نتایج جستجو برای: security needs

تعداد نتایج: 415429  

English for Specific Academic Purposes (ESAP) uses the results of needs analysis for curriculum development and materials production. ESAP courses should be based on students’ academic needs. Consequently, the present study investigated the English language needs of Iranian undergraduate students of Law. Participants included 218 undergraduate students, 33 graduate students, and 10 content teac...

In this paper, a maximum likelihood estimation and a minimum entropy estimation for the expected value and variance of normal fuzzy variable are discussed within the framework of credibility theory. As an application, a credibilistic portfolio selection model is proposed, which is an improvement over the traditional models as it only needs the predicted values on the security returns instead of...

Journal: :iau international journal of social sciences 2015
zahra farzizadeh somayeh haghi roghayeh aghaziyarati

social happiness is one of the humanity’s most necessary innate needs and which plays a crucial role in the sublimity of individuals and society. reaching this would occur once individual has either physical or mental health. one of the effective factors in increasing the amount of individuals’ social happiness especially in women is providing them with mental dimension of security e.g. felling...

2013
Karen Scarfone Dan Benigni Tim Grance

The goal of cyber security standards is to improve the security of information technology (IT) systems, networks, and critical infrastructures. A cyber security standard defines both functional and assurance requirements within a product, system, process, or technology environment. Well-developed cyber security standards enable consistency among product developers and serve as a reliable metric...

Journal: :زن در توسعه و سیاست 0
حشمت اله سعدی دکتری ترویج و آموزش کشاورزی، دانشیار دانشگاه بوعلی سینا هاجر وحدت مودب دانشجوی کارشناسی ارشد توسعۀ روستایی، دانشگاه بوعلی سینا

female heads of households are responsible for the material and spiritual needs of the families because of a deceased, missing, separated, divorced, addicted, disabled (permanent or temporary), imprisonment, ill or military deployed male head of households. survey research was employed in the study. the target population includes rural women heads of households razan city. following cochran’s f...

2008
Charles R. McLean Sanjay Jain Y. Tina Lee

The effective use of modeling, simulation, and analysis (MSA) applications could greatly enhance our nation’s ability to achieve homeland security goals. The development of MSA applications has been conducted largely on an ad hoc and piecemeal basis. There is very little, if any, coordination of MSA development activities across government agencies, the research community, the commercial softwa...

2015
Susan E. McGregor Polina Charters Tobin Holliday Franziska Roesner

Though journalists are often cited as potential users of computer security technologies, their practices and mental models have not been deeply studied by the academic computer security community. Such an understanding, however, is critical to developing technical solutions that can address the real needs of journalists and integrate into their existing practices. We seek to provide that insigh...

2007
Inder M. Singh

The information age dramatically changed the modern battlefield. The U.S. military has been deploying a new network-centric framework characterized by information sharing – shared situational awareness and knowledge of the commanders’ intent throughout the force, regardless of the individual’s or unit’s precise location. Under the direction of the U.S. Department of Defense’s (DoD’s) Office of ...

2017
Adam Houser Matthew L. Bolton

Efforts to bring inclusive privacy and security solutions to disadvantaged populations will require multifaceted approaches. A key aspect of this challenge is understanding the diverse needs of the userbase, as this will help ensure the alignment of proposed solutions with these needs. One potential strategy for addressing this challenge is to rigorously explore the mental models that character...

2010
Jason R.C. Nurse Jane E. Sinclair

As e-businesses partner to engage in online business scenarios, they face numerous challenges when considering the sharing, comparison, and negotiation on their individual security needs. To aid companies in this task, in previous work we have presented a security negotiations support tool, which acts as a bridge between businesses and streamlines various negotiation tasks. The paper continues ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید