To see the other types of publications on this topic, follow the link: Unauthorized actions.

Journal articles on the topic 'Unauthorized actions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Unauthorized actions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Voinik, Anna A., and Margarita R. Snegur. "Motives for participation of youth in unauthorized protest actions." Vestnik of Saint Petersburg University. Sociology 16, no. 3 (2023): 259–77. http://dx.doi.org/10.21638/spbu12.2023.302.

Full text
Abstract:
In-depth study of real motives for participation in protest actions could contribute a lot to increase effectiveness of educational activities and preventive maintenance with youth. Young people as a socio-demographic group have a high potential for civic participation and they are going to determine the strategy of the country’s political development in a few decades. The thesis deals with the analysis of the results of the field research on motives for the participation in unauthorized protest actions, conducted in July — September 2021 for the Committee on Youth Policy and Interaction with
APA, Harvard, Vancouver, ISO, and other styles
2

Рабенко, Татьяна Геннадьевна, and Анастасия Олеговна Терентьева. "The Dissemination Model of Unauthorized Information in the Virtual Communication Space (Based on the Material of the VKontakte Social Network)." Philology & Human, no. 1 (March 21, 2025): 7–26. https://doi.org/10.14258/filichel(2025)1-01.

Full text
Abstract:
The article presents aninteractive model for the dissemination of unauthorized information in a virtual communication space. Based on the interrelated dialogue of communication participants, this model is structured by the speech actions of the subjects of the virtual dialogue, defined as communicative actions or communicative moves. Acommunicative move is a verbal and/or non-verbal action of communication participants, a minimal significant element that either develops the interaction of dialogue participants and promotes their communication towards achieving a common communicative goal, or b
APA, Harvard, Vancouver, ISO, and other styles
3

Akhramovych, Volodymyr, and Vadym Akhramovych. "Quantitative assessment of the probability of protective system functioning without unlawful actions." Collection "Information Technology and Security" 12, no. 2 (2024): 257–67. https://doi.org/10.20535/2411-1031.2024.12.2.315745.

Full text
Abstract:
Information security, also known as InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information. The primary goal of information security is to achieve a balanced protection of data confidentiality, integrity, and availability, while considering the expediency of application and without any harm to the organization's productivity. In this paper, the security levels (threats) T of the k-th threat to the properties of information circulating in the information and telecommunications system (ITS) are obtained from the parame
APA, Harvard, Vancouver, ISO, and other styles
4

Krasnova, Anzhela, and Tat'yana Gribok. "TERRORISM AT DANGEROUS PRODUCTION FACILITIES. MEASURES OF PROTECTION AGAINST TERRORISM." Scientific Papers Collection of the Angarsk State Technical University 2020, no. 1 (2020): 338–43. http://dx.doi.org/10.36629/2686-7788-2020-1-338-343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Popov E. V., Popov E. V., Panteleev V. A. Panteleev V. A., Segal M. D. Segal M. D., Gavrilov S. L. Gavrilov S. L., Ovsynik A. I. Ovsynik A. I., and Lysenko I. A. Lysenko I. A. "THE RADIOLOGICAL CONSEQUENCES OF UNAUTHORIZED ACTIONS WITH RADIOISOTOPE SOURCES OF IONIZING RADIATION." Technology of technosphere safety 85 (2019): 115–26. http://dx.doi.org/10.25257/tts.2019.3.85.115-126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khanov, T. A., and A. T. Sadvakasova. "COMPENSATION FOR DAMAGE CAUSED BY THE PRODUCTION OF ILLEGAL UNAUTHORIZED INVESTIGATIVE ACTIONS." Russian-Asian Legal Journal, no. 3 (September 28, 2020): 37–42. http://dx.doi.org/10.14258/ralj(2020)3.8.

Full text
Abstract:
The article highlights the problematic issues associated with the lack of clear legal regulation of theprocedure for compensation for harm caused as a result of the production of covert investigative actions,which were recognized by the court as illegal. The authors provide arguments in support of the fact thatthe damage in question should be compensated for in civil proceedings. To eliminate the identified gaps, itis proposed that appropriate amendments be made to the criminal procedure legislation of the Republic ofKazakhstan.
APA, Harvard, Vancouver, ISO, and other styles
7

Kudryavtseva, Vera, and Natalia Vasileva. "On some problems of the legal regime of unauthorized construction objects." MATEC Web of Conferences 212 (2018): 09002. http://dx.doi.org/10.1051/matecconf/201821209002.

Full text
Abstract:
In real socio-economic conditions, unauthorized construction is a phenomenon quite common in contemporary society. Construction remains the main type of land use and planning of the populated areas, especially in the prevailing conditions, when every year the population in large cities of Russia is growing, which leads to a steady expansion of borders and an increase in the area occupied by cities. At the same time, in the absence of a clear, proper urban planning, and the development of urban and rural settlements, the number of buildings being built illegally will increase. In order to preve
APA, Harvard, Vancouver, ISO, and other styles
8

Varma, Jahith Sai Krishna. "EagleAI: AI Powered Real Time Restricted Area Surveillance." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 3499–506. https://doi.org/10.22214/ijraset.2025.70612.

Full text
Abstract:
Abstract: Traditional security measures often fail to provide accurate and efficient monitoring, leading to vulnerabilities in restricted areas. This project implements an advanced real-time facial recognition-based surveillance system to enhance security and address these shortcomings. The system uses facial recognition technology for live monitoring, identifying authorized personnel and detecting unauthorized individuals. Attendance is recorded automatically in an Excel file, with timestamps for entry and exit. For unauthorized access, the system triggers multiple actions, including capturin
APA, Harvard, Vancouver, ISO, and other styles
9

Deen-Racsmány, Zsuzsanna. "A Redistribution of Authority Between the UN and Regional Organizations in the Field of the Maintenance of Peace and Security?" Leiden Journal of International Law 13, no. 2 (2000): 297–331. http://dx.doi.org/10.1017/s0922156500000212.

Full text
Abstract:
The UN Charter and customary law contain significant ambiguities concerning the prohibition of enforcement measures by regional organizations. This fact – coupled with practical necessity – appears to have been responsible for the failure of the UN to condemn the unauthorized use of force by regional organizations in Liberia and Sierra Leone. These cases and legal doctrine suggested increasing regional autonomy in this field. Although reactions to Operation Allied Force in Kosovo cooled the enthusiasm of those who wished for the legitimization of such actions, evidence suggests that under cert
APA, Harvard, Vancouver, ISO, and other styles
10

Krismanto, Rachmat Satyo, and Luluk Lusiati Cahyarini. "The Legal Review Regarding Copyright Protection of Songs from Unauthorized Song Cover Actions." Jurnal Daulat Hukum 5, no. 3 (2022): 164. http://dx.doi.org/10.30659/jdh.v5i3.23078.

Full text
Abstract:
The copyright infringement is an act prohibited by the law, in practice copyright infringement is divided into several forms of song piracy in Indonesia which results in losses from the creator and the state, therefore the government tries to enforce copyright law. Problems in writing this scientific paper are related to forms of violations, arrangements and legal protection efforts for the rights of songwriters in Indonesia. This research uses a normative juridical approach. Meanwhile, the conclusion of this study is that an activity does not include copyright infringement as long as the acts
APA, Harvard, Vancouver, ISO, and other styles
11

Masterov, S. V., V. B. Glebov, А. А. Krasnoborodko, and А. B. Bateev. "CONCEPTUAL APPROACH TO ANALYSIS OF THE RISK OF NUCLEAR MATERIALS USE FOR NON-ENERGY PURPOSES." Strategic decisions and risk management, no. 5 (October 26, 2014): 92–98. http://dx.doi.org/10.17747/2078-8886-2012-5-92-98.

Full text
Abstract:
Large-scale development of nuclear power increases the risk of non-peaceful use of nuclear materials. Therefore, development and justification of the methods for quantification of nuclear materials protection against unauthorized activity are needed. Also, the justification for the ways to improve internal protection of nuclear materials is required. The concept of the risk of nuclear materials unauthorized use is proposed for quantification of nuclear materials protection. The formulas for calculating the probability of implementation of the illegal actions chain and for the damage caused by
APA, Harvard, Vancouver, ISO, and other styles
12

Романовский, М. В., and А. И. Солдатов. "ACOUSTIC SIGNALS PROCESSING IN UNAUTHORIZED OPERATION ON THE MAIN PIPELINE." Proceedings in Cybernetics 23, no. 1 (2024): 60–67. http://dx.doi.org/10.35266/1999-7604-2024-1-8.

Full text
Abstract:
The article demonstrates an approach for acoustic signal processing under conditions of unauthorized operation on the main pipeline. A case study included tests that simulated illegal pipeline tie-ins using metal pipe drilling. In the course of the study, acoustic signals were recorded and processed using the Fourier transform method. The fi ndings revealed the apexes of common frequencies for each test. The study aims to advance the protection of long-distance high-priority facilities from illegal actions by detecting any threat based on the common apexes of frequencies recorded during acoust
APA, Harvard, Vancouver, ISO, and other styles
13

Lototskyi, Mykhailo. "«Other» persons as participants in secret investigators (detective) actions (criminal control)." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi 1, no. 15(27) (2023): 257–63. http://dx.doi.org/10.33098/2078-6670.2023.15.27.1.257-263.

Full text
Abstract:
Purpose. The purpose of the work is to study the current legislation that ensures the legality of secret investigative (search) actions. The author of this work substantiates the illegality of using the materials of secret investigative (search) actions to prove the guilt of a person if an unauthorized person was involved in conducting such investigative actions. Method. The methodology includes a comprehensive analysis and generalization of the available scientific and theoretical material and the formulation of relevant conclusions. During the research, the following methods of scientific kn
APA, Harvard, Vancouver, ISO, and other styles
14

Lototskyi, M., and L. Dzundza. "«Other» persons as participants in secret investigators (detective) actions (criminal control)." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi, no. 16(28) (December 13, 2023): 126–32. http://dx.doi.org/10.33098/2078-6670.2023.16.28.126-132.

Full text
Abstract:
Goal. The purpose of the work is to study the current legislation that ensures the legality of secret investigative (search) actions. The author of this work substantiates the illegality of using the materials of secret investigative (search) actions to prove the guilt of a person if an unauthorized person was involved in conducting such investigative actions. Method. The methodology includes a comprehensive analysis and generalization of the available scientific and theoretical material and the formulation of relevant conclusions. During the research, the following methods of scientific knowl
APA, Harvard, Vancouver, ISO, and other styles
15

Beitz, Charles R. "Covert Intervention as a Moral Problem." Ethics & International Affairs 3 (March 1989): 45–60. http://dx.doi.org/10.1111/j.1747-7093.1989.tb00211.x.

Full text
Abstract:
Today's international community may well view covert action and democracy as mutually exclusive policies. This article examines the practice of covert action in American foreign policy in light of events of the mid-1970s and 1980s, focusing on the scandalous misuse of executive authority and lack of accountability associated with covert means. Often manipulative and sometimes anonymous, covert operations raise critical morality concerns in a democratic society. Whether “any form of accountability is likely to be sufficient to bring the unauthorized use of executive power under control” is the
APA, Harvard, Vancouver, ISO, and other styles
16

Aitkozha, Z., and D. Nazyrova. "ECONOMIC CONSEQUENCES OF UNAUTHORIZED LAND CAPTURE AND ILLEGAL CONSTRUCTION." Education. Quality assurance, no. 1 (March 15, 2023): 59–64. http://dx.doi.org/10.58319/26170493_2023_1_59.

Full text
Abstract:
The purpose of this article is a comprehensive study of the illegal activities of individuals and legal entities in the squatting of land and the impact of these actions in general on the economic security of the country. The changes taking place in Kazakhstan in political, socio-economic, legal and other relations have led not only to positive results, but also to negative consequences, expressed, in particular, in an increase in land squatting. Recently, the issues of unauthorized seizure of land plots, the erection of unauthorized buildings, which violate not only the real rights of citizen
APA, Harvard, Vancouver, ISO, and other styles
17

Gurevich, Vladimir. "Susceptibility of modern relay protection: Will protection from cyber attacks help?" Serbian Journal of Electrical Engineering 11, no. 2 (2014): 233–41. http://dx.doi.org/10.2298/sjee131026019g.

Full text
Abstract:
Modern trends in relay protection (RP) based on the substitution of electromechanical protection relays (EMPR) by digital protective relays (DPR) have resulted in the emergence of an absolutely new problem, which was not known before. This problem is the possibility of an intentional remote destructive impact (IRDI) on relay protection in order to put it out of action or make it perform functions that have nothing to do with the current operational mode of protected electric equipment. Traditional and well-known methods ensuring information safety cannot fully prevent unauthorized actions of R
APA, Harvard, Vancouver, ISO, and other styles
18

Kurman, O. V. "PROBLEM ISSUES OF THE SITUATION OF UNAUTHORIZED ACTIONS WITH INFORMATION PROCESSED IN ELECTRONIC VIEW." Juridical scientific and electronic journal 5 (2019): 310–12. http://dx.doi.org/10.32782/2524-0374/2019-5/74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yahel, Havatzelet. "The Conflict Over Land Ownership and Unauthorized Construction in the Negev." Contemporary Review of the Middle East 6, no. 3-4 (2019): 352–69. http://dx.doi.org/10.1177/2347798919872836.

Full text
Abstract:
Since the early days of Israeli independence, there has been a continuous dispute over land rights and settlements in the Negev region, between the Bedouins and the State of Israel. Its most notable manifestation is unauthorized construction dispersed over vast tracts of land, with no consideration for existing zoning plans and in locations undesignated or unfit for human habitation. As a result, the Bedouins, one of Israel’s most impoverished population groups, experience significant difficulties in benefitting from public services available to other citizens. The situation also impedes the d
APA, Harvard, Vancouver, ISO, and other styles
20

Mel'nikova, Ekaterina, and Andrey Rodionov. "Issues of qualification of unauthorized access to critical information infrastructure facilities." Legal Science and Practice: Journal of Nizhny Novgorod Academy of the Ministry of Internal Affairs of Russia 2024, no. 3 (2024): 208–15. http://dx.doi.org/10.36511/2078-5356-2024-3-208-215.

Full text
Abstract:
The article provides a criminal legal analysis of the crime provided for in part. 2.4 tbsp. 2741 of the Criminal Code of the Russian Federation — unlawful access to objects of critical information infrastructure of the Russian Federation. The authors conducted a comparative study of the objects regulated by the federal law no. 187-FZ of July 26, 2017 “On the security of critical information infrastructure of the Russian Federation” and part. 2.4 tbsp. 2741 of the Criminal Code of the Russian Federation, a legal assessment is given to criminal actions expressed in unlawful access using someone
APA, Harvard, Vancouver, ISO, and other styles
21

Drea, John, and James T. Kenny. "An examination of ethical standards and behaviors in transportation brokerage." Journal of Transportation Management 25, no. 1 (2014): 37–54. http://dx.doi.org/10.22237/jotm/1396310640.

Full text
Abstract:
The manuscript examines individual ethical decision making for common scenarios faced by transportation brokers, including unauthorized double brokering, booking and bouncing, and a failure to disclose all terms to a shipper. The results indicate significant discrepancies between what actions a broker would engage, what brokers perceive that others in the same industry would do, and what industry leaders perceive to be ethical.
APA, Harvard, Vancouver, ISO, and other styles
22

Гордейчук, В. В. "Протиправні дії щодо торговельних марок як об'єктивна сторона порушення виключних прав". Форум права, № 2 (30 березня 2018): 20–26. https://doi.org/10.5281/zenodo.1244513.

Full text
Abstract:
Розглядаються проблемні питання теоретичного визначення протиправних дій неуповноважених осіб щодо охоронюваних торговельних марок як об’єктивної сторони порушення виключних прав правоволодільців, яке є підставою виникнення охоронних правовідношень інтелектуальної власності відповідно до положень законодавства України. Проаналізовані такі дії щодо охоронюваних торговельних марок як "нанесення", "застосування", "імпорт", "пропозиція до продажу", "продаж" та інші дії, які у разі їх вчинення без дозволу правоволодільця можуть вважатися поруш
APA, Harvard, Vancouver, ISO, and other styles
23

Felicitas Citra Permatahati Nainggolan and Simona Bustani. "- PENGGUNAAN LAGU “AKU MAU” PADA PRODUK MAINAN BONEKA “PUTRI ANISA HIJAB PERFUMED DOLL”." Reformasi Hukum Trisakti 6, no. 3 (2024): 928–38. http://dx.doi.org/10.25105/refor.v6i3.20218.

Full text
Abstract:
Copyright violations have occurred frequently over the years, with one prevalent issue being the unauthorized duplication of copyrighted works. A notable instance of this is the unauthorized use of the song "Aku Mau" in the "Putri Anisa Hijab Perfumed Doll" toy. This case examines the protection of the song "Aku Mau"'s creator in relation to the doll product and the considerations of the Commercial Court judges based on Law No. 28 of 2014 on Copyright. The research methodology used is normative legal research with a descriptive approach, drawing on secondary data to support primary data. Data
APA, Harvard, Vancouver, ISO, and other styles
24

Rakhmatullaev, M. A., and Sh B. Normatov. "PROTECTION OF SCIENTIFIC AND EDUCATIONAL RESOURCES IN INFORMATION AND LIBRARY SYSTEMS." Scholarly Research and Information 2, no. 2 (2019): 121–28. http://dx.doi.org/10.24108/2658-3143-2019-2-2-121-128.

Full text
Abstract:
Introduction. The authors of the article highlight the results of research on the development of methods and tools for ensuring the information security of scientific and educational resources in information library systems and corporate information networks. The analysis of the state of the problem and the existing approaches on this topic are given too.Materials and Methods. The approach justifies the need to protect scientific resources from unauthorized access and the use of fuzzy logic to solve the problem. As a model and solution method, a fuzzy model correspondences is proposed, which m
APA, Harvard, Vancouver, ISO, and other styles
25

Pałęga, Michał, and Marcin Knapiński. "Assessment of Employees Level of Awareness in the Aspect of Information Security." System Safety: Human - Technical Facility - Environment 1, no. 1 (2019): 132–40. http://dx.doi.org/10.2478/czoto-2019-0017.

Full text
Abstract:
AbstractThe strategic importance of information for the functioning of each economic entity forces entrepreneurs to properly protect them against loss, unauthorized disclosure or unauthorized modification. Hence, organizations build complex security systems taking into account state-of-the-art technical solutions, while belittling often the most important element, which is the human factor. It should be emphasized that it is the intentional or accidental actions of the human that can lead to the loss of information security. In addition, it is also the potential of human capabilities and skill
APA, Harvard, Vancouver, ISO, and other styles
26

Danial, Anas, Mohd Fadzil Abdul Kadir, Ahmad Faisal Amri Abidin, Mohamad Afendee Mohamed, Nazirah Abdul Hamid, and Siti Dhalila Mohd Satar. "PASSWORD MANAGER SECURITY USING HONEY ENCRYPTION ALGORITHM AND HONEYPOT TECHNIQUE." Malaysian Journal of Computing and Applied Mathematics 6, no. 2 (2023): 1–10. http://dx.doi.org/10.37231/myjcam.2023.6.2.87.

Full text
Abstract:
Password managers are crucial tools for securely storing and managing multiple passwords. However, they can become targets for attackers attempting to gain unauthorized access to sensitive user data. In this paper, we propose an approach to password manager security by combining the Honey Encryption algorithm with the Honeypot technique. By implementing Honey Encryption on the authorization process of the password manager, we can effectively divert attackers to a honeypot, which contains a list of fake/honeyword passwords. The honeypot is designed to be high interaction, allowing us to gather
APA, Harvard, Vancouver, ISO, and other styles
27

Pohoretskyi, M. M. "GUARANTEES OF THE RIGHTS AND FREEDOMS OF THE PERSON DURING THE CONDUCT OF SECRET INVESTIGATORS (RESEARCH) ACTIONS AND OPERATIVE AND INVESTIGATIVE MEASURES IN THE PRE-JUDICIAL INVESTIGATION UNDER THE CONDITIONS OF THE STATE OF MARTIAL, STATE OF EMERGENCY OR IN THE AREA OF ANTI-TERRORIST OPERATION (ATO)." Herald of criminal justice, no. 1-2 (2021): 99–117. http://dx.doi.org/10.17721/2413-5372.2021.1-2/99-117.

Full text
Abstract:
The article substantiates that the current Criminal Procedure Code of Ukraine, having implemented the institution of covert investigative (search) actions and preserving the possibility of conducting operative and investigative measures in the interests of criminal justice, has significantly expanded the means of obtaining evidence in criminal proceedings. On the basis of the analysis of the materials of the practice of domestic law enforcement agencies and courts, the practice of the European Court of Human Rights, the norms of the current criminal procedural legislation, the legislation on o
APA, Harvard, Vancouver, ISO, and other styles
28

Tyshyk, Ivan. "IMPLEMENTATION OF DATABASE SECURITY BASED ON ORACLE AUDIT VAULT AND DATABASE FIREWALL." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 56–70. https://doi.org/10.28925/2663-4023.2024.26.666.

Full text
Abstract:
The paper provides recommendations for protecting databases from unauthorized intrusions, organizes the collection of statistics on the relevance and potential number of database attacks currently occurring worldwide, and offers a general overview of database attacks and countermeasures. To monitor database activity for unauthorized actions, the solution used is Oracle Audit Vault and Database Firewall, which combines built-in audit data with network SQL traffic capture. This solution prevents unauthorized database connections. It is evident that some databases may be compromised by cybercrimi
APA, Harvard, Vancouver, ISO, and other styles
29

Rakhmatullaev, Marat, and Sherbek Normatov. "Protection of Scientific and Educational Resources in Information and Library Systems." Scholarly Research and Information 2, no. 2 (2019): 121–28. http://dx.doi.org/10.24108//2658-3143-2019-2-2-121-128.

Full text
Abstract:
Introduction. The authors of the article highlight the results of research on the development of methods and
 tools for ensuring the information security of scientific and educational resources in information library systems and corporate information networks. The analysis of the state of the problem and the existing approaches
 on this topic are given too.
 Materials and Methods. The approach justifies the need to protect scientific resources from unauthorized access and the use of fuzzy logic to solve the problem. As a model and solution method, a fuzzy model correspondences i
APA, Harvard, Vancouver, ISO, and other styles
30

Oliveira, José, Pedro Pinto, and Henrique Santos. "Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices." Journal of Sensor and Actuator Networks 10, no. 1 (2021): 19. http://dx.doi.org/10.3390/jsan10010019.

Full text
Abstract:
Cyberattacks exploiting Universal Serial Bus (USB) interfaces may have a high impact on individual and corporate systems. The BadUSB is an attack where a USB device’s firmware is spoofed and, once mounted, allows attackers to execute a set of malicious actions in a target system. The countermeasures against this type of attack can be grouped into two strategies: phyiscal blocking of USB ports and software blocking. This paper proposes a distributed architecture that uses software blocking to enhance system protection against BadUSB attacks. This architecture is composed of multiple agents and
APA, Harvard, Vancouver, ISO, and other styles
31

Patil, Vishruta. "Multi-Factor Authentication Using Cryptography and Steganography." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 3207–9. http://dx.doi.org/10.22214/ijraset.2023.50818.

Full text
Abstract:
Abstract: Authentication, security, and confidentiality are some of the most important topics of cyber security. It is a critical component of any security system and is essential in ensuring that only authorized personnel can access sensitive information or perform specific actions. There is a large amount of data that is confidential and there are lots of threats to the data if it is not secured properly. It involves the protection of networks or data from unauthorized manipulation and destruction
APA, Harvard, Vancouver, ISO, and other styles
32

Yushkevych, O. G., and M. Yu Burdin. "Parental kidnapping as a form of abuse of parental rights." Bulletin of Kharkiv National University of Internal Affairs 105, no. 2 (Part 1) (2024): 74–83. http://dx.doi.org/10.32631/v.2024.2.07.

Full text
Abstract:
The article explores the legal phenomenon of “parental kidnapping”. It is noted that Ukrainian legislation lacks a definition of this legal phenomenon. The author suggests understanding parental kidnapping as the action of one of the parents regarding the unauthorized change of the child’s place of residence without the consent of the other parent with whom, according to the law or a court decision, the child resides. This includes abduction, leading to a violation of the child’s rights and causing material or non-material harm. Statistical data from the Secretariat of the Commissioner for Hum
APA, Harvard, Vancouver, ISO, and other styles
33

Alexander, Bilenko, Kyrychenko Alexander, and Kaidalov Ruslan. "RESEARCH OF INFLUENCE BALLISTIC CHARACTERISTICS OF WEAPONS ON THE SHOOTING EFFICIENCY TAKING INTO ACCOUNT THE SAFETY OF THE SMALL ARM USE." TECHNOLOGY AUDIT AND PRODUCTION RESERVES 3, no. 1(53) (2020): 4–10. https://doi.org/10.15587/2706-5448.2020.205125.

Full text
Abstract:
<em>The object of research is the process of performing a fire mission by employees of the security forces in the presence of unauthorized persons in the direction of fire. The paper investigates the influence of the ballistic characteristics of weapons on the effectiveness of performing fire missions by security forces, taking into account the security of the use of weapons. The purpose of the use of weapons by security forces is usually the cessation of the offender or its detention. In this case, the deaths or injuries of a hostage or an unauthorized person as a result of the use of weapons
APA, Harvard, Vancouver, ISO, and other styles
34

Kaur, Gurvinder, Dr S. N. Panda, and Dr Dalvinder Singh Dhaliwal. "Model-Based Tool-Assistance for Packet-Filter Design and its Future." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (2014): 4053–57. http://dx.doi.org/10.24297/ijct.v13i1.2929.

Full text
Abstract:
Firewall is a device that secure the private network from unauthorized access. Model based  tool assistance  facilitate the design task and has contribute to the correctness of the filters. But the model based tool assistance approach is design time only does not manage actions at run time. So we shall propose model on run time auditing architecture to detect the attack while packet filtering in firewall technology. It is usually based on the log-files of the packet-filters.
APA, Harvard, Vancouver, ISO, and other styles
35

Dampuru VNS Pavan Kumar, Kamal Kant Sharma, P. Rajender, and InumulaSatyanarayana. "Strengthening safety and regulatory framework in stone quarries (Minor Mineral) for Sustainable Infrastructure in India." International Journal of Science and Research Archive 15, no. 3 (2025): 1200–1204. https://doi.org/10.30574/ijsra.2025.15.3.1852.

Full text
Abstract:
Small Scale Minor mineral quarries, particularly those extracting stone, are indispensable for the development of roads, buildings, and various public infrastructures. However, these sites are increasingly characterized by unsafe mining practices, unauthorized operations, illegal use of explosives, and frequent accidents. This paper proposes a stringent safety and regulatory policy framework with coordinated actions from state and central governments to mitigate risks, prevent illegal mining, and hold leaseholders accountable. A robust policy overhaul is imperative to align minor mineral extra
APA, Harvard, Vancouver, ISO, and other styles
36

CHO, Geon. "The actual condition of casualties and the meaning of the records of rewards in the Japanese military during the March 1st Movement." Association for Korean Modern and Contemporary History 111 (December 31, 2024): 181–207. https://doi.org/10.29004/jkmch.2024.12.111.181.

Full text
Abstract:
This paper examines the reality of Japanese military casualties during the suppression of the March 1st Movement and the record of “rewards” for them. From our perspective, the imperialist Japanese military who suppressed the March 1st Movement were recognized as “meritorious people who crushed the resistance of the colonies”. The Japanese government sought to justify their actions by “rewarding” the casualties that occurred during the suppression of the March 1st Movement. A review of the Japanese military’s practice of rewarding casualties of the March 1 Movement reveals how the Japanese gov
APA, Harvard, Vancouver, ISO, and other styles
37

Apanasenko, K. I. "COURT’S DEFENSE OF PERSON’S RIGHTS IN A SPHERE OF CITY PLANNING BY PUBLIC ASSOCIATIONS: DEFINITION OF A PROBLEM." Economics and Law, no. 4 (December 6, 2021): 56–67. http://dx.doi.org/10.15407/econlaw.2021.04.056.

Full text
Abstract:
Unauthorized buildings are enough common problem of city planning in Ukraine. There is very popular practice to receive permissive documents after the beginning of building works and before commissioning. Therefore, effectiveness of activity of the Ukrainian State Architectural Building Service is not high. As a result, last decade some citizens and public organizations take part in struggle with city planning violations. Therefore, an investigation of a normative base of an appropriate activity of public organizations and court’s practice in this sphere is an actual task in purpose of an adop
APA, Harvard, Vancouver, ISO, and other styles
38

Ларкин, E. Larkin, Яшин, and S. Yashin. "Development of Synergetic Electromagnetic Equipment with Minimization of Unauthorized Pathogenic Radiation." Journal of New Medical Technologies. eJournal 8, no. 1 (2014): 1–9. http://dx.doi.org/10.12737/5944.

Full text
Abstract:
In this paper the authors present a synergetic approach developed and circuit level proven to the creation of electromagnetic equipment of the wide range of application with the minimization of unauthorized side of pathogenic radiation. In recent years, the issue of minimizing exposure to medical personnel pathogenic radiation when developing procedures and equipment electromagnetic physiotherapy is given special attention. In this paper the basic principles in development of synergetic biotechnical systems of the electromagnetic therapy have been formulated. The authors indicated that the mod
APA, Harvard, Vancouver, ISO, and other styles
39

Taharah, Amanah, Muhammad Arif Prasetyo, Amanda Okta Pamellia, and Akbar Reza Fauza. "Legal Review of the Use of Song Without Consent in Accordance with Law No. 28 of 2014." International Journal of Business, Law, and Education 6, no. 1 (2025): 739–45. https://doi.org/10.56442/ijble.v6i1.1097.

Full text
Abstract:
To produce aesthetically pleasing compositions, musicians employ a variety of instrumental sounds. Copyright refers to the exclusive right of a creator to maintain ownership of their work and to derive economic benefit from it. Under copyright law, the unauthorized use of musical works is strictly prohibited. This study aims to: (1) examine the enforcement of Law No. 28 of 2014 by the Indonesian government in protecting the rights of songwriters; and (2) analyze the implementation of licensing agreements by both producers and users. Employing a normative legal approach, this study emphasizes t
APA, Harvard, Vancouver, ISO, and other styles
40

Russetskiy, A. A. "PLACE OF FORENSIC SCIENCE IN THE CYBERTHREATS PREVENTION SYSTEM IN FIELD OF A UKRAINIAN INFORMATION SECURITY." Theory and Practice of Forensic Science and Criminalistics 18 (December 26, 2018): 263–71. http://dx.doi.org/10.32353/khrife.2018.29.

Full text
Abstract:
Theoretical developments and practical experience of countering cyberthreats in the field of information security of Ukraine are analyzed. It is determined that the crime prevention in the field of information security is structurally composed of several stages. They include: search for primary information on criminal activity in the information field ; prevention of cybercrime; detection of illegal actions in the field of information security while operative investigative activities and pre-trial investigation of criminal proceedings. The most common illegal actions in the field of informatio
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Yuhan. "Action Detection in Badminton Courts Using AVA Dataset and MMAction2 Architecture with Slow Fast Model." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 783–89. http://dx.doi.org/10.54097/qrh46274.

Full text
Abstract:
As a matter of fact, action detection technologies have emerged as powerful tools for a multitude of applications, from surveillance and security to healthcare and sports analytics. Badminton courts, especially those that are highly frequented, present unique challenges owing to the concentration of people engaged in diverse activities. Incidents such as unintended collisions between players, or unauthorized walking across the courts, are not uncommon and necessitate efficient monitoring for risk mitigation. This study addresses these issues by employing the MMAction2 architecture and the Slow
APA, Harvard, Vancouver, ISO, and other styles
42

Abirami, V., A. Mohana, V. Sarumathi, and Osvin Nancy V. Auxilia. "Enhancing Audit using Trace Logs Encrypted through User Secret Key Encryption Protocol in Multi Cloud Storage Management Application." Recent Trends in Cloud Computing and Web Engineering 2, no. 1 (2020): 1–4. https://doi.org/10.5281/zenodo.3719248.

Full text
Abstract:
<em>Cloud computing is a technology for sharing the resources for on demand request and for processing the data. V Various cloud storage providers (CSP) offers free and premium cloud storage spaces. Multi cloud storage management application provides a single unified interface to access all the connected storage spaces to obtain quick accessibility removing the effort and time involved in switching between CSPs to access data hosted in different CSPs. Authenticated accessibility ensures a secured environment but provision to audit the actions performed to verify the history of actions is requi
APA, Harvard, Vancouver, ISO, and other styles
43

Ben-Shaul, Daphna. "The Performative Return: Israeli and Palestinian Site-Specific Re-enactments." New Theatre Quarterly 32, no. 1 (2016): 31–48. http://dx.doi.org/10.1017/s0266464x15000846.

Full text
Abstract:
In this article Daphna Ben-Shaul explores politically engaged Israeli and Palestinian site-specific re-enactments that pursue what she terms a ‘performative return’. This includes performed aesthetic and political re-enactments of real-life events, which bring about a re-conceptualization of reality. Three contemporary cases of return are discussed with regard to the historical precedent of Evreinov’s 1920 The Storming of the Winter Palace. The first is an activist, unauthorized return to the village of Iqrit in northern Israel by a group of young Palestinians, whose families were required to
APA, Harvard, Vancouver, ISO, and other styles
44

Ptaschenko, D. "UNAUTHORIZED CONSTRUCTION: SOME PROBLEMS OF CRIMINAL LIABILITY IN TERMS OF REGULATORY LEGISLATION OF UKRAINE AND REGULATIONS OF CRIMINAL OFFENSES." Bulletin of Taras Shevchenko National University of Kyiv. Legal Studies, no. 119 (2021): 74–78. http://dx.doi.org/10.17721/1728-2195/2021/4.119-4.

Full text
Abstract:
The article examines some problems of criminal liability for unauthorized construction in terms of regulatory legislation of Ukraine, actual situations and regulations of criminal offenses. The issue of comparing the normative composition of criminal offenses with the regulatory and protective (administrative) law of Ukraine (primarily legislation in the field of urban planning) is highlighted. It is concluded that the filling of the specific legal content of unauthorized (spontaneous) construction should not be limited to its definition only for construction work without obtaining the right t
APA, Harvard, Vancouver, ISO, and other styles
45

Courpasson, David. "The Politics of Everyday." Organization Studies 38, no. 6 (2017): 843–59. http://dx.doi.org/10.1177/0170840617709310.

Full text
Abstract:
Stealing, doing something unauthorized, occupying places, feeling silly and on the edge… how can we account for these practices that make the everyday? Why would the notion of everyday be interesting for understanding people’s experiences at work? How can we make sense of the myriad of disconnected actions, gestures and encounters that make the everyday? This essay takes its inspiration from Henri Lefebvre and Michel de Certeau’s specific investigations of everyday life to draw a picture of current workplaces; it aims to capture some particulars of symbolic and material life at work, as well a
APA, Harvard, Vancouver, ISO, and other styles
46

Pandito Malim Hasayangan Tanjung and Diana Tantri Cahyaningsih. "Analisis Bentuk Pelanggaran dan Upaya Penegakan Hak Orisinalitas Video Content Creator di Era Digital." Amandemen: Jurnal Ilmu pertahanan, Politik dan Hukum Indonesia 1, no. 2 (2024): 234–43. http://dx.doi.org/10.62383/amandemen.v1i2.161.

Full text
Abstract:
This article is to review and analyze the forms of violation of originality rights in the context of video works and the efforts made by content creators if their originality rights are violated. this research identifies forms of Copyright infringement, especially related to reuploads without attribution or watermarks, as well as actions that can be taken by content creators in response to such violations, The research method used is a normative legal approach with a focus on analyzing primary and secondary legal materials through literature study. The results show that violations of originali
APA, Harvard, Vancouver, ISO, and other styles
47

Reddy, Reddyvari Venkateswara, V. Gayathri, P. Sai Charan Reddy, and S. Raj Kumar. "Android Pattern Bypass using Microcontroller." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 962–68. http://dx.doi.org/10.22214/ijraset.2024.59940.

Full text
Abstract:
Abstract: The goal is to exploit a potential security vulnerability in Android devices by using a microcontroller which goes by the name ATTiny85 connected via USB. The objective is to bypass the lock patterns or security measures typically in place on Android devices, which are designed to prevent unauthorized access. This could involve manipulating the USB connection to take control of the device's data or functions, potentially compromising the device's security. Such actions are unethical and illegal without proper authorization. It’s really important to acknowledge the amount of loss thes
APA, Harvard, Vancouver, ISO, and other styles
48

Asaad, Renas Rajab. "Implementation of a Virus with Treatment and Protection Methods." ICONTECH INTERNATIONAL JOURNAL 4, no. 2 (2020): 28–34. http://dx.doi.org/10.46291/icontechvol4iss2pp28-34.

Full text
Abstract:
Currently, viruses are the most dangerous things that happens to computers, whether by transferring data or from the Internet cloud. This research paper shows how to implement a virus that has an ability to move and fortify itself from deletion or destroying. A strong virus must have automatic multiplication, automatic transmission between devices, copying itself in important locations on the computer and performing unauthorized actions and instructions in the computer. So in this research paper it will also shows how to get rid of such viruses and ways to prevent them or providing a good secu
APA, Harvard, Vancouver, ISO, and other styles
49

Ilyin, Ilya. "Dynamics and criminogenic potential of protest actions." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2023, no. 1 (2023): 75–86. http://dx.doi.org/10.35750/2071-8284-2023-1-75-86.

Full text
Abstract:
The relevance of research. Modern reality is characterized by the growth of protest moods, which are considered as an integral part of public opinion. In this regard, the study of the main indicators of the state and factors of social protest activity is of particular importance.&#x0D; Public events (more than 637 thousand of them were held from 2010 to 2021) do not in themselves have an increased criminogenic and delictogenic potential. A different situation is demonstrated by uncoordinated public events that were initially outside the legal framework (their number in 2021 increased by more t
APA, Harvard, Vancouver, ISO, and other styles
50

Chernyshova, Evgeniia L., Dmitry V. Ivanov, and Ekaterina I. Roschupkina. "Socio-psychological research of value orientations of students." Vestnik of Samara State Technical University Psychological and Pedagogical Sciences 19, no. 1 (2022): 125–40. http://dx.doi.org/10.17673/vsgtu-pps.2022.1.9.

Full text
Abstract:
The analysis of philosophical, sociological, pedagogical and psychological literature let us make a conclusion that the fundamental basis of the legal consciousness of each person is the degree of his spiritual perfection and maturity. Value and spiritual and moral prerequisites, in turn, are the basis of law, making the behavior of an individual in society expedient. The authors of the paper focus their attention on the frequent cases of delinquent behavior among young students. There is a new form of delinquent behavior, that is deviant socio-political activity. The authors of the paper see
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!