نتایج جستجو برای: security in procedures

تعداد نتایج: 17020606  

2012
Bruce J. Vanstone Gavin Finnie Clarence Tan Bruce Vanstone

This paper demonstrates how neural networks may be successfully applied to the problem of security selection in the Australian Stockmarket. In practice, it is unrealistic for a trader to apply capital to all securities available in the market, and a selection technique must be employed to reduce the number of securities competing for capital. Selection techniques are generally based on either f...

Journal: :Journal of Computer Security 1992
Amihai Motro

T h e issues of database security and integrity are tightly related. Security mechanisms and integrity mechanisms are both concerned with protection of information, and both involve management of meta-information and procedures for screening transactions. Yet in database systems these tasks are entirely separate. In this paper we describe a unified model that accommodates both security and inte...

Journal: :پژوهش های معاصر انقلاب اسلامی 0
نبی الله ابراهیمی استادیار گروه روابط بین الملل دانشگاه تربیت مدرس سید مسعود موسوی شفائی استادیار گروه روابط بین الملل دانشگاه تربیت مدرس زینب زبیدی کارشناس ارشد روابط بین الملل دانشگاه تربیت مدرس

the purpose of this research is to examine the effect of the islamic awakening in the arabic countries of the middle east and north africa on israeli ontological security and, it's strategy ofclosure and deviationin the regional level. in other words, after occurrence of the developments, the ontological security and identity of israel faced with what challenges? this research argues that ...

2005
Scott R. Boss

The introduction of the Internet to the business world has changed many ways of doing business. Unfortunately, the Internet has also become an arena where individuals are constantly at risk for computer viruses, spyware/adware infection, and malicious attacks designed to misuse or appropriate corporate assets. The wide-spread publicity of both cyber-attacks and ways to combat these problems, pu...

Journal: :مجله دانشکده حقوق و علوم سیاسی 0
کامران طارمی

for the past quarter of a century iran has advocated the setting up of a security regime in the persian gulf by littoral states that excludes foreign powers. this paper examines the reasons behind iran's opposition to foreign participation in persian gulf security arrangements; the steps iran has taken to gain the support of other littoral states for its scheme, and the prospects for iran&...

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

2012
Sumedha Kaushik Ankur Singhal

Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...

2003
Giovanni Iachello

Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidelines to inform their internal processes. This paper analyzes whether existing security management standards support process requirements for personal data management, drawing from experience with security policies in p...

Journal: :The journal of contemporary dental practice 2004
Joseph E Chasteen Gretchen Murphy Arden Forrey David Heid

This article reviews the issues related to the Health Insurance Portability & Accountability Act (HIPAA) security rule that apply to dental practice. The security rule specifically addresses individually identifiable health information that is transmitted or maintained in electronic media. System security must be applied to the entire technical infrastructure for the practice environment as wel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید