To see the other types of publications on this topic, follow the link: State Security Service.

Journal articles on the topic 'State Security Service'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'State Security Service.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sundar, Priya, R. Raju, P. Mahalakshmi, and G. Lalitha. "Providing security for Web Service Composition using Finite State Machine." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (August 30, 2005): 435–44. http://dx.doi.org/10.24297/ijct.v4i2b1.3232.

Full text
Abstract:
The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the security requirements is truly a demanding task because of the dynamic and capricious nature of the Web. Web Service Composition associates web services to create high level business process that absolutely matches and conforms appropriately to the service requestor’s needs. It involves customizing services often by locating, assimilating and deploying elementary services. Our paper proposes a policy based system for granting security during the process of web service composition. Policies defined for effective and secure composition analyze and verify the conditions under which the task of the web service is allowed or rejected. To achieve this specification, we make use of Finite State Machine model which clearly portrays the business and flow logic. Nodes in the Finite State Machine represent rules. Upon efficacious fulfillment of policies which are defined in the node access points, transition between rules is stimulated. A service composition is said to be successfully incorporated only if there is complete absence of policy violations when combining the policies of elementary services. The simulated FSM which extracts the rules and policies of the web services and correctly matches and satisfies the policy constraints defined in the access points ensure providing security for the composite web service.
APA, Harvard, Vancouver, ISO, and other styles
2

Guracha, Adan Moro, and Felix Kiruthu. "Attitudes towards Outsourcing Security Services on Service Delivery in Commercial State Owned Enterprises in Nairobi City County, Kenya." International Journal of Current Aspects 3, no. III (June 5, 2019): 1–13. http://dx.doi.org/10.35942/ijcab.v3iiii.26.

Full text
Abstract:
Security service delivery in public sector is crucial as it entails protecting government personnel as well as property. Therefore, security is increasingly viewed as a key condition for economic growth and development. Lack or ineffective security service delivery weakens the performance of any organization. This study sought to determine if service delivery improves as a result of outsourcing of security services to commercial state owned enterprises in Kenya. Specifically, this research aimed at determining the effects of outsourcing cash protection, body guarding, property protection and information/data protection services on security service delivery of selected commercial state owned enterprises in Nairobi City County in Kenya. The study was guided by two theories; the Functionalist model and securitization theory. A descriptive research design was adopted. The target population for this study was a census of all the 29 selected commercial state owned enterprises. The study targeted security managers, assistant security managers and security staff, hence total target population was 958 respondents. The sample size was selected through purposive and random sampling techniques. The research used questionnaires to collect data. Descriptive statistics including frequencies, percentages, means and standard deviations were used. Further, inferential statistics including correlation and regression analysis were used to illustrate the relationship between the independent and the dependent variables. The study used a multiple regression model. The regression results indicated that, there is a positive and significant relationship between outsourcing cash protection security services and security service delivery of commercial state owned enterprises in Kenya (β=0.247, p=0.001); a positive and significant relationship between outsourcing bodyguard security services and security service delivery of commercial state owned enterprises in Kenya (β=0.271, p=0.000); a positive and significant relationship between outsourcing property guarding security services and security service delivery of commercial state owned enterprises in Kenya (β=0.289, p=0.033); and a positive and significant relationship between outsourcing information security services and security service delivery of commercial state owned enterprises in Kenya(β=0.389, p=0.015). From the findings, the study concluded that outsourcing security services has a significant influence on security service delivery of commercial state owned enterprises in Nairobi City County, Kenya. In particular, the study concluded that outsourcing cash protection, body guarding services, property guarding and information security services, had a positive and significant effect on security service delivery of commercial state owned enterprises in Kenya. The study recommended that commercial state owned enterprises should strengthen their cash protection security services, security officers should be trained on how to protect human life especially, the personnel that they are supposed to protect, private security companies should keep data on any property that enters and leaves the company’s premises, and that private data security officers should have access to IT skills. This is an open-access article, access, citation and distribution of this article is allowed with full recognition of the authors and the source. This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
APA, Harvard, Vancouver, ISO, and other styles
3

Borichev, Konstantin, and Mihail Pavlik. "The role of State Security bodies in countering terrorism." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2021, no. 1 (April 9, 2021): 94–103. http://dx.doi.org/10.35750/2071-8284-2021-1-94-103.

Full text
Abstract:
The article is devoted to the activities of the state security guard services of the Russian Federation in counteraction of terrorism. In particular, the main features and trends of modern terrorism are identified. The article analyzes the current legal acts in Russia that regulate activities of state security guard services, including their main tasks. The main legal definitions in the field of state security are studied. A retrospective analysis of the development of domestic special services in the field of state security was conducted. The main activities of the Federal security guard service of the Russian Federation in the fight against terrorism, as well as the powers in development and implementation of measures to prevent, detect and suppress terrorist activities, are considered. In particular, the complex of conservative, custodial, technical, operational, investigative and preventive activities, is carried out by the units of the Federal security guard service of the Russian Federation, on a permanent basis in the period of preparation and conduct of security measures in the places of permanent and temporary stay and sections of the route of state (movement) of the objects of state security to ensure the security of state security and counter the terrorist threat. On the basis of the analysis of the activities of state security services, options for increasing the efficiency of their work in the field of anti-terrorism are proposed in order to maximize the effectiveness of ensuring the security of state security objects.
APA, Harvard, Vancouver, ISO, and other styles
4

Otinashvili, Ramaz. "Security in Company Management." Works of Georgian Technical University, no. 2(520) (June 25, 2021): 67–75. http://dx.doi.org/10.36073/1512-0996-2021-2-67-75.

Full text
Abstract:
To neutralize the danger associated with business management there is a special security service in the management system of successful companies the structure of which depends on the nature and scale of the business. A medium-sized security service consists of four structural divisions: 1. Security; 2. Operative; 3. Analytical; 4. Technical. In each, depending on the specifics of the activity , up to 1 or 10 employees can be employed. Every business has its general and specific challenges. The main challenge still comes from direct competitors. Rivalry often transcends civilized boundaries and escalates into physical or other confrontation, especially if there is a new "player" in the segment. In the advanced countries of the West, in addition to state security institutions, there are private detective and detective organizations, news agencies, studying scientific and consulting centers, which provide various services on a fee-for-service basis. Coordination of state law enforcement agencies and private security structures is sophisticated. There is created a special body, if necessary and it harmonizes their activities. It would be nice to transfer this practice to Georgian conditions.
APA, Harvard, Vancouver, ISO, and other styles
5

Hordiienko, Serhii. "Powers of government agencies in ensuring the security of the state and directions of their improvement." Legal Ukraine, no. 10 (November 27, 2020): 6–17. http://dx.doi.org/10.37749/2308-9636-2020-10(214)-1.

Full text
Abstract:
The paper considers and systematizes the powers of the Verkhovna Rada of Ukraine, the President of Ukraine, the National Security Council of Ukraine, the Cabinet of Ministers of Ukraine, local authorities and the judiciary in modern conditions and attempts to improve them by systematizing legislation in the political, military, economic and judicial spheres. It is determined that the security of the state in the modern conditions of development of Ukrainian society is ensured not only by the Security Service of Ukraine, as stated in the legislation, but also by other authorities and management on which it directly depends: Verkhovna Rada, President, National Security and Defense Council, Ministry of Internal Affairs, Ministry of Economic Development, Trade and Agriculture of Ukraine; Ministry of Energy and Environmental Protection of Ukraine; Ministry of Foreign Affairs of Ukraine; Ministry of Finance of Ukraine; Ministry of Justice of Ukraine; State Tax Service of Ukraine; State Service of Ukraine for Ethnopolitics and Freedom of Conscience; State Customs Service of Ukraine; State Service of Geology and Subsoil of Ukraine; State Service of Ukraine for Emergencies; State Financial Monitoring Service of Ukraine; State Export Control Service of Ukraine; The State Fiscal Service of Ukraine and almost all other state institutions. However, their activities in this direction have their own specific features that need to be identified and enshrined in law. Key words: powers, Verkhovna Rada of Ukraine, President of Ukraine, National Security Council of Ukraine, Cabinet of Ministers of Ukraine, local authorities and judicial bodies, Constitution of Ukraine, Law of Ukraine «On the National Security and Defense Council of Ukraine».
APA, Harvard, Vancouver, ISO, and other styles
6

Barić, Nikica. "State Security of Socialist Republic of Croatia and events in Poland 1980-1982." Balcanica Posnaniensia. Acta et studia 28, no. 2 (December 31, 2021): 117–39. http://dx.doi.org/10.14746/bp.2021.28.23.

Full text
Abstract:
The Socialist Republic of Croatia, as one of republics of the Socialist Federative Republic of Yugoslavia, possessed its State Security Service (Služba državne sigurnosti, SDS), equivalent to similar political security services in other communist states. At the Yugoslav level there was also the Federal State Security Service. The State Security of Croatia dealt with both internal and external threats to the communist system and gathered intelligence information. In the early 1980s the State Security of Croatia gathered sizeable amount of information on the events connected with activities of „Solidarity” in the People’s Republic of Poland and the crisis that ultimately led to the imposition of state of war in Poland, as well as reaction to these events in Croatia. The main aim of this paper is to present State Security reports about with Poland in the period between 1980 and 1982.
APA, Harvard, Vancouver, ISO, and other styles
7

Kamiński, Mariusz Antoni. "Intelligence and counterintelligence in the structure of the state organs of the Republic of Estonia." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (October 10, 2019): 121–34. http://dx.doi.org/10.34739/dsd.2019.01.09.

Full text
Abstract:
The article presents an analysis of the legal status, organization and powers of the special services of the Republic of Estonia. The author presents the mission and tasks of the Estonian Internal Security Service (Kaitsepolitsei), the Estonian Foreign Intelligence Service (Välisluureamet) and the Military Intelligence Centre (Luurekeskus). The article show the historical aspect of the Estonian special services and their location in the structure of state organs responsible for national security. In addition, the author presents a surveillance system on the activities of intelligence and counterintelligence services.
APA, Harvard, Vancouver, ISO, and other styles
8

Mehta, Meera, Dinesh Mehta, and Jaladhi Vavaliya. "Urban drinking water security in Gujarat." Journal of Social and Economic Development 23, S1 (February 18, 2021): 166–80. http://dx.doi.org/10.1007/s40847-020-00122-0.

Full text
Abstract:
AbstractGujarat has made important strides to ensure that most parts of the state become water secure. In 2005, Gujarat was one of the few states that recognized that its urban areas were its ‘engines of growth’ and made significant investments in urban infrastructure. A state-wide water supply grid was constructed to transfer inter-basin water from perennial surface water sources to water-scarce areas. While these schemes have improved household-level access to municipal water supply, service levels have not improved. In this paper, we argue that along with infrastructure creation, there is a need to focus on monitoring, operation and maintenance of existing system and improving efficiency. We analyze information available from the performance assessment system (PAS) setup by the CEPT University for monitoring of urban services in India. It has annual information of water service delivery in all the urban areas of Gujarat from 2010. We assess urban drinking water supply on three key aspects: equity, service quality and financial sustainability. We also identify a few key intervention areas related to increased accountability, efficiency and equity in delivery of water supply services.
APA, Harvard, Vancouver, ISO, and other styles
9

Nielsen, Christian Axboe. "The Yugoslav State Security Service and the Bleiburg Commemorations." Politička misao 55, no. 2 (June 19, 2018): 50–70. http://dx.doi.org/10.20901/pm.55.2.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kondrashova, Nataliia. "LEGAL REGULATION OF DISCOVERY UKRAINE'S SECURITY SERVICE THREATS ECONOMIC SECURITY OF THE STATE." Entrepreneurship, Economy and Law, no. 7 (2019): 99–103. http://dx.doi.org/10.32849/2663-5313.2019.7.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kilichev, Abror. "The security services and features of Amir Temur's state." International Journal on Integrated Education 3, no. 1 (January 13, 2020): 69–73. http://dx.doi.org/10.31149/ijie.v3i1.275.

Full text
Abstract:
The article is devoted to philosophical understanding of the special service of the state of Amir Temur. Which introduce new forms of the state of Amir Temur and his special service. As you know, the special service of Amir Temur played a global role ustroystvo all powerful empire. It is shown that the philosophy of the special service of Amir Temur is not only very relevant at the time, but this time is also relevant. Based on the study, the author proposes to highlight the political and philosophical method of interpretation, gives its definition, formulates the main characteristics of the polytech analysis that make up the legal method.
APA, Harvard, Vancouver, ISO, and other styles
12

Goryca, Tomasz. "The Concept of the Process of Qualification to State Security Service." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 35, no. 35 (September 30, 2019): 37–53. http://dx.doi.org/10.5604/01.3001.0014.0249.

Full text
Abstract:
The aim of the study is to present the concept of the process of qualification to service in State Security Service, which was established on February 1, 2018 in lieu of the Government Protection Bureau. All requirements for candidates participating in the recruitment process to State Security Service are set out by relevant laws and ordinances of the Minister of Interior and Administration. The specificity of tasks carried out by the officers of the State Security Service requires superior physical fitness, high resistance to stressful situations and teamwork skills. The units responsible for recruitment make high demands on candidates in the face of changing security threats for the most important people in the state. Properly conducted recruitment process let the units to select the best candidates for officers who will ensure the highest standards of implementation of protective measures in the country as well as abroad. The article presents the author’s concept of such a process. For this purpose, theoretical research methods were used and documents related to the selection process for the State Security Service were analysed.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhou, Cheng, Qian Mu Li, and Jian Shi. "Role-Based Services Certification Model of State Grid Unified Application Platform." Applied Mechanics and Materials 668-669 (October 2014): 757–61. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.757.

Full text
Abstract:
With analyzing the cause and characteristics of security problems in the current power State Grid Unified Application Platform, this paper proposes a Role-Based Services Certification Model, RBSCM, to solve the security problems in electric power information system and designs a generalized and effective mechanism of security management. The paper provides a set of constraint specifications. These constraint specifications of RBSCM are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems.
APA, Harvard, Vancouver, ISO, and other styles
14

Kipcharskyi, O. M. "Theoretical and legal problems of state control over the judicial security service." Legal horizons, no. 23 (2020): 78–82. http://dx.doi.org/10.21272/legalhorizons.2020.i23.p78.

Full text
Abstract:
The article discloses the essence and legal foundations of state control over the activities of the Judicial Security Service and covers the main theoretical and legal problems in this area. The author examines the approaches of domestic scientists to the essence of the concept of control and state control in the field of justice. It has been established that scientists consider state control in a narrow sense as control of the executive authorities. However, the state control over the Judicial Security Service is carried out by the State Judicial Administration – a state body in the justice system that belongs to the judicial branch of government, therefore it exercises state control. Thus, the concept of state control goes beyond the limits of the activities of executive authorities, requires analysis and further research. The article analyzes the legal acts regulating the powers of the subjects exercising state control over the Judicial Security Service. It has been determined that the main subject of state control over the activities of the Judicial Security Service is the State Judicial Administration of Ukraine. It has been established that the High Council of Justice is a control and oversight body in the field of justice with a wide range of functions and powers and directly acts as a subject of state control in relation to the Judicial Security Service. It is concluded that state control over the activities of the Judicial Security Service is a system of organizational and legal forms of ensuring compliance with the principle of the rule of law, the fulfillment of tasks, and the implementation of managerial decisions in the activities of the Judicial Security Service, which is carried out on the basis and within the framework of the legislation by the State Judicial Administration and the Supreme Council of Justice to ensure the safety and independence of the court.
APA, Harvard, Vancouver, ISO, and other styles
15

Etor, Comfort R., Eno Etudor-Eyo, and Godfrey E. Ukpabio. "Provision of Security Facilities and Security Personnel Service Delivery in Universities in Cross River State, Nigeria." International Education Studies 13, no. 5 (April 18, 2020): 125. http://dx.doi.org/10.5539/ies.v13n5p125.

Full text
Abstract:
The study examined provision of security facilities and security personnel service delivery in Universities in Cross River State, Nigeria. Three research questions and one hypothesis guided the study. The ex-post facto design was adopted for the study. The population of the study comprised 440 security personnel while the sample size was 400 security personnel. Two researchers developed and validated instruments entitled “Provision of Facilities Questionnaire (POFQ) and Security Personnel Service Delivery Questionnaire (SPSDQ) were used for data collection. The reliability estimates of the instrument were determined using Cronbach Alpha Analysis and the coefficients of 0.80 and 0.83 were obtained. Descriptive statistics was used to answer the research questions while Pearson Product Moment Correlation was used to test the hypothesis at 0.05 level of significance. The finding of the study showed that there exist a disparity in the provision of security facilities in the institutions with the minimum provision of 11.10 and maximum of 26.00 facilities by State and Federal Universities respectively. The level of provision of security facilities in the two institutions studies indicated two levels of inadequate and moderate with a grand mean of 2.5135 and standard deviation of .92773. The level of security service delivery in the Universities in Cross River State depend on the level of availability of security facilities for use by security personnel is evident that there are three levels of security service delivery in Universities. The finding of the study also revealed that there is a significant relationship between provision of security facilities and security personnel service delivery. Based on the findings, it was recommended that the administrators should provide adequate security facilities such as hand guns, CCTV, tear gas, bullet proof vests and so on for effective security personnel service delivery.
APA, Harvard, Vancouver, ISO, and other styles
16

Solairaju, A., and S. Vivek Saravanan. "Security Service for Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 6 (November 5, 2013): 2715–24. http://dx.doi.org/10.24297/ijct.v11i6.3047.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by theindustrial automation community is impeded by open issues, such as security guarantees. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine to carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss some research issues.
APA, Harvard, Vancouver, ISO, and other styles
17

Ivanova, Malinka. "Security of Web Services: Methods and Contrivance." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (August 10, 2015): 6229–39. http://dx.doi.org/10.24297/ijct.v14i11.6374.

Full text
Abstract:
The increasing use of web services, the proved advantages of service-oriented architectures and continuously appliedattacks to them require utilization of given secure mechanisms that ensure the security at different levels. The aim of thepaper is to summarize the existing threats and attacks to web applications and web services. Contemporary securitystandards and good practices describing methods and contrivance for deciding security problems are explored too toreveal the present state in the field.
APA, Harvard, Vancouver, ISO, and other styles
18

Mutonyi, Gerald, Ann Merecia Sirera, and Wangari Mwai. "Examining Commercialized Security Industry’s Services on National Security in Nairobi County, Kenya." Technium Social Sciences Journal 8 (May 19, 2020): 710–36. http://dx.doi.org/10.47577/tssj.v8i1.671.

Full text
Abstract:
Maintenance of security and good order for the citizens, had traditionally been undertaken by the state. However, non-state actors have come up to offer security to those who can afford to pay for it. And this is the liberalists view of the provision of security that, the pursuance of security can be achieved with the involvement of other actors offering the same. Despite this development, few studies have examined commercialized security industry services on national security in Kenya. Using Security Governance theory and Network Analysis theory, this study sought to understand the topic. The study took on a cross sectional survey design, and was carried out in Nairobi with the adult residents as the target population. A multistage sampling technique was employed to obtain the respondents. Questionnaires, scheduled interviews and structured observation were used to collect data. The Statistical Package for Social Sciences (SPSS version 25, 2017) was used in data management and analysis. The results demonstrate that (1) Manned guarding significantly contributes to the 26 % of outcome of the commercialized security B = .260, β = .135, P = .007; (2) Alarm and Electronics 22.9 %; B = .229, β = .224, P = .001; (3) CVIT security service contributes significantly and positively at 10.8 %; B = .108, β = .118, P = .018. While commercial investigative security service 3.6 % (B = .036, β = .084, P < = .103 although it was not significant. The study concluded that, commercialized security though motivated by profit making plays a significant role that enhances state capacity in provision of security as well as contributes to safety of citizens. Thus the study recommended that, there should be efforts to increase the usage of commercialized security investigation service. It is expected that the findings of this research will provide data that can be used to inform policy and practice amongst commercial security providers to increase their impact on national security in Kenya. The data can also stimulate the academic community towards more research in the field.
APA, Harvard, Vancouver, ISO, and other styles
19

Podolchak, N., and V. Karkovska. "THE INFLUENCE OF PRESTIGIOUS GOVERNMENT SERVICE ON STATE SECURITY STAFF." Investytsiyi: praktyka ta dosvid, no. 5-6 (March 31, 2020): 128. http://dx.doi.org/10.32702/2306-6814.2020.5-6.128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Huang, Wei, Afshar Ganjali, Beom Heyn Kim, Sukwon Oh, and David Lie. "The State of Public Infrastructure-as-a-Service Cloud Security." ACM Computing Surveys 47, no. 4 (July 21, 2015): 1–31. http://dx.doi.org/10.1145/2767181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rosicki, Remigiusz. "State security and individual security as exemplified by operational surveillance used by the Polish counter-intelligence service." Przegląd Politologiczny, no. 3 (September 15, 2021): 5–23. http://dx.doi.org/10.14746/pp.2021.26.3.1.

Full text
Abstract:
The material scope of the research problem presented in the text encompasses the issues concerned with operational surveillance that the Polish civilian counter-intelligence service, i.e. the Internal Security Agency (in Polish abbreviated as ABW – Agencja Bezpieczeństwa Wewnętrznego), is authorised to. The main purpose of the analysis is to assess the changes introduced as a result of the passing of the so-called Surveillance Act in 2016. The Act was supposed to introduce new regulations with regard to the powers concerning operational surveillance and obtaining of ICT data, granted to particular secret and police services. The said changes were enforced by the judgment of the Constitutional Tribunal, which in 2014 found numerous violations of the provisions of the Constitutions of the Republic of Poland caused by the existing regulations authorising the services to engage in particular operational and investigative actions. In order to elaborate the material scope of the research problem, and to present the conclusions, the following research questions have been presented in the text: Do the legal regulations concerning the powers vested in the Polish civilian counter-intelligence service within operational surveillance infringe individual rights and freedoms (e.g. the right to privacy, protection of personal information, privacy of correspondence), and if so, then to what extent? Functional and pro-constitutional interpretations have been applied to assess the provisions regulating the powers of the Internal Security Agency with regard to operational surveillance and obtaining of ICT data. The functional interpretation focuses on the function of selected legal solutions, whereas the pro-constitutional interpretation focuses on the assessment of legal solutions in the context of the principles of a democratic state ruled by law, as well as human rights and freedoms. As regards the pro-constitutional interpretation, the tool used for assessment is the test of proportionality, i.e. the rule used for interpreting legal norms according to the degree and legitimacy of the interference in individual rights and freedoms.
APA, Harvard, Vancouver, ISO, and other styles
22

Tonkens, Evelien, and Loes Verplanke. "When Social Security Fails to Provide Emotional Security: Single Parent Households and the Contractual Welfare State." Social Policy and Society 12, no. 3 (April 10, 2013): 451–60. http://dx.doi.org/10.1017/s1474746413000110.

Full text
Abstract:
The provision of services in the contractual welfare state is conditional. If one wants to receive a service, one has to comply with the demands of the provider. If one fails to do so, the organisation threatens to terminate its services, and indeed often does so. There are, however, people who breach their contracts time after time, falling back into the same dire situation that prompted them to ask for help in the first place. Social workers must then visit these people to help them re-enter the contract. This article draws on an in-depth analysis of such ‘behind the front door’ policies, focussing on single mothers on welfare. It argues that for many single mothers on welfare, social security fails to provide emotional and relational security, which undermines their ability to fulfil the terms of the contract. So long as the welfare state is based on the idea of (material) social security, ‘behind the front door’ workers remain urgently needed.
APA, Harvard, Vancouver, ISO, and other styles
23

Averyanova, Maria Igorevna. "The right to social security of State civil servants from the standpoint of chronodiscret monogeographic comparative jurisprudence (HMP)." Genesis: исторические исследования, no. 2 (February 2022): 47–64. http://dx.doi.org/10.25136/2409-868x.2022.2.34991.

Full text
Abstract:
The article examines the features of the legal regulation of social security of state civil servants from the standpoint of the methodology of chronodiscret monogeographic comparative jurisprudence. Within the framework of this methodology, various aspects of the formation and implementation of the right to social security by state civil servants have been studied since the period of the XVIII century. The object of the study was public relations on pension and medical provision of civil servants and their family members, as well as social services for civil servants. The subject of the study is the legal norms regulating these relations, as well as scientific research conducted in the field of social security of civil servants. The scientific novelty of the study is to identify the features of the current state of legal regulation of social security of civil servants, taking into account the history of its development in the conditions of legislative consolidation of guarantees of social security of civil servants, decrees of the President of the Russian Federation on the further development of social guarantees of civil service. The paradox of the modern stage of social security of civil servants is the fact that most of the provisions of the Law on Civil Servants establishing guarantees of social security of civil servants have not yet been implemented in practice and are essentially declarative. Thus, the norms on state pension provision for family members of civil servants, on mandatory state social insurance in case of illness or disability during the period of civil service, on mandatory state insurance, as well as on special medical insurance for civil servants and their family members have not been implemented.
APA, Harvard, Vancouver, ISO, and other styles
24

Madugu, A. J. "Food security status of female-headed households in Mubi North Local Government area, Adamawa State, Nigeria." Agricultural Science and Technology 11, no. 1 (2019): 98–102. http://dx.doi.org/10.15547/10.15547/ast.2019.01.016.

Full text
Abstract:
Abstract. This study investigated the food security status of female-headed households (FHHs) in Mubi north local government area (LGA) of Adamawa State, Nigeria. Specifically, the socio economic characteristics and determinants of household food security status of respondents were tested. Structured questionnaire was used to collect data from 80 female headed households using simple random sampling technique from five districts of Mubi north LGA. Analytical tools used were the food security index (FSI) and Binary Logit Regression Analysis. The results showed that majority (57.9%) of the respondents were middle aged, having 1-5 persons in their household and cultivating about 1-3 hectares of land. It further showed that most of the respondents (63.8%) were food insecure. The result further showed that age, household size, educational status, and access to input were significant and therefore regarded as the major determinants of food security in the study area. It also showed that extension service was not significant and thus not a determinant of food security among the respondents. The study concluded that female headed households in the study area were food insecure; it was thus recommended that NGOs, CSOs and other actors should focus more on agricultural activities by providing inputs so as to improve food production and household food security index, furthermore, the result showed that extension service did not influence food security status of respondents, thus, private extension service providers should be established to assist the government in the provision of intensive extension contact/services, this can help to improve food production and subsequent food security status of respondents.
APA, Harvard, Vancouver, ISO, and other styles
25

Aliti, Admirim, Edmond Jajaga, and Kozeta Sevrani. "A need for an integrative security model for semantic stream reasoning systems." International Journal of Business & Technology 6, no. 3 (May 1, 2018): 1–4. http://dx.doi.org/10.33107/ijbte.2018.6.3.01.

Full text
Abstract:
State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, make securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanisms to a more autonomous system that supports complex and dynamic relationships between data, clients and service providers. We plan to validate our approach on a typical application of stream data, on Wireless Sensor Networks (WSNs). In particular, WSNs for water quality monitoring will serve as a case study. The paper describes the initial findings and research plan for building a consistent security model for stream reasoning systems.
APA, Harvard, Vancouver, ISO, and other styles
26

SOKOLOV, M. V., and A. V. MERKULOV. "OREL SECURITY OFFICER GAVRIIL STARINOV." JOURNAL OF PUBLIC AND MUNICIPAL ADMINISTRATION 9, no. 4 (2020): 44–57. http://dx.doi.org/10.22394/2225-8272-2020-9-4-44-57.

Full text
Abstract:
The purpose of the article is to study G. G. Starinov’s biography as a successful employee of the state security agencies of 1920s – 1950s. He worked his way up the career ladder from an ordinary courier to the Deputy Chief of the Republican Department of the KGB. Starting his chekist service in the Orel prov-ince, he served in the Central black earth region, visited the Urals, the South – in the Tajik SSR and the Turkmen SSR, and in the West – in the Moldavian SSR and the Estonian SSR. G.G. Starinov held senior positions in SMERSH during the Great Patriotic War. He was wounded and awarded the state awards. Besides serving in the state security agencies, G. G. Starinov served in the army, in the SPU, and in the civil service.
APA, Harvard, Vancouver, ISO, and other styles
27

BOLILYI, V. O., L. P. SUKHOVIRSKA, and O. M. LUNHOL. "ОПЕРАЦІЙНИЙ ЦЕНТР БЕЗПЕКИ ЯК ПОСЛУГА НА ОСНОВІ SIEM." Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 1, no. 2 (October 4, 2021): 177–86. http://dx.doi.org/10.31494/2412-9208-2021-1-2-177-186.

Full text
Abstract:
This study examines the Security Operations Center, which provides detection and analysis of cybersecurity, rapid response, and prevention of cyber attacks. Security Operations Center technologies are used to provide visibility and enable analysts to protect against attacks. The algorithm of presenting the topic «Security Center» during the teaching of the discipline «Security of programs and data» at the Volodymyr Vynnychenko Central Ukrainian State Pedagogical University is shown, namely the problems of implementation of event monitoring systems «Security information and event management», types of operational centers, methods of building internal operational security centers. Subject competencies are formed in students: to classify, identify and protect information processing facilities from unauthorized access and computer viruses, to develop individual access control and information protection systems. The process of implementing Security information and event management systems at the enterprise is shown, the main mechanisms of this system using a hierarchical model, the main tasks of the security operational center, the key parameters of the Security Operations Center (organizational model, performance of functions that go beyond the tasks, level of authority), basic rules of correlation. The commercial security operations center SOC as a Service is considered, which is designed to help work with a huge amount of information, real-time monitoring and response to attacks. During the laboratory classes, the students analyzed the companies that provide security operations center services (Information Systems Security Partners, Octave Cybersecurity, Infopulse, Omega Security Service) and studied the factors that affect companies when choosing the type Security Operations Center. Key words: Security Operations Center, SEIM-systems, cybersecurity, SOC as a Service.
APA, Harvard, Vancouver, ISO, and other styles
28

Shafack, Rosemary M. "Securing Library and Information Resources: The Situation in Two State University Libraries in Cameroon." European Journal of Education and Pedagogy 2, no. 1 (January 11, 2021): 25–31. http://dx.doi.org/10.24018/ejedu.2021.2.1.13.

Full text
Abstract:
Information services such as the library, under normal international standards should consider safety and security of its infrastructure and resources (human resources inclusive) as part of its workflow. Information is expanding and covering untold grounds every day and information bearing facilities are equally being transformed with the help of Information and Communication Technologies (ICTs) whose evolution seem to know no bounds. This trend is not only changing the role of the Library and Information Professional but urging this professional to ensure the security of access to the information resources platform. Thus it is not only worthwhile to collect, organize and make accessible information resources but it is equally important to secure these resources to last long and prevent unauthorized and unethical access. This therefore calls for a carefully developed security policy for every information service that can be updated as knowledge expands and the ICT platform continue to expand and evolve. Such a policy should be well thought out to cover all the forms information takes and include, print, electronic and graphics. It should equally include securing the human resources implicated in the running and using of the Library services. This paper is an investigation of the challenges faced in securing information resources in public university libraries in Anglophone Cameroon. The research design used for the study is a survey with data collecting instruments made of a questionnaire and an interview guide from library staff and library administrators respectively. Three main research questions were coined for the study having as thrust the following: security challenges faced, security policies put in place to secure library resources and difficulties libraries face in providing appropriate security and how these difficulties could be solved. The analysis of the data collected was done by a simple calculation of the percentages of the responses of the respondents to determine the threats and the extent of each threat. Academic libraries have been plagued with security issues for a long time. It is difficult to replace materials that are under security threats in libraries. Theft, mutilation and unauthorised access to libraries and their resources constitute serious problems which affect users. It is important that libraries with physical security systems reinforce these systems with electronic security systems. More effort is needed to properly train and encourage staff to be security conscious and to take the necessary precautionary measures. It is anticipated that if the right measures are put in place to resolve library security issues, libraries would be able to better protect their resources and render better services.
APA, Harvard, Vancouver, ISO, and other styles
29

Sukhonos, V. V., Y. V. Harust, T. A. Vasilieva, V. I. Melnyk, and V. V. Mirgorod-Karpova. "Directions of adaptation of the financial legislation of Ukraine to the EU legislation taking into account implementation of the concept of a new innovative model of the state management of financial system of Ukraine." Legal horizons, no. 25 (2020): 97–114. http://dx.doi.org/10.21272/legalhorizons.2020.i25.p97.

Full text
Abstract:
The scientific article is devoted to the coverage of one of the most pressing problems of Ukraine - problematic aspects of its economic security. The authors cover the current state of Ukraine's economy and analyze the views of domestic and foreign scholars on overcoming the economic crisis in the country. The current state of legal support of the foundations of financial and economic security of Ukraine is studied. The emphasis is on the crucial role of reforming and creating a new concept of the financial system of Ukraine. The foreign experience of ensuring the economic security of the country is analyzed. The paper plays a crucial role in reforming the system of public authorities in order to reduce the corruption element in public processes. The authors define that the financial system is a significant social sphere in society, on the state of which depends not only the economic security and reliability of the country, but also the potential of the state on the world stage as a whole. That is why the article focuses on the development of a new effective concept that would restructure the entire sector of the financial system of the state should be a priority in state and regional policy. This determines the urgency of studying the main problems and shortcomings of the current financial system of Ukraine, as well as the objective need to introduce a new concept of economic security of Ukraine. The Concept proposes ways to optimize the activities and structure of the subjects of financial system management in Ukraine, coordination and interaction between them. Proposals are provided for improving the administrative legislation that defines liability for financial offenses. Criteria for evaluating the effectiveness of financial system management are outlined. The concept envisages reforming the bodies of the Ministry of Finance of Ukraine, the Ministry of Internal Affairs of Ukraine, the Security Service of Ukraine, the State Tax Service of Ukraine, the State Customs Service, the State Fiscal Service, the State Audit Office, the Financial Monitoring Service, the Office of the Prosecutor General of Ukraine. state policy in the field of economy and finance, ensuring the economic security of the country, combating economic crime, reducing the shadow economy, control over the completeness of customs and tax revenues, as well as the effective use of the State budget.
APA, Harvard, Vancouver, ISO, and other styles
30

Et al., Artem Bratko. "Some Aspects of Capability-based Planning in the Field of National Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2219–25. http://dx.doi.org/10.17762/turcomat.v12i6.4827.

Full text
Abstract:
The State Border Guard Service of Ukraine is a component of the security and defense sector and the new conditions the border agency operates in arise the issue on improving the methodology of planning its operational and service activities. The authors propose to improve the methodology of operational and service activities planning based on the methodology of defense planning within the national security system on the basis of opportunities. The capability-based planning will allow for better planning of operational and service activities of the border agency and will ensure active cooperation between Ukraine and NATO in order to achieve the criteria necessary for full membership in the Alliance. A defense survey is conducted to assess the state and readiness of the defense forces to perform tasks related to the defense of Ukraine, the state of their personnel, financial, logistical and other types of support in the current and projected conditions of the security environment. The survey of the state of the State Border Guard Service of Ukraine was conducted using an analytical method, namely the analysis of strengths and weaknesses, opportunities and threats (SWOT-analysis), which allows substantiating the main directions of the Development Strategy of the State Border Guard Service of Ukraine and increasing the level of operational and service activities planning within the system of national security.
APA, Harvard, Vancouver, ISO, and other styles
31

Kopczewski, Marian, Zbigniew Ciekanowski, and Anna Piotrowska. "Legal basis for the functioning of special services in Poland." Scientific Journal of the Military University of Land Forces 196, no. 2 (June 26, 2020): 292–307. http://dx.doi.org/10.5604/01.3001.0014.2534.

Full text
Abstract:
The article presents the most important legal acts regulating the activities of special services in Poland in the years 1990-2018. As part of the political transformation, the Office of State Protection (Polish abbrev. UOP) was set up according to the Act of April 6, 1990. It replaced the previous civil intelligence and counterintelligence. In 2002, the Office was liquidated and replaced the Intelligence Agency (Polish abbrev. AW), and the Internal Security Agency (Polish abbrev. ABW) were established under the Act of May 24, 2002. The AW was created to protect the external security of the state, while the ABW was intended to protect the internal security of the state and its constitutional order. The mentioned Act divided the tasks between those services. Even though preventing and detecting crimes of corruption of public officers was one of the ABW’s tasks, the Act of June 9, 2006, established the Central Anti-Corruption Bureau (Polish abbrev. CBA), giving it the status of a special service, although the CBA performs typical police tasks. On the other hand, the Act of June 9, 2006, on the Military Counterintelligence Service (Polish abbrev. SKW) and the Military Intelligence Service (Polish abbrev. SWW) constituted a legal basis for the operation of both services in place of the liquidated Military Information Services (Polish abbrev. WSI). The article focuses on the services currently operating. The legal regulations constituting the basis for their functioning were analyzed. These are mainly competence acts, to which many amendments were introduced. They resulted, among others, from the implementation of directives and regulations of European institutions, decisions of the Constitutional Tribunal, the introduction of new laws, concerning, e.g., the establishment of the State Protection Service (Polish abbrev. SOP) or changes in the Marshal’s Guard’s powers. Attention was drawn to numerous ordinances amending the statutes, particularly as regards the ABW, and thus reorganizing the structures of offices.
APA, Harvard, Vancouver, ISO, and other styles
32

Abdullaev, Bobomurod Juraevich. "Some Reflections On The History Of Security Activities In Uzbekistan." American Journal of Political Science Law and Criminology 03, no. 06 (June 12, 2021): 104–8. http://dx.doi.org/10.37547/tajpslc/volume03issue06-15.

Full text
Abstract:
This article provides insights into the existing and politically important security system in the Central Asian khanates. The khanates of Bukhara, Khiva and Kokand had their own military power and were divided into different parts. The security departments of the khanates also played an important role in the development of the state and the security of the people. During the years of independence, as in any other field, significant changes have taken place in the field of security services. In particular, the President of the Republic of Uzbekistan Shavkat Mirziyoyev has improved the security service in the National Guard.
APA, Harvard, Vancouver, ISO, and other styles
33

Khan, Naveed, Jianbiao Zhang, and Saeed Ullah Jan. "A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server." Security and Communication Networks 2022 (March 14, 2022): 1–14. http://dx.doi.org/10.1155/2022/1943426.

Full text
Abstract:
Everyone desires to avail online services provided by different service providers securely, efficiently, and effectively. In this regard, security is still a significant concern for them. However, no one guarantees secure communication by browsing different applications remotely. To ensure confidentiality, authorization, availability, nonrepudiation, and removing eavesdropping, without a robust authentication scheme, nothing will go right. Therefore, we attempted to design a robust and privacy-preserving authentication scheme for end-users to securely access public cloud servers’ services remotely without losing performance. Our proposed scheme security has been evaluated formally using the random oracle model (ROM) and ProVerif2.03 and informally using proposition and discussion. At the same time, the performance metric has been analyzed by considering the scheme’s computation and communication costs. Upon comparing the proposed scenario with state-of-the-artwork, it has been demonstrated that the scheme is much better in terms of security and performance, as these are contradicting metrics, and the change in one conversely affects the other.
APA, Harvard, Vancouver, ISO, and other styles
34

Sapkota, Vishnu Prasad, and Umesh Prasad Bhusal. "Governance and Purchasing Function under Social Health Insurance in Nepal: Looking Back and Moving Forward." Journal of Nepal Health Research Council 15, no. 1 (August 13, 2017): 85–87. http://dx.doi.org/10.3126/jnhrc.v15i1.18027.

Full text
Abstract:
Nepal is pursuing Social Health Insurance as a way of mobilizing revenues to achieve Universal Health Coverage. The Social Health Insurance governance encourages service providers to maintain quality and efficiency in services provision by practicing strategic purchasing. Social Health Security Programme is a social protection program which aspires to achieve the goals of Social Health Insurance. Social Health Security Development Committee needs to consider following experiences to function as a strategic purchaser. The Social Health Security Development Committee need to be an independent body instead of falling under Ministry of Health. Similarly, purchasing of health services needs to be made strategic, i.e., Social Health Security Development Committee should use its financial power to guide the provider behavior that will eventually contribute to achieving the goals of quality and efficiency in service provision. The other social health security funds should be merged with Social Health Security Development Committee and develop a single national fund. Finally, the state has to regulate and monitor the performance of the SHI agency.
APA, Harvard, Vancouver, ISO, and other styles
35

Ilchenko, O. V. "State border as an object of administrative and legal activity of the State Customs Service." Legal horizons, no. 25 (2020): 81–85. http://dx.doi.org/10.21272/legalhorizons.2020.i25.p81.

Full text
Abstract:
Protection of the state border is one of the most important functions of the state. The state border is a feature that should be inherent in any state and without which its existence is impossible. Areas of territorial sovereignty of states are determined by the boundaries established between them. Thus, the main purpose of borders is to establish the boundaries of state territories. No state can exist without a legally defined territory. However, the geopolitical state attribute is the relevant political space, which is determined by state borders, which are enshrined in national and international law. The proper functioning of any country, the level of its social and economic development directly depends on the reliable protection, defense and stability of state borders. An integral part of the state border policy and state and legal regulation is the creation of an effective, perfect legal framework and conditions for ensuring the sovereignty, territorial integrity and inviolability of Ukraine, taking into account the current security challenges related to state regulation of border security. , protection and defense of the state border in general and administrative and legal regulation in particular. Ukraine's European integration policy, globalization processes taking place in the world, manifestations of foreign aggression affect border policy and require finding ways to increase the level of reliability of protection and protection of the state border as the main attribute of its sovereignty, territorial integrity and important national security of Ukraine. An important measure to increase Ukraine's border security is the implementation in Ukraine of the project "EU Support to Strengthening Integrated Border Management in Ukraine (EU4IBM)" funded by the European Union and implemented by the International Center for Migration Policy Development (ICMPD). The implementation of the Project will provide an opportunity to identify and eliminate shortcomings in the implementation of reforms that will help bring the national border management system closer to the standards and best practices of the European Union.
APA, Harvard, Vancouver, ISO, and other styles
36

Włodarczyk, Renata. "Unmanned Aerial Vehicles ‘in service’ of Internal Security of the State." Internal Security 12, no. 1 (July 22, 2020): 195–210. http://dx.doi.org/10.5604/01.3001.0014.3197.

Full text
Abstract:
The study was created thanks to the author’s preferences to learn increasingly more about new technologies that are able to increase the potential of internal security of the state. Recently, interest in recording areas (difficult to access, dangerous, monitored in adverse weather conditions, monitored due to the implementation of tasks by relevant services), the development of methods enabling the transmission of various materials at a distance, and performing other complicated activities have increased. For this purpose, unmanned aerial vehicles (so-called drones, UAVs) that are versatile in many respects are used. The author noticed the need to disseminate such innovative devices on native soil, especially for using them in multidirectional strengthening of the security sphere. Polish companies producing UAVs for many foreign customers have already marked their presence in this matter. The achievements of the designers are so impressive that it makes us appreciate the development of our technical thought, and above all, the use of drones to ensure security and public order in Poland. A series of training courses is already conducted by the Police Academy in Szczytno, which is a good solution both for teachers and, above all, for the trainees themselves. Such an initiative will undoubtedly translate into increased interest in drones, and especially the incredible usefulness of these devices for uniformed services and other entities.
APA, Harvard, Vancouver, ISO, and other styles
37

Manurung, Siska Purnama, and Chen Ke. "ANALYSIS OF FACTORS THAT AFFECT CHINESE PEOPLE’S DECISION OF CHINA STATE-OWNED COMMERCIAL BANKS." Hasanuddin Economics and Business Review 2, no. 1 (June 30, 2018): 35. http://dx.doi.org/10.26487/hebr.v2i1.1472.

Full text
Abstract:
The purpose of this study is to examine Chinese people's decision of China state-owned commercial banks, the Chinese people that stay in Greater Jakarta area, Indonesia. The study included four independent variables (service provision, government support, online bank services, bank perceived security) and a dependent variable (Chinese people's decision). Researchers used quantitative studies to study the data, which was collected using questionnaires. A total of 265 questionnaires were valid in this study. Multivariate regression tests were performed using the T test (partial test) and F test (simultaneous test) hypothesis test to analyze the effect of the dependent variable on the dependent variable. Data analysis uses SPSS 20.0 to generate results. The findings of this study that service provision does not have a significant impact on Chinese people's decision, the three variables of government support, online bank services and bank perceived security have a significant impact on Chinese people's decision. At the same time, these three important independent variables provide 41.9% of the dependent variable.
APA, Harvard, Vancouver, ISO, and other styles
38

Voskresenskaya, O. A., and N. M. Sladkova. "COMPETENCY-BASED APPROACH TO MONITORING THE EFFECTIVENESS OF PUBLIC SERVICES PERSONNEL ON INFORMATION SECURITY." Social@labor researches 45, no. 4 (2021): 121–29. http://dx.doi.org/10.34022/2658-3712-2021-45-4-121-129.

Full text
Abstract:
Among the factors affecting the level of digitalization and information security of public services in the Russian Federation, the training level of civil servants in this area has a special place. The object of this paper is the activities of government agencies on the assessment and development of information security competencies of civil servants. The authors apply a competencybased approach to determine the effectiveness of information security in government agencies and focus on monitoring the state of work on assessing and developing competencies in the field of information security of civil servants. The purpose of the study is to develop tools and methods for monitoring the effectiveness of personnel to ensure information security in public services. The methodological base of the study includes the analysis of the regulatory framework, scientific literature in the field of the best domestic and foreign practices, data obtained on the basis of surveys of government representatives. The research results: indicators and methods for assessing the maturity of the work of state bodies on the assessment and development of competencies in the field of information security of civil servants are proposed; the findings of the study on information security level in a number of instances are presented, the most frequent incidents related to ensuring information security by civil servants are given, the relationship between the maturity of information security processes and the level of competence of civil servants in this area is shown. The results of the study may be used in the activities of HR and IT-services, information security divisions of public services, as well as by federal and regional authorities responsible for the development and implementation of state policy in legal regulation on information security in the public civil service. Provided the information security is one of the basic qualification requirements, the prospect of solving problems in this area is seen in the automation of monitoring processes based on the federal unified information system for personnel management of the civil service of Russia.
APA, Harvard, Vancouver, ISO, and other styles
39

Thomson, Lindsay D. G. "Management of schizophrenia in conditions of high security." Advances in Psychiatric Treatment 6, no. 4 (July 2000): 252–60. http://dx.doi.org/10.1192/apt.6.4.252.

Full text
Abstract:
There are four high-security hospitals in the UK: Broadmoor Hospital in Berkshire (founded in 1863), Rampton Hospital in Nottinghamshire (1914), Ashworth Hospital in Merseyside (1990), which opened following the amalgamation of Park Lane (1974) and Mosside Hospitals (1913), and the State Hospital at Carstairs in Lanarkshire (1948). The first three are known as the special hospitals and serve England and Wales. The latter offers a special security service, combining high and medium secure care, for the whole of Scotland and Northern Ireland – there is no form of medium secure psychiatric provision in these countries. All four hospitals provide care for patients with mental disorders and dangerous, violent or criminal propensities. There are approximately 1550 beds in these facilities and all patients are formally detained under mental health or criminal legislation. The special hospitals are currently administered by the high-security psychiatric services commissioning team, managed locally as individual authorities, although in the future it is intended to integrate them more fully into the National Health Service (NHS) and to organise both high and medium secure services at a regional level. Carstairs is administered by the State Hospital Board for Scotland which has the status of a special health board.
APA, Harvard, Vancouver, ISO, and other styles
40

Lo Iacono, Luigi, Hoai Nguyen, and Peter Gorski. "On the Need for a General REST-Security Framework." Future Internet 11, no. 3 (February 27, 2019): 56. http://dx.doi.org/10.3390/fi11030056.

Full text
Abstract:
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept. In a SOA, applications are orchestrated by software services generally operated by distinct entities. Due to the latter fact, service security has been of importance in such systems ever since. A dominant protocol for implementing SOA-based systems is SOAP, which comes with a well-elaborated security framework. As an alternative to SOAP, the architectural style representational state transfer (REST) is gaining traction as a simple, lightweight and flexible guideline for designing distributed service systems that scale at large. This paper starts by introducing the basic constraints representing REST. Based on these foundations, the focus is afterwards drawn on the security needs of REST-based service systems. The limitations of transport-oriented protection means are emphasized and the demand for specific message-oriented safeguards is assessed. The paper then reviews the current activities in respect to REST-security and finds that the available schemes are mostly HTTP-centered and very heterogeneous. More importantly, all of the analyzed schemes contain vulnerabilities. The paper contributes a methodology on how to establish REST-security as a general security framework for protecting REST-based service systems of any kind by consistent and comprehensive protection means. First adoptions of the introduced approach are presented in relation to REST message authentication with instantiations for REST-ful HTTP (web/cloud services) and REST-ful constraint application protocol (CoAP) (internet of things (IoT) services).
APA, Harvard, Vancouver, ISO, and other styles
41

Bratko, Artem, Dmytro Oleshko, Anton Datskov, Valerii Vychavka, Oleksandr Olytskyi, and Ihor Balytskyi. "Use of the SWOT Analysis in the Field of National Security Planning." Emerging Science Journal 5, no. 3 (June 1, 2021): 330–37. http://dx.doi.org/10.28991/esj-2021-01280.

Full text
Abstract:
The authors propose to improve the methodology of operational and service activities planning based on the methodology of defense planning within the national security system on the basis of opportunities. The capability-based planning will allow for better planning of operational and service activities of the border agency and will ensure active cooperation between Ukraine and NATO in order to achieve the criteria necessary for full membership in the Alliance. A defense survey is conducted to assess the state and readiness of the defense forces to perform tasks related to the defense of Ukraine, the state of their personnel, financial, logistical and other types of support in the current and projected conditions of the security environment. The survey of the State Border Guard Service of Ukraine was conducted using an analytical method, namely the analysis of strengths and weaknesses, opportunities and threats (SWOT-analysis), which allows substantiating the main directions of the Development Strategy of the State Border Guard Service of Ukraine and increasing the level of operational and service activities planning within the system of national security. The State Border Guard Service of Ukraine is a component of the security and defense sector and the new conditions the border agency operates in arise the issue on improving the methodology of planning its operational and service activities. Doi: 10.28991/esj-2021-01280 Full Text: PDF
APA, Harvard, Vancouver, ISO, and other styles
42

Kuprijanova, Jekaterina, Juris Livdāns, and Iluta Arbidāne. "PRACTICAL ASPECTS OF PRACTICAL ASPECTS OF COOPERATION BETWEEN THE STATE BORDER GUARD OF LATVIA AND FEDERAL SECURITY SERVICE BORDER GUARD SERVICE OF RUSSIAN FEDERATION." BORDER SECURITY AND MANAGEMENT 1, no. 6 (May 10, 2016): 77. http://dx.doi.org/10.17770/bsm.v1i6.1698.

Full text
Abstract:
One of the main State Border Guard priorities is to maintain and develop the state border guarding system, according to the European Union external borders requirements, by fulfilling the conditions of the Schengen acquis. Schengen acquis provides that international cooperation in the field of border security can have multilateral, bilateral and local dimensions. In this context, an agreements concluded with bordering countries on cooperation in the field of border management is an effective tool to strengthen border security (EU Schengen Catalogue, 2002). In research as methodology are used scientific literature in the field of international law, treaties and agreements, the law of the Republic of Latvia, the State border guard of the internal regulations and the State border guard of unpublished materials. The Republic of Latvia and the Russian Federation cooperate in the field of development and implementation of coherent measures for the border control. Cooperation with RF is executed based on treaties and agreements concluded, as well, maintaining contacts between competent representatives of both countries at various management levels. The extensive cooperation between neighbouring countries on maintenance of security at the border results in the elucidation of the incidents occurring at the state border and other relevant issues, at the same time providing stability and security at the common border.
APA, Harvard, Vancouver, ISO, and other styles
43

Kubás, Jozef, Viktor Šoltés, and Katarína Repková Štofková. "SUPPORTING SMALL AND MEDIUM SIZED BUSINESSES IN SPECIFIC SERVICES WITHIN SLOVAKIA." CBU International Conference Proceedings 6 (September 25, 2018): 260–65. http://dx.doi.org/10.12955/cbup.v6.1166.

Full text
Abstract:
Providing private security is considered a specific type of business service, primarily carried out by small- and medium-sized enterprises. This specific type of business complements the state services in the field of internal security. State institutions support the creation of small- and medium-sized enterprises through targeted subsidies. The principal goal of this paper is to describe the business environment within Slovakia, focusing on small and medium enterprises providing services of private security. The secondary aim of the paper is to explain the support available for such business through subsidies from public authorities. The number of enterprises that provide services of private security, along with the number of their employees, is relevant. The outputs of the paper can be used as part of the analysis of the competitive environment by subsidy applicants who plan to operate in this specific area.
APA, Harvard, Vancouver, ISO, and other styles
44

Annenkova, Viktoriya, Alexander Naryzhny, and Lyubov' Petrova. "OPTIMIZATION OF COSTS FOR THE PROVISION OF PUBLIC SERVICE IN THE SYSTEM OF ENSURING ECONOMIC AND BUDGET SAFETY." Russian Journal of Management 7, no. 4 (January 28, 2020): 61–65. http://dx.doi.org/10.29039/2409-6024-2019-7-4-61-65.

Full text
Abstract:
The relevance and novelty of the work. In modern conditions, the increase in the level of threats to the enterprise is accompanied by an increasing role of economic security of the economic entity and management accounting in the system of economic security. Organization of managerial accounting system to provide public services to virtually any public institutions providing public services. The program allows you to calculate the costs and value of the State normative services (works) in view of the calculation of direct and expense costs, allowing reporting at the level of State and municipal institutions provides consolidating information in the desired volume at the level of ministries with the ability to provide various management reports. The purpose of the work. Providing primary information collection and processing municipal and regional institutions with a view to optimal planning of payroll staff, calculating the cost of State services (works), get detailed information about the costs in terms of expenditures throughout the State (municipal) institution, and any group of institutions. The materials and methods of research. Program management decision public service allows you to create accountability at the level of State and municipal institutions. Program configuration management decision "State service" has a two-tiered system, built on the client-server technology. The results of the work. "Public service" program was implemented and works in the city of Saratov, in the Ministry of social development of the region.
APA, Harvard, Vancouver, ISO, and other styles
45

Makarchuk, Vitalii. "ADMINISTRATIVE AND LEGAL STATUS OF LAW ENFORCEMENT BODIES AS SUBJECTS OF FORMATION AND IMPLEMENTATION OF STATE POLICY IN THE FIELD OF NATIONAL SECURITY AND DEFENSE." Law Journal of Donbass 75, no. 2 (2021): 35–44. http://dx.doi.org/10.32366/2523-4269-2021-75-2-35-44.

Full text
Abstract:
The article is devoted to the administrative and legal status of law enforcement agencies as subjects of formation and implementation of state policy in the field of national security and defense. The article outlines the basic terminological concepts, such as: status, legal status, administrative and legal status. The opinions of various scholars on the interpretation of the concept of the legal status of law enforcement agencies, its structure and elements are analyzed. The administrative and legal status of law enforcement agencies that ensure the formation and implementation of state policy in the field of national security and defense, including the administrative and legal status of the National Police, Prosecutor's Office, National Anti-Corruption Bureau of Ukraine, State Bureau of Investigation, Law Enforcement Service, State Security Service of Ukraine, state border guards. It was established that the administrative and legal status is a systemic set of such administrative and legal properties of law enforcement agencies that implement state policy in the field of national security and defense, as: competence; the order of formation and acquisition of legal features; name; location; structure; goals of operation; responsibilities, which are directly regulated by current regulations, laws of Ukraine, and international agreements, the binding nature of which is given by the Verkhovna Rada of Ukraine. The presence of administrative and legal status means that law enforcement agencies have the competence defined by administrative and legal norms – subjects of jurisdiction, rights and responsibilities (powers), are responsible for actions or omissions within their own or delegated competence, perform public, executive, functions involved in administrative legal relations of a regulatory or protective nature. It was concluded that the administrative and legal status of law enforcement agencies (National Police, Prosecutor's Office, National Anti-Corruption Bureau of Ukraine, State Bureau of Investigation, Law Enforcement Service, State Security Service of Ukraine, state border guards) as subjects of state policy formation and implementation in sphere of national security and defense determines the main directions of influence on public relations in the state, and those that arise to protect the interests of national security and defense of the state. It was stated that the obligatory sign of acquisition by law enforcement bodies - subjects of administrative-legal status is the presence of specific subjective rights and obligations, which are realized both within the administrative legal relations and outside them.
APA, Harvard, Vancouver, ISO, and other styles
46

Piwowarski, Juliusz, Barbara Piwowarska, and Jacek A. Piwowarski. "State Fire Service in the National Emergency and Fire System." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 37, no. 37 (June 30, 2020): 47–66. http://dx.doi.org/10.5604/01.3001.0014.2815.

Full text
Abstract:
Within the framework of the Polish National Emergency and Fire System (NEFS), tasks are realized in the areas of rescuing life, health and property of the citizens, as well as environmental protection. The purpose of this article is to depict the rules of the functioning of this system, with a special emphasis on State Fire Service, which plays a significant role in NEFS, among others as an organizer thereof. First, the origin and tasks of NEFS are presented, and the areas of Polish public security are indicated of which particular bodies associated in NEFS take care; the organization and tasks of State Fire Service are also outlined. Then, the place of NEFS and State Fire Service in crisis management is indicated. The presentation of the above issues allows the author to conclude that State Fire Service plays a leading role in multiple rescue operations and is a vital component of the system of internal security, e.g. as a pillar of NEFS.
APA, Harvard, Vancouver, ISO, and other styles
47

Prudyus, Ievgenii. "CONCEPTUAL ASPECTS OF STRATEGIC MANAGEMENT BY COURT SECURITY SERVICE." HERALD OF KHMELNYTSKYI NATIONAL UNIVERSITY 300, no. 6 (December 3, 2021): 94–100. http://dx.doi.org/10.31891/2307-5740-2021-300-6-17.

Full text
Abstract:
The article covers the issues of strategic management of the units of the Court Security service (CSS) at the present stage of state formation. It is determined that the management of units of the Judicial Protection Service is a special kind of managerial, organizational and administrative activities carried out within the framework of a permanent, purposeful system of collective work. The definition of “strategic management” is formulated as a management that relies on human potential as the basis of the organization, focuses on consumer demand, allows flexible response and timely changes in the organization that meet the challenges of the environment and provide competitive advantage. Аggregate enables the organization to survive in the long run, while achieving its goals. An assessment of the current management system of CSS units has been made. The stages of formation of the Judicial Protection Service, the main tasks and powers of employees of the service (maintenance of public order in court, cessation of contempt of court, protection of court premises and institutions of justice, functions of state personal protection of judges and their families, court employees, ensuring the safety of litigants in court). It is determined that in modern science and practice there are a significant number of methods used in the field of forecasting, however, it is proved that in the context of strategic management of CSS units of particular value are the method of analogy and scenario development. In order to facilitate the management of CSS units, a conceptual scheme of development and implementation of a strategy for the management of CSS units is proposed, which is characterized by complexity and completeness and provides a sequence of certain stages. The developed algorithm combines both the main functions for the development and implementation of the organization’s strategy, and the most important actions for their practical implementation. The functional content of strategic management is realized through the technological support of the functions of strategic management, which consists in the performance of judicial subdivisions of the relevant sub-functions. These traditionally include: forecasting, development and implementation of strategy. A universal model of strategic management of CSS units has been formed.
APA, Harvard, Vancouver, ISO, and other styles
48

Narain, Vishal, Pranay Ranjan, Sumit Vij, and Aman Dewan. "Taking the road less taken: reorienting the state for periurban water security." Action Research 18, no. 4 (October 27, 2017): 528–45. http://dx.doi.org/10.1177/1476750317736370.

Full text
Abstract:
This paper describes the intervention strategy to improve water security in Sultanpur, a village in periurban Gurgaon, India. Most approaches to improving natural resource management in periurban contexts focus on mobilising the community; little attention is paid to reorienting the state or strengthening the user-bureaucracy interface. This paper describes the action research process that was followed to reorient civic agencies engaged in the provisioning of water and to break from a situation of distrust and prisoners' dilemma between water users and service providers. The paper argues that the creation and provision of a platform for direct engagement between water users and service providers can be a key tool for improving periurban water security. These platforms can provide support in building community resilience to face challenges such as climate variability and urbanisation, both of which threaten periurban water security. The action research emphasises on building the community's capacity to ask for improved water supply and to negotiate with state service providers, rather than augmenting water supply physically.
APA, Harvard, Vancouver, ISO, and other styles
49

Dzidzah, Esther, Kwame Owusu Kwateng, and Benjamin Kofi Asante. "Security behaviour of mobile financial service users." Information & Computer Security 28, no. 5 (June 29, 2020): 719–41. http://dx.doi.org/10.1108/ics-02-2020-0021.

Full text
Abstract:
Purpose The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in cybersecurity threat. Customers are progressively becoming conscious of some of the threat and several of them now shun away from some suspicious activities over the internet as a form of protection. This study aims to explore the factors that influence users’ to adopt security behaviour. Design/methodology/approach A synthesis of theories – Self-efficacy and technology threat avoidance theories – was used to examine the security behaviour of users of MFSs. Data was gathered from 530 students in Ghana using convenience sampling technique. Data analysis was carried out using descriptive statistics, inferential statistics and structural equation model. Findings Outcome of the investigation indicate that both mastery experience and verbal persuasion have substantial effect on the avoidance motivation of MFSs users. It was, however, found that emotional state and vicarious experience of users do not influence their avoidance motivation. Also, it was established that avoidance motivation is a positive prognosticator of avoidance behaviour. Practical implications Understanding the security behaviour of MFS users will help the operators to outline strategies to sustain the successes achieved. Originality/value Studies on user security behaviour are rare, especially in sub Saharan Africa, thus, this study will contribute to extant literature by adding a new dimension of user security behaviour.
APA, Harvard, Vancouver, ISO, and other styles
50

A. Naagas, M., E. L. Mique Jr, T. D. Palaoag, and J. S. Dela Cruz. "Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack." Bulletin of Electrical Engineering and Informatics 7, no. 4 (December 1, 2018): 593–600. http://dx.doi.org/10.11591/eei.v7i4.1349.

Full text
Abstract:
Denial of Service (DOS) and (DDOS) Distributed Denial of Service attacks have become a major security threat to university campus network security since most of the students and teachers prepare online services such as enrolment, grading system, library etc. Therefore, the issue of network security has become a priority to university campus network management. Using online services in university network can be easily compromised. However, traditional security mechanisms approach such as Defense-In-Depth (DID) Model is outdated in today’s complex network and DID Model has been used as a primary cybersecurity defense model in the university campus network today. However, university administration should realize that Defense-In-Depth (DID) are playing an increasingly limited role in DOS/DDoS protection and this paper brings this fact to light. This paper presents that the Defense-In-Depth (DID) is not capable of defending complex and volatile DOS/DDOS attacks effectively. The test results were presented in this study in order to support our claim. The researchers established a Defense-In-Depth (DID) Network model at the Central Luzon State University and penetrated the Network System using DOS/DDOS attack to simulate the real network scenario. This paper also presents the new approach Defense-through-Deception network security model that improves the traditional passive protection by applying deception techniques to them that give insights into the limitations posed by the Defense-In-Depth (DID) Model. Furthermore, this model is designed to prevent an attacker who has already entered the network from doing damage.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography