-
1
Dark Clouds: Can Government Agencies Evade Public-Records Laws by Storing Documents in Privately Owned Digital Portals?
Published 2023-12-01“… This article examines government officials using privately owned communication portals to exchange messages, asserting that documents do not become public records if government agencies avoid taking possession of them. …”
Get full text
Article -
2
Defense Advanced Research Projects Agency: Comment on ‘Engineering biology and the grand challenges: Do we need a new R&D&I model?’
Published 2021-06-01“…However, the authors have not mentioned one of the most famous classic Research & Development (R&D) models used in the creation of disruptive technologies—a unique model of the Defense Advanced Research Projects Agency (DARPA) of the US Department of Defense. …”
Get full text
Article -
3
Forming the Research Component of the U.S. Defense Budget Policy
Published 2015-01-01“…The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved. …”
Get full text
Article -
4
Forming the Research Component of the U.S. Defense Budget Policy
Published 2015-12-01“…The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved. …”
Get full text
Article -
5
Forming the Research Component of the U.S. Defense Budget Policy
Published 2015-01-01“…The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved. …”
Get full text
Article -
6
ICT Governance and Management Macroprocesses of a Brazilian Federal Government Agency
Published 2022-04-01Get full text
Article -
7
-
8
Quantum data locking for high-rate private communication
Published 2015Get full text
Get full text
Article -
9
The role of private armed forces in the traditional concepts of security
Published 2014-01-01“…These services range from strategic, tactical and technological advice, training and logistical support, to providing exclusively military (combat) services to governments of various countries, multinational corporations, international organizations, non-government agencies and other non-state actors. Private military companies are certainly not a transient phenomenon or occurrence; on the contrary, they will be very important providers of private military services in the future. …”
Get full text
Article -
10
An Organizational Network Analysis of the Sprawling U.S. Department of Defense Innovation Ecosystem
Published 2024“…The Department of Defense (DoD) relies on a massive connected network of government agencies, private industry, academia, and research institutions to accomplish these activities. …”
Get full text
Thesis -
11
Achievement of the Planetary Defense Investigations of the Double Asteroid Redirection Test (DART) Mission
Published 2024-01-01Get full text
Article -
12
5G and Beyond Private Military Communication: Trend, Requirements, Challenges and Enablers
Published 2023-01-01“…Although the use of 5GB commercial networks for defense agencies can offer greater flexibility and efficiency, they also face a new challenge that requires high standards of network protection and harsh working conditions and environments. …”
Get full text
Article -
13
Burnout Among Private Security Staff in Serbia: A Multicentic Cross-Sectional Study
Published 2021-05-01“…Background: Burnout is a special a state of physical or emotional exhaustion that also involves a sense of reduced accomplishment and loss of personal identity.Objectives: To evaluate the predictors of burnout among work staff in the seven private agencies for support and defense of persons and their property.Material and Method: We performed a multicentric cross-sectional study that involved representative sample of working staff from Agencies of Private Security in Central Serbia. …”
Get full text
Article -
14
Quantitative Modeling of Manufacturing Process, Storage and Optimal Distribution Agent Based Distribution Using Future Research Methods in the Defense Industry
Published 2020-08-01“…Due to the constraints that impede their inherent missions, the defense industry needs to seek a change of procedure to maintain the level of their products to meet their customers' needs One of these is to use a networking strategy.This study uses a basic model to consider supply chain concepts and dealership theory It intends to produce the product that customers want by using capabilities beyond the organizational boundary and representative network In this approach, the goal is not to reduce costs, but to increase the utility of the agent-owner-customer relationship.The proposed model is one of a variety of multi-purpose decision making models and aims to achieve optimal response, owner desirability and average agency desirability.The model is solved using weighted objective functions and a Pareto solution set. …”
Get full text
Article -
15
Geoblocking and Geopricing: An analysis in the light of Mike Feintuck’s public interest theory
Published 2019-10-01Get full text
Article -
16
How a modern business could respond to the phishing attack challenges
Published 2017-01-01“…The majority of public and private enterprises as well as the entire society are getting dependable on cyber technologies. …”
Get full text
Article -
17
Human Security Workers Deployed in Austere Environments: A Brief Guide to Self-Care, Sustainment, and Productivity
Published 2015-01-01“…The content represents a synoptic consensus of best general practices and guidance from a range of resources comprising United Nations agencies and activities, national and international non-governmental organizations (NGO's), private volunteer organÂizations (PVO's), national military services, and international business concerns.…”
Get full text
Article -
18
ICSTASY: An Integrated Cybersecurity Training System for Military Personnel
Published 2022-01-01Get full text
Article -
19
Risk factors for positive depression screening across a shipboard deployment cycle
Published 2019-09-01Get full text
Article -
20
Considerations on the Impact of Emerging and Disruptive Technologies on Security Policies
Published 2021-12-01“…At the same time, the fact that the Romanian Army has mastered the defining elements of the impact of emerging and disrupted technologies on security policy and acts to make them operational is demonstrated by the meeting of July 12, 2021, of the Minister of National Defense, Nicolae-Ionel Ciuca with Heidi Grant, director of the US Defense and Security Cooperation Agency, on which occasion Romania received from the US the name of “Dependable Undertaking (DU)” under which contracts for the purchase of military equipment can be concluded without any payment in advance. …”
Get full text
Article