Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Private security services – United States.

Articles de revues sur le sujet « Private security services – United States »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Private security services – United States ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Trounstine, Jessica. "The Privatization of Public Services in American Cities." Social Science History 39, no. 3 (2015): 371–85. http://dx.doi.org/10.1017/ssh.2015.61.

Texte intégral
Résumé :
In the United States, significant variation regarding the quality of public goods exists across local governments. In this article, I seek to explain these patterns. I argue that economically and racially homogenous communities are collectively willing to invest more resources in public goods relative to diverse communities. I provide evidence in support of this claim by analyzing the relationship between race and income diversity and the share of community security and education that is provided by private entities. I find that as racial diversity and income inequality increase, the share of
Styles APA, Harvard, Vancouver, ISO, etc.
2

Khalyasov, Ilshat S., and Andrey G. Svetlakov. "TO THE QUESTION OF RUSSIAN AND FOREIGN EXPERIENCE OF COUNTERACTION CRIMINALIZATION IN THE MARKET OF SECURITY SERVICES." Today and Tomorrow of Russian Economy, no. 107-108 (2022): 63–73. http://dx.doi.org/10.26653/1993-4947-2022-107-108-05.

Texte intégral
Résumé :
This article discusses the issues of decriminalization of the security services market, the author’s definition of this concept is proposed; the functions of private security companies in the implementation of public and private interests, the scheme of interaction between security officers, security companies, customer organizations and the state in the security services market are presented. The characteristic features of the implementation of security activities in Russia are considered, the powers of security officers are determined, including the protection of the life and health of citiz
Styles APA, Harvard, Vancouver, ISO, etc.
3

Karska, Elżbieta, and Karol Karski. "Introduction: The Use of Private Military and Security Companies by the United Nations." International Community Law Review 16, no. 4 (2014): 399–404. http://dx.doi.org/10.1163/18719732-12341286.

Texte intégral
Résumé :
The work of private military and security contractors is extremely controversial from the point of view of international law and of practice. Sometimes there are doubts as to whether some of their activities should be considered legal activities or illegal mercenarism. Like any other entities using force, they can violate human rights as well as international humanitarian law. They provide their services to, amongst others, states and intergovernmental organisations, including the un. This requires a precise definition of the rules under which such contractors operate, both with regard to the
Styles APA, Harvard, Vancouver, ISO, etc.
4

Nalla, Mahesh K., Sheila R. Maxwell, and Chae M. Mamayek. "Legitimacy of Private Police in Developed, Emerging, and Transitional Economies." European Journal of Crime, Criminal Law and Criminal Justice 25, no. 1 (2017): 76–100. http://dx.doi.org/10.1163/15718174-25012107.

Texte intégral
Résumé :
Research suggests that states that fail to provide political goods, such as security, have low citizens’ confidence in state apparatuses, resulting in greater demand for services by non-state actors like private security. The present study seeks to compare citizen trust and confidence in private security guards, in 6 developed, emerging, and transitional economies in the Americas (the United States), Asia (India, Singapore, South Korea), and Europe (The Netherlands, Slovenia). This study seeks to assess whether democracy levels across the countries and/or contextual factors such as contact, pe
Styles APA, Harvard, Vancouver, ISO, etc.
5

Patel, Mohasina. "Legal Basis for Information Security Risk Management." Uzbek Journal of Law and Digital Policy 2, no. 4 (2024): 8–16. http://dx.doi.org/10.59022/ujldp.214.

Texte intégral
Résumé :
Information security risks threaten the integrity of notarial services in an increasingly digital era. This study analyzes the legal frameworks governing notarial cyber risk management in the United States and internationally through doctrinal and comparative methodology. Key findings show existing regulations lack harmonized, tailored standards and oversight for notaries. Introducing nationwide requirements, audits, training programs, and sector-specific rules could significantly enhance risk management. Non-regulatory initiatives like education and public-private collaboration can complement
Styles APA, Harvard, Vancouver, ISO, etc.
6

ZACON, Corina. "Inițiativele Organizației Națiunilor Unite de reglementare a activităților companiilor militare și de securitate private." Studii Juridice Universitare 1 2021 (November 2, 2021): 203–8. https://doi.org/10.5281/zenodo.5639479.

Texte intégral
Résumé :
<strong>United Nations Initiatives to Regulate the Activities of Private Military and Security Companies</strong> In order to ensure international peace and security, the United Nations is taking several steps to achieve this goal. The legal regulation of the status of Private Military and Security Companies is one of the objectives of the UN. In order to prevent and combat the use of mercenaries and specific services provided by Private Military and Security Companies, the UN has created several tools and intervention mechanisms. The text of this article examines the possibility of creating a
Styles APA, Harvard, Vancouver, ISO, etc.
7

Gia Anisa and Fitria Widianingsih. "SolarWinds Attack: Stages, Implications, and Mitigation Strategies in the Cyber Age." Electronic Integrated Computer Algorithm Journal 2, no. 1 (2024): 47–52. http://dx.doi.org/10.62123/enigma.v2i1.31.

Texte intégral
Résumé :
SolarWinds is a software company based in the United States that provides IT monitoring and management tools. Founded in 1999, SolarWinds offers a variety of products that help organizations manage networks, systems, IT infrastructure, applications and cloud-based services. SolarWinds products are used for performance monitoring, log management, IT security, and data analysis. The company became widely known after a major cybersecurity incident came to light in late 2020, in which their network management software, Orion, was used as a vector for attacks by a state-backed hacking group. These
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kuznetsov, E. A. "The Role of the Commercial Space Industry within the US National Security under the Trump Administration." Moscow University Bulletin of World Politics 13, no. 1 (2021): 85–119. http://dx.doi.org/10.48015/2076-7404-2021-13-1-85-119.

Texte intégral
Résumé :
The US space activities from their inception have been closely connected with the private sector. However, only in 2010s private space companies have come to play a prominent role not only on the global market of space services but in the field of international security as well. At the same time, this trend towards commercialization of outer space use and the growing role of the private space sector in ensuring national security is still understudied. This paper aims to partially fill this gap by assessing approaches to these issues adopted by the administration of D. Trump. In the first secti
Styles APA, Harvard, Vancouver, ISO, etc.
9

GULYAMOV, Said, and Ilyosbek ODILKHUJAEV. "LEGAL BASIS FOR INFORMATION SECURITY RISK MANAGEMENT IN THE NOTARIAL SECTOR." Young Scholar's Academic Journal III, no. 1 (2024): 6–11. https://doi.org/10.5281/zenodo.10616226.

Texte intégral
Résumé :
<em>Information security risks threaten the integrity of notarial services in an increasingly digital age. Using a doctrinal and comparative methodology, this study analyses the regulatory framework for notarial cyber risk management in the United States and internationally. Key findings show that existing regulations lack harmonized, tailored standards and oversight for notaries. The introduction of nationwide requirements, audits, training programmes and sector-specific regulations could significantly improve risk management. Non-regulatory initiatives such as education and public-private co
Styles APA, Harvard, Vancouver, ISO, etc.
10

Krahmann, Elke. "Choice, voice, and exit: Consumer power and the self-regulation of the private security industry." European Journal of International Security 1, no. 1 (2016): 27–48. http://dx.doi.org/10.1017/eis.2015.6.

Texte intégral
Résumé :
AbstractPromoting Private Security Company (PSC) self-regulation has become a key focus due to high profile scandals during the military interventions in Iraq and Afghanistan. Related efforts include the Montreux Document, the International Code of Conduct for Private Security Service Providers (ICoC), American National Standards Institute/ASIS certification, and the new International Standards Organization (ISO) Management System Standard for Private Security Operations. Implicit in industry self-regulation, however, is the assumption that the consumers of private security services will help
Styles APA, Harvard, Vancouver, ISO, etc.
11

San Nicolas-Rocca, Tonia, and Richard J. Burkhard. "Information Security in Libraries." Information Technology and Libraries 38, no. 2 (2019): 58–71. http://dx.doi.org/10.6017/ital.v38i2.10973.

Texte intégral
Résumé :
Libraries in the United States handle sensitive patron information, including personally identifiable information and circulation records. With libraries providing services to millions of patrons across the U.S., it is important that they understand the importance of patron privacy and how to protect it. This study investigates how knowledge transferred within an online cybersecurity education affects library employee information security practices. The results of this study suggest that knowledge transfer does have a positive effect on library employee information security and risk management
Styles APA, Harvard, Vancouver, ISO, etc.
12

Pradnyajaya, I. Kadek Wahyu, and Made Maharta Yasa. "LEGALITAS DAN TANGGUNG JAWAB PRIVATE MILITARY AND SECURITY COMPANY DALAM INVASI IRAK OLEH AMERIKA SERIKAT." Kertha Semaya : Journal Ilmu Hukum 10, no. 7 (2022): 1496. http://dx.doi.org/10.24843/ks.2022.v10.i07.p03.

Texte intégral
Résumé :
Amerika Serikat (AS) melibatkan Perusahaan Militer dan Keamanan Swasta atau “Private Military and Security Companies” (PMSC) dalam jumlah besar atas misi rekonstruksi Irak sejak tahun 2003. Keterlibatan dari PMSC telah menimbulkan banyak permasalahan khususnya kejahatan terhadap kemanusiaan (Crime Against Humanity) yang dilakukan kepada warga sipil dalam misi rekonstruksi Irak ini. Adapun tulisan ini bertujuan untuk mengetahui status hukum dari PMSC dalam invasi Irak oleh Amerika Serikat (AS) berdasarkan hukum internasional yang berlaku serta untuk menganalisa pertanggungjawaban dari Amerika S
Styles APA, Harvard, Vancouver, ISO, etc.
13

DAVITTI, Daria. "The Rise of Private Military and Security Companies in European Union Migration Policies: Implications under the UNGPs." Business and Human Rights Journal 4, no. 1 (2018): 33–53. http://dx.doi.org/10.1017/bhj.2018.21.

Texte intégral
Résumé :
AbstractThis article examines the involvement of Private Military and Security Companies (PMSCs) in both shaping and implementing the European Agenda on Migration (European Agenda), launched by the European Union in May 2015. The migration policies which have since been adopted have increasingly enabled the outsourcing to private security contractors of various border control operations, including those related to forced returns, administrative detention and security services for the Italian and Greek ‘hotspots’. The article argues that PMSCs frame, shape and entrench militarized responses in
Styles APA, Harvard, Vancouver, ISO, etc.
14

Kleyhons, Ferdinand. "Les Affreux en Irak. Die Teilprivatisierung des professionellen Blutvergießens in der heutigen Kriegsführung anhand des Beispiels des Irakkriegs." historia.scribere, no. 13 (June 22, 2021): 177. http://dx.doi.org/10.15203/historia.scribere.13.637.

Texte intégral
Résumé :
Les Affreux en Irak. The partial privatisation of professional bloodshed in modern warfare exemplified by the Iraq WarAfter the launch of "Operation Iraqi Freedom", the United States of America were engaged in war for the next eight years, in which they heavily relied on the assistance of private companies, known as Private Military Companies (PMC). The following paper uses the Iraq War respectively the following occupation of Iraq as a case study to examine the role of PMCs in modern warfare. It analyses the military branches in which PMCs provided support to the USA, including logistics, tra
Styles APA, Harvard, Vancouver, ISO, etc.
15

Korol’kova, E. "Evolution of United States’ Private Military and Security Companies: The Case of Afghanistan 2001–2021." International Trends / Mezhdunarodnye protsessy 20, no. 1 (2022): 122–47. http://dx.doi.org/10.17994/it.2022.20.1.68.7.

Texte intégral
Résumé :
The withdrawal of troops on 31 August 2021 which was carried out in accordance with the Agreement signed on 29 February 2020 between the U.S. government and the Taliban (an international terrorist organization banned in the Russian Federation) marked the end of the international military campaign in Afghanistan which lasted twenty years. Assessing the preliminary outcomes of nearly a quarter-century of the US military and their NATO allies’ presence in Afghanistan, U.S. President Joseph Biden announced the end of “an era of major military operations to remake other countries”. Though the conse
Styles APA, Harvard, Vancouver, ISO, etc.
16

Krahmann, Elke. "From performance to performativity: The legitimization of US security contracting and its consequences." Security Dialogue 48, no. 6 (2017): 541–59. http://dx.doi.org/10.1177/0967010617722650.

Texte intégral
Résumé :
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to perf
Styles APA, Harvard, Vancouver, ISO, etc.
17

Scheffler, Sarah, and Jonathan Mayer. "SoK: Content Moderation for End-to-End Encryption." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 403–29. http://dx.doi.org/10.56553/popets-2023-0060.

Texte intégral
Résumé :
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy create new content moderation challenges for online services, because services can no longer directly access plaintext content. While ongoing public policy debates about E2EE and content moderation in the United States and European Union emphasize child sexual abuse material and misinformation in messaging and storage, we identify and synthesize a wealth of scholarship that goes far beyond those topics. We bridge literatu
Styles APA, Harvard, Vancouver, ISO, etc.
18

Brandão, Luís T. A. N., Nicolas Christin, and George Danezis. "Toward Mending Two Nation-Scale Brokered Identification Systems." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (2015): 135–55. http://dx.doi.org/10.1515/popets-2015-0022.

Texte intégral
Résumé :
Abstract Available online public/governmental services requiring authentication by citizens have considerably expanded in recent years. This has hindered the usability and security associated with credential management by users and service providers. To address the problem, some countries have proposed nation-scale identification/authentication systems that intend to greatly reduce the burden of credential management, while seemingly offering desirable privacy benefits. In this paper we analyze two such systems: the Federal Cloud Credential Exchange (FCCX) in the United States and GOV.UK Verif
Styles APA, Harvard, Vancouver, ISO, etc.
19

Luciano, Edimara, M. Adam Mahmood, and Parand Mansouri Rad. "Telemedicine adoption issues in the United States and Brazil: Perception of healthcare professionals." Health Informatics Journal 26, no. 4 (2020): 2344–61. http://dx.doi.org/10.1177/1460458220902957.

Texte intégral
Résumé :
Telemedicine has recently garnered more attention from healthcare professionals because it provides access to health services to patients in rural areas while making patient healthcare information more vulnerable to security breaches. The objective of this research is to identify factors that play a critical role in possible adoption of telemedicine in the United States and Brazil. A model with eight hypotheses was used to establish a research framework. A survey was conducted involving healthcare professionals in the aforementioned countries. The results show that telemedicine adoption is inf
Styles APA, Harvard, Vancouver, ISO, etc.
20

Schindler, Hans-Jakob, and Frederique Gautier. "Looting and Smuggling of Artifacts as a Strategy to Finance Terrorism Global Sanctions as a Disruptive and Preventive Tool." International Journal of Cultural Property 26, no. 3 (2019): 331–42. http://dx.doi.org/10.1017/s0940739119000225.

Texte intégral
Résumé :
Abstract:In recent years, the Islamic State in Iraq and the Levant (ISIL)1 as well as several Al-Qaida affiliates have used the systematic and large-scale looting of antiquities as one of their income streams. Due to the large-scale and organized looting activities of these groups, in particular, in Iraq and the Syrian Arab Republic, the United Nations Security Council (UNSC), following various reports and recommendations by the ISIL, Al-Qaida and Taliban Monitoring Team has adopted a range of measures, chiefly among them the landmark UNSC Resolution 2347 (2017) to counter this threat. These m
Styles APA, Harvard, Vancouver, ISO, etc.
21

Chudinova, K. "U.S.-Japan Economic Cooperation Under the Biden Administration." World Economy and International Relations 67, no. 12 (2023): 28–34. http://dx.doi.org/10.20542/0131-2227-2023-67-12-28-34.

Texte intégral
Résumé :
Since the post-war period, the development of U.S.-Japan relations has been determined by security cooperation and economic integration. As economic integration evolved, the United States and Japan became closely linked through the flow of goods and services, the movement of capital, and the joint implementation of R&amp;D. The U.S.-Japan alliance is becoming more and more necessary for the United States in the context of strategic rivalry with China. Cooperation with Japan in the field of reinforcing and diversifying the GVCs important for ensuring US national security, as well as in the deve
Styles APA, Harvard, Vancouver, ISO, etc.
22

Seraj, Sultan-Mahmood. "Post-Pandemic Telehealth: An Unhealthy Privacy Prescription." Global Privacy Law Review 3, Issue 4 (2022): 208–20. http://dx.doi.org/10.54648/gplr2022024.

Texte intégral
Résumé :
The COVID-19 pandemic catapulted the use of telehealth services across the United States (US). In response to the public health emergency, the Office for Civil Rights (OCR) at the US Department for Health and Human Services (HHS) issued a notice relaxing privacy and security safeguards outlined in the Health Insurance Portability and Accountability Act (HIPAA). During the past two years, several novel legal issues have arisen due to these lenient standards. The US government has not adequately considered standardizing rules for remote telehealth consultations and regulating the flow of sensiti
Styles APA, Harvard, Vancouver, ISO, etc.
23

Pimentel, Cauê Rodrigues. "Entre o livre-mercado e o compromisso multilateral: opções de regulação internacional sobre empresas militares e de segurança privada/Between free-market and multilateral commitment: options on the international regulation of private military and security." Brazilian Journal of International Relations 4, no. 2 (2015): 273–99. http://dx.doi.org/10.36311/2237-7743.2015.v4n2.06.p273.

Texte intégral
Résumé :
Este artigo tem como problema central o fenômeno das Empresas Militares e de Segurança Privada e seu papel no uso da força. O objetivo é analisar os processos de regulação para controlar este setor que floresceu a partir da década de 1990. Analisar-se-ão duas propostas negociadas internacionalmente: o “Projeto de Convenção” do Grupo de Trabalho sobre Mercenários das Nações Unidas que configura uma opção pelo controle tradicional através de tratado multilateral; e o “Documento de Montreux”, projeto de iniciativa suíça que congrega Estados e integrantes do setor privado para a criação de um Códi
Styles APA, Harvard, Vancouver, ISO, etc.
24

Neagu, Florentina Stefania, and Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt." Proceedings of the International Conference on Business Excellence 13, no. 1 (2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.

Texte intégral
Résumé :
Abstract In recent years cyber terrorism has become increasingly used with the globalization of technology and people’s access to high-speed internet. It takes place exclusively in the online environment, the advantage being that it offers an increased level of anonymity to users. Terrorist groups are targeting the misappropriation of social media accounts, focused on Distributed Denial of Service activities, exploiting communications services and banking services for fraudulent misappropriation of financial accounts. Cyberterrorism generates very high costs for the national economy, such as t
Styles APA, Harvard, Vancouver, ISO, etc.
25

Chiu, Dickson K. W., Yuexuan Wang, Patrick Hung, et al. "Governance of Cross-Organizational Healthcare Document Exchange through Watermarking Services and Alerts." International Journal of Systems and Service-Oriented Engineering 2, no. 4 (2011): 83–108. http://dx.doi.org/10.4018/jssoe.2011100105.

Texte intégral
Résumé :
There is an increasing demand for sharing documents for process integration among organizations. Web services technology has recently been widely proposed and gradually adopted as a platform for supporting such an integration. There are no holistic solutions thus far that are able to tackle the various protection issues, specifically regarding the security and privacy protection requirements in cross-organizational progress integration. This paper proposes the exchange of documents through a Document / Image Exchange Platform (DIEP), replacing traditional ad-hoc and manual exchange practices.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Srikanth, Kandragula. "Security and Privacy Challenges." Journal of Scientific and Engineering Research 6, no. 10 (2019): 315–17. https://doi.org/10.5281/zenodo.14050056.

Texte intégral
Résumé :
Cloud computing has revolutionized the way businesses operate, offering a paradigm shift from on-premise infrastructure to a virtualized, on-demand environment. However, security and privacy concerns remain a significant hurdle for some businesses considering cloud adoption. This white paper delves into the key challenges associated with cloud security and privacy, empowering businesses of all sizes to make informed decisions and navigate the potential risks involved. We begin by exploring the concept of data security threats in the cloud environment. Data breaches are a major concern, as clou
Styles APA, Harvard, Vancouver, ISO, etc.
27

Laurell, Asa Cristina, and Maria Elena Ortega. "The Free Trade Agreement and the Mexican Health Sector." International Journal of Health Services 22, no. 2 (1992): 331–37. http://dx.doi.org/10.2190/v2xg-18v2-5ux1-qgke.

Texte intégral
Résumé :
This article presents a discussion of the probable implications for the Mexican health sector of the Free Trade Agreement (FTA) between the United States, Canada, and Mexico. The authors argue that the FTA should be seen as part of neoliberal policies adopted by the Mexican government in 1983 that are based on large-scale privatization and deregulation of labor relations. In this general context the health sector, which traditionally has been dominated by public institutions, is undergoing a deep restructuring. The main trends are the decapitalization of the public sector and a selective proce
Styles APA, Harvard, Vancouver, ISO, etc.
28

Bernard Omwansa Obae. "Assessing the impact of the constitution of Kenya 2010 on foreign direct investments: opportunities and challenges." Magna Scientia Advanced Research and Reviews 14, no. 1 (2025): 145–49. https://doi.org/10.30574/msarr.2025.14.1.0081.

Texte intégral
Résumé :
The provisions of the 2010 Kenyan Constitution indirectly promotes Foreign Direct Investment (FDI). It outlines principles that creates favorable conditions for thriving of FDI in Kenya. This study focused on the Foreign Investment Protection Act, revised in 2022, which defines foreign nationals, foreign assets; outlines procedures for investment approval; and provides protections for foreign investors. Utilizing a qualitative approach, thi research incorporates document analysis of relevant legal texts, case studies comparing FDI trends before and after the constitution was adopted. The resea
Styles APA, Harvard, Vancouver, ISO, etc.
29

Aguila, Emma, Jaqueline L. Angel, and Kyriakos Markides. "OLD AND FORGOTTEN? CARE FOR ELDERS IN MEXICO AND THE U.S." Innovation in Aging 3, Supplement_1 (2019): S64—S65. http://dx.doi.org/10.1093/geroni/igz038.249.

Texte intégral
Résumé :
Abstract The United States and Mexico differ greatly in the organization and financing of their old-age welfare states. They also differ politically and organizationally in government response at all levels to the needs of low-income and frail citizens. While both countries are aging rapidly, Mexico faces more serious challenges in old-age support that arise from a less developed old-age welfare state and economy. For Mexico, financial support and medical care for older low-income citizens are universal rights, however, limited fiscal resources for a large low-income population create inevitab
Styles APA, Harvard, Vancouver, ISO, etc.
30

Sragow, Howard Michael, Eileen Bidell, Douglas Mager, and Shaun Grannis. "Universal Patient Identifier and Interoperability for Detection of Serious Drug Interactions: Retrospective Study." JMIR Medical Informatics 8, no. 11 (2020): e23353. http://dx.doi.org/10.2196/23353.

Texte intégral
Résumé :
Background The United States, unlike other high-income countries, currently has no national unique patient identifier to facilitate health information exchange. Because of security and privacy concerns, Congress, in 1998, prevented the government from promulgating a unique patient identifier. The Health and Human Services funding bill that was enacted in 2019 requires that Health and Human Services report their recommendations on patient identification to Congress. While there are anecdotes of incomplete health care data due to patient misidentification, to date there have been insufficient la
Styles APA, Harvard, Vancouver, ISO, etc.
31

Rodrigues, Gabriel Arquelau Pimenta, André Luiz Marques Serrano, Guilherme Fay Vergara, Robson de Oliveira Albuquerque, and Georges Daniel Amvame Nze. "Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies." Future Internet 16, no. 6 (2024): 201. http://dx.doi.org/10.3390/fi16060201.

Texte intégral
Résumé :
A data breach is the unauthorized disclosure of sensitive personal data, and it impacts millions of individuals annually in the United States, as reported by Privacy Rights Clearinghouse. These breaches jeopardize the physical safety of the individuals whose data are exposed and result in substantial economic losses for the affected companies. To diminish the frequency and severity of data breaches in the future, it is imperative to research their causes and explore preventive measures. In pursuit of this goal, this study considers a dataset of data breach incidents affecting companies listed
Styles APA, Harvard, Vancouver, ISO, etc.
32

Shakya, HS, and NP KC. "Family Planning and Health Commodities Security in Nepal." Nepal Journal of Medical Sciences 3, no. 1 (2014): 51–56. http://dx.doi.org/10.3126/njms.v3i1.10359.

Texte intégral
Résumé :
Background: Commodity security is essential for effective delivery of quality health services. Commodity security exists when people are able to choose, obtain and use products whenever they need them. With leadership of Government of Nepal’s Logistics Management Division and with technical assistance from United States Aid for International Development funded projects have been consistently working toward this goal with priority to Family Planning (FP), Reproductive Health, and Maternal Child Health commodities. Methods: A National Consensus Contraceptive Security Forecast meeting is held ann
Styles APA, Harvard, Vancouver, ISO, etc.
33

Akoh Atadoga, Oluwatoyin Ajoke Farayola, Benjamin Samson Ayinla, Olukunle Oladipupo Amoo, Temitayo Oluwaseun Abrahams, and Femi Osasona. "A COMPARATIVE REVIEW OF DATA ENCRYPTION METHODS IN THE USA AND EUROPE." Computer Science & IT Research Journal 5, no. 2 (2024): 447–60. http://dx.doi.org/10.51594/csitrj.v5i2.815.

Texte intégral
Résumé :
Data encryption is a critical aspect of modern information security, and understanding the approaches taken by different regions is vital for a comprehensive analysis. In the United States and Europe, data encryption methods vary in implementation, legal frameworks, and overall priorities. In the United States, encryption methods are primarily governed by a combination of federal laws and industry standards. The National Institute of Standards and Technology (NIST) plays a central role in recommending cryptographic standards, while the Department of Commerce oversees export controls on encrypt
Styles APA, Harvard, Vancouver, ISO, etc.
34

Lanawaang, Yehuda, Tito Suryawijaya, Mahmud Mahmud, and Bolei Zhou. "Achieving Customer Satisfaction Drive-Thru Services through Digital Twins in America." International Journal of Digital Entrepreneurship and Business 5, no. 1 (2024): 1–15. http://dx.doi.org/10.52238/ideb.v5i1.148.

Texte intégral
Résumé :
In today’s dynamic business environment, comprehending consumer behavior stands as a pivotal factor for achieving success. However, traditional methods of gathering consumer insights often prove to be time-consuming, expensive, and limited in depth. Digital Twins technology emerges as a promising solution, offering virtual representations of consumers and real-time insights into their behaviors and preferences. This study, which has yielded promising results, investigates the implementation of Digital Twins in enhancing efficiency, performance, and user experience within drive-thru services, f
Styles APA, Harvard, Vancouver, ISO, etc.
35

Kelly, Christopher, Nikolaos Pitropakis, Alexios Mylonas, Sean McKeown, and William J. Buchanan. "A Comparative Analysis of Honeypots on Different Cloud Platforms." Sensors 21, no. 7 (2021): 2433. http://dx.doi.org/10.3390/s21072433.

Texte intégral
Résumé :
In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and operational advantages of moving IT infrastructure to specialised cloud providers are clearly compelling. However, with such volumes of private and personal data being stored in cloud computing infrastructures, security concerns have risen. Motivated to monitor and analyze adversarial activities, we deploy multiple honeypots on the popular cloud providers, namely Amazon Web Services (AWS), Google Cloud Platf
Styles APA, Harvard, Vancouver, ISO, etc.
36

Cedrick Agorbia-Atta. "Setting new benchmarks for combating financial crimes and ensuring the safety and security of America's digital financial landscape." International Journal of Science and Research Archive 13, no. 1 (2024): 1291–98. http://dx.doi.org/10.30574/ijsra.2024.13.1.1738.

Texte intégral
Résumé :
The increasing digitalization of financial services in the United States has introduced significant challenges in combating financial crimes, including fraud, money laundering, and cybercrimes. As digital transactions become more pervasive, so too do the opportunities for illicit activities that exploit the vulnerabilities of these systems. This research seeks to establish new benchmarks for combating financial crimes and ensuring the security of America's digital financial landscape. By leveraging advanced technologies such as Artificial Intelligence (AI), Machine Learning (ML), and blockchai
Styles APA, Harvard, Vancouver, ISO, etc.
37

COJAN, Nicușor. "Rolul guvernanţei în realizarea obiectivelor globale ale Organizației Națiunilor Unite." Gândirea Militară Românească 2022, no. 2 (2022): 88–105. http://dx.doi.org/10.55535/gmr.2022.2.06.

Texte intégral
Résumé :
"Global governance brings together various actors to coordinate collective action around the world. This concept encompasses all the institutions, policies, rules, procedures and initiatives by which states and their citizens seek to bring more predictability, stability and order into their responses to transnational challenges and is largely achieved through international organisations. In fact, the goal of global governance is to provide global policies and services, in particular peace and security systems, justice and conflict mediation, functioning markets and unified standards for trade
Styles APA, Harvard, Vancouver, ISO, etc.
38

Esmaeilzadeh, Pouyan. "Patients' Perceptions of Different Information Exchange Mechanisms: An Exploratory Study in the United States." Methods of Information in Medicine 59, no. 04/05 (2020): 162–78. http://dx.doi.org/10.1055/s-0040-1721784.

Texte intégral
Résumé :
Abstract Background Patients may seek health care services from various providers during treatment. These providers could serve in a network (affiliated) or practice separately (unaffiliated). Thus, using secure and reliable health information exchange (HIE) mechanisms would be critical to transfer sensitive personal health information (PHI) across distances. Studying patients' perceptions and opinions about exchange mechanisms could help health care providers build more complete HIEs' databases and develop robust privacy policies, consent processes, and patient education programs. Objectives
Styles APA, Harvard, Vancouver, ISO, etc.
39

Liang, Bryan. "Crisis on Campus: Student Access to Health Care." University of Michigan Journal of Law Reform, no. 43.3 (2010): 617. http://dx.doi.org/10.36646/mjlr.43.3.crisis.

Texte intégral
Résumé :
College-aged adults are an overrepresented group in the uninsured population of the United States, and traditionally underserved minorities are disproportionately affected. Students with private health insurance are often functionally uninsured as well, since most schools refuse to accept this traditionally elite calling card on campus. Consequently, the large uninsured and functionally uninsured populations often rely on school-sponsored health insurance plans for access to care. These plans have uneven coverage, limited benefits, exclusions and high co-pays and deductibles, and provide littl
Styles APA, Harvard, Vancouver, ISO, etc.
40

Zhou, Xuan, Zhihong Xu, and Ashlynn Kogut. "Research data management needs assessment for social sciences graduate students: A mixed methods study." PLOS ONE 18, no. 2 (2023): e0282152. http://dx.doi.org/10.1371/journal.pone.0282152.

Texte intégral
Résumé :
The complexity and privacy issues inherent in social science research data makes research data management (RDM) an essential skill for future researchers. Data management training has not fully addressed the needs of graduate students in the social sciences. To address this gap, this study used a mixed methods design to investigate the RDM awareness, preparation, confidence, and challenges of social science graduate students. A survey measuring RDM preparedness and training needs was completed by 98 graduate students in a school of education at a research university in the southern United Stat
Styles APA, Harvard, Vancouver, ISO, etc.
41

Tzafestas, Spyros. "Ethics and Law in the Internet of Things World." Smart Cities 1, no. 1 (2018): 98–120. http://dx.doi.org/10.3390/smartcities1010006.

Texte intégral
Résumé :
The aim of the law is to maintain social order, peace, and justice in society, whereas the aim of ethics is to provide codes of ethics and conduct that help people to decide what is wrong, and how to act and behave. Laws provide a minimum set of standards for obtaining good human behavior. Ethics often provides standards that exceed the legal minimum. Therefore, for the best behavior, both law and ethics should be respected. The Internet of Things (IoT) involves a large number of objects and humans that are connected via the Internet ‘anytime’ and ‘anyplace’ to provide homogeneous communicatio
Styles APA, Harvard, Vancouver, ISO, etc.
42

Nicole Wassenberg. "Transatlantic Trade and Investment Partnership (TTIP): The Possible Impact on the European Union and North America." Journal of Advance Research in Business Management and Accounting (ISSN: 2456-3544) 2, no. 8 (2016): 01–08. http://dx.doi.org/10.53555/nnbma.v2i8.92.

Texte intégral
Résumé :
The Transatlantic Trade and Investment Partnership (TTIP) is projected high-standard and inclusive free trade agreement which is being conversed between the United States (US) and European Union (EU). Transatlantic Trade and Investment Partnership is a chain of trade negotiations operating between EU and US. The TTIP is mainly about decreasing the regulatory obstacles to trade to open up a way for bigger businesses such as environmental legislation, food safety, sovereign powers of the individual nations and also banking regulations. The US and EU are two of the most integrated countries when
Styles APA, Harvard, Vancouver, ISO, etc.
43

Glover, Lisa. "Creditworthy: A History of Consumer Surveillance and Financial Identity in America by Josh Lauer." Journal of Intellectual Freedom and Privacy 2, no. 3-4 (2018): 33. http://dx.doi.org/10.5860/jifp.v2i3-4.6482.

Texte intégral
Résumé :
In September of 2017 Equifax, one of the three major consumer credit reporting agencies in the United States, announced its system security had been breached and confidential consumer information may have fallen into the hands of hackers. Although reports of system intrusions are released almost daily, this breach was of particular significance: sensitive data, including personal, identifying and financial data, was compromised for an estimated 143 million consumers in the United States. Just this week, Equifax further disclosed another 15 million client records were breached in the United Kin
Styles APA, Harvard, Vancouver, ISO, etc.
44

Kislitsyn, S. "Partnership for Global Infrastructure and Investment: Goals and Development Prospects." World Economy and International Relations 67, no. 10 (2023): 30–39. http://dx.doi.org/10.20542/0131-2227-2023-67-10-30-39.

Texte intégral
Résumé :
The article is devoted to the Partnership for Global Infrastructure and Investment (PGII). This initiative is a part of the common approaches of the United States and its G7 partners. The prerequisite for its creation was implementing the Chinese “Belt and Road Initiative” (B&amp;R), which the U.S. and its allies consider a severe challenge to their interests in the world economy. The PGII will focus on soft infrastructure development in middle- and low-income countries. It will contribute to introducing modern digital technologies and evolution of Industry 4.0 in developing regions. Furthermo
Styles APA, Harvard, Vancouver, ISO, etc.
45

Dalton, Michelle. "There is a Lack of Standardization in the Collection Development and Circulation Policies of Prison Library Services." Evidence Based Library and Information Practice 8, no. 2 (2013): 248. http://dx.doi.org/10.18438/b8r611.

Texte intégral
Résumé :
Objective – To explore how collection development policies currently support the role and purpose of prison libraries, and to explore if the accessibility of circulation records impacts on patron privacy.&#x0D; &#x0D; Design – Online survey questionnaire and a case study analysis of the existing policy statements of selected correctional institutions.&#x0D; &#x0D; Setting – The prison library sector in the United States.&#x0D; &#x0D; Subjects – 17 librarians and library staff across ten states in the United States.&#x0D; &#x0D; Methods – An eight-question online questionnaire was used to explo
Styles APA, Harvard, Vancouver, ISO, etc.
46

Dr., Madan Lal Bhasin. "Privacy Protection Legislative Scenario in Select Countries." International Journal of Management Sciences and Business Research 5, no. 10 (2016): 14–32. https://doi.org/10.5281/zenodo.3466150.

Texte intégral
Résumé :
The right of privacy is well established in international law. In fact, consumer privacy has attracted the widespread attention of regulators across the globe. Of course, privacy laws vary throughout the globe but, unfortunately, it has turned out to be the subject of legal contention between the European Union (EU) and the United States (US). Protection of personal data privacy under the law has been shaped by the interests of multiple constituencies: individuals, commercial organizations, government agencies, law enforcement, and national security services. For corporations that collect and
Styles APA, Harvard, Vancouver, ISO, etc.
47

Mrvić-Petrović, Nataša. "Criminal law approach to regulating non-consensual pornographic deepfake." Bezbednost, Beograd 66, no. 2 (2024): 5–23. http://dx.doi.org/10.5937/bezbednost2402005p.

Texte intégral
Résumé :
The paper examines the needs and possibilities of applying the criminal law mechanism to prevent the deepfake pornography (digital pornographic content created by the use of artificial intelligence). The criminological characteristics of the phenomenon are described. The legislation of the United States of America, Great Britain, Switzerland, Russia and China, as well as the regulations of the European Union related to the prevention of gender-based violence and liability for the dissemination of deepfakes, was analyzed. Analysis of the Criminal Code of Republic of Serbia showed that legal ref
Styles APA, Harvard, Vancouver, ISO, etc.
48

Venkata Raja Ravi Kumar Gelle. "Revolutionizing U.S. Health Insurance: Leveraging Cloud Computing and Angular/React Development for Scalable, User-Centric Solutions." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 1194–202. https://doi.org/10.32628/cseit251112126.

Texte intégral
Résumé :
This article explores the transformative impact of integrating cloud computing with modern frontend frameworks like Angular and React in the U.S. health insurance industry. The article shows how this technological convergence is enabling insurers to develop scalable, user-centric solutions that enhance customer experiences and operational efficiency. The article discusses the benefits of cloud computing, including flexibility, security, and scalability, and how these advantages translate into improved data management and cost reduction for insurers. It then delves into the role of Angular and
Styles APA, Harvard, Vancouver, ISO, etc.
49

Chakraborty, Parama. "Identity as a Legal Concept & Economic Identity." Inverge Journal of Social Sciences 2, no. 2 (2023): 134–45. https://doi.org/10.63544/ijss.v2i2.33.

Texte intégral
Résumé :
Identity is a multifaceted concept with various meanings and interpretations. In a legal context, identity refers to the characteristics and attributes that define an individual or entity, which are recognized and regulated by law. Identity is a crucial legal concept because it determines an individual's rights, privileges, and obligations under the law. Legal identity is created through the process of identification, which involves providing evidence of one's personal attributes, such as name, age, and nationality, to establish legal recognition. Identity documents, such as passports and birt
Styles APA, Harvard, Vancouver, ISO, etc.
50

Stackhouse-Lawson, Kim, and Logan Thompson. "80 Climate Change and the Beef Industry: A Rapid Expansion." Journal of Animal Science 100, Supplement_2 (2022): 32–33. http://dx.doi.org/10.1093/jas/skac064.053.

Texte intégral
Résumé :
Abstract The beef industry has come under scrutiny in recent decades over its perceived impacts on climate change from both climate scientists and the public. In the United States, only 3.8% of greenhouse gas (GHG) emissions come directly from livestock primarily from enteric methane (CH4) and nitrous oxide (N2O) emissions (EPA, 2021). While this is a small contribution, relative to other industries, beef cattle are important sources of atmospheric CH4, and mitigation of this gaseous emission has been highlighted as a tool to slow global climate change (Lynch et al., 2021). Unfortunately, ther
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!