• Title/Summary/Keyword: the level of economic security

Search Result 234, Processing Time 0.022 seconds

Regional Level of Inclusive Development

  • Shashyna, Maryna V.;Butko, Mykola P.;Tulchynska, Svitlana O.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.133-138
    • /
    • 2021
  • The concept of inclusive development provides equal opportunities for all participants in access to the labor market and resource allocation. This concept emphasizes the equality of human capital, the ecological state of the environment, social protection and food security. This concept is fundamentally different from the standard perception of economic growth, because it has broader goals than simply increasing incomes and GDP. It rejects the position that positive results are an automatic consequence of growth; here the basic condition is human development and increase of its well-being, reduction of poverty. Therefore, it is not the result of distribution that becomes primary, but the involvement in the process of social reproduction. An alternative system of characterization of the country's position according to the resulting indicator of the Inclusive Development Index was presented at the World Economic Forum in Davos. In this research the methodical development of the system of estimation of the index of inclusive development for regions of the NUTS 4 level of the European classification is resulted.

Corruption as a Threat to Economic Security of the Country

  • Samiilenko, Halyna;Ivanova, Nataliia;Shaposhnykova, Iryna;Vasylchenko, Lidiia;Solomakha, Iryna;Povna, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.316-322
    • /
    • 2021
  • The problem of corruption and the spread of corruption crime today is not only one of the main social problems, but also an obstacle to the implementation of reforms in Ukraine. Given the complexity, scale and diversity of the impact of corruption, it is an undisputed threat to national security. At the state level, corruption threatens, firstly, state security as a result of its spread in public authorities and the combination of political and business spheres; secondly, in the domestic political sphere as a result of non-compliance and violation by officials of public authorities and local governments of the laws of Ukraine; thirdly, in the economic sphere as a result of the dominance of personal interests of civil servants over national ones; fourthly, in other spheres, namely, military, social, ecological, informational, foreign policy, etc. The origins of corruption are diverse and are formed not only in the country but also abroad. The current corruption threat is the result of the country's ineffective domestic and foreign anticorruption policies. Acceleration of the spread and manifestation of external corruption threats is associated with a number of unresolved foreign policy issues against the background of the development of globalization and integration processes, in particular: economic and financial dependence of the country on international financial institutions and organizations; as well as from foreign countries that pose a potential threat due to their ambitious plans to expand our country; unresolved issues regarding the international legal consolidation of borders, etc. It is noted that the current conditions for the development of state security, due to new challenges and threats, need to improve and implement new measures to prevent corruption as a negative impact of the main threats to national economic security. As a result of the study, the main measures to counter the main threats to the economic security of the state were identified.

A Study on the Need of the Usable Security in the Corelation between IT Security and User Experience

  • Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.14-18
    • /
    • 2017
  • In this paper, an contemplate the direction for Usable Security in IT security and User Experience. To evaluate how the user interface is convenient to use, we examine the components such as the property, learnable property, memory simplicity, faults and satisfaction level. By considering for the security, we should bring positive effects on the user experience. By emphasizing usability and security at the same time, we should increase the satisfaction level of the user experience and then produce the valuable experience through participation, use and observation. The positive user experience is the important task for the software engineering, business administration and others., and this will result satisfaction of the users, brand trust, and success in the market. On the other hand, for the negative user experience, the users cannot achieve their desired goal and therefore, are unsatisfied due to emotional, rational and economic inconvenience. Due to this, we should try to maintain a certain level of usability and security of the system in IT security and User Experience.

A Study on the Supply Chain Security Program (수출입 공급망 안전 프로그램에 관한 연구)

  • Han, Byoung Wan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.58
    • /
    • pp.287-311
    • /
    • 2013
  • In this study, the scope of previous logistics security were focused only on port and ship. Because of it now extends to the overall (export and import) supply chain areas and in regards with supply security programs in the international level, it reviewed supply chain security programs categorized them into 'ships and port security system', 'container screening system', 'logistics chain authorization system' which are expanded to be adopted in the international level. The major features of those programs are summarized as in building risk management system, providing information ahead, selectivity test and benefits to AEO authorized companies in the customs administration level. The government and companies which are to ensure supply chain security and trade facilitation in order to cope actively with international customs administrative atmosphere need to do the followings : First, they need to build an intra-government integrated supply chain security and make efforts to conclude AEO MRA in order to increase trade competitiveness among major trading countries. Second, they need to build supply chain risk management system in order to enhance management performance through overseas market and company level strategy to obtain and maintain AEO authorization in the company level.

  • PDF

A Multi-level Optimal Power Flow Algorithm for Constrained Power Economic Dispatch Control (제약조건을 고려한 경제급전 제어를 위한 다단계 최적조류계산 알고리즘)

  • Song, Gyeong-Bin
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.9
    • /
    • pp.424-430
    • /
    • 2001
  • A multi-level optimal power flow(OPF) algorithm has been evolved from a simple two stage optimal Power flow algorithm for constrained power economic dispatch control. In the proposed algorithm, we consider various constraints such as ower balance, generation capacity, transmission line capacity, transmission losses, security equality, and security inequality constraints. The proposed algorithm consists of four stages. At the first stage, we solve the aggregated problem that is the crude classical economic dispatch problem without considering transmission losses. An initial solution is obtained by the aggregation concept in which the solution satisfies the power balance equations and generation capacity constraints. Then, after load flow analysis, the transmission losses of an initial generation setting are matched by the slack bus generator that produces power with the cheapest cost. At the second stage we consider transmission losses. Formulation of the second stage becomes classical economic dispatch problem involving the transmission losses, which are distributed to all generators. Once a feasible solution is obtained from the second stage, transmission capacity and other violations are checked and corrected locally and quickly at the third stage. The fourth stage fine tunes the solution of the third stage to reach a real minimum. The proposed approach speeds up the two stage optimization method to an average gain of 2.99 for IEEE 30, 57, and 118 bus systems and EPRI Scenario systems A through D testings.

  • PDF

An Economic Analysis of Alternative Mechanisms for Optimal IT Security Provision within a Firm (기업 내 최적 정보기술보안 제공을 위한 대체 메커니즘에 대한 경제적 분석)

  • Yu, Seunghee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.107-117
    • /
    • 2013
  • The main objective of this study lies at examining economic features of IT security investment and comparing alternative mechanisms to achieve optimal provision of IT security resources within a firm. There exists a paucity of economic analysis that provide useful guidelines for making critical decisions regarding the optimal level of provision of IT security and how to share the costs among different users within a firm. As a preliminary study, this study first argues that IT security resources share some unique characteristics of pure public goods, namely nonrivalry of consumption and nonexcludability of benefit. IT security provision problem also suffers from information asymmetry problem with regard to the valuation of an individual user for IT security goods. Then, through an analytical framework, it is shown that the efficient provision condition at the overall firm level is not necessarily satisfied by individual utility maximizing behavior. That is, an individual provision results in a suboptimal solution, especially an underprovision of the IT security good. This problem is mainly due to the nonexcludability property of pure public goods, and is also known as a free-riding problem. The fundamental problem of collective decision-making is to design mechanisms that both induce the revelation of the true information and choose an 'optimal' level of the IT security good within this framework of information asymmetry. This study examines and compares three alternative demand-revealing mechanisms within the IT security resource provision context, namely the Clarke-Groves mechanism, the expected utility maximizing mechanism and the Groves-Ledyard mechanism. The main features of each mechanism are discussed along with its strengths, weaknesses, and different applicability in practice. Finally, the limitations of the study and future research are discussed.

  • PDF

Organizational-Economic Mechanism of Attracting Investment Resources in the Innovative Development of Regions in Teams of Sustainable Development

  • Krasnonosova, Olena;Perepeliukova, Olena;Papp, Vasyl;Doronina, Maya;Romaniuk, Mykhailo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.376-384
    • /
    • 2022
  • The article considers the features of the organizational-economic mechanism of attracting investment resources in the innovative development of regions in terms of sustainable development. Factors influencing the investment activity of regions in terms of sustainable development, including: institutional structure, intellectual capital, level of innovation infrastructure, business development, financial and credit component, level of human resources development, information environment, production development, environmental component. Factors influencing the attraction of investment resources in the regions are identified. The dynamics of changes in the volume of capital investments and foreign direct investment in Ukraine is analyzed. The regional features of the distribution of capital investments in the conditions of sustainable development are revealed. The essence of the main principles on the basis of which the organizational - economic mechanism of attraction of investment resources in innovative development of regions in the conditions of sustainable development should be formed is analyzed. A set of measures to regulate the investment processes of the regions has been identified. The mechanism of attraction of investment resources in innovative development of regions in the conditions of sustainable development is outlined. The results of activity of separate Agencies of regional development for 2020 in the direction of investment and innovation activity and increase of level of investment attractiveness of regions are analyzed. Important prerequisites for the effective implementation of the organizational-economic mechanism for attracting investment resources in the innovative development of regions in terms of sustainable development are identified. The main directions of directing the efforts of the organizational-economic mechanism to ensure the attraction of investment resources in the innovative development of regions in the context of increasing the level of investment activity in the regional aspect are substantiated.

The Industrial Security along with the International Transfer of Technology (국제기술이전계약에서의 산업보안에 관한 연구)

  • SEO, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.1-20
    • /
    • 2017
  • The industrial technology (including trade secrets), which is commonly understood as systematic and applied technical knowledge, can be transferred to third parties by contracting for the transfer of technology or by granting of a licence. The activity of industrial espionage, due to the gradual increase of the economic interests of intellectual property, is displaying intensively in order to gain advanced technology information. With our outstanding high technology, but compared to the level of the advanced countries, the technical protection systems, the legal protection measures and the systematic management thereof may still be insufficient. Our industrial technology outflow abroad, due to the vulnerability to the security control system in our country, has been increasing since the 2000. Computer software and SNS, such as smart devices, appear as a rapid change in the technical information environment. In order to minimize the dead zone of a new industrial security, the country's organic activity is being conducted. In 2006, Industrial Technology Outflow Prevention and Protection Law was enacted, which emphasized the responsibilities of the country. In this paper for the economic entity's efforts to prevent technology leakage oversea, I have looked to how the industrial technology can be protected in terms of national security and economic benefits of our enterprises. To solve the above-mentioned problems hereof, Korean government should willingly establish a reliable legal system for supporting to enterprise's operations, and Korean companies should autonomously introduce a synthetic technology protection system and incorporate the confidentiality clauses in an international transfer of technology agreement with third parties.

  • PDF

The Precariousness Employment in the Eurasian Economic Space: Measurement Problems, Factors and Main Forms of Development

  • Kaliyeva, Saule A.;Alzhanova, Farida G.;Meldakhanova, Marziya K.;Sadykov, Ilyas М.;Adilkhanov, Murat А.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.3
    • /
    • pp.157-167
    • /
    • 2018
  • This research aims to generalize the conceptual basis of precariousness of employment, study the factors and scale of unsustainable of employment in the countries of the Eurasian Economic Union (EAEU). The concept of precariousness of employment is formed in social and economic studies about 40 years ago, but objective and subjective conditions and forms of unsustainable employment existed before. This study proposes a classification of forms of precariousness of employment on 16 criteria: the duration and timing of agreements, contract terms, the nature of income; the degree of labor autonomy; the level of formality; the level of openness; the level of vulnerability; the conditions of growth of qualification; the level of flexibility; the level of stability; regularity; the severity of the danger of work; in relation to the workplace; the quality of employment, the level of social security. In this research highlighted factors (globalization, demography, migration, structure factors, shadow and informal economy, social development and living standards, unemployment), and systematized certain trends of precariousness of employment, channels and means, forms of manifestation. The empirical analysis identified of the labor potential of the Eurasian countries and new quantitative estimates of the levels of unsustainable employment in the Eurasian Economic Space.

A Study on Securing of Air Cargo Supply Chain by Adapting One-Stop Security - Focusing on ICAO SARPs and EU Case - (원스톱 보안(One-Stop Security) 도입을 통한 항공화물 공급망 보안체계 강화 연구 - ICAO 국제기준 및 EU 사례를 중심으로 -)

  • Park, Man-Hui;Lee, Seung-Yeol;Heo, Beak-Yong;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.28 no.3
    • /
    • pp.18-26
    • /
    • 2020
  • Cost reduction and equality by exempting re-scanning of passengers, baggage and cargo secured from the first airport of departure, mainly in the European Union/European Economic Area(EU/EEA), Switzerland, etc. One-Stop Security(OSS) is being promoted to maintain the level of security while increasing speed and convenience, and movement is expected to expand worldwide. Therefore, this paper establishes the basic concept of OSS through a literature review of ICAO Standards and Recommended Practices(SARPs), and analyzes the actual conditions of OSS implementation in major countries such as the United States and the EU. It is intended to present the political, economic benefits for Korea and highlight the urgency of implementing the OSS system in the aviation industry including the cargo sector. Therefore, the practical implications of strengthening international cooperation through the expansion of government and airport operators OSS implementation to overcome the resource shortage problem of the existing national air cargo security system and to strengthen the status as a global aviation powerhouse were drawn up. There is academic significance that it raised the need for effective implementation of OSS, which was not previously covered.