![](/irbis_nbuv/images/db_navy.gif) Книжкові видання та компакт-диски ![](/irbis_nbuv/images/db_navy.gif) Журнали та продовжувані видання ![](/irbis_nbuv/images/db_navy.gif) Автореферати дисертацій ![](/irbis_nbuv/images/db_navy.gif) Реферативна база даних ![](/irbis_nbuv/images/db_navy.gif) Наукова періодика України ![](/irbis_nbuv/images/db_navy.gif) Тематичний навігатор ![](/irbis_nbuv/images/db_navy.gif) Авторитетний файл імен осіб
![Mozilla Firefox](../../ico/mf.png) |
Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер "Mozilla Firefox" |
|
|
Повнотекстовий пошук
Пошуковий запит: (<.>A=Tagarev T$<.>) |
Загальна кількість знайдених документів : 2
Представлено документи з 1 до 2
|
1. |
Tagarev T. D. A taxonomy of essential services [Електронний ресурс] / T. D. Tagarev, V. A. Georgiev, V. R. Ratchev // Радіоелектронні і комп’ютерні системи. - 2012. - № 6. - С. 191–196. - Режим доступу: http://nbuv.gov.ua/UJRN/recs_2012_6_36 Communities, countries and alliances cannot be efficient in preparing to meet diverse threats to their security within traditional organizational stovepipes. The boundaries between "internal" and "external" threats are getting fuzzier, and the vulnerabilities of governments, businesses and communities feed on each other, while the comprehensive approach is gaining traction in ever more security fields. The implementation of the comprehensive approach poses a number of methodological challenges. While it clearly requires coordination of various capabilities of a multitude of actors, it is less apparent which is the suitable organising concept. This paper takes as a starting point the concept of "essential services" and suggests a taxonomy, that would allow to treat threats, vulnerabilities and risk in a common comprehensive framework. The taxonomy has been developed with a specific purpose in mind, and thus refers to European Essential Services. We nevertheless reason that it can be replicated to support decision making at other levels, e.g. in national security policy making and planning.
| 2. |
Tagarev T. D. Modelling extreme events for the purposes of security foresight [Електронний ресурс] / T. D. Tagarev, P. I. Ivanova // Радіоелектронні і комп’ютерні системи. - 2012. - № 7. - С. 253–259. - Режим доступу: http://nbuv.gov.ua/UJRN/recs_2012_7_45 The risk management approach is used increasingly in modern security planning. In this approach, planners attempt to assess the likelihood of an event and the potential loss if the event occurs, and then to select certain measures that minimise an integral criteria of risk over some set of events. However, certain events of low probability but high potential impact, referred to as "extreme" or "catastrophic" events, need to be treated differently than those with a low potential loss and a high likelihood of occurring. This paper presents a brief overview of six "methods" that have been used in addressing security-related risk management tasks - extreme value theory, catastrophe loss models, black swan theory, dynamic modelling, agent models, and complexity studies - and provides examples. It presents a summary on areas of implementation and underlines the limitations of established risk management approaches.
|
|
|