Претраживање
Приказ резултата 1-6 од 6
Types and extent of data significant to monitoring and assessing security threats to certain persons and facilities
(Скопје : Факултет за безбедностSkopje : Faculty of security, 2018)
Basic and special types of data necessary for monitoring and assessing security threats to certain persons and facilities are defined based on the analysis of historical data, legislature, manuals, security plans and other ...
Reinterpreting security in the context of the new types of risks and conflicts of globalisation 4.0
(Belgrade : University of Criminal Investigation and Police Studies, 2019)
This study maps the political, social and economic trends expected
for the next 15-20 years, which will determine the processes of the so-called
globalisation 4.0, making sure that the changed nature of the risks and ...
Overview of Some Security Aspectsof Smart Phones
(Belgrade : Academy of Criminalistic and Police Studies, 2018)
Smart phones or mobile phones with advanced capabilities are used by more people. Their popularity and relatively weaker security level have made them attractive targets for attackers. Mobile phone security in the beginning ...
Household supplies for natural disaster: factor of influence on the possession of supplies
(Skopje : Faculty of security, 2017)
Purpose –The paper presents the results of the quantitative research of the impact of certain factors on household possession of supplies necessary for the survival of the consequences of natural ...
Modern migrations and diversityof conflict paradigm
(Beograd : Kriminalističko-policijska akademija = Belgrade : Academy of Criminalistic and Police Studies, 2016)
By careful analysis of important trends, phenomena and processes that
characterize modern migration in the European context, the authors focus on the
emergency crisis management and address the national audiences, ...
Certain aspects of security science methodological bases
(Skopje : Faculty of security, 2012)
The paper deals with the following: (1) the security science concept, (2) the
security science constituents, and (3) the possibilities of the security science research. According to this, it has been concluded that: (1) ...