Oil Theft: Deregulation or Contracting Security to Militants?

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to improve security by contracting security outsourcing

There is an increasing number of articles and internet forums against outsourcing security and contracting Managed Security Services. In this type of articles and forums, outsourcing providers professionals are presented as a security threat to their customers.(An extreme example of this can be seen at Cio.com Forum (6)). The aim of this paper is to show customers the possible advantages of con...

متن کامل

Electricity Restructuring: Deregulation or Reregulation?

46 Vo l u m e 2 3 , N o . 2 As other jurisdictions refashion their electricity markets, they seem to be incorporating little of the experience from the markets that are furthest along in the process. That is unfortunate, because there are important and quite general lessons that can be gleaned. Probably the two most salient lessons are that the short-run benefits are likely to be small or nonex...

متن کامل

Outsourcing Information Security: Contracting Issues and Security Implications

We examine the implications of a firm outsourcing both (i) security device management which attempts to prevent security breaches and (ii) security monitoring which attempts to detect security breaches to managed security service providers (MSSPs). In the context of security outsourcing, the firm not only faces the traditional moral hazard problem as it cannot observe an MSSP’s prevention or de...

متن کامل

Social Security: Combating Device Theft With Community-Based Video Notarization

People increasingly rely on mobile devices for storing sensitive information and credentials for access to services. Because these devices are vulnerable to theft, security of this data is put at higher risk — once the attacker is in physical possession of the device, recovering these credentials and impersonating the owner of the phone is usually straightforward and hard to defend by purely lo...

متن کامل

Disclosure of Information Theft: The ChoicePoint Security Breach

n recent months, the media have reported several major securi ty breaches. Hackers have stolen the personal information of thousands of individuals from leading banks, credit bureaus, and insurance companies. In other cases, computers and disks with highly confidential data have simply vanished at the airport security counter or from vehicles parked in the company lot. Stolen data may include s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: African Journal of Law, Political Research and Administration

سال: 2021

ISSN: 2689-5102

DOI: 10.52589/ajlpra-9nfkdezq