2021 ◽  
Vol 95 ◽  
pp. 17-28
Author(s):  
José-Mauricio Galli Geleilate ◽  
Ronaldo C. Parente ◽  
M. Berk Talay

2018 ◽  
Vol 7 (4.36) ◽  
pp. 904
Author(s):  
Krylov A.A ◽  
Pobyvayev S.A ◽  
Selivanov A.I ◽  
Silvestrov S.N ◽  
Starovoitov V.G ◽  
...  

The task of the authors was to develop a certain control system to identify the role of country economic security in the Eurasian integration. To this end, the approaches to economic security in Europe, Russia and Asian countries are analyzed. The differences in the methods of controlling the national economic security and in the key approaches to its provision are primarily due to the historically established internal economic and geo-economic conditions. There is a fairly wide range of paradigms of controlling system implemented in national economic security, primarily the differences between the European approaches and the approach of Russia.  Given information based on mentioned control systems revealed that principles and mechanisms of organization of national economic security systems in Asian countries is practically absent in Russian science. It was also necessary to analyze the typology of control monitoring system in order to clarify the prospects of integration of national economic security systems. The authors substantiate the position that ensuring national economic security is an important imperative of integration and development in the Eurasian space, competitiveness and economic sovereignty of countries. The article systematically organizes the facts about the types of organization of national economic security, explains the need for the countries of Eurasia active control system of economic security as a response to the challenges of our time. The authors express a certain control syste, of Eurasian integration in the field of national security, involving both sovereignty and harmonization of national systems aimed at protecting economic interests.  


2006 ◽  
pp. 577-582
Author(s):  
Herman Kruegle ◽  
Frank Abram

Global Jurist ◽  
2019 ◽  
Vol 20 (1) ◽  
Author(s):  
Letizia Casertano

Abstract In recent years the phenomenon of the illicit trafficking in cultural assets has been addressed by international and European lawmakers as an important phenomenon within the complex criminal networks used for the financing of international terrorism. The factors that contribute most to its development include in particular the availability of advanced technologies for plundering archaeological sites and e-commerce, which has sped up trade by breaking down space-time barriers, along also with armed conflict, political instability and poverty. In order to bring about change and put an end to the phenomenon, some significant legislative choices have recently been implemented in the European Union. The aim is to create a regime that is as uniform as possible along with a network of standardised controls capable of intercepting illicit trafficking. The concerns of art market operators surrounding the introduction of new rules and regulations can be appreciated if it is considered that the vibrant lawful market of artworks operates in accordance with tried and tested arrangements. This article will seek to provide an account of the phenomenon in its full complexity, highlighting the most significant recent developments within the European Union. It will also discuss the role of information and digital technologies in the area of cultural heritage. In particular, the existing European legal framework represented by the main legal instruments adopted by the international community and by the European Union will be sketched out, including both civil law and criminal law responses to the illicit trafficking of cultural heritage. Within this context the importance of the issues of traceability within art transactions, which are mostly paper-based, will be investigated along with other related issues such as digital tracking of artworks (digital passports), art security systems and authentication technologies.


2014 ◽  
Vol 1 (3) ◽  
pp. 1-20
Author(s):  
Soumyo D. Moitra

Estimating the benefits of network security systems is important for security decisions since considerable resources are spent on them and organizations need to know the returns on their investments. The objective of the model presented here is to improve management decisions. Better decisions imply greater security for the budget. This model has a number of novel features such as a probabilistic sub-model for the detection and response process, a new attack/damage matrix based on damage-type and cyber-attacks by category, and extensive sensitivity analyses. The results suggest a number of insights into the factors affecting the benefits from sensors such as the effects of non-linear relationships between the rate of attacks and the damages caused. The key role of the value of sensitive information is identified. The model helps identify the conditions under which a new security system provides enough benefits to justify its purchase.


1991 ◽  
Vol 20 (4) ◽  
pp. 485-508 ◽  
Author(s):  
Eithne McLaughlin

ABSTRACTThis paper considers social security policy and structures in relation to the labour market of the late 1980s and 1990s. The paper begins by describing the labour market of the late 1980s and summarising projective descriptions of labour demand in the 1990s. The second section of the paper reports on recent research examining the labour supply behaviour of long term unemployed people, drawing out the role of social security policy and structures therein. The third section of the paper concludes that the role of social security policy is at present essentially reactive rather than proactive; that it does little to address the likely need for labour of certain kinds in the 1990s; and that efforts to address the problem of long term unemployment through social security policy have been largely misdirected. The final section of the paper briefly considers some of the ways in which social security systems can be more proactive and suggests a number of both short term and longer term policy changes which research indicates would be of benefit in the UK.


2002 ◽  
Vol 56 (4) ◽  
pp. 101A-101A
Author(s):  
Joel M. Harris
Keyword(s):  

2020 ◽  
Vol 13 (3) ◽  
pp. 89-108
Author(s):  
Henrik Wenander

This article looks into the meaning of the concepts of sincere cooperation, mutual trust, and mutual recognition in EU social security coordination. It analyses the legislative choice of coordination as the main regulatory mechanism in the field, and examines the role of administrative cooperation. Furthermore, the article highlights the challenges that arise in situations where mutual recognition is required under the Regulations, as in connection with portable documents relating to the posting of workers. It also considers the limits to mutual trust via the principle of prohibition of fraud and abuse of rights established in the case law of the CJEU on free movement. In the last few years, this principle has been extended into the field of social security law, notably in Altun. In this way, the coordination regime does not require totally blind trust: rather, it balances the Member States' interests of maintaining the integrity of their social security systems with the Union interest of simplifying free movement. As in other fields of EU law relating to free movement, the mutual trust between the Member States in social security coordination may therefore be set aside in extraordinary cases.


Sign in / Sign up

Export Citation Format

Share Document