نتایج جستجو برای: it can influence security dimensions including economic
تعداد نتایج: 5650268 فیلتر نتایج به سال:
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about shedding liability as about minimising risk. Banks use computer security mechanisms to transfer liability to their customers; companies use them to transfer liability to their insurers, or (via the public prosecutor) ...
Continuously changing nature of technological environment has been enforcing to revise the process of information security risk analysis accordingly. A number of quantitative and qualitative risk analysis methods have been proposed by researchers and vendors. The purpose of these methods is to analyze today's information security risks properly. Some of these methods are supported by a software...
The proliferation of e-services has initiated several concerns for consumers regarding trust, security, and privacy that make consumers hesitant to use e-services. Although the influence of trust, security, and privacy on the continuance of e-services use is highlighted in literature, there is scarcity in research that investigates the influence of the accumulation of these three dimensions on ...
Introduction: Everyone in the community has this right that to have a “decent work”. The “decent Work” program is one of the strategies of the International Labor Organization in the field of labor and social security. This program implies that each individual:1) Have access to employment in equal conditions, 2) as a result of employment, having the right to social dialogue, 3) having fundament...
Introduction: Everyone in the community has this right that to have a “decent work”. The “decent Work” program is one of the strategies of the International Labor Organization in the field of labor and social security. This program implies that each individual:1) Have access to employment in equal conditions, 2) as a result of employment, having the right to social dialogue, 3) having fundament...
The present study aimed at investigating the physical security dimensions affecting the security of volleyball stadiums in Iran. The study employed a descriptive-exploratory research method conducted on 115 managers and officials in volleyball stadiums, presidents and experts of Provincial Volleyball Boards as well as experts in the field of sports facilities and events as wel...
In the recent past, Information Security has received a lot of attention in the business and trade press. Much of this can be attributed to an increase in security breaches leading to major losses to the affected enterprises. The CSI/FBI 2005 [4] security survey reports 13 different attack types, ranging from website defacement to financial fraud to Internet worms and viruses. There are several...
as, the terrorism, nowadays, is an important and effective matter that affects different problems especially national security, it is tried to study an important aspect of interaction fields between national security and political development in developing countries and iran. an important point in this study is to consider terrorism as an strategic phenomenon that follows the procedures includi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید