نتایج جستجو برای: security needs
تعداد نتایج: 415429 فیلتر نتایج به سال:
English for Specific Academic Purposes (ESAP) uses the results of needs analysis for curriculum development and materials production. ESAP courses should be based on students’ academic needs. Consequently, the present study investigated the English language needs of Iranian undergraduate students of Law. Participants included 218 undergraduate students, 33 graduate students, and 10 content teac...
In this paper, a maximum likelihood estimation and a minimum entropy estimation for the expected value and variance of normal fuzzy variable are discussed within the framework of credibility theory. As an application, a credibilistic portfolio selection model is proposed, which is an improvement over the traditional models as it only needs the predicted values on the security returns instead of...
social happiness is one of the humanity’s most necessary innate needs and which plays a crucial role in the sublimity of individuals and society. reaching this would occur once individual has either physical or mental health. one of the effective factors in increasing the amount of individuals’ social happiness especially in women is providing them with mental dimension of security e.g. felling...
The goal of cyber security standards is to improve the security of information technology (IT) systems, networks, and critical infrastructures. A cyber security standard defines both functional and assurance requirements within a product, system, process, or technology environment. Well-developed cyber security standards enable consistency among product developers and serve as a reliable metric...
female heads of households are responsible for the material and spiritual needs of the families because of a deceased, missing, separated, divorced, addicted, disabled (permanent or temporary), imprisonment, ill or military deployed male head of households. survey research was employed in the study. the target population includes rural women heads of households razan city. following cochran’s f...
The effective use of modeling, simulation, and analysis (MSA) applications could greatly enhance our nation’s ability to achieve homeland security goals. The development of MSA applications has been conducted largely on an ad hoc and piecemeal basis. There is very little, if any, coordination of MSA development activities across government agencies, the research community, the commercial softwa...
Though journalists are often cited as potential users of computer security technologies, their practices and mental models have not been deeply studied by the academic computer security community. Such an understanding, however, is critical to developing technical solutions that can address the real needs of journalists and integrate into their existing practices. We seek to provide that insigh...
The information age dramatically changed the modern battlefield. The U.S. military has been deploying a new network-centric framework characterized by information sharing – shared situational awareness and knowledge of the commanders’ intent throughout the force, regardless of the individual’s or unit’s precise location. Under the direction of the U.S. Department of Defense’s (DoD’s) Office of ...
Efforts to bring inclusive privacy and security solutions to disadvantaged populations will require multifaceted approaches. A key aspect of this challenge is understanding the diverse needs of the userbase, as this will help ensure the alignment of proposed solutions with these needs. One potential strategy for addressing this challenge is to rigorously explore the mental models that character...
As e-businesses partner to engage in online business scenarios, they face numerous challenges when considering the sharing, comparison, and negotiation on their individual security needs. To aid companies in this task, in previous work we have presented a security negotiations support tool, which acts as a bridge between businesses and streamlines various negotiation tasks. The paper continues ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید