Science topic

Security Measures - Science topic

Regulations to assure protection of property and equipment.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Security Measures (10,000)
Sorted by most recent
Article
Full-text available
The article proposes to consider comprehensively the features of the rumors phenomenon, the circumstances under which they arise, and the social role they play. A brief analysis of the key stages of studying the phenomenon of rumors in different historical periods is given. Accordingly, the main characteristics and attempts to systematize rumors at...
Article
Full-text available
Social media plays a pivotal role in shaping communication among political entities. Substantial research has been carried out for examining the impact of politicians’ social media usage and interactions on political polarization. Analysing political polarization is particularly significant for fragmented political systems like India where collabor...
Article
Full-text available
Background Understanding and addressing healthcare and service delivery inequalities is essential to increase equity and overcome health disparities and service access discrimination. While tremendous progress has been made towards the inclusion of sexual and gender minorities in health and other research, gaps still exist. Innovative methods are n...
Article
Full-text available
The term ‘resilience’ has increasingly featured in foreign and security policy discourse, appearing in the 2016 European Union Global Strategy, the 2017 US National Security Strategy, and most recently in the UK’s 2021 Integrated Review. These strategies note the importance of preparing for, responding to, and recovering from crises that could affe...
Conference Paper
Full-text available
Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic...
Conference Paper
Full-text available
DNS hijacking represents a security threat to users because it enables bypassing existing DNS security measures. Several malware families exploit this by changing the client DNS configuration to point to a malicious DNS resolver. Following the assumption that users will never actively choose to use a resolver that is not well-known, our paper intro...
Poster
Full-text available
In order to obtain relevant and timely support for strategic decision making related to the national security and defence, many countries have established research organizations appropriate for their needs and visions. That organizations usually are named as centers or insitutes for strategic research (strategic studies, or strategic analysis) for...
Article
Full-text available
Technology is growing exponentially in the recent years and most of the organizations store their data in digital format. With the rapid growth in technology, there is a need for maintaining security of data. It is extremely essential as data leak might have a huge effect on the organization. Preventing data leak has become one of the biggest chall...
Chapter
Full-text available
Hong Kong’s apex court invites highly regarded judges from other common law jurisdictions to sit as full members for (renewable) three-year periods. This Chapter begins by outlining the basics of the ‘overseas judge’ system as it operates in Hong Kong and shows that the justification generally proffered is different than those made for similar syst...
Article
Full-text available
In this paper, a comparative analysis of expenditure items of the budgets of Uzbekistan and some countries of the world is carried out. The main issue raised in the study is the existence of priorities in Russia's budget policy. The paper argues that in Uzbekistan, budget priorities are shifted towards defense and national security, and not towards...
Article
Full-text available
As automobiles become more electrified, more and more Electronic Control Units (ECU) are installed in vehicles. ECUs communicate with each other through dedicated protocols such as a controller area network (CAN), but these protocols do not have their own security measures. Many cyberattacks have exploited this weakness, but an intrusion detection...
Preprint
Full-text available
In the IT Security world, there is a lack of available, reliable systems for measuring security levels/posture. They lack the range of quantitative measurements and easy and fast deployment and potentially affect companies of all sizes. Readily available security standards provide qualitative security levels, but not quantitative results that would...
Article
Full-text available
The state of Jammu and Kashmir has been the focus of an enduring rivalry between India and Pakistan. Both states consider Kashmir as part of their sovereign territory, marking it as a perceptual ‘territory of desire’. For India, Kashmir is an integral part of its territory and a symbol of secular nationalism. However, for Pakistan, the Kashmir issu...
Article
Full-text available
The rising wave of insecurity in Nigeria has fuelled crime rate and terrorists attacks in different parts of the country, leaving unpalatable consequences for the nation’s economy and its growth. Despite the plethora of security measures taken to address the daunting challenges of insecurity in Nigeria, government efforts have not produced the de...
Article
Full-text available
Energy is an important support for national economic development, and energy security directly affects national security, sustainable development, and social stability. The Middle East has the largest energy reserves in the world. Saudi Arabia is located in the Middle East and is a big energy country with very rich resources. With the reduction of...
Research
Full-text available
This 1-page ppt slide contains referenced information about "the issuance of up to a thousand visas for German and Austrian scientists ‘in the interest of national security" (page 21 [1]), with in the end "more than seven hundred scientists, engineers, and other technical specialists who had served the Third Reich" (page 22[1]) who came to the Unit...
Article
Full-text available
The COVID-19 pandemic has reiterated the interdependence of health security and health systems, and the need for resilient health systems to prevent large-scale impacts of infectious disease outbreaks and other acute public health events. Three years into the COVID-19 pandemic has led to discussions on how to “build back better”, making it importan...
Preprint
Full-text available
The Emerging Infectious Disease (EID) crisis has been challenging global health security for decades, dealing substantial damage to all socioeconomic landscapes. Control measures have failed to prevent or even mitigate damages of an accelerating wave of EIDs, leading to the emergence and devastation caused by the COVID-19 pandemic. In the wake of t...
Conference Paper
Full-text available
Satellite technologies are used for both civil and military purposes in the modern world, and typical applications include Communication, Navigation and Surveillance (CNS) services, which have a direct impact several economic, social and environmental protection activity. The increasing reliance on satellite services for safety-of-life and mission-...
Article
Full-text available
Background: A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards), providing access to data for research while protecting patient confidentiality. Accessing sensitive data without compromising the privacy and security of the data is a complex pro...
Article
Full-text available
Муха, Д. В. Актуальные вопросы обеспечения научно-технологической безопасности Республики Беларусь в условиях инновационного развития национальной экономики / Д. В. Муха // Вестник Института экономики НАН Беларуси. – 2022. – Вып. 4. – С. 21–42. http://doi.org/10.47612/2789-5122-2022-4-21-42. В статье раскрыты существующие теоретико-методологически...
Article
Full-text available
Abstract This paper argues that there is an increasing dispute between China and United States on international technical standards, with national security as a central element and involving emerging and critical technologies. Based on Krasner’s structural perspective on international regimes, it shows that historically, states’ powers and interest...
Article
Full-text available
This study uses the entropy method to measure the comprehensive evaluation index of 30 provincial samples, with the exception of the Tibet, Hong Kong, Macao, and Taiwan regions, of farmland intensive utilization and new-type urbanization in China. This study also builds a coupling coordination model to measure the coupling degree, coordination degr...
Article
Full-text available
The current Hong Kong situation is the product of a long-term accumulation of crises and the consequences of the broader interplay of clashes among nations. Taiwan has long seen the PRC’s treatment of Hong Kong as a barometer of its Taiwan policy. The “One Country, Two Systems” formula was proposed with an eye on Taiwan. In recent years, Beijing se...
Conference Paper
Full-text available
Socrates (470-390 B.C.) stated democracy is based on education. When there is a lack of education, election problems develop. The 2020 presidential election has raised questions of being rigged. Through election technology & security education, such questions can be resolved. The purpose of this paper is to propose a curriculum on election security...
Article
Full-text available
Smart Grids (SGs) are governed by advanced computing, control technologies, and networking infrastructure. However, compromised cybersecurity of the smart grid not only affects the security of existing energy systems but also directly impacts national security. The increasing number of cyberattacks against the smart grid urgently necessitates more...
Article
Full-text available
In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. One of the big issues in securing IoT communications is that...
Article
Full-text available
Improving the accessibility of coal transportation is a crucial issue for energy security, national defense, and livelihoods. In this study, a method to evaluate the performance of the port-centric coal transportation chain (PCTC), which is a crucial part of the international coal production and delivery process, is proposed. After analyzing the fe...
Article
Full-text available
The article outlines the European Union (EU) regulation of information technology (IT) security in Internet of Things products from a consumer and end user perspective. It starts with civil law and the necessity to address security requirements and specifications in individual contractual terms. Data and consumer protection laws have not helped muc...
Article
Full-text available
To implement new software functions and more flexible updates in the future as well as to provide cloud-based functionality, the service-oriented architecture (SOA) paradigm is increasingly being integrated into automotive electrical and electronic architecture (E/E architectures). In addition to the automotive industry, the medical industry is als...
Article
Full-text available
The sensitive and selective detection of nitroaromatic explosives is of great significance to national security and human health. Herein, the novel linear polymer l-PAnTPE and cross-linked polymer PAnTPE nanoparticles based on anthracene and tetraphenylethene groups were designed and successfully synthesized via Suzuki-miniemulsion polymerization....
Article
Full-text available
Resume This paper deals with the use of modern technology for security purposes, focusing on the situation in cities (urban noise and shooting) and in transport (passenger rail). The authors aimed to highlight the possibilities and capabilities of installation of technology in the field of applied physical acoustics (sensors, evaluation system with...
Article
Full-text available
Literature in cyber security including cyber security in energy informatics is overly technocentric focuses that may miss the chances of understanding a bigger picture of cyber security measures. This research thus aims to conduct a literature review focusing on non-technical issues in cyber security in the energy informatics field. The findings sh...
Article
Full-text available
Power struggle and supremacy are underlying in international relations and international law (Orr, D. A. 2002). Many nations and states are concerned with the right or power to govern their territories or be governed by other external powers. As such, the concept of sovereignty comes into mind. To be governed by another state comes along with many...
Article
Full-text available
Background Given the unprecedented nature of the COVID-19 crisis and the importance of early implementation of prevention programs, it is essential to understand better its potential impacts on various food security dimensions and indicators. Methods Research databases, including Cochrane Central Register of Controlled Trials (CENTRAL), Cochrane P...
Article
Full-text available
The border security situation is complex and severe, and the border patrol system relying on the ground-air cooperative architecture has been paid attention to by all countries as an important means of protecting national security. In the flying ad-hoc network (FANET), under the ground-air cooperative architecture, an unmanned aerial vehicle (UAV)...
Technical Report
Full-text available
How has Baku's foreign policy changed following Russia’s invasion of Ukraine? On the one hand, Azerbaijan supports Ukraine’s territorial integrity; on the other, it is cautious about angering the Kremlin for the sake of its national security. Given this quandary, how is Baku pursuing its multifaceted foreign policy? To answer such questions, we oug...
Article
Full-text available
The contemporary world is undergoing profound processes of change, many of them unprecedented in terms of the scale on which they occur and their content or effects. In such a troubled context, the issue of security is becoming more acute by the day. All these changes involving a multidimensional security environment have generally become more acut...
Article
Full-text available
In the name of health security, individual freedoms were constrained in an unprecedented way in many countries, democratic or authoritarian, all over the world during the COVID-19 pandemic. Yet the constraints have not been consistent across countries, which motivates this paper to examine the relevance of value preferences towards freedom or secur...
Article
Full-text available
The pandemic caused by COVID-19 has changed the world forever, forcing it to turn to the values, which, under globalized capitalism, were rapidly decreasing in significance. This transformation should take place based on the idea of safeguarding and caring for life, therefore the issue of public health is of particular relevance. The pandemic has c...
Article
Full-text available
This study examined factors that influence adequacy of private housing estates in the Federal Capital Territory, Abuja from residents' perspectives. Questionnaires were administered on 280 household heads of three different private housing estates on their socio-economic characteristics and their perception about their housing unit attributes. Like...
Conference Paper
Full-text available
The final assembly of an aircraft or a spacecraft is a rigorous task that requires full traceability of the parts installed, their fabrication processes, and the assembly work. This is also the case for each of its sub-assemblies. Safety and security go hand in hand in the production of these flying machines, and even more so for satellites and spa...
Preprint
Full-text available
Security of Additive Manufacturing (AM) gets increased attention due to the growing proliferation and adoption of AM in a variety of applications and business models. However, there is a significant disconnect between AM community focused on manufacturing and AM Security community focused on securing this highly computerized manufacturing technolog...
Preprint
Full-text available
Many individuals, organizations, and industries rely on web applications for the daily running of their businesses and operations. With the increasing deployment and reliance on web applications, much focus has been paid to the development of more accurate and secure mechanisms to protect web applications from malicious attacks on the web. The slow...
Technical Report
Full-text available
This supplement provides statistics that complement those in Household Food Security in the United States in 2021 (ERR-309), a research report that presents the primary national statistics on house-hold food security, food spending, and the use of Federal food and nutrition assistance programs by food-insecure households. Additional statistics here...
Chapter
Full-text available
The transport of dangerous goods consists of the carriage of goods presenting potential risks to the people, living organisms, the environment, and materials (public or private property) and therefore necessitates dedicated and specially reinforced security measures. According to global statistics, dangerous goods may constitute about fifty percent...
Preprint
Full-text available
We present a detailed strong lensing analysis of the massive and distant ($z=0.870$) galaxy cluster ACT-CL J0102$-$4915 (ACT0102, also known as El Gordo), taking advantage of new spectroscopic data from the Multi Unit Spectroscopic Explorer (MUSE) on the Very Large Telescope, and archival imaging from the Hubble Space Telescope. Thanks to the MUSE...
Presentation
Full-text available
This research argues that consecutive governments in Sri Lanka’s cautionary approach to engaging with its diaspora – which at times were more impotent than active – has resulted in viewing Sri Lankan diaspora factor from a national security lens.
Article
Full-text available
Since it affects a nation’s economy and people’s wellbeing, food security is a crucial national security requirement. In order to realize multi-angle grain data presentation and analysis and achieve the goal of deep mining, we propose a 3D dynamic visualization analysis method of multidimensional agricultural spatial–temporal data based on the self...
Presentation
Full-text available
The discussion about “crime” or the manifestation of security threats usually involves two important elements: MOTIVE (i.e. easy profit for a pirate or the person involved in an “armed robbery”.); and OPPORTUNITY (i.e. the influence of geography (reducing speed when transiting a busy waterway, or the absence of the State’s capability to enforce the...
Preprint
Full-text available
The Brahmaputra mainly flows through three countries China, India, and Bangladesh. It has been a source of conflict for the involved nations due to the intricacies of transboundary water management such as the power play between upper and lower riparian countries, the lack of comprehensive bilateral or multilateral cooperation policies, and the cor...
Article
Full-text available
This paper studies the issue of financing the Space Industry at the State Level in the Postwar period as part of the country’s recovery plan, as one of the foremost critical zones of technological development and to ensure space security and defence. The European Space Agency (ESA) is, identified as the main player in the European space sector. It...
Book
Full-text available
This SpringerBrief contains eight chapters and presents an overview of the evolution of the Moroccan Cybersecurity Strategy. It also draws attention to the development of cybersecurity in Morocco and to ensure national security in the context of the current and developing information confrontation in the international community. However, it cannot...
Article
Full-text available
As safety and security are essential for creating successful sustainable communities and urban planning, it is important for proper planning of safety and security measures to be implemented to reduce crime in a city. Crime Prevention through Environmental Design (CPTED) strategies are used in many advanced states to safeguard community members fro...
Article
Full-text available
It is noted that today the Black Sea region geographically includes states belong-ing to various political and military associations, due to the specifics of civilizational identification, excellent philosophy of state-building processes of the Black Sea countries, and internationalization of political processes, crises and conflicts in this geopol...
Article
Full-text available
Detecting malicious activity in advance has become increasingly important for public safety, economic stability, and national security. However, the disparity in living standards incites the minds of certain undesirable members of society to commit crimes, which may disrupt society’s stability and mental calm. Breakthroughs in deep learning (DL) ma...
Article
Full-text available
Several cell types and a wide variety of inflammatory mediators are involved in the chronic airway inflammation that characterizes asthma. The study aims to uncover a link between high serum immunoglobulin E IgE levels and childhood asthma. This cross-sectional study was conducted from March to July 2022 at Khyber Teaching Hospital Peshawar, Pakist...
Article
Full-text available
Mobile banking application solutions are now the most preferable means of performing financial transactions and almost all banks in Nigeria have developed and deployed at least one mobile application to service their Client (Customers). However, the security of users of these solutions is a critical issue that cannot be overlooked and understand th...
Article
Full-text available
Information security protection has a tremendous impact on human life, social stability, and national security, leading to the rapid development of anti‐counterfeiting materials and related techniques. However, the traditional stored information on hard or dry media is often static and lacks functions, which makes it challenging to deal with increa...
Article
Full-text available
The paper focuses on examining the implications of Political Thuggery on Electoral Process in Nigeria. Its general objective is to examine the effects of political thuggery or violence on electoral process with inferences from Nigeria; with specific objectives to i). Identify the implications of Political Thuggery to national security, and ii). pro...
Article
Full-text available
The development of the social security system is to show the progress of each country, each state, and on a worldwide scale. Therefore, at present, every government in the world is trying to build and implement a basic human social security system through its specific policy system, contributing to building a progressive society, towards the values...
Technical Report
Full-text available
This report is a summary of a 3-year LDRD project that developed novel methods to detect faults in the electric power grid dramatically faster than today's protection systems. Accurately detecting and quickly removing electrical faults is imperative for power system resilience and national security to minimize impacts to defense critical infrastruc...
Article
Full-text available
Introduction The COVID-19 pandemic, and the consequent recession, have caused a decline in the job market, with the resultant job insecurity increasing the risk of depression. While this affected all genders, suicidal thoughts were observed to be more common among women than men, suggesting that the impact of unemployment on depression varies by ge...
Article
Full-text available
The death penalty in Malaysia is a British colonial legacy that has undergone significant scrutiny in recent times. While the Malaysian Federal Constitution 1957 provides that ‘no person shall be deprived of his life or personal liberty save in accordance with law’, there are several criminal offences (including drug-related crimes) that impose the...
Article
Full-text available
As Cuba achieves one of the lowest per capita ecological footprints in the world, the country’s overshoot day was on 1 December 2019, while some European countries already reach this limit in February (e.g., Luxembourg), monitoring the environmental preferences of the Cuban younger generation may offer valuable behavioral or pedagogical insights in...
Article
Full-text available
As healthcare data is extremely sensitive, it poses a risk of invading individuals' privacy if stored or exported without proper security measures. De-identification entails pseudonymi-zation or anonymization of data, which are methods for temporarily or permanently removing an individual's identity. These methods are most suitable to keep user hea...
Article
Full-text available
This article examines the verdict in HKSAR v Tong Ying Kit, the first criminal trial under the new National Security Law's secession and counter-terrorism criminal provisions. The article uses international human rights law and comparative law on counter-terrorism to argue that the verdict ignores rights-based jurisprudence, which could reconcile t...
Article
Full-text available
A Greedy Perimeter Coordinator Routing and Mobility Awareness (GPCR-MA) vehicular routing is a widely accepted routing protocol for VANET (Vehicular Ad hoc Network). The insufficiency of security measures in the operating design of GPCR-MA gives possible exposure to a Sybil attack. During a Sybil attack, the attacker (usually a vehicle) collects da...
Article
Full-text available
An unauthorized leak of information that is not tolerable always implies inadequate or poor security measures of information. Globally, the hospitality industry has in the recent past been targeted by cybercrimes. Management of cybercrimes are divided into facets like policies of security frameworks, cyber-threats, and management appreciating the v...
Article
Full-text available
Background and aims Object attachment is the emotional bond or connection that we have with possessions. Although thought to be ubiquitous, when excessive, object attachment is presumed to contribute to compulsive buying and hoarding problems. Unfortunately, our understanding of this relationship has been limited by the constraints of existing obje...
Article
Full-text available
The challenge of tracking unmanned aerial vehicles (UAVs) is arising out of increasing their market and spread usage in many applications. Miscuing UAVs can lead to potential threats as they are considered an essential part of national security. One of the major issues in communication with UAVs is the enormous amount of data generated by UAVs that...
Article
Full-text available
Chieftaincy succession conflicts are a near-ubiquitous phenomenon in Ghanaian Chiefdoms. While many studies have investigated the causes and implications of such conflicts, the extent to which traditional and central authorities collaborate in the management of chieftaincy succession conflicts in Ghana is largely understudied. This is the gap in th...
Article
Full-text available
This study investigates the spillover effects among partisan conflict, national security policy uncertainty and tourism (i.e., tourist arrivals, exports, and stock) in the U.S. by using the TVP-VAR-based connectedness measures. Specifically, we discuss the association strength, spillover direction and dynamic linkages among the three under this fra...