-
161
Legal bases for counteracting financial terrorism
Published 2021-09-01“…Financial terrorism is primarily a threat to the economic interests of the state, and therefore threatens national security in general. The fight against financial terrorism is directly linked to financial security. …”
Get full text
Article -
162
Analysis and enlightenment on the cybersecurity strategy of various countries in the world
Published 2016-01-01“…National cybersecurity strategy is the top-level design and strategic framework of the country, which in-cludes the national security, risk management and the personal protection. …”
Get full text
Article -
163
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
Published 2019-06-01“…Cyberspace security is a matter of national security,and the talent cultivation is of top priority.Based on the experience of developing the first-class cyber security college of Beihang University,this paper analyzes some common issues,and discusses the ideas,mechanisms and patterns of cyberspace security talents cultivation from the aspects of the talents selection,curriculum system,comprehensive training platform,practical training and academic competitions.It may provide a reference for the training of cyber security professionals.…”
Get full text
Article -
164
Digitalization of national economy
Published 2019-09-01“…The gradual transition to a digital model of development will increase the competitiveness of Russian products on international markets and it will also contribute to the improvement of national security. Analysis of the implementation of information and communication technologies in the national economy shows significant lag behind the leaders. …”
Get full text
Article -
165
Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine
Published 2018-12-01“…The link element through which the system of objects of this crime is formed is defined as the general sphere of social activity, where the mentioned social relations arise, develop and operate, namely, the national security of Ukraine. Thus, all social relations, which are put under the protection of Section XIV of the Special Part of the Criminal Code of Ukraine, arise and function in general in order to safeguard the interests of Ukraine’s national security. …”
Get full text
Article -
166
-
167
Research and applications of intelligent public security information system based on big data
Published 2016-12-01“…The rapid development of big data push the big changes to every industries and government agencies.The concept of big data and security intelligent system framework was cleared.Then,the serious problems of the devel-opment of intelligent public security were analyzed,the novel work model of public security was also studied,and the new paths and method were pointed ont.Next,the intelligent information system for public security was built up,and the effectiveness of this system were evaluated.The system can efficiently meet the requirements of the current public security,and serve the national security with great significance.…”
Get full text
Article -
168
Ballot initiatives and the national debate on immigration
Published 2012-01-01“…As of 1996 new laws related to immigration and access to welfare benefits followed the main guidelines of Proposition 187; since the 9-11 attacks national security has become the main axis of immigration laws. …”
Get full text
Article -
169
Research on cyberspace security situation awareness
Published 2016-10-01“…Cyberspace is the fifth sovereignty space after the sea,land,sky and space.The security of cyberspace is closely relative to national security.How to discover threat in time,how to defense network attack,how to trace attackers were the problems to be selved.Facing the polyphyletic,isomeric,disconnected properties in the cyberspace,bases on a credible IaaS,a cyberspace security situation awareness was constructed by ontology,semantic Web and linked data theory.While guarantee the access security of integrating data,the model could make a comprehensive analysis on the properties in the cyberspace,which contributes to cyberspace governance.…”
Get full text
Article -
170
L’appel à l’ennemi : l’anticommunisme à l’École supérieure de guerre au Brésil (1954-1964)
Published 2021-03-01“…The focus is on the conferences given by judges, academics and psychiatrists who saw Communism as a political doctrine and a threat to national security. Opposing Communism helped pull these elites together and shaped the central axis of the new doctrine that both civilians and military officers were elaborating at the Superior War College. …”
Get full text
Article -
171
THE EUROPEAN UNION (EU) AND THE CLIMATE-SECURITY NEXUS: CSDP MISSIONS AND OPERATIONS
Published 2022-12-01“…For some scholars, the linkages between climate change and security should be analyzed from the national security perspective, whereas others from a human security perspective. …”
Get full text
Article -
172
Stratégies de partage et diffusion de données publiques environnementales
Published 2013-09-01“…On the contrary, in French Guiana, there is a reduction of information distribution concerning gold mining impacts, linked to an increased involvement of national security state services in the monitoring process.…”
Get full text
Article -
173
Research status and development trends of security assurance for space-ground integration information network
Published 2016-11-01“…Space-ground integration information network consists of space-based backbone network, space-based access network, the node net of foundation, Internet, mobile communication network, which has important significance for the realization of the target of national security strategy. Firstly, the characteristics of space-ground integration network, such as exposed channel, heterogeneous network integration, etc, were analyzed. …”
Get full text
Article -
174
Donald Trump et les services de renseignement : une relation sous tension
Published 2018-09-01“…The foreign policy decision-making process has been influenced by the intelligence community since at least 1947 when the passage of the National Security Act led to the creation of the Central Intelligence Agency. …”
Get full text
Article -
175
Research and practice of network security threat intelligence management system for power enterprise
Published 2022-07-01“…Network security is an important part of the national security, and network security threat intelligence work has become an important part of the network security protection.Aiming at the problems of power enterprise carrying out network security threat intelligence, such as many sources, many types, wide range, many vulnerability risks, many subordinate departments and personnel, the network security threat intelligence work plan of power enterprise was put forward.The scheme includes five aspects: information source, information research and judgment, information disposal, information platform and information performance.The evaluation method of network security vulnerabilities, information emergency disposal process and information performance evaluation method were puts forward.The preliminary application results show that the proposed scheme has important reference value for power enterprise to improve the emergency response ability of network security information and the level of network security protection ability.…”
Get full text
Article -
176
Evolution of approaches to defense policy in Japan in the post-war period
Published 2024-12-01“…The study examines the key steps of the Japanese leadership towards strengthening of national security policy against the backdrop of a tendency to gradual transition from the implementation of defensive measures to the formation of a base for offensive operations. …”
Get full text
Article -
177
A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures
Published 2020-01-01“…Critical infrastructures are essential for national security, economy, and public safety. As an important part of security protection, response strategy making provides useful countermeasures to reduce the impacts of cyberattacks. …”
Get full text
Article -
178
Combating Cybercrime and Cyberterrorism in Indonesia
Published 2023-02-01“…Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current regulatory measures. …”
Get full text
Article -
179
Satellite-Earth Integration Intelligent Resource Management and Control Architecture of Giant Sensing Constellation
Published 2022-09-01“…The giant sensing constellation will have the capabilities of on-board automatic processing, on-board independent planning, multisensors and multi-mode automatic switching.The traditional control mode of relying solely on the ground system can no longer meet the requirements of the giant sensing constellation.According to the requirements of intelligent and networked control, an integrated intelligent resource management and control architecture was proposed.It was based on the integration of satellite and earth.The work contents of satellite and earth were specifically designed.The interaction mechanism between satellite and earth was designed.The architecture it proposed could be well applied to the independent resource management and controlled of giant sensing constellation.The architecture realized the "networking, autonomy and intelligence" of the giant sensing constellation and it could played an important role in major national security emergency response and other tasks.…”
Get full text
Article -
180
The Risks of the would be Modernization of the Country: Sociologists-Riskologists are Required
Published 2009-12-01“…The problem of innovative approaches to the national security is analyzed in connection with new possibilities of risk management. …”
Get full text
Article