Contracting Out to Manage: Evidence from Security Service Suppliers and Clients in India

2021 ◽  
Vol 2021 (1) ◽  
pp. 11778
Author(s):  
Saikat Chakraborty ◽  
Ernesto Noronha ◽  
Premilla D'Cruz ◽  
Parvinder Gupta
2020 ◽  
Vol 23 (11) ◽  
pp. 1291-1312
Author(s):  
N.V. Zyleva

Subject. This article discusses the practice of ensuring the economic security of oil and gas companies operating under the terms of production sharing agreements, where minerals are the object of security. Objectives. The article aims to justify the need to apply professional judgment in the organization of reliable accounting of minerals, explored and extracted under the terms of the production sharing agreement implementation, to avoid various risks to the entity's economic security. Methods. For the study, I used the methods of deduction and modeling. Results. The article presents proposals to arrange accounting of intangible exploration assets (geological information on mineral reserves) and finished products (the part of the extracted minerals owned by the investor and the part owned by the State). Conclusions. As strategic minerals, oil and gas are the targets of various economic risks. Professionals familiar with the specifics of accounting operations in the implementation of the production sharing agreement should be prepared to prevent these risks. The results obtained can be used to design accounting policies and develop local regulations on the tasks and functions of the economic security service of the organization implementing the production sharing agreement.


Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


2017 ◽  
Vol 33 (4) ◽  
pp. 39-46
Author(s):  
T. D. Malyutina

The article substantiates the importance of the company's economic security service in the modern conditions of business operations. The level of security of the enterprise is ensured by high economic potential, financial independence, sustainable development, personnel responsibility. The loss of at least one of the listed elements of a universal system of economic security is characterized by unforeseen consequences for the enterprise. The untimely modernization of the economic security system, its obsolete form, will not ensure the proper level of the company's confident working.


Public Voices ◽  
2017 ◽  
Vol 9 (2) ◽  
pp. 46
Author(s):  
Nolan J. Argyle ◽  
Gerald A. Merwin

Privatization, contracting out, and a host of other current trends blur the line between public and private—they create what at best is a fuzzy line. This study examines yet one additional area where the lines between public and private have gotten even fuzzier—the best selling novel. It uses the writings of Tom Clancy and Clive Cussler,two authors whose names on a novel guarantee best-seller status. It will do so in the context of what a civic community and civil society are, and how they relate to the public-private question, a question that has renewed life in public administration.


Sign in / Sign up

Export Citation Format

Share Document