Showing 1 - 20 results of 32 for search 'National Intelligence and Security Service', query time: 0.10s Refine Results
  1. 1
  2. 2
  3. 3

    Network security of the National Natural Science Foundation of China: today and prospects by Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU

    Published 2022-12-01
    “…The National Natural Science Foundation of China (hereinafter referred to as the Natural Science Foundation of China) is responsible for effectively utilizing the National Natural Science Foundation of China, supporting basic research, adhering to free exploration, playing a guiding role, and discovering and cultivating science and technology in accordance with the national guidelines, policies and plans for the promotion of scientific and technological progress and coordinated economic and social development.With the continuous development of new productive forces represented by information technology, the Natural Science Foundation of China has been committed to promoting the informatization and intelligence of fund management.With the increasing complexity of business types, various types of network attacks, such as information leakage attacks, are encountered in the construction of informatization and make network security face severe challenges.The network security construction of the Natural Science Foundation of China was took as the main line and the network security construction of the existing platform was introduced.At present, a network security system structure with the science fund project management as the core has been established to ensure the safe and stable operation of the network system.The main information systems of the Natural Science Foundation of China (Natural Science Foundation Shared Service Network, business department website, email system) and its main threats were analyzed and introduced.Then the thoughts and suggestions in the follow-up informatization and network security construction were given.The Natural Science Foundation of China will start the construction of a new generation of secure network.Under the premise of fully considering the characteristics of science fund review, management, and open sharing, it will achieve the overall goal of “smarter, safer, and better” and carry out network security system construction for relevant units.…”
    Get full text
    Article
  4. 4
  5. 5

    The Role of the Commercial Space Industry within the US National Security under the Trump Administration by E. A. Kuznetsov

    Published 2021-04-01
    “…Finally, the fifth section assesses the prospects for private space activities given the current tightness of the space services market and growing competition. The author concludes that private space plays a subsidiary role within the US national security and is still heavily dependent on state support. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Legal aspects of functional security standardisation of the Internet of Things by P. S. Klimushyn, V. Ye. Roh, T. P. Kolisnyk

    Published 2023-09-01
    “…A review of existing security infrastructures for IoT-based intelligent environments shows that every connected device can be a potential entry point for an attack. …”
    Get full text
    Article
  10. 10

    Digital economy and education in China: globalisation and cyber sovereignty by M. Yu. Zakharov, A. V. Shishkova

    Published 2024-04-01
    “…Several potential spheres of influence on the international community have been highlighted: world-class standardisation; demand for Chinese education (including education in the field of public administration) in the global market for educational services; development of artificial intelligence due to national peculiarities of China (a huge volume of domestic data, the possibility of mass implementation of developments, financial capabilities of the country). …”
    Get full text
    Article
  11. 11

    Presenting the evaluation model of financial technology policies in National Bank of Iran by Vahid moradi, changiz mohammadi zadeh, ali farhadi mahali

    Published 2024-09-01
    “…Theoretical Framework fintech Fintech or financial technology refers to a set of businesses that use software and hardware to provide innovative financial services. The National Center for Digital Research in Dublin, Ireland defines fintech as innovation in financial services (Owzaei & Sohrabi, 2017).   …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics by Chuntang YU, Zhigeng HAN, Zhiyuan LI, Liangmin WANG

    Published 2020-06-01
    “…In view of the security threats such as forgery,deception,privacy disclosure and non-traceability caused by the lack of transaction supervision for crowdsourcing logistics in the modern service industry,a blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics was proposed.Firstly,the framework adopted the two-stage supervision system:one was the National Authorized Certification Center for the supervision of logistics service platform,the other was the logistics service platform for the supervision of crowdsourcing logistics participation.Later,under the framework of the supervision system,the functions of crowd contract,legal and anonymous identity authentication,intelligent transaction matching,anomaly data analysis and detection,privacy protection and traceability were realized.Then,through the security analysis and transaction supervision component software,the security controllability and operational efficiency of the transaction supervision architecture were verified.Finally,the software component was run on the real crowdsourcing logistics enterprise platform for the actual measurement.The measurement results show that the proposed hierarchical and multi-level smart service transaction supervision framework is safe and controllable.The framework can protect the privacy of users and data,prevent forgery and deception,and realize the auditability and traceability of behaviors and data of users.…”
    Get full text
    Article
  18. 18

    DIFUZIA PUTERII DE LA ACTORII STATALI LA CEI NON-STATALI by Octavian-Alexandru-Ștefan BROȘTEANU

    Published 2023-01-01
    “…These new actors take advantage of the fact that you no longer have to be "great" to be relevant on the international stage, thus foreshadowing a series of conflicts between states and non-state organizations for the coming decades. Since the national security of a state remains a duty of the intelligence services, this topic can represent a starting point for the development of other scientific writings, given the fact that, in Romania, the subject of power diffusion is little addressed. …”
    Get full text
    Article
  19. 19

    Customs institutions development strategy: design and implementation issues by V. V. Makrusev

    Published 2022-05-01
    “…The aim of the study was to analyse the existing approaches and methodological support used to research and develop strategic planning documents on national (economic) security of the Russian Federation, and to substantiate proposals and approaches to the design of strategies and programmes for the development of public administration and administration institutions in terms of foreign economic and customs activities. …”
    Get full text
    Article
  20. 20

    Ulovlig påvirkningsvirksomhet i samarbeid med fremmed etterretningstjeneste by Martin Hennig

    Published 2021-12-01
    “…Furthermore, it is argued that national security agencies should aid citizens in identifying what constitutes »unlawful influence activities«, and provide further criteria which can enable citizens to recognize »foreign intelligence services« with whom cooperation is prohibited.…”
    Get full text
    Article