Littérature scientifique sur le sujet « Defence and security contracts »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Defence and security contracts ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Defence and security contracts"

1

Heuninckx, Baudouin. « Defence procurement : The most effective way to grant illegal State Aid and get away with it... or is it ? » Common Market Law Review 46, Issue 1 (1 février 2009) : 191–211. http://dx.doi.org/10.54648/cola2009007.

Texte intégral
Résumé :
This article examines the ways in which the EC State aid rules apply to defence procurement in the EU and identifies the issues raised by the interplay between these two areas of the law. The award of a public contract can be found to be State aid if it is not in the form of a “normal commercial transaction”. However, even though defence procurement generally has to comply with EC public procurement law, it can be subject to a number of exemptions for reasons of public security. This raises the issue of cross–subsidization from the military to the civil sector, which could be found to constitute State aid. Moreover, defence procurement contracts are often awarded without competition and include specific pricing mechanisms, and complex military equipment usually has no civil equivalent. These particularities make it difficult to compare the award of defence contracts with “normal commercial transactions”. EC Member States usually do not consider possible interference between defence procurement and State aid rules. This creates the risk that defence contracts may have to be annulled if in breach of such rules, could undermine the regulation of State aid because of cross–subsidisation, and could also reduce the effectiveness of the EC policy to progressively open its defence market and render it more transparent. This article therefore suggests how best EC Member States could implement a policy for the award of defence contracts without breaching the EC State aid rules.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Zervos, Vasilis. « European Policies and the Space Industry Value Chain (Note 1) ». Journal of Economics and Public Finance 4, no 1 (28 février 2018) : 101. http://dx.doi.org/10.22158/jepf.v4n1p101.

Texte intégral
Résumé :
<p><em>The economics of contracting have received rather limited attention insofar as the implications for efficiency from the selection of types of contracts employed in the aerospace and defence sector are involved. The paper analyzes the challenges confronting the cost-plus/cost-reimbursement type of contracts of European Commission and intergovernmental organizations like the European Space Agency (ESA), who are involved in security and defence projects with significant multiplier effects within defence and security networks. The analysis indicates how institutional limitations result in contractual choice inefficiencies and anti-competitive practices that may affect the whole of the aerospace industrial base, including subcontractors. The paper concludes with policy implications and further research recommendation. </em></p>
Styles APA, Harvard, Vancouver, ISO, etc.
3

Chernysheva, Galina N., Nikolay V. Rogov et Maria Vyacheslavovna Tkacheva. « Methods for ensuring the reliable fulfilment of state defence orders ». Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser. : Ekonomika i upravlenie = Proceedings of Voronezh State University. Series : Economics and Management, no 3 (30 septembre 2021) : 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.

Texte intégral
Résumé :
Introduction. The national security of the Russian Federation, both within the country and externally, is ensured by the development of its military-technical potential. The military-technical potential is viewed as an ability of the state to maintain the armed forces and to provide the army with modern and competitive military equipment. This is performed through state defence orders (SDOs). Taking into account both internal and external factors, it is impossible to fulfil SDOs without a reliable system of contract liabilities. To ensure proper fulfilment of SDOs, it is necessary to consider the following measures: 1) to retain all the liabilities of contracts for the duration of the contracts, i.e. the liabilities of the customer with regard to the financing of SDOs, and the liabilities of the contractor with regard to the production of the military equipment of high quality; 2) to prevent unauthorised use of the financing provided for the SDOs. Purpose. The purpose of our study was to analyse the factors preventing the fulfilment of SDOs and suggest measures for improving the system for managing SDOs and the economic security of defence industry enterprises. Methodology. In our study we used general scientific methods and specific economic analysis methods: systems analysis, time series analysis, modelling, and expert evaluation methods. The analysis was based on Russian and international sources, as well as the regulatory and legal framework concerning SDOs. Results. In our study, we listed and classified the factors preventing the fulfilment of SDOs, and suggested a SDO model in the form of a system of financial relations between entities. To ensure the fulfilment of SDOs, we suggest a series of measures to control the compliance of financial flows and the economic security of defence industry enterprises. Conclusions. The article presents a specific study of financial flows between the key participants of SDOs. The determined problems and suggested measures will help to reduce the risks and ensure the proper fulfilment of SDOs.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Hasnaoui, Inas, Maria Zrikem et Rajaa Elassali. « Block-AD : Blockchain Attack-Defense CTF Competition for Next-Web3 Security ». International Journal of Computer Science, Engineering and Information Technology 13, no 5 (27 octobre 2023) : 30–37. http://dx.doi.org/10.5121/ijcseit.2023.13503.

Texte intégral
Résumé :
The rapid growth of blockchain technology hasintroduced newsecurity challengesin decentralized systems.In this paper, we present Block-AD, a Blockchain Attack-Defense Capture The Flag (CTF) competition aimed at improving smart contract security skills and addressing evolving security threats in Next-Web3 environments. Unlike traditional CTF competitions, participants engage in attack and defense actions to exploit vulnerabilities and protect their smart contract services. This game-based approach concludes with rewards distributed from the competition’s vault and the allocation of non-fungible tokens (NFTs) as proof of participation. This approach aims to provide a fun and engaging way to improve the security skills of all participants, as well as to identify and fix vulnerabilities in smart contracts. By combining blockchain technology, CTF methodology, and Next-Web3 security, Block-AD provides a unique and innovative approach for enhancing cybersecurity skills in decentralized systems and smart contracts.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Sarkawi, Azizi Ahmad, Mohamad Ghozali Hassan et Mustakim Melan. « THE SIGNIFICANCE OF LEADERSHIP SUPPORT TOWARDS EFFECTIVE CONTRACT MANAGEMENT ». Journal of Technology and Operations Management 18, no 2 (30 décembre 2023) : 1–8. http://dx.doi.org/10.32890/jtom2023.18.2.1.

Texte intégral
Résumé :
This study examines the role of leadership support in contract management within the Ministry of Defence, focusing on the asset and equipment maintenance crucial for national security. It aims to assess the current level of leadership support among Supply & Secretariate Officers in the Royal Malaysian Navy and their understanding of its importance. By addressing this gap, this study intends to improve contract management practices for enhanced national security within the ministry. A quantitative survey was used to obtain data through stratified random sampling. The survey was initiated in April 2022 and lasted five months. The questionnaires were distributed to the Supply & Secretariate Officers who handle the asset and equipment maintenance contract of the Ministry of Defence. A total of 206 questionnaires were distributed through electronic means, such as email and WhatsApp. Out of 206 questionnaires, only 204 has been analysed as the other two were not complete. The results revealed that leadership commitment significantly improves contract-related activities. When top executives prioritize contract management, it creates a corporate environment in which rules are followed, responsibility is clear, and employees are more diligent. This commitment leads organizations to allocate resources, set clear contract guidelines, and invest in advanced contract technology, making contract management more efficient. In summary, leadership commitment fosters a culture of excellence in contract management, emphasizing the importance of contracts, compliance, and attention to detail, ultimately improving overall operational efficiency.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Novruzova, Oksana B., Ilya A. Klevtsov et Elizaveta R. Shikova. « Methods and Conditions of Conclusion of State Contracts ». Court administrator 1 (8 février 2024) : 12–15. http://dx.doi.org/10.18572/2072-3636-2024-1-12-15.

Texte intégral
Résumé :
The article reveals the concept of a state contract, discusses the features and specific features of a state contract, as well as the methods and conditions for its conclusion. In addition, the work comments on the latest changes in the field of government contracts, which are aimed at increasing the efficiency of procurement for defense and national security.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Derrick Lim Kin Yeap, Jason Jong Sheng Tat, Jason Ng Yong Xing, Joan Sia Yuk Ting, Mildred Lim Pei Chin et Muhammad Faisa. « Securing Industrial IoT : Blockchain-Integrated Solutions for Enhanced Privacy, Authentication, and Efficiency ». International Journal of Computer Technology and Science 1, no 3 (17 juillet 2024) : 01–19. http://dx.doi.org/10.62951/ijcts.v1i3.18.

Texte intégral
Résumé :
The Industrial Internet of Things (IIoT) enhances the connectivity and efficiency of living lifestyles. However, it also comes with significant security vulnerabilities. Traditional authentication methods are often inadequate, leading to IIoT devices opened to security threats. This paper proposes a comprehensive security framework integrating blockchain, cryptographic techniques, smart contracts, and deep learning-based Intrusion Detection Systems (IDS) to tackle the mentioned issue. Blockchain ensures data integrity and prevents tampering through a decentralized ledger. A decentralized device identity management system enhances user verification, while secure communication protocols using Hash-based Message Authentication Codes (HMAC) safeguard data integrity. Smart contracts automate transactions, providing transparent, secure record-keeping without a central authority. The deep learning-based IDS, utilizing Contractive Sparse Autoencoder (CSAE) and Attention-Based Bidirectional Long Short-Term Memory (ABiLSTM) networks, effectively detects cyber threats. Evaluation metrics, including precision, recall, F1-score, and False Acceptance Rate (FAR), demonstrate high accuracy and low false alarm rates across datasets. This framework addresses the need for secure, efficient, and scalable authentication in IIoT, combining blockchain's security features with advanced cryptographic and anomaly detection techniques, offering robust defence against cyber threats.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Mateaş, Florian. « GENERAL CHARACTERIZATION OF SECURITY SYSTEMS FOR OBJECTIVES, GOODS, VALUABLES AND PROTECTION OF INDIVIDUALS ». Agora International Journal of Juridical Sciences 9, no 3 (9 octobre 2015) : 21–28. http://dx.doi.org/10.15837/aijjs.v9i3.2113.

Texte intégral
Résumé :
The local police operate as a public institution with legal personality for the interest of citizens, which provides services for the security of goods, participates in the defence of public order and peace, of the life and integrity of individuals, and other rights and legitimate interests of the community.The organization and carrying out of the guarding of the goods and valuables of any kind owned, their transportation and other security services, and participation in the defence of public order and peace are done on the basis of contracts concluded between the local Police and mayors, public or private economic operators, institutions, associations of any kind, natural or legal persons as appropriate.The security provided by local police officers is carried out according to the security plan drawn up by local police commanders and beneficiaries, approved by the local committee and with the expert’s approval from the local police. In their work for performing the service at the objectives entrusted to them, the local police officers have a number of obligations including cooperation with the police bodies and the notification thereof when finding crimes committed which might damage public and private property, acts directed against individuals, fire occurrence, calamities.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ahmad Sarkawi, Azizi, Mohamad Ghozali Hassan et Mustakim Melan. « Navigating Contract Compliance in Maritime Procurement for National Security : A Study on the Ministry of Defense ». Compendium by PaperASIA 39, no 5(b) (22 octobre 2023) : 34–39. http://dx.doi.org/10.59953/cpa.v39i5(b).33.

Texte intégral
Résumé :
Public procurement involves government spending for the well-being of the people. This study was carried out to observe the management of contracts implemented by procurement officers at the Ministry of Defense (Royal Malaysian Navy) for expenses related to asset and equipment maintenance used to maintain national maritime security for the well-being of the people. This study also attempts to examine the level of understanding of the procurement officers on pre-planning of asset maintenance contract procurement planning and financial planning, as well as whether or not the mechanism used is sufficient to monitor the contract compliances and contractors' obligations to comply with the terms of the contracts. A survey was initiated in April 2022 and lasted for five months. The questionnaires were distributed to the procurement officers handling the asset and equipment maintenance contract of the Ministry of Defense. A total of 206 questionnaires were returned and analyzed. Results revealed that the procurement officers understood that pre-planning process needs to be implemented before a procurement contract is signed; additionally, they believed that pre-planning process is not a requirement and that the mechanism used is a tool to prevent unethical misconduct in contract management. However, some respondents believed the mechanism could not prevent corruption. Therefore, it is suggested that the procurement officers be given disclosure not only on how to manage the procurement contract but also to ensure that the contract is implemented efficiently through pre-planning procurement. In addition, more improvements to the existing mechanism need to be made to increase procurement officers' trust in the existing system.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kim, Yong Woon, et Trevor Brown. « Autonomy versus control in procurement and contracting : the use of cost-reimbursement contracts in three US federal departments ». International Review of Administrative Sciences 83, no 1_suppl (9 juillet 2016) : 41–58. http://dx.doi.org/10.1177/0020852315619477.

Texte intégral
Résumé :
This article examines the efficacy of central attempts to influence the use of specific types of contracts, namely, cost-reimbursement versus fixed-price contracts, by individual departments within a decentralized procurement system. We draw five years of data (Fiscal Years 2004–2008) from the Federal Procurement Data System to examine the contract type decisions of three US federal agencies: the Department of Health and Human Services, the Department of Defense, and the Department of Homeland Security. The results of our analysis suggest that while departments have discretion to purchase products that meet their mission requirements, there is relative uniformity in the reliance on cost-reimbursement versus fixed-price contracts. Points for practitioners The driving factor in the use of one contract type over the other is not the department in question, but rather what the department buys. Following central regulatory guidance, the three departments in our sample tend to use cost-reimbursement contracts for complex products and fixed-price contracts for simple products. The practical implications for central policymakers is that focusing guidance on what departments buy may be more effective in maintaining overall budget control rather than focusing on how the department buys products.
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Defence and security contracts"

1

Latta, Jason E. « Analysis of the distribution of vaccine using Department of Defense assets versus contracts with private-sector delivery companies ». Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLatta.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Management)--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Apte, Aruna. Second Reader: Ferrer, Geraldo. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Pandemic Influenza, Vaccine Distribution, Vaccine Distribution with DoD Assets, DoD Pandemic Influenza Response Plan. Includes bibliographical references (p. 63-64). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Froment-Maire, Anne. « L'organisation administrative française à l'épreuve de l'évolution des notions de sécurité et de défense ». Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0236.

Texte intégral
Résumé :
Repenser l’action administrative dans le nouveau continuum sécurité/défense est devenu un impératif dans la mesure où l’ordonnancement institutionnel administratif constitue le socle de l’action sécuritaire. Il fallut dresser un état des lieux de l’évolution des notions de sécurité et de défense, devenues les deux faces d’une même médaille, sur le fonctionnement de l’administration. La consistance de la sécurité ne cessant de s’accroître, les outils mis à la disposition de ces objectifs étatiques ont été adaptés pour réorganiser les acteurs au sein d’une rénovation du cadre sémantique de la sécurité. La redéfinition des rapports entre l’Etat et les collectivités territoriales a nécessité la réorganisation de leur carte territoriale et de leurs moyens en matière de sécurité et de défense. Cela a néanmoins complexifié les rapports entre les différents niveaux de l’administration, conduisant les acteurs institutionnels, avec le concours de l’institution militaire, à rechercher des solutions alternatives. Ceci s’est notamment traduit par le développement de partenariats contractuels entre personnes publiques et par le développement de la coopération transfrontalière et la prise en compte de l’influence européenne
Rethinking administrative action within the new security/defense continuum has become imperative since the institutional set-up constitutes the basis for security action. It was of paramount importance to assess the impact that the evolution of the notions of security and defense - now become the two faces of the same coin - bears on the functioning of the administration. This is all the more essential since the substance of security keeps expanding. The tools available to meet these objectives have been adapted to re-organize the partners’ roles with a view to overhauling the semantic framework of security within a territorial reorganization, allowing redefining the relationships between the State and the local authorities. Complexity has however impeded the relationships between the various administrations, involving institutional partners with those of defense. Solutions have been sought through the development of partnerships between public entities, opting for supranational options and particularly European trans-border cooperations
Styles APA, Harvard, Vancouver, ISO, etc.
3

Marie, Quentin. « Marchés de défense ou de sécurité ˸ entre marchés publics et politiques publiques ». Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPASH016.

Texte intégral
Résumé :
Les marchés de défense ou de sécurité (MDS) sont-ils des marchés comme les autres ? Quel est l'impact de leur dimension régalienne marquée et des impératifs de politiques publiques qu'ils peuvent contribuer à atteindre ? Leur nature (Partie 1) et leur régime (Partie 2) sont-ils avant tout ceux des marchés publics ou bien leur dimension de politique publique l'emporte-t-elle ? Pour répondre à ces question, force est de constater que les marchés publics dans le domaine de la défense ont longtemps été attribués selon des procédures nationales, le plus souvent en dehors de toute logique de transparence. Depuis l'adoption de la directive 2009/81/CE, les achats de défense ou de sécurité font par principe l'objet d'obligations de publicité et de mise en concurrence à l'échelle de l'Union européenne. Malgré leurs spécificités, ces achats constituent l'archétype du marché public. En effet, la défense est une fonction régalienne par excellence, de sorte que les achats en la matière sont particulièrement « publics », avec des enjeux de souveraineté très forts. En France, la défense est un marché économique de première importance, notamment en termes d'emploi, avec en outre un solde commercial nettement positif. De plus, les achats de défense et de sécurité sont au service de la politique de défense nationale et européenne, en particulier s'agissant de l'objectif du développement de la base industrielle et technologique de défense européenne (BITDE). Ils sont également concernés par l'ensemble des politiques publiques intégrées dans le droit des marchés publics comme le développement durable, l'innovation et le soutien des PME. Les achats de défense et de sécurité sont aussi, de ce point de vue, des « politiques publiques ». Ils sont, de ce fait, amenés à tirer profit des développements politiques du droit des marchés publics, développements qui constituent l'une des évolutions la plus significative de ce droit. Les MDS sont donc l'angle idoine pour étudier les possibilités et les limites d'une instrumentalisation des achats de défense en particulier, et de la commande publique en général, au service d'objectifs de politique publique. Ce faisant, ils permettent d'évaluer la flexibilité du droit des marchés publics et, dans le même temps, celle de la logique de concurrence qu'il diffuse. Le droit des marchés publics a dû intégrer les spécificités politiques, économiques et techniques des achats de défense et de sécurité, faire apparaitre une notion sur mesure de « marché de défense ou de sécurité », permettant, tout en renforçant la BITDE, de mettre en œuvre une logique de concurrence adaptée à la défense, et donc plus efficace. Cette notion spécifique de MDS permet ensuite de déclencher l'application d'un régime qui vient concrétiser l'instrumentalisation de ces contrats, tant au stade de leur passation que lors de leur exécution. Les obligations de publicité et de mise en concurrence sont pour grande partie dédiées à la prise en compte des spécificités des achats qu'elles encadrent et spécialement des impératifs de sécurité d'approvisionnement et de sécurité des informations. La dimension « politiques publiques » des MDS se trouvent, non seulement au sein des principes et des notions fondamentales, mais également dans les règles plus détaillées de la passation et de l'exécution de ces contrats. Ainsi, l'instrumentalisation des MDS repose sur la flexibilité du droit des marchés publics propre à rendre efficace l'interaction entre « marchés publics » et « politiques publiques ». Tout en étant encadrée par le respect du libre jeu de la concurrence, l'instrumentalisation permet aux achats publics d'assumer pleinement leur dimension politique. Les MDS réussissent donc, par leur nature et leur régime, une combinaison efficace entre marchés publics et politiques publiques
Are defence or security contracts (DSC) like public procurement? What is the impact of their strong regalian dimension and the public policies they can help to achieve? Are their nature (Part 1) and their regime (Part 2) above all those of public procurement, or does their ‘public policies' dimension take precedence? To answer these questions, it must be said that for a long time, defence procurement was awarded according to national procedures, most often without any logic of transparency. Since the adoption of Directive 2009/81/EC, defence and security purchases have in principle been subject to EU-wide advertising and competitive tendering requirements. Despite their specific characteristics, these purchases constitute the archetypal public procurement contract. Defence is a sovereign function par excellence, so procurement in this area is particularly ‘public', with very high stakes for sovereignty. In France, defence is a major economic market, particularly in terms of employment, with a clearly positive trade balance. Defence and security procurement also serves national and European defence policy, particularly regarding the objective of developing the European Defence Technological and Industrial Base (EDTIB). They are also affected by all the public policies incorporated into public procurement law, such as sustainable development, innovation and support for SMEs. From this point of view, defence and security purchases are also ‘public policies'. As a result, they are bound to benefit from political developments in public procurement law, developments which constitute one of the most significant changes in this law. DSC are therefore an ideal way of studying the possibilities and limits of using defence procurement in particular, and public procurement in general, to achieve public policy objectives. In so doing, they provide an opportunity to assess the flexibility of public procurement law and, at the same time, the flexibility of the competitive rationale it promotes. Public procurement law has had to take account of the specific political, economic and technical features of defence and security purchases, and to introduce a tailor-made concept of ‘defence or security contract', which, while strengthening the EDTIB, makes it possible to implement a competitive approach tailored to defence, and therefore more effective. This specific concept of ‘defence or security contract' then triggers the application of a regime that gives concrete form to the instrumentalization of these contracts, both at the stage of their award and during their performance. The advertising and competitive tendering requirements are largely dedicated to considering the specific features of the purchases they govern, and in particular the imperatives of security of supply and security of information. The ‘public policies' dimension of DSC is to be found not only in the fundamental principles and concepts, but also in the more detailed rules governing the award and performance of these contracts. In this way, the use of DSC is based on the flexibility of public procurement law, which makes the interaction between ‘public procurement' and ‘public policies' effective. While respecting the free play of competition, this instrumentalization allows public procurement to fully assume its political dimension. By their very nature and the way they are governed, DSC are an effective combination of public procurement and public policy
Styles APA, Harvard, Vancouver, ISO, etc.
4

Gjoka, Algert <1990&gt. « Smart Contracts security in Government Institutions ». Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14525.

Texte intégral
Résumé :
Smart Contracts are the building blocks of todays Decentralised Applications. Governments have started using blockchain technology to offer different services to the citizens and other entities but the state of the art is far from perfect. A lot of security and transparency issues arise when implementing Decentralised Applications and with every innovation there are always strings attached. A practical approach will be discussed on how to tackle the problems that come when implementing and using smart contracts.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Young, Christopher J. « The European security and defence identity debate ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ56151.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Frey, Stefanie. « Swiss defence and security policy 1945-73 ». Thesis, King's College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268809.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Bellavista, Daniele. « Ict security : Defence strategies against targeted attacks ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.

Texte intégral
Résumé :
L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati. Il lavoro è stato svolto in un contesto aziendale come parte di un tirocinio. Come incipit, ho effettuato un attacco mirato contro l’azienda in questione per valutare la validità dei sistemi di difesa. L’attacco ha avuto successo, dimostrando l’inefficacia di moderni sistemi di difesa. Analizzando i motivi del fallimento nel rilevare l’attacco, sono giunto a formulare una strategia di difesa contro attacchi mirati sotto forma di servizio piuttosto che di prodotto. La mia proposta è un framework concettuale, chiamato WASTE (Warning Automatic System for Targeted Events) il cui scopo è fornire warnings ad un team di analisti a partire da eventi non sospetti, ed un business process che ho nominato HAZARD (Hacking Approach for Zealot Attack Response and Detection), che modella il servizio completo di difesa contro i targeted attack. Infine ho applicato il processo all’interno dell’azienda per mitigare minacce ed attacchi informatici.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Wing, Ian Politics Australian Defence Force Academy UNSW. « Australian Defence in transition : responding to new security challenges ». Awarded by:University of New South Wales - Australian Defence Force Academy. School of Politics, 2002. http://handle.unsw.edu.au/1959.4/38662.

Texte intégral
Résumé :
The conceptual understanding of security and the practicalities of national defence are interdependent. In many countries both are undergoing significant change. This work provides an international context but focuses on Australian defence, arguing that a transition is underway from old security thinking to new, and that this is evidenced by changes in policies and practical activities. The aim of this work is to demonstrate the interdependence between the current reconceptualisation of security and the practicalities of national defence. Old security thinking concerns military power relationships between states, in contrast with new security thinking, which uses a broader conceptual framework. These are described, providing benchmarks for the subsequent analysis. While it is acknowledged that change has occurred in security thinking throughout history, those developments observed since the end of the Cold War and the rise of globalisation signify a fundamental shift. To explore this shift, recent developments in the defence policies and military activities of four relevant nations are examined, providing an international context for the consideration of the primary case study of Australian defence. This case study draws on historical descriptions and empirical data to analyse developments in four spheres - Australian defence policy, current Australian Defence Force activities, recent military developments and contemporary Australian public debate. The weight of evidence supports the thesis of a transition in both security thinking, described as transitional security thinking, and ADF activities. Tensions are observed between the requirements of defending a nation against attack, and contributing to the expanding requirements of the broadened security agenda. Despite these tensions, the expansion in both security thinking and the associated activities of armed forces, is likely to continue. This expansion has important implications for Australia???s defence capabilities which are increasingly required to meet the demands of refocused national security. These demands contribute to the pressing challenges of convergence and overstretch. A strategy of integration is recommended to address these challenges and it follows the principles of whole-of-government security and sustainable partnerships. The application of these principles will require the ADF to emphasise capabilities with versatility and adaptability.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Müller-Wille, Björn Wilhelm. « Thinking security in europe ? is there a European security and defence identity ? / ». [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=970705735.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Keogh, Darrin M. « European security and defence policy reform : a theoretical challenge ». Thesis, London Metropolitan University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.507077.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "Defence and security contracts"

1

U.S. Dept. of Defense. Security of defense contractor telecommunications. [Washington, D.C.?] : Dept. of Defense, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Treddenick, J. M. Peace, security and economics. Toronto, Ont : Ryerson Polytechnical Institute, Dept. of Economics, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Quigly, Richard M. Military contractors : Legal status, oversight, and security. New York : Nova Science Publishers, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

United States. General Accounting Office., dir. Contract pricing : Recurring issues and the role of the Defense Contract Audit Agency : statement of Paul F. Math, Director, Research, Development, Acquisition, and Procurement Issues, National Security and International Affairs Division, before the Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. [Washington, D.C.] : The Office, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

United States. General Accounting Office., dir. Contract pricing : Recurring issues and the role of the Defense Contract Audit Agency : statement of Paul F. Math, Director, Research, Development, Acquisition, and Procurement Issues, National Security and International Affairs Division, before the Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. [Washington, D.C.] : The Office, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Office, General Accounting. Government contracting : Contractor promotional advertising costs are unallowable : report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C : The Office, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Math, Paul F. Contract pricing : Dual-source contract prices : statement of Paul F. Math, director, Research, Development, Acquisition, and Procurement Issues, National Security and International Affairs Division, before the Congressional Military Reform Caucus. [Washington, D.C.?] : U.S. General Accounting Office, 1989.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Math, Paul F. Contract pricing : Dual-source contract prices : statement of Paul F. Math, director, Research, Development, Acquisition, and Procurement Issues, National Security and International Affairs Division, before the Congressional Military Reform Caucus. [Washington, D.C.?] : U.S. General Accounting Office, 1989.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Math, Paul F. Contract pricing : Dual-source contract prices : statement of Paul F. Math, director, Research, Development, Acquisition, and Procurement Issues, National Security and International Affairs Division, before the Congressional Military Reform Caucus. [Washington, D.C.?] : U.S. General Accounting Office, 1989.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Subcommittee, United States Congress House Committee on Government Operations Legislation and National Security. Defense Contract Audit Agency : Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Second Congress, second session, May 6, 1992. Washington : U.S. G.P.O., 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Defence and security contracts"

1

Layton, Peter. « Evolution Not Revolution : Defence AI in Australia ». Dans Contributions to Security and Defence Studies, 581–603. Cham : Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_26.

Texte intégral
Résumé :
AbstractMiddle power Australia has an active defence Artificial Intelligence (AI) program underway with a well-defined innovation pathway and numerous experimentation projects. The Australian Defence Force sees AI mainly being used in human–machine teams to improve efficiency, increase combat power, achieve decision superiority, and lower risks to combat personnel. The major equipment acquisition plan for the next two decades sets out six AI-relevant projects: one navy, one army, three air force and one in the information and cyber domain. Associated with this investment is a high expectation that Australian AI companies will have considerable involvement in the projects. The Australian defence AI sector, though, consists mainly of small and medium-sized companies that may need to partner with large prime contractors to achieve the requisite industrial heft. There are also wider national concerns about whether Australia will have a large enough AI workforce over the next decade to handle both commercial and defence demands. Accordingly, Australia is involved with collaborative AI developments with the United States including the “loyal wingman” fast jet drone, autonomous submarines and surface vessels, and robot land vehicles. Current defence AI plans will most likely lead to evolutionary improvements not revolutionary changes. AI is envisaged as being used to either enhance, augment, or replace existing capability. This approach means the future ADF will do things better, but it won’t necessarily be able to do better things.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Carafano, James Jay, et Silviu Nate. « Free and Open Spaces : The Global Impact of Ukraine Reconstruction ». Dans Contributions to Security and Defence Studies, 257–70. Cham : Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-66434-2_18.

Texte intégral
Résumé :
AbstractThe reconstruction of Ukraine has far-reaching global implications. It presents an opportunity to reshape Eurasia’s geopolitical and economic landscape, potentially rewiring the pathways of worldwide commerce and connectivity. Ukraine’s strategic location makes it a pivotal link in integrating Central Asia, the Caucasus, and Eastern Europe with Western Europe and the broader transatlantic community. Rebuilding Ukraine must be approached not as a traditional foreign aid endeavor but as a private sector-driven economic integration effort. Harnessing global capital and expertise can deliver real growth, in contrast to past schemes of foreign assistance that have failed to sustain Ukraine’s economy.Crucial prerequisites include developing Ukraine’s domestic defense capabilities, insulating the reconstruction effort from great power competition, and continuing anti-corruption reforms. The reconstruction should not only empower small and medium enterprises and leverage regional companies, but also utilize international private financing for large infrastructure projects, making all stakeholders feel included and valued in this effort.If successfully implemented, this model could be a game-changer across the post-Soviet space, transforming the Eurasian landscape. It would not only create new trade and investment opportunities and foster greater regional integration and stability but also significantly diminish Russia’s influence, providing a sense of empowerment and security for future geopolitical competition.
Styles APA, Harvard, Vancouver, ISO, etc.
3

McCormack, John, et Tim Burnett. « Defence acquisition ». Dans Managing Security, 160–76. London : Routledge, 2021. http://dx.doi.org/10.4324/9781003137061-11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Mazarr, Micheal J. « The European Dimension : Comparisons and Contrasts with Asia ». Dans Missile Defences and Asian-Pacific Security, 46–62. London : Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-10576-2_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Leuffen, Dirk, Berthold Rittberger et Frank Schimmelfennig. « Security and Defence ». Dans Differentiated Integration, 184–220. London : Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-28501-0_7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Doran, Susan. « Security and Defence ». Dans England and Europe in the Sixteenth Century, 42–79. London : Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-26990-7_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Bluth, Christoph. « Defence and Security ». Dans Khrushchev and Khrushchevism, 194–214. London : Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18646-4_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Rice, Condoleezza. « Defence and Security ». Dans The Soviet Union Under Gorbachev, 192–209. London : Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18648-8_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Juncos, Ana E. « Security and defence ». Dans Foreign Policies of EU Member States, 115–30. Abingdon, Oxon ; New York, NY : Routledge, 2017. : Routledge, 2017. http://dx.doi.org/10.4324/9781315276724-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Constant, Fred. « Security/Defence Assets ». Dans Overseas Territories in World Affairs, 67–78. Cham : Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-64233-3_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Defence and security contracts"

1

Younus, A., S. Salort, B. Brecur, P. Desbarats, P. Mounaix, J. P. Caumes et E. Abraham. « 3D millimeter wave tomographic scanner for large size opaque object inspection with different refractive index contrasts ». Dans Security + Defence, sous la direction de Keith A. Krapels et Neil A. Salmon. SPIE, 2010. http://dx.doi.org/10.1117/12.867943.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Hermansson, Patrik, et Klas Edstam. « Atmospheric visibility estimation and image contrast calibration ». Dans SPIE Security + Defence, sous la direction de Karin U. Stein et Ric H. M. A. Schleijpen. SPIE, 2016. http://dx.doi.org/10.1117/12.2241045.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Wu, Tirui, et Alexander Toet. « Efficient contrast enhancement through log-power histogram modification ». Dans SPIE Security + Defence, sous la direction de David A. Huckridge et Reinhard Ebert. SPIE, 2014. http://dx.doi.org/10.1117/12.2064971.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

He, Xiaoyu, et Xiaojian Xu. « Contrast analysis of space-based Earth observation infrared system ». Dans SPIE Security + Defence, sous la direction de David A. Huckridge et Reinhard Ebert. SPIE, 2014. http://dx.doi.org/10.1117/12.2067106.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Triantaphillidou, S., J. Jarvis, G. Gupta et H. Rana. « Defining human contrast sensitivity and discrimination from complex imagery ». Dans SPIE Security + Defence, sous la direction de Roberto Zamboni, Francois Kajzar, Attila A. Szep, Douglas Burgess et Gari Owen. SPIE, 2013. http://dx.doi.org/10.1117/12.2029194.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Stewart, Seán M., et R. B. Johnson. « Exact expressions for thermal contrast detected with thermal and quantum detectors ». Dans SPIE Security + Defence, sous la direction de David A. Huckridge et Reinhard Ebert. SPIE, 2014. http://dx.doi.org/10.1117/12.2066598.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Tektonidis, Marco, David Monnin et Frank Christnacher. « Hue-preserving local contrast enhancement and illumination compensation for outdoor color images ». Dans SPIE Security + Defence, sous la direction de Gary Kamerman, Ove Steinvall, Keith L. Lewis et John D. Gonglewski. SPIE, 2015. http://dx.doi.org/10.1117/12.2194314.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Karali, A. O., Serdar Cakir et Tayfun Aytaç. « A multiscale contrast direction adaptation approach for the fusion of multispectral and multifocus infrared images ». Dans SPIE Security + Defence, sous la direction de David A. Huckridge, Reinhard Ebert, Mark T. Gruneisen, Miloslav Dusek et John G. Rarity. SPIE, 2015. http://dx.doi.org/10.1117/12.2191961.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Bijl, Piet, Alexander Toet et Frank L. Kooi. « Feature long axis size and local luminance contrast determine ship target acquisition performance : strong evidence for the TOD case ». Dans SPIE Security + Defence, sous la direction de David A. Huckridge, Reinhard Ebert et Stephen T. Lee. SPIE, 2016. http://dx.doi.org/10.1117/12.2241805.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Stewart, Seán M. « Comparison of the relative merits of the midwave and longwave infrared bands for various target types using detected thermal contrast ». Dans SPIE Security + Defence, sous la direction de Karin U. Stein et Ric H. M. A. Schleijpen. SPIE, 2015. http://dx.doi.org/10.1117/12.2194252.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Defence and security contracts"

1

C, Maria Thaemar. Japan–Philippines defence deal reflects regional security dynamics. East Asia Forum, septembre 2024. http://dx.doi.org/10.59425/eabc.1725919687.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Allen, Julia, Lisa Cunningham, Gary Ford, Barbara Fraser et John Kochmar. Security for Information Technology Service Contracts. Fort Belvoir, VA : Defense Technical Information Center, janvier 1998. http://dx.doi.org/10.21236/ada336329.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Wing, Ian. The Australian Defence Force : Broadened Concepts of Security Operations. Fort Belvoir, VA : Defense Technical Information Center, octobre 1998. http://dx.doi.org/10.21236/ada386066.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Alt, Josef. The Future of the European Security and Defence Policy. Fort Belvoir, VA : Defense Technical Information Center, avril 2006. http://dx.doi.org/10.21236/ada475658.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Armstrong, Shiro. More to Australia–Japan security than bilateral defence ties. East Asia Forum, janvier 2018. http://dx.doi.org/10.59425/eabc.1516183233.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sherman, Dylan, et Simon Brawley. AI, disinformation and cyber security. Parliamentary Office of Science and Technology, janvier 2025. https://doi.org/10.58248/hs104.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Tagarev, Todor. Methodology for Defence Planning in the Context of Security Strategy Planning. Procon, 2007. http://dx.doi.org/10.11610/it4sec.0016.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Portela, Clara, et Raúl González Muñoz. The EU Space Strategy for Security and Defence : Towards Strategic Autonomy ? Stockholm International Peace Research Institute, juin 2023. http://dx.doi.org/10.55163/lhsq8207.

Texte intégral
Résumé :
Satellite navigation, communications and imagery are critical to military doctrine. They provide the capability and functionalities required to operate increasingly complex military assets with unprecedented precision. On account of their growing importance, there is a need for EU member states to develop their own satellite infrastructure, and to ensure control over and superiority in the space landscape in which satellites operate in order to protect their security. This paper analyses the EU Space Strategy, which is the first of its kind, identifying its strengths and areas where there is room for improvement, as well as the challenges facing the project to establish a common European space defence policy, in terms of both institutional and industrial collaboration.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Hastings, Justin. What Australia’s new defence deal with Indonesia means for regional security. East Asia Forum, octobre 2024. http://dx.doi.org/10.59425/eabc.1728986400.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Millar, Katharine, James Shires et Tatiana Tropina. Gender Approaches to Cybersecurity : Design, Defence and Response. The United Nations Institute for Disarmament Research, janvier 2021. http://dx.doi.org/10.37559/gen/21/01.

Texte intégral
Résumé :
Gender approaches to cybersecurity explores how gender norms shape specific activities pertaining to cybersecurity design, defence and response. In each of these three pillars, the research identifies distinct dimensions of cyber-related activities that have gendered implications and, thus, need to be considered from a gender perspective. The report proposes recommendations for the incorporation of gender considerations throughout international cybersecurity policy and practice, so as to ensure that cybersecurity improves the security of people of all gender identities and expressions, as well as international peace and security. The ultimate conclusion is that these two levels of security cannot be separated.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie