Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
economic security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/228)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69/en
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
book article
Economic security of enterprise and the system of its ensuring
Ianioglo, Alina
;
Põlajeva, Tatjana
;
Parmacli, Dmitri
Scientific Conference Contemporary Issues in Business, Management and Education 2015 : selected papers : 12-13 November 2015, Vilnius, Lithuania
2015
/
p. 1-8 : ill
http://dx.doi.org/10.3846/cibme.2015.05
book article
3
journal article
La ciberseguridad en la era de hipercompetitividad: ¿puede la Union Europea afrontar los nuevos retos?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69
journal article
4
journal article EST
/
journal article ENG
The essence and phases of the comprehensive system of ensuring the economic security of enterprise
Ianioglo, Alina
;
Põlajeva, Tatjana
International journal of learning and change
2017
/
p. 59-74
https://doi.org/10.1504/IJLC.2017.084223
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
226
1.
comprehensive system of economic security
2.
economic security
3.
economic security of enterprise
4.
system of economic security
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
cloud security
10.
communication system security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-physical system security
19.
cyber-security
20.
data and information security
21.
data security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
asymmetric economic integration
126.
combined heat and power economic dispatch (CHPED)
127.
comparative economic development
128.
comparative economic systems
129.
cubic economic load dispatch
130.
development of economic thought
131.
Early Islamic economic thought
132.
economic
133.
economic policy coordination
134.
economic education
135.
economic activity
136.
Economic Allocation
137.
economic analysis
138.
Economic and Monetary Union
139.
economic and social cohesion
140.
economic and social effects
141.
economic benefits
142.
economic complexity
143.
economic conditions
144.
economic convergence
145.
economic cooperation
146.
economic crisis
147.
economic cycle
148.
Economic Development
149.
Economic Development and Growth
150.
economic development policy
151.
economic developmnet
152.
economic dispatch
153.
economic effect
154.
economic efficiency
155.
economic environment
156.
economic feasibility
157.
economic feasibility analysis
158.
economic fluctuations
159.
economic growth
160.
Economic growth and aggregate productivity regional government analysis
161.
economic history
162.
economic history Europe
163.
economic impact
164.
economic indicators
165.
economic insulation thickness
166.
economic integration
167.
economic interests
168.
economic load dispatch
169.
economic load dispatch (ELD)
170.
Economic Management
171.
economic model
172.
economic modeling
173.
economic motives
174.
economic networks
175.
Economic optimization model
176.
economic performance
177.
economic planning
178.
economic policies
179.
economic policy
180.
Economic policy uncertainty
181.
economic populism
182.
economic power dispatch
183.
economic recession
184.
economic recession of 2008-2011
185.
economic reforms
186.
economic regulation
187.
economic regulation assessment
188.
Economic risk
189.
economic sanctions
190.
economic shocks
191.
economic theory
192.
economic transformations
193.
Economic transit
194.
economic transition
195.
environmental and economic losses of the construction project
196.
environmental and economic regulation
197.
European economic integration
198.
European Economic Space
199.
European history of economic thought
200.
fiscal and economic effects
201.
History of Chinese economic thought and philosophy
202.
history of economic thought before 1750
203.
mathematical models for economic problems
204.
R11 - regional economic activity
205.
regional economic integration
206.
Silk Road Economic Belt
207.
social and economic impacts
208.
social-economic analysis
209.
Socio-economic context
210.
socio-economic development
211.
socio-economic factors
212.
socio-economic impacts
213.
socio-economic risks
214.
socio-economic status
215.
socio-economic system change
216.
sustainable economic growth
217.
techno-economic
218.
Techno-economic analysis
219.
techno-economic assessment
220.
Techno-economic modelling
221.
techno-economic paradigm shifts
222.
techno-economic paradigms
223.
The organisation for economic cooperation and development (OECD)
224.
theory of economic development
225.
unreported economic activity
226.
wear and economic feasibility map
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT