Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
economic security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
4
Look more..
(2/231)
Export
export all inquiry results
(4)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69/en
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
book article
Economic security of enterprise and the system of its ensuring
Ianioglo, Alina
;
Põlajeva, Tatjana
;
Parmacli, Dmitri
Scientific Conference Contemporary Issues in Business, Management and Education 2015 : selected papers : 12-13 November 2015, Vilnius, Lithuania
2015
/
p. 1-8 : ill
http://dx.doi.org/10.3846/cibme.2015.05
book article
3
journal article
La ciberseguridad en la era de hipercompetitividad: ¿puede la Union Europea afrontar los nuevos retos?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69
journal article
4
journal article EST
/
journal article ENG
The essence and phases of the comprehensive system of ensuring the economic security of enterprise
Ianioglo, Alina
;
Põlajeva, Tatjana
International journal of learning and change
2017
/
p. 59-74
https://doi.org/10.1504/IJLC.2017.084223
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 4, displaying
1 - 4
keyword
229
1.
comprehensive system of economic security
2.
economic security
3.
economic security of enterprise
4.
system of economic security
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
cloud security
10.
communication system security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security monitoring in maritime
18.
cyber security strategies
19.
cyber-physical system security
20.
cyber-security
21.
data and information security
22.
data security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
emotional security
27.
energy security
28.
energy security indicator
29.
Estonian information security standard
30.
graded security
31.
hardware security
32.
hardware security primitive
33.
high level of security
34.
Homeland security
35.
human security
36.
information security
37.
information security and privacy
38.
initial level of security
39.
internal security
40.
international security
41.
investment and innovation security
42.
IPv6 security
43.
IT security
44.
IT security management
45.
job security
46.
long-term security
47.
maritime cyber security
48.
maritime cyber security operations centers
49.
Maritime Security Operations Center (M-SOC)
50.
medium level of security
51.
metadata model for security measures
52.
Middle Eastern security
53.
Mobile security
54.
national cyber security strategy
55.
national security
56.
NATO. Science for Peace and Security Program
57.
network security
58.
network security monitoring
59.
OSCE (Organization for Security and Co-operation in Europe)
60.
passenger’s security
61.
policy-based routing security
62.
political and security cultures
63.
post-quantum security
64.
power system security
65.
quantitative security
66.
regional security
67.
RISC-V Security Verification
68.
safety and security in sea transportation
69.
safety and security testing
70.
security
71.
security adaptation
72.
security alert prioritization
73.
security analysis
74.
security and justice (AFSJ)
75.
Security and political science
76.
security and privacy
77.
security and privacy in smart grids
78.
Security Assertion
79.
Security Assertion Mining
80.
security closure
81.
Security Coverage
82.
security dataset
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of data
95.
security of supply
96.
security operation center
97.
security operations center
98.
security patterns
99.
security policy
100.
security problem definition
101.
security proof
102.
security protocols
103.
security requirements
104.
security requirements engineering
105.
security research
106.
security risk assessment
107.
security risk management
108.
security risks
109.
security science and technology
110.
security strategies
111.
security systems
112.
security systems for military objects
113.
security testing
114.
security training
115.
security verification
116.
security-by-design
117.
social security planning
118.
societal security
119.
software security
120.
software security level
121.
software security subcharacteristics
122.
sufficient level of security
123.
system security
124.
terrorism security
125.
transmission System Security
126.
voting privacy and security
127.
asymmetric economic integration
128.
combined emission economic dispatch
129.
combined heat and power economic dispatch (CHPED)
130.
comparative economic development
131.
comparative economic systems
132.
cubic economic load dispatch
133.
development of economic thought
134.
Early Islamic economic thought
135.
economic
136.
economic policy coordination
137.
economic education
138.
economic activity
139.
Economic Allocation
140.
economic analysis
141.
Economic and Monetary Union
142.
economic and social cohesion
143.
economic and social effects
144.
economic benefits
145.
economic complexity
146.
economic conditions
147.
economic convergence
148.
economic cooperation
149.
economic crisis
150.
economic cycle
151.
Economic Development
152.
Economic Development and Growth
153.
economic development policy
154.
economic developmnet
155.
economic dispatch
156.
economic effect
157.
economic efficiency
158.
economic environment
159.
economic feasibility
160.
economic feasibility analysis
161.
economic fluctuations
162.
economic growth
163.
Economic growth and aggregate productivity regional government analysis
164.
economic history
165.
economic history Europe
166.
economic impact
167.
economic indicators
168.
economic insulation thickness
169.
economic integration
170.
economic interests
171.
economic load dispatch
172.
economic load dispatch (ELD)
173.
Economic Management
174.
economic model
175.
economic modeling
176.
economic motives
177.
economic networks
178.
Economic optimization model
179.
economic performance
180.
economic planning
181.
economic policies
182.
economic policy
183.
Economic policy uncertainty
184.
economic populism
185.
economic power dispatch
186.
economic recession
187.
economic recession of 2008-2011
188.
economic reforms
189.
economic regulation
190.
economic regulation assessment
191.
Economic risk
192.
economic sanctions
193.
economic shocks
194.
economic theory
195.
economic transformations
196.
Economic transit
197.
economic transition
198.
environmental and economic losses of the construction project
199.
environmental and economic regulation
200.
European economic integration
201.
European Economic Space
202.
European history of economic thought
203.
fiscal and economic effects
204.
History of Chinese economic thought and philosophy
205.
history of economic thought before 1750
206.
mathematical models for economic problems
207.
R11 - regional economic activity
208.
regional economic integration
209.
Silk Road Economic Belt
210.
social and economic impacts
211.
social-economic analysis
212.
Socio-economic context
213.
socio-economic development
214.
socio-economic factors
215.
socio-economic impacts
216.
socio-economic risks
217.
socio-economic status
218.
socio-economic system change
219.
sustainable economic growth
220.
techno-economic
221.
Techno-economic analysis
222.
techno-economic assessment
223.
Techno-economic modelling
224.
techno-economic paradigm shifts
225.
techno-economic paradigms
226.
The organisation for economic cooperation and development (OECD)
227.
theory of economic development
228.
unreported economic activity
229.
wear and economic feasibility map
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT