Threat of Technology
نویسندگان
چکیده
منابع مشابه
Mitigating the Threat of Lost Knowledge within Information Technology Departments
Experienced information technology professionals leaving an organization creates a risk of losing crucia l knowledge. To mitigate this risk, an organization must identify key knowledge holders and develop a plan to transfer their knowledge before these employees leave the organization. This research develops the Knowledge Loss Assessment to identify employees with critical knowledge about impor...
متن کاملBiosensor technology: recent advances in threat agent detection and medicine.
Biosensors are of great significance because of their capability to resolve a potentially large number of analytical problems and challenges in very diverse areas such as defense, homeland security, agriculture and food safety, environmental monitoring, medicine, pharmacology, industry, etc. The expanding role of biosensing in society and a real-world environment has led to an exponential growt...
متن کاملAdvanced receiver technology for commercial threat warning systems
Advanced threat warning technology will begin to play a more significant role for homeland defense and national security. Of particular concern are landing and take-off patterns of slow moving commercial airliners here and abroad. Recognizing this vulnerability has triggered renewed interest in high sensitivity internal gain optical detectors and two dimensional arrays. Avalanche photo-detector...
متن کاملAirborne Systems Technology Application to the Windshear Threat
The general approach and products of the NASA/FAA Airborne Windshear Program conducted by NASA Langley Research Center are summarized, with references provided for the major technical contributions. During this period, NASA conducted 2 years of flight testing to characterize forward-looking sensor performance. The NASA/FAA Airborne Windshear Program was divided into three main elements: Hazard ...
متن کاملMalware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication
The current study presents a conceptual replication of Liang and Xue’s (2010) test of their proposed Technology Threat Avoidance Theory (TTAT). Whereas the original study investigated individuals’ spyware related threat perceptions, avoidance motivations, and behaviors; we applied the original study’s research questions, hypotheses, and model to the more general context of malware. Results from...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Japan Academy of Midwifery
سال: 1999
ISSN: 0917-6357,1882-4307
DOI: 10.3418/jjam.13.1