• Title/Summary/Keyword: Security Conditions

Search Result 884, Processing Time 0.029 seconds

Modernization determinants by ensuring economic security of enterprises in the competitive conditions

  • Tkachenko, Tetiana;Tulchynska, Svitlana;Kostiunik, Olena;Vovk, Olha;Kovalenko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.119-126
    • /
    • 2021
  • The study develops methodological aspects for modeling the determining impact of modernization on the enterprise's economic security in development competitive conditions using the model of speed, stability and spaciousness of modernization. Modeling the determining impact of modernization on the enterprise's economic security in a competitive conditions involves: firstly, the formation of estimated modeling indicators in accordance with the speed, stability and spaciousness of the enterprise's modernization; secondly, establishing the weight of indicators in the assessment system using the tools of cognitive judgment; thirdly, the establishment of reference values of sound evaluation indicators; fourthly, the calculations of the integrated impact assessment of the modernization's determining impact modeling on the enterprise's ensuring economic security in a competitive conditions; fifthly, conducting calculations and analytical summarization of the results. To determine a comprehensive integrated indicator of the modernization changes impact on the competitiveness and economic security of enterprises, we use the correlation method of the calculated value with the reference value, as well as use weights for groups of calculations. Approbation of modeling of determining influence of modernization on maintenance of economic safety of the enterprise in competitive conditions of development by authors was carried out concerning such enterprises, as: JSC "Ukrzaliznytsia", SE "Ukraerorukh", SE IA "Boryspil", SE "Ukrposhta", KP "Kyivpastrans".

Analysts of Assumption Part of Protection Profile for Evaluation of Smart Card (스마트 카드 평가를 위한 보호프로파일의 가정요소 분석)

  • Kim, Tai-Hoon;Kim, Min-Chul;No, Byung-Gyu
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2744-2746
    • /
    • 2003
  • ISO/IEC 15408 requires the TOE(Target of Evaluation) Security Environment section of a Protection Profile(PP) or Security Target(ST) to contain a list of assumptions about the TOE security environment or the intended usage of the TOE. This paper presents a specific conditions should be assumed to exist in the smart card environment and the analysis of those conditions developer of smart card PP must consider.

  • PDF

The Economic Security System in the Conditions of the Powers Transformation

  • Arefieva, Olena;Tulchynska, Svitlana;Popelo, Olha;Arefiev, Serhii;Tkachenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.35-42
    • /
    • 2021
  • In the article, the authors investigate the economic security system in the conditions of the powers transformation. It is substantiated that economic security acts as a certain system that includes components and at the same time acts as a subsystem of the highest order. It is determined that the economic security system of regions acting as a system has its subsystems, which include: production, financial, environmental, innovation, investment and social subsystems. The parameters of the economic security system include relative economic independence, economic stability and self-development of economic systems, and it is proved that an important feature of economic security in addition to its systemic nature is multi-vector. It is substantiated that the monitoring of ensuring the economic security system of the development of economic systems of different levels in the conditions of the powers transformation should contain the analysis of social, economic and ecological development of regions; spheres of possible dangers of the development of regional economic systems; the nature of the threats; the degree of the possibility of threats; time perspective of economic development threats; possible consequences of losses for economic entities; the impact of threats to the object of the economic entities' activity; possible asymmetry of economic development of regional economic entities. Possible threats as a consequence of the powers transformation have been identified. A PEST analysis of the impact of factors of different nature on economic security and the development of regional economic systems in the powers transformation is carried out. A recurrent ratio is proposed for the economic security system in the conditions of the powers transformation.

A Study on procedure of Criminal Cases related to the Security (안보형사법제도의 바람직한 개선방향 제시 - 안보사례분석을 중심으로 -)

  • Joo, Seong-Bhin
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.231-257
    • /
    • 2015
  • Today, the international community make every effort to suppress security crimes, to provide numerous institutional strategies and to prevent security crimes such as the terrorism and spy. Particularly, developed countries in the field of security are strengthening related legislation under new-security conditions. Things work a little differently about security crimes because the nation's benefit and protection of the law is the basis of individual benefit and protection of the law under investigation procedure of the security crimes. Therefore they have policy that permits major investigative agency under the arrest and detention procedure(e.g. security and communication monitoring ${\ldots}$). Criminal procedure's improvement and reinforcement are very important for events related security. But, The investigation procedure between criminal offense and security crimes makes no odds in the Korea. Continuance of such a national mood will accuse of not responding appropriately in preparation for new-security conditions recently. To revise with international best security legislation, We should institute a proper registration system in Korea's situation. This study have been discussing how to improve related legislation under new-security conditions through the cases analysis of the arrest and detention procedure in Korea.

  • PDF

The Mechanism of Labor Motivation as a Determinant of Economic Security of Enterprises in Competitive Conditions

  • Lagodiienko, Volodymyr;Samoilenko, Viktoria;Pasko, Maryna;Ovod, Larysa;Matsulevych, Yevgeniy
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.385-393
    • /
    • 2022
  • In the study of the mechanism of labor motivation as a determinant of economic security of the enterprise in competitive conditions, it was found that motivation is determinant in creating the conditions for production and ensuring the active functioning of the enterprise. It is substantiated that the motivational mechanism is the presence of a system of levers, incentives, measures and other elements for economic and administrative incentives for employees, which are used for incentives to work, increase productivity and safety, and more. The motivational mechanism plays an important role in ensuring the economic security of the enterprise and at the same time is a lever to increase competitiveness in the market. The functions of the mechanism of labor motivation are singled out, among which: explanatory-substantiating, regulative, communicative, socialization, regulating. The stages of occurrence of the motive for the employee are classified. The interrelation of motives and incentives in the mechanism of labor motivation as determinants of economic security of the enterprise in competitive conditions is proved. It is proved that the mechanism of labor motivation as a determinant of economic security of the enterprise in competitive conditions should be aimed at: assistance in forming and achieving goals and objectives of the enterprise and achieving balance and equilibrium of economic goals and social responsibility of the enterprise; ensuring close cooperation between management and employees of the enterprise; focus on building a flexible mechanism; transition to a democratic style of governance and involvement of employees in decision-making.

On the Study Expansion Step of Security industry in the 1970th (1970년대 한국 민간경비산업의 발전과정)

  • Seo, Jin-Seok
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.155-196
    • /
    • 2004
  • In the 1970th, Security industry in Korea based auxiliary measures for confrontation about increase of a crime by Industrialization and Urbanization. However, This based growth of 1980th - 1990th Security industry, On the Study consider expansion step of Security industry in Korea with classification policing conditions in the 1970th and Security Law in the 1976th. In the 1976th, Security industry in Korea play an important part by maintenance of social order and inspire 'Security of one's own accord' into the hearts of the people.

  • PDF

Enhancing utilization and ensuring security: Insights to compromise contradicting conditions in new research reactors

  • Alrammah, Ibrahim
    • Nuclear Engineering and Technology
    • /
    • v.53 no.5
    • /
    • pp.1479-1482
    • /
    • 2021
  • Research reactors are typically well-suited for outreach activities at different levels. However, unplanned seeking to increase the utilization of a research reactor may result in weakening the nuclear security of this facility. Research reactor staff might be in shortage of a functional nuclear security culture; specifically, there might be a conviction that the necessities of research can be given the priority over consistence with security procedural requirements. Research reactors are usually parts of bigger institutes or research labs of different activities. Moreover, the employments of research reactors are usually with the purpose that easy entry to the reactor premises is fundamental. So, they could be co-situated in places with different sorts of activities, mostly under similar security arrangements. The co-area of research reactor offices among different kinds of research labs introduces explicit security issues, the effects of which should be viewed as when building up a nuclear security framework. Notwithstanding potential security vulnerabilities presented in the design, research reactors frequently have devices kept promptly accessible to encourage research and education. The accessibility of these sorts of hardware could be used by an authorized person to commit an unapproved activity or cause harm. This paper aims to present insights to compromise contradicting conditions in new research reactors in which both enhancing utilization and ensuring security are satisfied.

An Analysis of the Impact of the Characteristics of Corporate Information Security Systems upon Technology Acceptance Intention based on UTAUT - Focusing on the Moderating Effect of Innovation Resistance among Semiconductors Production Workers - (통합기술수용이론(UTAUT)을 기반으로 기업정보보호시스템의 특성요인이 사용자 기술수용의도에 미치는 영향 분석 - 반도체 제조 구성원의 혁신저항 조절효과를 중심으로 -)

  • Woogwang Jeon;Seungwoo Son
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.1
    • /
    • pp.36-47
    • /
    • 2024
  • The purpose of this study is to identify the factors that impact the user's intention to accept technology when Introducing new information security systems for the workers of a semiconductor company. The findings of this study were as follows. First, the factors of a company's information security systems, namely reliability, expertise, availability, security, and economic efficiency, all significantly and positively impacted performance expectations. Second, the performance expectation of introducing information security systems for a company significantly and positively impacted the intention to accept technology. Third, the social impact of introducing information security systems for a company had a significant and positive impact on technology acceptance intention. Fourth, the facilitating conditions for introducing a company's information security systems significantly and positively impacted technology acceptance intention. Fifth, as for the moderating effect of innovation resistance, the moderating effect was significant in the paths of [performance expectation -> technology acceptance intention], [social impact -> technology acceptance intention], and [facilitating conditions -> technology acceptance intention]. The implication of this study is that the factors to be considered when introducing information security systems were provided to companies that are the actors of their proliferation, providing the base data to lay the foundation for introducing security technologies and their proliferation.

  • PDF

New Approaches to the Formation of the Food System in Modern Conditions

  • Kulaiets, Andrii;Kulayets, Mariia;Shynkaruk, Lidiia;Kendus, Daria;Gerashchenko, Mykyta
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.51-56
    • /
    • 2022
  • The main purpose of the article is to analyze the main approaches to the formation of the food system in modern conditions. The constant growth of the population, the increase in the level of use of natural resources against the background of a decrease in their reserves causes a number of risks for the food security of both a person and the country as a whole. The problem of the formation of food security has always remained at the center of scientific interests of both domestic and foreign researchers. In the context of globalization, this issue is considered as one of the key global problems in the system. Theoretical and metodological basis studia systematic approach to study of fundamental provisions of economic science regarding the formation of the food system. Based on the results of the study, the main approaches to the formation of the food system in modern conditions were characterized. The study has limitations associated with the lack of the ability to analyze the food system on the practical activities of a single socio-economic system.

Preventive Control for Transient Security with Generation Rescheduling Based on Rotor Trajectory Index

  • Verma, Kusum;Niazi, K.R.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.2
    • /
    • pp.465-473
    • /
    • 2015
  • The increasing need to improve transient security assessment of existing or forecasted operating conditions of networks by power system operators is major concern of the power system security monitoring problem at the Energy Management Systems. This paper proposes a preventive control of transient stability with generation rescheduling based on rotor trajectory index obtained using time domain simulations. This index may help power engineers in making operational decision and to obtain a generation configuration with better transient security dispatch. The effectiveness of the proposed methodology is demonstrated on IEEE 39-bus New England system for a three phase fault at different loading conditions with single and multiple line outage cases.