Threat of Technology

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating the Threat of Lost Knowledge within Information Technology Departments

Experienced information technology professionals leaving an organization creates a risk of losing crucia l knowledge. To mitigate this risk, an organization must identify key knowledge holders and develop a plan to transfer their knowledge before these employees leave the organization. This research develops the Knowledge Loss Assessment to identify employees with critical knowledge about impor...

متن کامل

Biosensor technology: recent advances in threat agent detection and medicine.

Biosensors are of great significance because of their capability to resolve a potentially large number of analytical problems and challenges in very diverse areas such as defense, homeland security, agriculture and food safety, environmental monitoring, medicine, pharmacology, industry, etc. The expanding role of biosensing in society and a real-world environment has led to an exponential growt...

متن کامل

Advanced receiver technology for commercial threat warning systems

Advanced threat warning technology will begin to play a more significant role for homeland defense and national security. Of particular concern are landing and take-off patterns of slow moving commercial airliners here and abroad. Recognizing this vulnerability has triggered renewed interest in high sensitivity internal gain optical detectors and two dimensional arrays. Avalanche photo-detector...

متن کامل

Airborne Systems Technology Application to the Windshear Threat

The general approach and products of the NASA/FAA Airborne Windshear Program conducted by NASA Langley Research Center are summarized, with references provided for the major technical contributions. During this period, NASA conducted 2 years of flight testing to characterize forward-looking sensor performance. The NASA/FAA Airborne Windshear Program was divided into three main elements: Hazard ...

متن کامل

Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication

The current study presents a conceptual replication of Liang and Xue’s (2010) test of their proposed Technology Threat Avoidance Theory (TTAT). Whereas the original study investigated individuals’ spyware related threat perceptions, avoidance motivations, and behaviors; we applied the original study’s research questions, hypotheses, and model to the more general context of malware. Results from...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Japan Academy of Midwifery

سال: 1999

ISSN: 0917-6357,1882-4307

DOI: 10.3418/jjam.13.1