Showing 2,761 - 2,780 results of 5,943 for search '"securities"', query time: 0.10s Refine Results
  1. 2761

    Analysis of global experience in creating digital platforms and related risks by T. B. Timofeeva, E. A. Ozdoeva

    Published 2020-10-01
    “…The following types of digital risks have been considered: information security risks, organized cybercrime risks, reputational risks, legal risks, operational risks and risks of instability of participants’ income. …”
    Get full text
    Article
  2. 2762

    HUMAN RIGHTS, FUNDAMENTAL FREEDOMS AND UNIVERSAL VALUES IN INTERNATIONAL RELATIONS by L. S. Voronkov

    Published 2016-08-01
    “…The author emphasizes the import role of the Conference on Security and Cooperation in Europe (CSCE) in transforming the issues of human rights and fundamental freedoms into the essential element of public diplomacy of contemporary states. …”
    Get full text
    Article
  3. 2763
  4. 2764

    Quality of public services in the field of population administration in malang public administrative mall by Didik Supriyanto

    Published 2023-12-01
    “…Employees in terms of helping people who need services, especially people who are confused about services, have been seen between officers and visitors who communicate with each other. Security at the Malang City Public Administration Mall has shown efforts to improve the quality of its services related to providing a sense of security for the community. …”
    Get full text
    Article
  5. 2765

    An Analysis of Spatial Pathology of the Physical and Social Structure of the City with Non-Relevant Defense Approach Case Study: Tehran Metropolitan Area by s z, a t, m a

    Published 2019-06-01
    “…In addition, it was revealed that education and awareness, resiliency against security-military threats, skill and expertise, respectively, are the effective indicators of the vulnerability of the social structure of the area.…”
    Get full text
    Article
  6. 2766

    ECP-IEM: Enhancing seasonal crop productivity with deep integrated models. by Ghulam Mustafa, Muhammad Ali Moazzam, Asif Nawaz, Tariq Ali, Deema Mohammed Alsekait, Ahmed Saleh Alattas, Diaa Salama AbdElminaam

    Published 2025-01-01
    “…Accurate crop yield forecasting is vital for ensuring food security and making informed decisions. With the increasing population and global warming, addressing food security has become a priority, so accurate yield forecasting is very important. …”
    Get full text
    Article
  7. 2767
  8. 2768

    The Kurdish Movement’s Factor in US Politics at the Peak of Iran and Afghanistan Crises, 1979 – January 1981 by V. T. Yungblud, A. I. Sennikov

    Published 2023-11-01
    “…Faced with the challenges presented by the Iranian and Afghan crises, the United States' analytical, intelligence, and military bodies navigated various resources in search of viable solutions.This study delves into the consideration of the Kurdish factor as a potential instrument in shaping the regional landscape. The National Security Council (NSC), State Department, Central Intelligence Agency (CIA), and the US Department of Defense all scrutinized the Kurdish movement, evaluating its prospects for advancing American interests. …”
    Get full text
    Article
  9. 2769
  10. 2770
  11. 2771

    Transformation in European Defence Supply Chains as Ukraine Conflict Fuels Demand by Roland Hellberg, Martin Lundmark

    Published 2025-01-01
    “…This study contributes to a deeper understanding and theoretical advancement in managing military and security challenges, with particular emphasis on enhancing readiness, resilience, and the scaling of military capabilities across cross-border defence supply chains.…”
    Get full text
    Article
  12. 2772
  13. 2773

    Efficient data possession–checking protocol with deduplication in cloud by Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao

    Published 2017-08-01
    “…Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. …”
    Get full text
    Article
  14. 2774

    Virtual Simulation Design Facing Smart Payment Screen on the Background of Artificial Intelligence by Yan Li, Xiao Wang

    Published 2022-01-01
    “…The design of the smart payment screen makes the user’s payment more secure, and the payment risk is greatly reduced.…”
    Get full text
    Article
  15. 2775

    Digitization and Preservation of Academic Records: A case Study of Kabale University Registry. by Ainanani, Catherine

    Published 2024
    “…The study also identified several threats to these records, such as inadequate data security measures, insufficient storage space, cybersecurity threats, poor maintenance of digitization equipment, technological obsolescence, and potential disasters. …”
    Get full text
    Thesis
  16. 2776

    Advanced Measuring (Instrumentation) Methods for Nuclear Installations: A Review by Wang Qiu-kuan, Lin Chang-hua, Yang Yan

    Published 2012-01-01
    “…The research of measurement in nuclear installations involves many aspects, such as nuclear reactors, nuclear fuel cycle, safety and security, nuclear accident, after action, analysis, and environmental applications. …”
    Get full text
    Article
  17. 2777

    STRUCTURE AND CONTENT OF PRODUCTION ANALYSIS IN RETAIL CHAINS by A. Dvoryankina, T. Rogulenko

    Published 2017-09-01
    “…The issues of analysis in the enterprise security system are touched.…”
    Get full text
    Article
  18. 2778

    Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia by Richard J. Henny, Jianjun Chen, Terri A. Mellich

    Published 2009-06-01
    “…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
    Get full text
    Article
  19. 2779

    IMPLEMENTATION OF PUBLIC-PRIVATE PARTNER-SHIP PROJECTS IN THE RUSSIAN ARCTIC by O. Bolshakova, V. Volkova, A. Surnova

    Published 2018-06-01
    “…The importance of this task is determined by the fact that the reserves of natural resources located in the Arctic should provide the basis for the energy and economic security of the country. The comparative analysis of ways of realization of infrastructure projects on the basis of the state order and public - private partnership is carried out. …”
    Get full text
    Article
  20. 2780

    THE COMINFORM EMIGRATION IN BULGARIA by Milan Milenković

    Published 2025-02-01
    “…Research is mostly based on unpublished sources from the State Security Service (UDB) that are kept in the State Archives of Serbia, and also on relevant literature.…”
    Get full text
    Article