scholarly journals METHOD OF EVALUATION OF INTEGRATED SECURITY SYSTEMS AT THE OBJECT OF INFORMATION ACTIVITY

2020 ◽  
Vol 2 (10) ◽  
pp. 135-143
Author(s):  
Iryna Litvinchuk ◽  
Nataliia Korshun ◽  
Maksym Vorokhob

The article is devoted to the development of a method for evaluating the effectiveness of the level of protection at the object of information activities when using an integrated security system. Such systems provide for the sharing of resources of subsystems of fire and security alarm, video surveillance, access control systems and others. The application of integration provides a number of benefits, including: quick and accurate reaction to events, facilitating the work of the operator by automating management processes, control and decision-making on security, reducing the probability of erroneous actions of the operator, reducing equipment costs. Among the requirements for integrated security systems are reducing the role of man in the security process by increasing the systems intelligence, reducing the level of false positives due to closer use of subsystems and openness. Implementation of these requirements will increase the efficiency of security systems, reduce the human factor and will make the construction of integrated systems more transparent. The proposed method of assessing the integrated security system summarizes the state of security at the object of information activities, points to the weaknesses of the existing integrated security system, those that need of improvement. It can also be used when selecting the appropriate integrated security system. The assessment of the level of protection takes into account such criteria as complexity, functionality, size, speed, fault tolerance, scalability, interaction with external systems, the possibility of expansion.

2019 ◽  
Vol 4 (1) ◽  
pp. 36-40
Author(s):  
Nur Hidayat Syukron

The growth of motorcycles at this time is very fast. The case of motorcycle theft is still often the case, this happens because there is still a lack of security systems that exist in motor vehicles that only use the ignition key. In addition, the lack of human control systems are still often missed. Motorcycles are the main transportation at this time, so it needs to be made bicycle security system. Security is done in the form of a system with fingerprints in anticipation of the frequent mode of motorcycle theft, which can access by using fingerprints are certain people whose fingerprint data has been programmed into the system, so that the motorcycle can not live without the match between the fingerprint which is detected by the sensor by fingerprint.


2014 ◽  
Vol 680 ◽  
pp. 557-560
Author(s):  
Wang Lin

This paper discusses empirical findings and theories about prison architecture security system and security fence material. As advanced security systems and high quality materials became increasingly significant for prison architecture. The prison insecurity fence design and lag behind materials consume use results in threat of jail safety, which implies that scholar focus on such security design system is necessary. Few people, therefore, doubt the value of new building materials and financial theory to justify prison security system as enhance safeguarding measure. Most scholars of penology promoted consensus on application of new materials can enhance the performance of prison fences, which focus on the security aspects of prison architecture, and this is case studies on the role of security design system and new materials reuse in prison architecture, solutions for make security sustainable development in a national prison system. Thus, there is a continuing need to carry out well-designed research on this question as improve the safety measures. Conclusions and directions for further research are provided.


2017 ◽  
Vol 24 (4) ◽  
pp. 236-244 ◽  
Author(s):  
Yasuo Sasaki

Purpose This paper aims to show that systems intelligence (SI) can be a useful perspective in knowledge management, particularly in the context of the socialization, externalization, combination and internalization (SECI) model. SI is a recently developed systemic concept, a certain kind of human intelligence based on a systems thinking perspective. Design/methodology/approach This paper first provides an overview of the related literature, and then conceptually discusses the role of SI in organizational knowledge creations. Findings SI can work as a powerful momentum in each stage as well as the whole process of SECI. Originality/value This paper is the first application of SI to the field of knowledge management. It provides us with a new perspective to touch human factors in knowledge management processes, which are considered to be essential in the SECI model.


Arsitektura ◽  
2019 ◽  
Vol 17 (2) ◽  
pp. 151
Author(s):  
Reysa Yanarsya ◽  
Rachmadi Nugroho ◽  
Agung Kumoro Wahyuwibowo

<p class="AbstractTitle"><em><span>The role of level II prison in Surakarta as a supporter of the correctional system is based on three aspects. The first aspect is to overcome the problem of prisoners' excess capacity in Indonesia by building prisons in every district or city so that the handling and placement of prisoners are at their place of origin. Second, Surakarta is a city that contributes to the second highest crime rate  in Central Java and the lack of optimal correctional facilities that already exist. Third, the security aspects are the most important factor in establishing prison buildings, because in this era, security is not only done manually but also electronically. The combination of the two security systems can provide the concept of a more modern prison design. The discussion method applied from the beginning to the completion of the design is through the stages of problem identification and exploration, stages of data collection through precedent studies, interviews, observations, and security system theory literature. Then the analysis stages that combine data obtained with theories related to prison buildings. The results of the overall analysis include five concepts of designing prison security system design concepts in the form of deter, detect, delay, halt, and minimize.</span></em></p>


1976 ◽  
Vol 36 (01) ◽  
pp. 104-114 ◽  
Author(s):  
D. L Aronson ◽  
A. J Mustafa

SummaryHuman factor X was purified by several different procedures yielding products which had varying amounts of factor VII and factor IX. Treatment with CHC13 during the fractionation of the factor X removed 95% of the factor VII and factor IX activity and the resulting factor X activated more slowly when incubated in 25% sodium citrate. Removal of residual factor VII by DEAE cellulose chromatography yielded a factor X which activated still more slowly and less completely. When the factor VII, removed by chromatography, was added to the chromatographed factor X, the ability to be activated in 25% sodium citrate was restored. Confirmatory evidence for the role of factor VII in this reaction was the inhibition of the conversion of the factor X by both DFP and SBTI.


2013 ◽  
Vol 1 (1) ◽  
pp. 83
Author(s):  
Ozan Büyükyılmaz

The development and expansion of knowledge management as an important management philosophy has a significant impact on human resources management as well as on organization as a whole. In this context, knowledge management processes have been used as a strategic tool within human resources management.Therefore, functions of human resources management must adapt itself to this change. The purpose of this study is to determine the role of human resources management in the management of knowledge and to reveal the effects of knowledge management practices on the functions of human resources byexamining the relationship between human resources and knowledge management. In this context, a theoretical investigation was conducted. It has been determined that significant changes occurred on the functions of human resources management such as selection and recruitment, performance management, remuneration and reward, training and development within the framework of the knowledge management strategies.


Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


Author(s):  
Stefan Tibuleac

This article analyzes the most current security issues for the Republic of Moldova that are part of the regional security context of Eastern Europe –the region that can be considered the epicenter of international tensions through which the„geopolitical line of fracture”passes. The geographical position of the Republic of Moldova makes this state particularly sensitive to any negative trends in theregion. Growing of international tensions creates security threats and complicates economic development. From a historical point of view, Moldova has repeatedly fallen victim by the confrontation of the great powers. Therefore, the Republic of Moldova has a vital interest in preventing a new conflict in Eastern Europe. This article is based on a number of assumptions made by changes in the European security environment, such as the „shift of weight” to the East, strategic uncertainty, increasing the role of non-state actors, the situation in eastern Ukraine, etc. Based on these assumptions, this article makes an attempt to outline the potential role of the Republic of Moldova in the Eastern European security system, taking into account the desideratum for integration of the republic into the European Union. Other relevant factors will be taken into account for shaping the role of the Republic of Moldova in the European security system, namely: the security deficit; the impact of NATO and EU security policy; the rebirth of the project to create a regional defense alliance, etc. This article will largely take into account the military aspects of security. Keywords: Republic of Moldova, national security, Eastern Europe, NATO, Intermarium, defence, threats, risks, challenges


Sign in / Sign up

Export Citation Format

Share Document