نتایج جستجو برای: it can influence security dimensions including economic

تعداد نتایج: 5650268  

1994
Ross J. Anderson

The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about shedding liability as about minimising risk. Banks use computer security mechanisms to transfer liability to their customers; companies use them to transfer liability to their insurers, or (via the public prosecutor) ...

Journal: :Journal of Anesthesia and Intensive Care Medicine 2019

Journal: :Computers & Security 2005
Bilge Karabacak Ibrahim Sogukpinar

Continuously changing nature of technological environment has been enforcing to revise the process of information security risk analysis accordingly. A number of quantitative and qualitative risk analysis methods have been proposed by researchers and vendors. The purpose of these methods is to analyze today's information security risks properly. Some of these methods are supported by a software...

2011
Jaffar Ahmad Alalwan

The proliferation of e-services has initiated several concerns for consumers regarding trust, security, and privacy that make consumers hesitant to use e-services. Although the influence of trust, security, and privacy on the continuance of e-services use is highlighted in literature, there is scarcity in research that investigates the influence of the accumulation of these three dimensions on ...

رحمانی, علی, هاشمی, سید محمد,

Introduction: Everyone in the community has this right that to have a “decent work”. The “decent Work” program is one of the strategies of the International Labor Organization in the field of labor and social security. This program implies that each individual:1) Have access to employment in equal conditions, 2) as a result of employment, having the right to social dialogue, 3) having fundament...

رحمانی, علی, هاشمی, سید محمد,

Introduction: Everyone in the community has this right that to have a “decent work”. The “decent Work” program is one of the strategies of the International Labor Organization in the field of labor and social security. This program implies that each individual:1) Have access to employment in equal conditions, 2) as a result of employment, having the right to social dialogue, 3) having fundament...

 The present study aimed at investigating the physical security dimensions affecting the security of volleyball stadiums in Iran. The study employed a descriptive-exploratory research method conducted on 115 managers and officials in volleyball stadiums, presidents and experts of Provincial Volleyball Boards as well as experts in the field of sports facilities and events as wel...

2006
Vineet Kumar Rahul Telang Tridas Mukhopadhyay

In the recent past, Information Security has received a lot of attention in the business and trade press. Much of this can be attributed to an increase in security breaches leading to major losses to the affected enterprises. The CSI/FBI 2005 [4] security survey reports 13 different attack types, ranging from website defacement to financial fraud to Internet worms and viruses. There are several...

Journal: :سیاست 0
احمد ساعی دانشیار گروه روابط بین¬الملل دانشکده حقوق و علوم سیاسی دانشگاه تهران مجید معصومی دانش آموخته دکتری علوم سیاسی از دانشگاه آزاد اسلامی واحد علوم تحقیقات تهران

as, the terrorism, nowadays, is an important and effective matter that affects different problems especially national security, it is tried to study an important aspect of interaction fields between national security and political development in developing countries and iran. an important point in this study is to consider terrorism as an strategic phenomenon that follows the procedures includi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید