Showing 1 - 20 results of 62 for search 'private defense agency', query time: 0.38s Refine Results
  1. 1

    Dark Clouds: Can Government Agencies Evade Public-Records Laws by Storing Documents in Privately Owned Digital Portals? by Frank LoMonte

    Published 2023-12-01
    “… This article examines government officials using privately owned communication portals to exchange messages, asserting that documents do not become public records if government agencies avoid taking possession of them. …”
    Get full text
    Article
  2. 2

    Defense Advanced Research Projects Agency: Comment on ‘Engineering biology and the grand challenges: Do we need a new R&D&I model?’ by Ilya Klabukov, Olga Krasilnikova

    Published 2021-06-01
    “…However, the authors have not mentioned one of the most famous classic Research & Development (R&D) models used in the creation of disruptive technologies—a unique model of the Defense Advanced Research Projects Agency (DARPA) of the US Department of Defense. …”
    Get full text
    Article
  3. 3

    Forming the Research Component of the U.S. Defense Budget Policy by Alexandr V. Balyshev, Vladimir I. Konnov

    Published 2015-01-01
    “…The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved. …”
    Get full text
    Article
  4. 4

    Forming the Research Component of the U.S. Defense Budget Policy by A. V. Balyshev, V. I. Konnov

    Published 2015-12-01
    “…The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved. …”
    Get full text
    Article
  5. 5

    Forming the Research Component of the U.S. Defense Budget Policy by Alexandr V. Balyshev, Vladimir I. Konnov

    Published 2015-01-01
    “…The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    The role of private armed forces in the traditional concepts of security by Vračević Nikola, Cvetković Vladimir

    Published 2014-01-01
    “…These services range from strategic, tactical and technological advice, training and logistical support, to providing exclusively military (combat) services to governments of various countries, multinational corporations, international organizations, non-government agencies and other non-state actors. Private military companies are certainly not a transient phenomenon or occurrence; on the contrary, they will be very important providers of private military services in the future. …”
    Get full text
    Article
  10. 10

    An Organizational Network Analysis of the Sprawling U.S. Department of Defense Innovation Ecosystem by Case, Michael C.

    Published 2024
    “…The Department of Defense (DoD) relies on a massive connected network of government agencies, private industry, academia, and research institutions to accomplish these activities. …”
    Get full text
    Thesis
  11. 11

    Achievement of the Planetary Defense Investigations of the Double Asteroid Redirection Test (DART) Mission by Nancy L. Chabot, Andrew S. Rivkin, Andrew F. Cheng, Olivier S. Barnouin, Eugene G. Fahnestock, Derek C. Richardson, Angela M. Stickle, Cristina A. Thomas, Carolyn M. Ernst, R. Terik Daly, Elisabetta Dotto, Angelo Zinzi, Steven R. Chesley, Nicholas A. Moskovitz, Brent W. Barbee, Paul Abell, Harrison F. Agrusa, Michele T. Bannister, Joel Beccarelli, Dmitriy L. Bekker, Megan Bruck Syal, Bonnie J. Buratti, Michael W. Busch, Adriano Campo Bagatin, Joseph P. Chatelain, Sidney Chocron, Gareth S. Collins, Luca Conversi, Thomas M. Davison, Mallory E. DeCoster, J. D. Prasanna Deshapriya, Siegfried Eggl, Raymond C. Espiritu, Tony L. Farnham, Marin Ferrais, Fabio Ferrari, Dora Föhring, Oscar Fuentes-Muñoz, Igor Gai, Carmine Giordano, David A. Glenar, Edward Gomez, Dawn M. Graninger, Simon F. Green, Sarah Greenstreet, Pedro H. Hasselmann, Isabel Herreros, Masatoshi Hirabayashi, Marek Husárik, Simone Ieva, Stavro L. Ivanovski, Samuel L. Jackson, Emmanuel Jehin, Martin Jutzi, Ozgur Karatekin, Matthew M. Knight, Ludmilla Kolokolova, Kathryn M. Kumamoto, Michael Küppers, Fiorangela La Forgia, Monica Lazzarin, Jian-Yang Li, Tim A. Lister, Ramin Lolachi, Michael P. Lucas, Alice Lucchetti, Robert Luther, Rahil Makadia, Elena Mazzotta Epifani, Jay McMahon, Gianmario Merisio, Colby C. Merrill, Alex J. Meyer, Patrick Michel, Marco Micheli, Alessandra Migliorini, Kate Minker, Dario Modenini, Fernando Moreno, Naomi Murdoch, Brian Murphy, Shantanu P. Naidu, Hari Nair, Ryota Nakano, Cyrielle Opitom, Jens Ormö, J. Michael Owen, Maurizio Pajola, Eric E. Palmer, Pasquale Palumbo, Paolo Panicucci, Laura M. Parro, Jason M. Pearl, Antti Penttilä, Davide Perna, Elisabeta Petrescu, Petr Pravec, Sabina D. Raducan, K. T. Ramesh, Ryan Ridden-Harper, Juan L. Rizos, Alessandro Rossi, Nathan X. Roth, Agata Rożek, Benjamin Rozitis, Eileen V. Ryan, William H. Ryan, Paul Sánchez, Toni Santana-Ros, Daniel J. Scheeres, Peter Scheirich, Cem Berk Senel, Colin Snodgrass, Stefania Soldini, Damya Souami, Thomas S. Statler, Rachel Street, Timothy J. Stubbs, Jessica M. Sunshine, Nicole J. Tan, Gonzalo Tancredi, Calley L. Tinsman, Paolo Tortora, Filippo Tusberti, James D. Walker, C. Dany Waller, Kai Wünnemann, Marco Zannoni, Yun Zhang

    Published 2024-01-01
    Get full text
    Article
  12. 12

    5G and Beyond Private Military Communication: Trend, Requirements, Challenges and Enablers by Rojeena Bajracharya, Rakesh Shrestha, Syed Ali Hassan, Haejoon Jung, Hyundong Shin

    Published 2023-01-01
    “…Although the use of 5GB commercial networks for defense agencies can offer greater flexibility and efficiency, they also face a new challenge that requires high standards of network protection and harsh working conditions and environments. …”
    Get full text
    Article
  13. 13

    Burnout Among Private Security Staff in Serbia: A Multicentic Cross-Sectional Study by Dejan R. Veljković, Natasa K. Rancic, Momčilo R. Mirković, Ljiljana M. Kulić, Veroslava V. Stanković, Ljubomir S. Stefanović, Marko M. Stojanović, Miloš V. Mirković, Slađana M. Ðurić, Danijela Z. Ilić

    Published 2021-05-01
    “…Background: Burnout is a special a state of physical or emotional exhaustion that also involves a sense of reduced accomplishment and loss of personal identity.Objectives: To evaluate the predictors of burnout among work staff in the seven private agencies for support and defense of persons and their property.Material and Method: We performed a multicentric cross-sectional study that involved representative sample of working staff from Agencies of Private Security in Central Serbia. …”
    Get full text
    Article
  14. 14

    Quantitative Modeling of Manufacturing Process, Storage and Optimal Distribution Agent Based Distribution Using Future Research Methods in the Defense Industry by Mahdi Moradi, Alireza Iradjpour, Morteza Musakhani, Mahmood Sheykhhassani

    Published 2020-08-01
    “…Due to the constraints that impede their inherent missions, the defense industry needs to seek a change of procedure to maintain the level of their products to meet their customers' needs One of these is to use a networking strategy.This study uses a basic model to consider supply chain concepts and dealership theory It intends to produce the product that customers want by using capabilities beyond the organizational boundary and representative network In this approach, the goal is not to reduce costs, but to increase the utility of the agent-owner-customer relationship.The proposed model is one of a variety of multi-purpose decision making models and aims to achieve optimal response, owner desirability and average agency desirability.The model is solved using weighted objective functions and a Pareto solution set. …”
    Get full text
    Article
  15. 15
  16. 16

    How a modern business could respond to the phishing attack challenges by Đekić Milica D.

    Published 2017-01-01
    “…The majority of public and private enterprises as well as the entire society are getting dependable on cyber technologies. …”
    Get full text
    Article
  17. 17

    Human Security Workers Deployed in Austere Environments: A Brief Guide to Self-Care, Sustainment, and Productivity by Thomas F. Ditzler, Abigail D. Hoeh, Patricia R. Hastings

    Published 2015-01-01
    “…The content represents a synoptic consensus of best general practices and guidance from a range of resources comprising United Nations agencies and activities, national and international non-governmental organizations (NGO's), private volunteer organ­izations (PVO's), national military services, and international business concerns.…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Considerations on the Impact of Emerging and Disruptive Technologies on Security Policies by Vladu Mircea, Popescu Stelian

    Published 2021-12-01
    “…At the same time, the fact that the Romanian Army has mastered the defining elements of the impact of emerging and disrupted technologies on security policy and acts to make them operational is demonstrated by the meeting of July 12, 2021, of the Minister of National Defense, Nicolae-Ionel Ciuca with Heidi Grant, director of the US Defense and Security Cooperation Agency, on which occasion Romania received from the US the name of “Dependable Undertaking (DU)” under which contracts for the purchase of military equipment can be concluded without any payment in advance. …”
    Get full text
    Article