نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

Performance Assessment and analysis of Specialized Nutrition and Food Security Working Group in Achiveing Strategic Goals of National Nutrition and Food Security Document in Iran Mona Pourghaderi1, Fatemeh Mohammadi-Nasrabadi2, Behzad Damari3*, Zahra Abdollahi4, Shiva Mafimoradi5,6, Sareh Edalati7, Nasrin Omidvar8** 1Ph.D. Candidate in Food and Nutrition Policy, Department of Community Nutriti...

2003
Yinlun Huang Helen H. Lou

Chemical processes are often operated under high pressures, at high temperatures, and with fast material flows and complex manufacturing mechanisms. Thus, their operation is always more risky, environmentally more harmful, and potentially more dangerous than other types of manufacturing activities when abnormal or destructive situations arise. In the extreme, catastrophes, such as explosions, t...

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

اکبرزاده صفوئی, مرتضی, زنگیان, سمیه, موسوی امیری, طیبه, نعمتی, محمد علی,

Nowadays, learning to use internet provides an opportunity for financial institutes and banks to benefit from it in their own favor in such turbulent competitive environment. In this regard, this research studies simultaneous role of perceived security, citizens’ trust and satisfaction on the acceptance of internet banking services. Statistical population of the research is customers of Bank Me...

Journal: :EURASIP Journal on Wireless Communications and Networking 2006

Journal: :Intensif : jurnal ilmiah penelitian teknologi dan penerapan sistem informasi 2023

The Personal Identification Number or KTP is prone to be stolen and used by unwanted parties, this also a possibility for the Simpel Desa, village administration application that contain use Number. This study aims detect information security vulnerabilities. analyze vulnerabilities in applications using MobSF ISO 27002:2013. penetration testing malware applications. In Desa analyzed two ways, ...

This paper seeks to examine the effect of the revolutions of 2011-2012 in the Arabic countries of the Middle East and North Africa (MENA) on Israeli regime's ontological security and its strategy of closure and deviation in the regional level. In other word, the paper tries to find the challenges the ontological security and identity of Israel is facing with after the occurrence of the awakenin...

The study highlights the importance to develop the national economy through assuring energy security. The study aims to analyze how to develop renewable energy sources, determine the main priorities of Ukraine’s national security policy and discover novel ways of assuring energy security due to developing the industry of renewable energy in the light of environmental safety, energy conservation...

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید