• THEORETICAL FOUNDATIONS OF SECURITY

    Possible structure of standard operating procedure to ensure the operation of security systems

    Security & Future, Vol. 6 (2022), Issue 2, pg(s) 55-58

    Standard operating procedures describe the precise steps required to carry out the organization’s security tasks in the operation of security systems and are important both for maintaining the level of competence of personnel performing a particular security job and for training new employees. Reducing errors in security-related activities and mission-critical processes is at the core of these procedures. Also, providing information on identified gaps, together with a survey of emerging technologies, is expected to help critical infrastructure operators seek future capabilities to create security and optimize the content of standard operating procedures.
    Precisely, the presentation of a variant of standard operating procedures for the functioning of security systems is the basis of this paper.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Some benefits of building key partnerships to develop security systems

    Security & Future, Vol. 6 (2022), Issue 2, pg(s) 51-54

    Research and innovation is the part of an organization’s business that shapes the ability of its management and staff to acquire knowledge, design, develop and improve products, services, technologies and processes. Realizing key partnerships in collaborative research and innovation are critical to long-term success for high-tech organizations, while at the same time key to improving business skills, expanding product and service portfolios, and delivering cutting-edge applied research in interest of the country’s security. Presenting some of the benefits of building key partnerships between organizations in the development of security systems is the content of
    this publication.

  • THEORETICAL FOUNDATIONS OF SECURITY

    A variant of the risk profile of a business model in the development of intelligent security systems

    Security & Future, Vol. 6 (2022), Issue 1, pg(s) 7-10

    Business models (BMs) are business plans used by an organization to create, deliver, and acquire value. There is a strong need in different areas of business to develop a better understanding of BM’s risks. The appropriate risk framework would support the full range of risk management capabilities, namely identifying key risks, quantifying and, finally, managing those risks.
    Therefore, in developing the organization’s BM, it is necessary to create a better understanding of the risks associated with the development of security systems. The proposal for a variant of the BM risk profile framework for the establishment of security systems is the content of this publication.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Flexible business models applied to products and systems in the field of security systems with different Technologiy Readiness Levels

    Security & Future, Vol. 6 (2022), Issue 1, pg(s) 3-6

    The growing importance of business models (BM) is primarily due to significant changes in competitive conditions for business over the past two decades. The creation of BM in the development of security systems is a structured approach that is consistent with the characteristics of security objects.
    At the same time, in the international aspect, in the field of intelligent security systems, the practice of systematic application of different levels of the Technology Readiness Levels (TRL) scale is required, which allows security systems technology to develop from concept to research, development and implementation. Iterations between different levels of TRL are possible, especially during the development phase.
    Namely the study of the flexible application of BM in the development of security systems and their connection with the TRL i s the purpose of
    this paper.

  • THEORETICAL PROBLEMS IN INNOVATIONS

    Structuring key partnerships in the field of critical infrastructure security systems

    Innovations, Vol. 10 (2022), Issue 2, pg(s) 53-56

    Joint scientific and applied research occupies its place as a major innovation process in the activities of scientific, educational and business organizations. The purpose of this approach is to gain access to external sources of technology (or other assets) and their integration into products and services to build security of critical infrastructure and strategic sites of national importance.
    Partnerships in the development of security systems can bring added value to partner organizations, allowing them to use a wider network of promising assets and markets and helping them gain trust and prestige in society.
    The presentation of a variant of structuring key partnerships in the development of security systems is the content of this p aper.

  • SOCIETY

    A proposal for a basic structure of a business model for research management, with a focus on intelligent security systems within the scope of the quasar project

    Science. Business. Society., Vol. 6 (2021), Issue 2, pg(s) 62-65

    Joint research takes its place as a major innovation process. The aim is to build relationships through which to gain access to external sources of high technology (or other assets) and their integration into the products and services of business organizations.
    The establishment and operation of Competence Centers in our country, such as QUASAR, plays a leading role in planning, structuring and negotiating these relationships with universities, small high-tech companies, mid-market companies and large companies. The proper development of the business models of the Centers of Competence plays an essential role in this direction
    The purpose of this study is to present the impact of business models on two dimensions of joint research: cooperation as an alternative to successful relationships and business models as an effective tool for assessing the portfolio of opportunities and risk allocation.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Possible approach for standard operating procedures development for intelligent security systems functioning

    Security & Future, Vol. 5 (2021), Issue 3, pg(s) 81-84

    Standard Operating Procedures are a common guide to the organization’s activities. Their development and use are an integral part of a successful management system of an organization, as it provides staff with information on the proper per formance of a job and facilitates consistency in achieving the desired end result.
    Standard Operating Procedures describe the exact steps needed to perform the organization’s security tasks and are important both for maintaining the level of competence of the staff performing a particular job and for training new employees. To reduce errors within organisation in terms of security-related activities and the mission-critical processes is the basis of this paper.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Some standardized peculiarity in defining the processes / stages providing input data for Intelligent Security Systems development – peripheral security systems

    Security & Future, Vol. 5 (2021), Issue 1, pg(s) 3-6

    The creation of an intelligent security environment is one of the main trends in the coming years, as security technologies will be a significant part of the developed systems, incl. physical protection and system integration systems will play a key role in d ata collection to ensure critical infrastructure (CI) security. Organizations equipped with intelligent security systems provide increased operational efficiency by using system integration for data collection and allow systems to “communicate” and work in tandem to provide real-time information for emergency preparedness or execution.
    In addition, data collected from advanced security technologies can be analyzed by system integrators to help senior CI management better understand how their organization works and make improvements based on the information gathered. Understanding the value of connecting different physical security systems, incl. and CI peripheral security systems, as well as ways to integrate them with other systems, is a key component in developing a smarter and more secure facility. Whether applying new CI solutions or upgrading compatibility solutions, system integration offers a variety of cost options that meet the specific needs of the business environment.
    Last but not least, threat information is used to determine the security regime of the CI as a basis for developing common requirements and performance targets, as well as criteria for assessing the conformity or effectiveness of physical protection systems. Modern standardized approaches have been developed, summarizing the good international practices, for determining the goals and / or requirements for physical protection, in accordance with the specifics of CI and for preventing any level of potential impact both in the sites and for the population in the neighboring territories. The development of requirements for peripheral security systems as an element of intelligent CI security systems and their integration in the CI as early as possible is the subject of this publication.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    Compatibility between design of mechatronic systems for critical infrastructure security and technological readiness levels

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 111-114

    With a high degree of reliability we could say that modern products and systems in the field of critical infrastructure security are mechatronic, as they are complete mechanical systems with fully integrated electronics, intelligent control system and information technology. At the same time, the concept of Technology Readiness Levels has become an important project management tool that facilitates communication and common understanding between technology manufacturers and developers, customers and managers.
    Defining and implementing the compatibility approach between the stages of development of mechatronic security systems of CI and TRLs is one of the possible correct ways to maintain an adequate security levels for national CI, providing prevention and counteraction against contemporary risks.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Possible approach for developing a model of intelligent security system applicable in its design in the quasar center of competence

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 47-50

    Through the development and operation of intelligent security systems, with a focus on critical infrastructure, it is expected to improve the security of the population in our country. This process finds real dimensions in the goals and tasks of the centers of competence, which are in the process of construction during the current period. A key element contributing to the proper functioning of intelligent security systems is its design, in accordance with the specifics of the security environment.
    Precisely the synergy of the efforts of the scientific, educational and industrial communities for the development of contemporary models of security systems, structured within the functional scope of the QUASAR competence center, is the basis of this article.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Opportunities for determining factors affecting the development of intelligent security systems models

    Security & Future, Vol. 4 (2020), Issue 1, pg(s) 6-9

    Contemporary security challenges require the creation of a continuous and manageable process that guarantees the survival and sustainability of the organization’s core activities before, during and after a devastating event. This means that it is necessary to manage the organization’s activities, resources, personnel, impact on its functioning and countless risks. Significant contribution in this direction provides intelligent security systems.
    Thanks to rapid technological progress it is possible to be developed sophisticated security systems able to integrate heterogeneous sources that can monitor, control and manage the security environment of the organization, which is potentially at risk. But the combination of different technologies is not sufficient to significantly increase the level of security and the approach to the integrity of system elements, and compatibility with other systems management organization are basic factors for success in this direction.

  • TRANSPORT TECHNICS. INVESTIGATION OF ELEMENTS. RELIABILITY

    Some approaches to the non-destructive control of composite materials used in the aerospace industry

    Trans Motauto World, Vol. 5 (2020), Issue 1, pg(s) 9-12

    One of the priority areas for the use of composite materials is the aerospace industry. A number of evaluations have shown that their use in the manufacture of modern aircraft and helicopters lead to a reduction in weight of the respective parts with 20-30% compared to the same manufactured from conventional materials. In this case, an increase in the resistance of the respective part to external influences is usually achieved, and in many cases a decrease in its production cost.
    The increasing use of composite materials in the aerospace industry requires analyzing options for their diagnosis and non-destructive examination of their quality, taking into account their specific features. Because of the enormous diversity and complexity composition for composite materials, various methods of diagnosis have different efficiencies for different types of composites. In many cases, composites contain highly porous or fibrous layers, which results in a strong attenuation of the acoustic waves and render the acoustic method inapplicable to their non-destructive control. In these and other cases, the use of emerging methods for their non-destructive ultra-high frequency (microwave) diagnostics is of interest.