نتایج جستجو برای: protection policy
تعداد نتایج: 431861 فیلتر نتایج به سال:
The International Commission on Radiological Protection has existed for 75 yearsand throughout that time has produced recommendations for the protection of peopleagainst the dangers of ionizing radiation. It recognized some 25 years ago that the envi-ronment should also be protected, but the policy was to assume that the protection ofpeople was sufficient to protect other specie...
Management and policy scholars widely accept that the external context plays a significant role in shaping firm behavior. Indeed, a vast literature supports this neo-institutional view. There is also copious literature discussing the differences between the regulatory context of firms in developing countries and developed nations. For instance, the Chinese Environmental Protection Agency employ...
Health insecurity has emerged as a major concern among health policy-makers particularly in low- and middle-income countries (LMICs). It includes the inability to secure adequate healthcare today and the risk of being unable to do so in the future as well as impoverishing healthcare expenditure. The increasing health insecurity among 150 million of the world's poor has moved social protection i...
Since the enactment of the Antiquities and Monuments Ordinance in 1971 and the establishment of Antiquities and Monuments Office in 1976, the Hong Kong Government has set up several institutions with particular ordinances and schemes for Heritage Conservation. With the set-up of government initiatives, yet the protection of physical and cultural heritage is still limited due to the ambiguity of...
ISSN 0265–8240 © 2005 UB Foundation Activities Inc., for and on behalf of the Baldy Center for Law and Social Policy and Blackwell Publishing Ltd. Blackwell Publishing, Ltd. Oxford, UK LAPO aw & Policy 0265-8240 © Blackwell Publishing Ltd. 2005 April 2005 27riginal Article Gunningham, Thornton & Kagan CORPORATE COMPLIANCE W & POLICY April 2005 Motivating Management: Corporate Compliance in Envi...
Security policies define how information within a computer system is to be used. Protection mechanisms are built into these systems to enforce security policies. However, in mort systems it is quite unclear what policies a particular mechanism can or does enforce. This paper prscisely defines security policies and protection mechanisms in order to bridge the gap between them with the concept of...
OBJECTIVE To assess current sun protection policies and the receptiveness to new policies at elementary schools in the United States. DESIGN A cross-sectional telephone survey. SETTING General educational community. PATIENTS OR OTHER PARTICIPANTS In 1998, a random sample of 1000 public elementary schools in the United States was selected (proportional to population size) from 27 metropoli...
Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all stakeholders, train the co-operation and solutionfinding process, and evaluate existing concepts. Key elements for success include a well-established scenario as well as specific tasks for the participants. In the follo...
We firstly suggest privacy protection cache policy applying the duty to delete personal information on a hybrid main memory system. This cache policy includes generating random data and overwriting the random data into the personal information. Proposed cache policy is more economical and effective regarding perfect deletion of data.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید