نتایج جستجو برای: government protocol
تعداد نتایج: 377577 فیلتر نتایج به سال:
Online security experiences, perceptions, and behaviors are key to understanding users security practices. Users express that they are concerned about online security, but they also express frustration in navigating the often confusing and mentally taxing cybersecurity world. This paper examines the differences in cybersecurity perception and behavior between cybersecurity experts in the US Gov...
This chapter addresses a topical issue: the creation of a global market for carbon dioxide (CO2) emission permits.1 The recent adoption in the Kyoto Protocol of an ambitious target for global CO2 emission has focused attention on policy instruments for achieving this goal. In addition, increasing awareness of the economic burden of environmental protection has produced an interest in market-bas...
The co-working relationship between general practitioners and local mental health services lies at the heart of the success of recent changes in mental health care. These changes have seen large-scale deinstitutionalisation, a shift to primary and community care, and a government policy of prevention and partnerships. This article outlines a liaison project developed jointly by the South-East N...
☆ We thank Josh Angrist, Paul Glewwe, Alaka Holla, Vict Menezes-Filho, Karthik Muralidharan, and seminar par Harvard, UC Santa Barbara, the World Bank, Dartmouth C International Seminar for their helpful comments and di Ministry of Education, International Child Support Africa, a laboration. We thank Willa Friedman, Jessica Morgan, N Pouliquen and Paul Wang for their excellent research Grace Ma...
Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e...
Secure similar document detection (SSDD) plays an important role in many applications, such as justifying the need-to-know basis and facilitating communication between government agencies. The SSDD problem considers situations where Alice with a query document wants to find similar information from Bob’s document collection. During this process, the content of the query document is not disclose...
Tamper-indicating devices, also called security seals, are widely used to detect tampering or unauthorized entry. We studied 94 different security seals, both passive and electronic, developed either commercially or by the United States Government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low...
Hospital Casemix Protocol data provide a brief summary outlining morbidity data and costs associated with an episode of care. Federal government legislation requires that hospitals report this information to private health insurers who, in turn, merge these data with benefit outlays and report their findings to the Department of Health and Ageing (DoHA). This article gives a brief outline of th...
As government organizations make subsequent investments to reposition their services around an Egovernment agenda, executives and managers of public organizations are experiencing great challenges in managing E-government systems successfully. This study examines how various human, organizational, and technological factors influence the performance of E-government systems in the Gangnam-Gu dist...
Last year, a process evaluation protocol was designed by Government of India (GOI), United Nations Childrens' Fund (UNICEF) and World Health Organization (WHO) consisting of a rapid qualitative evaluation by independent observers throughout the country. The process evaluation was carried out on the first day of the PPI to provide information for improving the effectiveness of the day 2 activiti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید