نتایج جستجو برای: deterrence and securing social defense
تعداد نتایج: 16953888 فیلتر نتایج به سال:
Information systems are growing in size and complexity making it infeasible for human administrators to manage them. The aim of this work is to study ways of securing and using mobile software agents to deter attackers, protect information systems, detect intrusions, automatically respond to the intrusions and attacks, and to produce recovery services to systems after attacks. Current systems p...
Over the last decade, we and colleagues have done considerable theoretical and applied work involving multiresolution modeling and exploratory analysis,1 in part to connect the worlds of strategic planning (e.g., development of the defense guidance and defense programs) 2 with the world of more detailed analysis (e.g., development of military forces, weapon systems, and doctrine).3 We have also...
The chapter gives an overview of business practices and how people and human relations influence situational awareness and information security in an organization. There is still a long way to go in training employees in information security and improving employees’ information security awareness. Motivated and trained employees have the ability to detect and report security weaknesses and brea...
ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies
This paper proposed a five dimensional taxonomy ADMIT which captures five major classifiers to characterize the nature of attacks. These are classification by attack vector, classification by defense, classification by method, classification by impact and classification by attack target. The classification structure of proposed taxonomy described the nature of attacks thoroughly. The administra...
Why do individuals sometimes pursue apparently senseless aggression, whether on the street, in court, at work, or in politics? Past work converges on the idea that individuals do so to establish social rank and deter prospective challengers. However, the fundamental claims of this argument - that concerns for one's reputation cause individuals to behave aggressively, and that a reputation for a...
to teach english adequately, qualified teachers are needed. unfortunately, there are still teachers who are teaching english without an academic degree in tefl. it is necessary for teachers to have a major in english to have subject knowledge, but it is not sufficient. teachers need to have an understanding of the social, cultural, moral, ethical, and pedagogical issues of education and practic...
nowadays, given different definitions and conceptions on development, territorial planning lends to for various economic, social and geographical aspects, however its defensive and security perspectives have been taken into account to less extent. the present research is aimed to specify passive defense legal requirements in territorial planning through outlining the most important rules on pas...
Nigeria defense strategy has since combined soft and hard diplomacy to negotiate, persuade induce both global regional allies support her counter terrorism fight. This study examined challenges of in securing external arrangement between 2007 2022. The adopted mixed research design using qualitative quantitative methods. relied heavily on secondary sources such as books, journals, articles, per...
Abstract Measures aimed at general deterrence are often thought to be problematic on the basis that they violate Kantian prohibition against sacrificing interests of some as a means securing greater good. But even if this looks like weak objection because can justified form societal self-defence, such measures may regarded for another reason: Harming in self-defence is only when it’s necessary,...
Risk is an inherent factor in the traveler's choice of destination. Tourism destinations differ in many aspects including their location, economic condition, cultural and political status and crime. Given such differences, the analysis of destination risk and its dimensions is of substantial interest. The current study explores the risk factors perceived about Iran as a tourism destination usin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید