نتایج جستجو برای: government protocol

تعداد نتایج: 377577  

2017
Mary Theofanos Brian Stanton Susanne Furman Sandra Spickard Prettyman Simson Garfinkel

Online security experiences, perceptions, and behaviors are key to understanding users security practices. Users express that they are concerned about online security, but they also express frustration in navigating the often confusing and mentally taxing cybersecurity world. This paper examines the differences in cybersecurity perception and behavior between cybersecurity experts in the US Gov...

1993
Graciela Chichilnisky Geoffrey Heal David Starrett

This chapter addresses a topical issue: the creation of a global market for carbon dioxide (CO2) emission permits.1 The recent adoption in the Kyoto Protocol of an ambitious target for global CO2 emission has focused attention on policy instruments for achieving this goal. In addition, increasing awareness of the economic burden of environmental protection has produced an interest in market-bas...

Journal: :Australian health review : a publication of the Australian Hospital Association 2000
M Welch T Philip G Aldridge H Fisher M Cross

The co-working relationship between general practitioners and local mental health services lies at the heart of the success of recent changes in mental health care. These changes have seen large-scale deinstitutionalisation, a shift to primary and community care, and a government policy of prevention and partnerships. This article outlines a liaison project developed jointly by the South-East N...

2012
Esther Duflo Pascaline Dupas Michael Kremer

☆ We thank Josh Angrist, Paul Glewwe, Alaka Holla, Vict Menezes-Filho, Karthik Muralidharan, and seminar par Harvard, UC Santa Barbara, the World Bank, Dartmouth C International Seminar for their helpful comments and di Ministry of Education, International Child Support Africa, a laboration. We thank Willa Friedman, Jessica Morgan, N Pouliquen and Paul Wang for their excellent research Grace Ma...

2013
Harmandeep Singh Manpreet Singh

Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e...

2011
Wei Jiang Bharath K. Samanthula

Secure similar document detection (SSDD) plays an important role in many applications, such as justifying the need-to-know basis and facilitating communication between government agencies. The SSDD problem considers situations where Alice with a query document wants to find similar information from Bob’s document collection. During this process, the content of the query document is not disclose...

1997
R. G. Johnston LAUR Roger G. Johnston

Tamper-indicating devices, also called security seals, are widely used to detect tampering or unauthorized entry. We studied 94 different security seals, both passive and electronic, developed either commercially or by the United States Government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low...

Journal: :Health information management : journal of the Health Information Management Association of Australia 2010
John Szakiel

Hospital Casemix Protocol data provide a brief summary outlining morbidity data and costs associated with an episode of care. Federal government legislation requires that hospitals report this information to private health insurers who, in turn, merge these data with benefit outlays and report their findings to the Department of Health and Ageing (DoHA). This article gives a brief outline of th...

2004
Jon P. Gant Won-Joon Nam Stuart Bretschneider Soonhee Kim Heungsuk Choi

As government organizations make subsequent investments to reposition their services around an Egovernment agenda, executives and managers of public organizations are experiencing great challenges in managing E-government systems successfully. This study examines how various human, organizational, and technological factors influence the performance of E-government systems in the Gangnam-Gu dist...

Journal: :Indian pediatrics 1997
K Banerjee K Suresh

Last year, a process evaluation protocol was designed by Government of India (GOI), United Nations Childrens' Fund (UNICEF) and World Health Organization (WHO) consisting of a rapid qualitative evaluation by independent observers throughout the country. The process evaluation was carried out on the first day of the PPI to provide information for improving the effectiveness of the day 2 activiti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید