3 (July 1986): 367–90. http://dx.doi.org/10.1177/0011128786032003008.

Full text
Abstract:
Many prison classification systems include risk assessment instruments designed to assign individuals to institutions varying in security features or to levels of supervision differing in staffing patterns and the extent of inmate privileges. Decision criteria that make up classification instruments are selected to measure inmate attributes as information that predicts the occurrence or rates of prison disciplinary problems. The present article is an introduction to research designs and methods for use in the validation of classification instruments. Hypothetical validity findings are presented to demonstrate their critical role in the development of a classification system. Finally, it is concluded that validation research, whether for management or scientific purposes, is optimally conducted in a program of research designed to evaluate the risk assessment instrument in the context of other components of the classification system and environmental variables that influence validity criterion behavior.
APA, Harvard, Vancouver, ISO, and other styles
36

Manatakis, Dimitrios K., and Nikolaos Georgopoulos. "Reducing the Cost of Laparoscopy: Reusable versus Disposable Laparoscopic Instruments." Minimally Invasive Surgery 2014 (2014): 1–4. http://dx.doi.org/10.1155/2014/408171.

Full text
Abstract:
Cost-effectiveness in health care management is critical. The situation in debt-stricken Greece is further aggravated by the financial crisis and constant National Health System expense cut-downs. In an effort to minimize the cost of laparoscopy, our department introduced reusable laparoscopic instruments in December 2011. The aim of this study was to assess potential cost reduction of laparoscopic operations in the field of general surgery. Hospital records, invoice lists, and operative notes between January 2012 and December 2013, were retrospectively reviewed and data were collected on laparoscopic procedures, instrument failures, and replacement needs. Initial acquisition cost of 5 basic instrument sets was €21,422. Over the following 24 months, they were used in 623 operations, with a total maintenance cost of €11,487. Based on an average retail price of €490 per set, projected cost with disposable instruments would amount to €305,270, creating savings of €272,361 over the two-year period under study. Despite the seemingly high purchase price, each set amortized its acquisition cost after only 9 procedures and instrument cost depreciated to less than €55 per case. Disposable instruments cost 9 times more than reusable ones, and their high price would almost equal the total hospital reimbursement by social security funds for many common laparoscopic procedures.
APA, Harvard, Vancouver, ISO, and other styles
37

Angraini, Angraini, Rose Alinda Alias, and Okfalisa Okfalisa. "Measuring information security policy compliance: content validity of questionnaire." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 469. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp469-475.

Full text
Abstract:
<span>Instruments used to measure compliance with information security policies have been developed by many researchers before, but only a few have conducted validity tests per item, especially for variables selected based on qualitative research. This study aims to validate the questionnaire will be used to measure user compliance with policies of information security. This study began by designing a questionnaire and conducting content validation using content ratio validation (CVR) and content index validation (CVI). As many as eight experts from the university assessed the items given. The results of 72 items submitted a questionnaire, as many as 22 items eliminated, and only 50 items that have CVR and CVI values above 0.75. Also, Kappa statistical calculations show that items have excellent reliability among assessors at the item level. This study revealed that this instrument had obtained an appropriate level of validity to measure compliance with information security policies. </span>
APA, Harvard, Vancouver, ISO, and other styles
38

Данькевич, А. П. "THE UKRAINIAN FINANCIAL INSTRUMENTS MARKETS IN CONDITIONS OF GLOBALIZATION." Збірник наукових праць Університету державної фіскальної служби України, no. 1 (June 22, 2019): 33–44. http://dx.doi.org/10.33244/2617-5940.1.2019.33-44.

Full text
Abstract:
In the article are considered discrepancy of the standard legislation of Ukraine to the international regulation of the markets of financial instruments. It is established that the main differences concern: mutual recognition between regulatory bodies of the Ukrainian security market and their colleagues from EU member states.
APA, Harvard, Vancouver, ISO, and other styles
39

Rajavuori, Mikko, and Kaisa Huhta. "Digitalization of security in the energy sector: evolution of EU law and policy." Journal of World Energy Law & Business 13, no. 4 (August 1, 2020): 353–67. http://dx.doi.org/10.1093/jwelb/jwaa030.

Full text
Abstract:
Abstract This article analyses the dynamics and implications of the digitalization of security in the energy sector. Based on an evolutionary review of legal and policy instruments, we map the pace and internal dynamics of the digitalization of security in the European Union over the past 15 years. Our analysis reveals substantial changes in the conceptions and dynamics of security in the energy sector. First, we find that digitalization has only recently penetrated into the core of the energy sector’s security paradigm. Secondly, we uncover a significant disconnect in the conceptualization of the risk as against the opportunities associated with digitalization. Thirdly, we identify the growing influence of cross-sectoral instruments in the energy sector. Fourthly, we find that energy security does not feature in the overarching security discourse relating to the use of data-driven technologies in the energy sector. The findings illustrate the difficulties that managers, policymakers and researchers face when trying to keep up with the rapid technological change in the energy transition and the ensuing evolution of the energy sector’s security paradigm.
APA, Harvard, Vancouver, ISO, and other styles
40

Rajivan, Prashanth, Pablo Moriano, Timothy Kelley, and L. Jean Camp. "Factors in an end user security expertise instrument." Information & Computer Security 25, no. 2 (June 12, 2017): 190–205. http://dx.doi.org/10.1108/ics-04-2017-0020.

Full text
Abstract:
Purpose The purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and interactions in the security and privacy context. Standardized, externally valid instruments for measuring end-user security expertise are non-existent. Design/methodology/approach A questionnaire encompassing skills and knowledge-based questions was developed to identify critical factors that constitute expertise in end users. Exploratory factor analysis was applied on the results from 898 participants from a wide range of populations. Cluster analysis was applied to characterize the relationship between computer and security expertise. Ordered logistic regression models were applied to measure efficacy of the proposed security and computing factors in predicting user comprehension of security concepts: phishing and certificates. Findings There are levels to peoples’ computer and security expertise that could be reasonably measured and operationalized. Four factors that constitute computer security-related skills and knowledge are, namely, basic computer skills, advanced computer skills, security knowledge and advanced security skills, and these are identified as determinants of computer expertise. Practical implications Findings from this work can be used to guide the design of security interfaces such that it caters to people with different expertise levels and does not force users to exercise more cognitive processes than required. Originality/value This work identified four factors that constitute security expertise in end users. Findings from this work were integrated to propose a framework called Security SRK for guiding further research on security expertise. This work posits that security expertise instrument for end user should measure three cognitive dimensions: security skills, rules and knowledge.
APA, Harvard, Vancouver, ISO, and other styles
41

EBRAHIM, MUHAMMED-SHAHID. "PRICING ASSET BACKED ISLAMIC FINANCIAL INSTRUMENTS." International Journal of Theoretical and Applied Finance 03, no. 01 (January 2000): 59–83. http://dx.doi.org/10.1142/s0219024900000048.

Full text
Abstract:
The social impact of bankruptcies and loan defaults result in structural impairment of the economy. This paper presents a judicious methodology for pricing durable asset backed financing facilities while reducing their risk of default. Although the framework of the study is that of an Islamic banking system, it can also be implemented by conventional intermediaries. Both credit as well as hybrid (quasi-equity) facilities in the form of Bai' Bithman Ajil (BBA)/Ijara wal-'Iqtina and Decreasing Mudharabah (DM) instruments are discussed using computer simulation. These are applied to the cases of automobile financing and home mortgages. Placing additional assets as Rehn (security) has the capacity to improve the financing ratio and/or the term to maturity of both kinds of vehicles.
APA, Harvard, Vancouver, ISO, and other styles
42

Hossain, Ishrat, Aliyu Dahiru Muhammad, Binta Tijjani Jibril, and Simeon Kaitibie. "Support for smallholder farmers through Islamic instruments." International Journal of Islamic and Middle Eastern Finance and Management 12, no. 2 (April 30, 2019): 154–68. http://dx.doi.org/10.1108/imefm-11-2018-0371.

Full text
Abstract:
Purpose In societies with strong presence of Islam, Islamic instruments with more scope for fairness and equity can be innovatively harnessed to play an increasing role in the development process and poverty alleviation schemes. Poor smallholder farmers dominate agricultural production in many developing countries and contribute a significant portion of global food production. This paper aims to develop a scheme to improve poor smallholder farmers’ vulnerable financial situation through the application of Zakah and Salam contract, using Bangladesh as a case study. Secondary goals are to show the effect of the scheme on food security and relevance to Nigeria. Design/methodology/approach The authors explore the existing traditional modes of financing available to poor smallholders, identify their challenges and propose an appropriate Islamic financing scheme. Findings With the Zakah-based Salam forward contract, the proposed scheme would procure food through Institutional Demand to offer interest free financing, fair price and access to new marketing channels and reduce income uncertainty for the rural smallholders. The discussions indicate that the local food security will be enhanced through incentivized farming activities and disbursement of food from the food bank to the Zakah-eligible food insecure local people. Research limitations/implications This proposal brings forth a potentially powerful idea that needs further empirical validation. Originality/value The religion-based Institutional Demand initiative to promote smallholder agricultural development and social protection is a novel one. The attempt to apply the framework to Nigeria context shows the potential of the framework to generalize for other Muslim developing countries with similar characteristics, especially the poorer agriculture-based countries.
APA, Harvard, Vancouver, ISO, and other styles
43

Marques, Emanuele S., Michael E. Reichenheim, Claudia L. de Moraes, Marina ML Antunes, and Rosana Salles-Costa. "Household food insecurity: a systematic review of the measuring instruments used in epidemiological studies." Public Health Nutrition 18, no. 5 (June 25, 2014): 877–92. http://dx.doi.org/10.1017/s1368980014001050.

Full text
Abstract:
AbstractObjectiveTo conduct a systematic review aimed at identifying and characterizing the experience-based household food security scales and to synthesize their psychometric properties.DesignSearch in the MEDLINE, LILACS and SciELO databases, using the descriptors (‘food insecurity’ OR ‘food security’) AND (‘questionnaires’ OR ‘scales’ OR ‘validity’ OR ‘reliability’). There was no limitation on the period of publication. All articles had their titles and abstracts analysed by two reviewers. The studies of interest were read in their entirety and the relevant information extracted using a standard form.ResultsThe initial bibliographic search identified 299 articles. Of these, the 159 that seemed to meet the criteria for inclusion were read fully. After consultation of the bibliographic references of these articles, twenty articles and five documents were added, as they satisfied the previously determined criteria for inclusion. Twenty-four different instruments were identified; all were brief and of easy application. The majority were devised in the USA. Forty-seven references reported results of psychometric studies. The instruments that presented the highest number of psychometric studies were the Core Food Security Measurement/Household Food Security Survey Module (CFSM/HFSSM) and the Self-Perceived Household Food Security Scale.ConclusionsThere are a number of structured scales available in the literature for characterization of household food insecurity. However, despite some psychometric studies already existing about the majority of the instruments, it is observed that, except for the studies of the CFSM/HFSSM, these are still restricted to appraisal of a few aspects of reliability and validity.
APA, Harvard, Vancouver, ISO, and other styles
44

Akimova, L. M. "Mechanisms of the influence state regulation on economic security of the state in social and demographic spheres: world experience." Public administration aspects 6, no. 9 (October 19, 2018): 81–91. http://dx.doi.org/10.15421/151857.

Full text
Abstract:
In this article, the author revealed that in the modern world, national states function in conditions of high uncertainty, disequilibrium and risk, which increases the relevance and role of the security component in public administration. It is established that ensuring economic security is one of the fundamental criteria for the effectiveness of the state as a subject of social relations, since in the economic system a necessary material basis is created for the social and demographic development of the country. In turn, it is clarified that the social and demographic spheres are critically important for economic development as sources of reproduction of human and social capital. Based on the results of the analysis of data from international indices that reflect Ukraine’s economic position among the countries of the world, it has been clarified and proven that the influence of the main instruments of state regulation on the country’s economic security is positive in the sphere of education and vocational training and negative in the areas of the labor market, freedom of business, health and security.The state has a low level of stability, which is most influenced by indicators of the social state of society and cohesion policy related to the functioning of the security apparatus, the presence of a split in the elite in society, social policies for vulnerable groups, in particular internally displaced persons, external intervention. In general, the influence of the main instruments of state regulation on the economic security of the country can be considered positive in the sphere of education and training and negative in the labor market, freedom of business, health and safety.Existing international databases allow only relative dynamic characteristics of the influence of state regulation instruments on economic security in the social and demographic spheres. Taking this into account, the prospects for further scientific research encompass the development of theoretical and methodological bases for assessing the impact of certain instruments of state regulation of economic security in the social and demographic spheres for the benefit of society and economic growth.
APA, Harvard, Vancouver, ISO, and other styles
45

Rudenko, L. D., A. Yu Bavikin, and O. P. Sokolenko. "TO THE QUESTION ON ECONOMIC AND LEGAL SECURITY OF THE USE OF BINARY OPTIONS AS FINANCIAL INSTRUMENTS." Legal horizons 33, no. 20 (2020): 58–63. http://dx.doi.org/10.21272/legalhorizons.2020.i20.p58.

Full text
Abstract:
The article investigates the current state of economic and legal support for the use of binary options as financial instruments. On the basis of the conducted research, the concept of binary option as derivative security and the financial instrument is specified, the main types of binary options are distinguished. Also, the article investigates features of the functioning of the binary options market through online trading platforms. The legal nature of the binary option as a derivative of security and a financial instrument (item 5 of Part 5 of Article 3 of the Law of Ukraine “On Securities and the Stock Market”) is specified. There is no comprehensive list of such securities in the legislation. That is, based on the features of the binary option (timeliness; purchase or sale of any of the financial instruments, including those that provide cash payment; no actual purchase of securities, currency or precious metals, raw materials; availability of a certain fixed condition at the time conclusion of the transaction; short-term and speculative nature of the financial transaction; trading on online platforms). The concept of a binary option has been clarified, namely: this is the type of options contract (contract) under which the payment will depend entirely on the result of the offer, yes or no, usually related to whether the price of a particular asset such as a stock or commodity will rise above or will decrease below the amount indicated. Unlike traditional options, when such an agreement is concluded, no actual purchase of a security, precious metal, raw materials is made, but a bid is made to increase or decrease the price of the asset for a certain time. Based on an analysis of EU law, including the MIFID, it is determined that binary options refer to derivative financial instruments. The peculiarities of economic and legal regulation of the binary options market are investigated by the European Securities Market Supervision Authority (ESMA). There is a lack of proper regulation and control over the binary options market by the state in Ukraine, which in turn led to an outflow of tens of millions of dollars from the Ukrainian economy and causing significant financial losses to traders. The article argues the feasibility of adopting a special law on the market for binary options based on the experience of the Federal Republic of Germany to protect Ukrainian traders. Keywords: binary option, financial instrument, trader, trading online platforms, ESMA, MIFID.
APA, Harvard, Vancouver, ISO, and other styles
46

Jabbar, Awais, Qun Wu, Jianchao Peng, Ali Sher, Asma Imran, and Kunpeng Wang. "Mitigating Catastrophic Risks and Food Security Threats: Effects of Land Ownership in Southern Punjab, Pakistan." International Journal of Environmental Research and Public Health 17, no. 24 (December 11, 2020): 9258. http://dx.doi.org/10.3390/ijerph17249258.

Full text
Abstract:
In the wake of environmental challenges, the adoption of risk management strategies is imperative to achieve sustainable agricultural production and food security among the Pakistani farmers of Punjab. For a deeper insight into farmers’ adaptive behavior towards climate change, this study explored the role of land tenancy in the adoption of risk management instruments, such as off-farm diversification, improved varieties, and crop insurance. Off-farm diversification was found to be a preferred instrument among landless tenants. The study also employed a multivariate probit model that further signified the role of land tenure in risk-related decisions. Apart from land tenancy, the results identified the prominence of risk perception, information access, and extension access in adoption decisions. This study also investigated the association between risk management approaches and food security indicators (household hunger scale, food consumption score). Analysis revealed a significant association between risk management tools and food security indicators.
APA, Harvard, Vancouver, ISO, and other styles
47

Velychko, О. M., V. V. Gaman, O. V. HrabovskiiHrabovskii, and T. B. Gordiyenko. "FEATURES OF TESTING OF THE BUILT-IN SOFTWARE OF MEASURING INSTRUMENTS." Key title: Zbìrnik naukovih pracʹ Odesʹkoï deržavnoï akademìï tehnìčnogo regulûvannâ ta âkostì -, no. 1(16) (2020): 36–41. http://dx.doi.org/10.32684/2412-5288-2020-1-16-36-41.

Full text
Abstract:
Protection against unauthorized modification or its components, measurement data and protection against external unintentional and accidental interference are particularly important for measuring instruments (MIs) software. The possibilities of ensuring the security of built-in MI software, as well as MI as a whole, are considered. The analysis of the main features of built-in MI software on the basis of documents, guidelines and recommendations of international and regional organizations in the field of legal metrology are shown. The characteristics of MI software in accordance with international and regional documents, guidelines and recommendations are the establishment and regulation of such tests, which must be provided in the testing methods for specific MI with embedded software.
APA, Harvard, Vancouver, ISO, and other styles
48

Weisman, Camila. "MECHANISMS AND INSTRUMENTS FOR ENSURING ECONOMIC SECURITY OF OIL AND PETROCHEMICAL ENTERPRISES." Russian Journal of Management 8, no. 1 (May 22, 2020): 126–30. http://dx.doi.org/10.29039/2409-6024-2020-8-1-126-130.

Full text
Abstract:
The oil and gas industry remains for Russia the most important source of income, a strategic industry. According to official figures of the Ministry of Finance of the Russian Federation, income from the oil and gas sector, according to the results of 2019, is 40% of the total budget of the country. A large volume of crude oil and gas is exported from the country. The tax burden on raw materials reaches up to 60% of the initial cost, which makes oil production at new fields extremely unprofitable. The most important direction for the country is the transition from a strategy for the sale of crude oil products to refined ones, which have an additional cost. The article discusses the features of domestic oil production, analyzes the reasons for overpriced in comparison with competitive raw materials from other oil producing leader countries. The strategy of ensuring the economic security of the industry is noted, the main tools are listed and the mechanisms for ensuring the economic security of petrochemical industry enterprises are presented.
APA, Harvard, Vancouver, ISO, and other styles
49

Tamakchi, Andrei S. "Managing the economic security of the regions using the instruments of controlling." Market economy problems, no. 3 (2019): 30–37. http://dx.doi.org/10.33051/2500-2325-2019-3-30-37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Alizhonova, B. I. K., and O. V. Korneyko. "FEATURES OF TRADE POLICY INSTRUMENTS’ APPLICATION FOR ENSURING FOOD SECURITY IN RUSSIA." Russian Journal of Agricultural and Socio-Economic Sciences 72, no. 12 (December 30, 2017): 246–48. http://dx.doi.org/10.18551/rjoas.2017-12.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography