Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
comprehensive system of economic security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/134)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
The essence and phases of the comprehensive system of ensuring the economic security of enterprise
Ianioglo, Alina
;
Põlajeva, Tatjana
International journal of learning and change
2017
/
p. 59-74
https://doi.org/10.1504/IJLC.2017.084223
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
132
1.
comprehensive system of economic security
2.
system of economic security
3.
economic security
4.
economic security of enterprise
5.
communication system security
6.
power system security
7.
system security
8.
transmission System Security
9.
socio-economic system change
10.
comprehensive battery
11.
comprehensive climate risk assessment
12.
comprehensive evaluation
13.
comprehensive national defense
14.
comprehensive plan
15.
comprehensive ports
16.
comprehensive renovation
17.
Comprehensive Situation Awareness Model
18.
ad-hoc sensor networks security
19.
Automatic Security Verification
20.
Blockchain security
21.
cache security
22.
cloud security
23.
computer security
24.
cooperative security dilemma
25.
cyber security
26.
cyber security education
27.
cyber security exercises
28.
cyber security monitoring
29.
cyber security strategies
30.
cyber-security
31.
data and information security
32.
data security
33.
development of security cameras
34.
digital security practices
35.
drinking water security
36.
emotional security
37.
energy security
38.
energy security indicator
39.
Estonian information security standard
40.
graded security
41.
hardware security
42.
hardware security primitive
43.
high level of security
44.
Homeland security
45.
human security
46.
information security
47.
information security and privacy
48.
initial level of security
49.
internal security
50.
international security
51.
investment and innovation security
52.
IPv6 security
53.
IT security
54.
IT security management
55.
job security
56.
long-term security
57.
maritime cyber security
58.
maritime cyber security operations centers
59.
Maritime Security Operations Center (M-SOC)
60.
medium level of security
61.
metadata model for security measures
62.
Middle Eastern security
63.
Mobile security
64.
national cyber security strategy
65.
national security
66.
NATO. Science for Peace and Security Program
67.
network security
68.
network security monitoring
69.
OSCE (Organization for Security and Co-operation in Europe)
70.
passenger’s security
71.
policy-based routing security
72.
political and security cultures
73.
post-quantum security
74.
quantitative security
75.
regional security
76.
RISC-V Security Verification
77.
Safety and Security in Sea Transportation
78.
safety and security testing
79.
security
80.
security adaptation
81.
security alert prioritization
82.
security analysis
83.
security and justice (AFSJ)
84.
Security and political science
85.
security and privacy
86.
security and privacy in smart grids
87.
Security Assertion
88.
Security Assertion Mining
89.
security closure
90.
Security Coverage
91.
security dataset
92.
security dilemma
93.
Security evaluation
94.
security evaluation instruments
95.
Security Level Evaluation
96.
Security limitations
97.
security log analysis
98.
security management
99.
security model
100.
security monitoring
101.
security notion
102.
security objectives
103.
security of data
104.
security of supply
105.
security operation center
106.
security operations center
107.
security patterns
108.
security policy
109.
security problem definition
110.
security proof
111.
security protocols
112.
security requirements
113.
security requirements engineering
114.
security research
115.
security risk assessment
116.
security risk management
117.
security risks
118.
security science and technology
119.
security strategies
120.
security systems for military objects
121.
security testing
122.
security training
123.
security verification
124.
security-by-design
125.
social security planning
126.
societal security
127.
software security
128.
software security level
129.
software security subcharacteristics
130.
sufficient level of security
131.
terrorism security
132.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT