• THEORETICAL FOUNDATIONS OF SECURITY

    Flexible business models applied to products and systems in the field of security systems with different Technologiy Readiness Levels

    Security & Future, Vol. 6 (2022), Issue 1, pg(s) 3-6

    The growing importance of business models (BM) is primarily due to significant changes in competitive conditions for business over the past two decades. The creation of BM in the development of security systems is a structured approach that is consistent with the characteristics of security objects.
    At the same time, in the international aspect, in the field of intelligent security systems, the practice of systematic application of different levels of the Technology Readiness Levels (TRL) scale is required, which allows security systems technology to develop from concept to research, development and implementation. Iterations between different levels of TRL are possible, especially during the development phase.
    Namely the study of the flexible application of BM in the development of security systems and their connection with the TRL i s the purpose of
    this paper.

  • SOCIETY

    A proposal for a basic structure of a business model for research management, with a focus on intelligent security systems within the scope of the quasar project

    Science. Business. Society., Vol. 6 (2021), Issue 2, pg(s) 62-65

    Joint research takes its place as a major innovation process. The aim is to build relationships through which to gain access to external sources of high technology (or other assets) and their integration into the products and services of business organizations.
    The establishment and operation of Competence Centers in our country, such as QUASAR, plays a leading role in planning, structuring and negotiating these relationships with universities, small high-tech companies, mid-market companies and large companies. The proper development of the business models of the Centers of Competence plays an essential role in this direction
    The purpose of this study is to present the impact of business models on two dimensions of joint research: cooperation as an alternative to successful relationships and business models as an effective tool for assessing the portfolio of opportunities and risk allocation.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Possible approach for standard operating procedures development for intelligent security systems functioning

    Security & Future, Vol. 5 (2021), Issue 3, pg(s) 81-84

    Standard Operating Procedures are a common guide to the organization’s activities. Their development and use are an integral part of a successful management system of an organization, as it provides staff with information on the proper per formance of a job and facilitates consistency in achieving the desired end result.
    Standard Operating Procedures describe the exact steps needed to perform the organization’s security tasks and are important both for maintaining the level of competence of the staff performing a particular job and for training new employees. To reduce errors within organisation in terms of security-related activities and the mission-critical processes is the basis of this paper.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Some standardized peculiarity in defining the processes / stages providing input data for Intelligent Security Systems development – peripheral security systems

    Security & Future, Vol. 5 (2021), Issue 1, pg(s) 3-6

    The creation of an intelligent security environment is one of the main trends in the coming years, as security technologies will be a significant part of the developed systems, incl. physical protection and system integration systems will play a key role in d ata collection to ensure critical infrastructure (CI) security. Organizations equipped with intelligent security systems provide increased operational efficiency by using system integration for data collection and allow systems to “communicate” and work in tandem to provide real-time information for emergency preparedness or execution.
    In addition, data collected from advanced security technologies can be analyzed by system integrators to help senior CI management better understand how their organization works and make improvements based on the information gathered. Understanding the value of connecting different physical security systems, incl. and CI peripheral security systems, as well as ways to integrate them with other systems, is a key component in developing a smarter and more secure facility. Whether applying new CI solutions or upgrading compatibility solutions, system integration offers a variety of cost options that meet the specific needs of the business environment.
    Last but not least, threat information is used to determine the security regime of the CI as a basis for developing common requirements and performance targets, as well as criteria for assessing the conformity or effectiveness of physical protection systems. Modern standardized approaches have been developed, summarizing the good international practices, for determining the goals and / or requirements for physical protection, in accordance with the specifics of CI and for preventing any level of potential impact both in the sites and for the population in the neighboring territories. The development of requirements for peripheral security systems as an element of intelligent CI security systems and their integration in the CI as early as possible is the subject of this publication.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Possible approach for developing a model of intelligent security system applicable in its design in the quasar center of competence

    Security & Future, Vol. 4 (2020), Issue 2, pg(s) 47-50

    Through the development and operation of intelligent security systems, with a focus on critical infrastructure, it is expected to improve the security of the population in our country. This process finds real dimensions in the goals and tasks of the centers of competence, which are in the process of construction during the current period. A key element contributing to the proper functioning of intelligent security systems is its design, in accordance with the specifics of the security environment.
    Precisely the synergy of the efforts of the scientific, educational and industrial communities for the development of contemporary models of security systems, structured within the functional scope of the QUASAR competence center, is the basis of this article.

  • THEORETICAL FOUNDATIONS OF SECURITY

    Opportunities for determining factors affecting the development of intelligent security systems models

    Security & Future, Vol. 4 (2020), Issue 1, pg(s) 6-9

    Contemporary security challenges require the creation of a continuous and manageable process that guarantees the survival and sustainability of the organization’s core activities before, during and after a devastating event. This means that it is necessary to manage the organization’s activities, resources, personnel, impact on its functioning and countless risks. Significant contribution in this direction provides intelligent security systems.
    Thanks to rapid technological progress it is possible to be developed sophisticated security systems able to integrate heterogeneous sources that can monitor, control and manage the security environment of the organization, which is potentially at risk. But the combination of different technologies is not sufficient to significantly increase the level of security and the approach to the integrity of system elements, and compatibility with other systems management organization are basic factors for success in this direction.