نتایج جستجو برای: security and trust at five maturity levels performed

تعداد نتایج: 17233090  

2004
Hossein Safari Adel Moslehi Ayoob Mohammadian Emad Farazmand Kazem Haki Gholamreza Khoshsima

eGovernment has been defined as Information and Communication Technology (ICT) enabled route to good governance. eGovernment is an evolutionary path that its effective implementation requires a complete understanding of constituting elements and at the same time taking a holistic view to stay focused on its overall objectives. This paper introduces a new heuristic model that could be used to me...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تهران 1370

the subjects of the study are only the tefl teachers and students at gilan university. to obtain the desired data, a questionnaire which was based on the theories and disecussions gathered, was used as the main data gathering instrument. to determine the degree of relationship between variables, covariance and pearson product moment correlation coefficient were the formulas applied. the data we...

Journal: :international journal of management academy 0
ali mircholi m.sc student of marketing management, official sciences and economics faculty, university of isfahan,isfahan,iran ali asadi m.a student of marketing management university of isfahan alireza harooni arvin tajhiz sepahan co., isfahan, iran

in today’s very competitive world gaining competitive advantage is bound to arranging products and services of companies and businesses in accordance with customers’ needs. for this purpose, gaining reputation in e-service can be quite helpful. thus the goal of the present research is studying the effect of e-banking service quality on bank reputation. so a coherent collection of structures wer...

2014
Pedro Domingues Paulo Sampaio

Maturity models enabling the assessment of integrated management systems (IMS) are crucial in order to provide a comparison between IMS from different companies. This paper intends to report the efforts made and the methodologies followed to develop an IMS maturity assessment model. Additionally, the paper aims at presenting such model, illustrate its usefulness, and demonstrate how companies m...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زیست شناسی 1388

abstract chickpea is weak in competition of weeds that damages to it at between 40 t0 60 percent. kermanshah province is one of the most important region for chickpea fields in iran. for these reosons, weed management is necessary in this crop. in order to evaluate of herbicides and stubble control on broad leave weeds control in chickpea. experiment was conducted in agricultural research stat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1388

هدف تحقیق حاضر بررسی تاثیر نشانه های فرا گفتمان متنی بر فهم متون انگلیسی به وسیله ی زبان اموزان فارسی زبان است.این تحقیق علاوه بر این کوشیده است تا میزان اگاهی این زبان اموزان و نحوه ی تعامل انان را با متون خوانده شده در زبان انگلیسی به وسیله ی پرسش نامه ی تهیه شده بررسی کند.بر اساس محتوای یک متن انگلیسی یازده سوال درست /غلط طرح گردید و یک مرتبه با ان متن و یک مرتبه با نسخه ای که نشانه ها...

Journal: :Information & Management 2004
James J. Jiang Gary Klein Hsin-Ginn Hwang Jack Huang Shin-Yuan Hung

Software projects have a high rate of failure. Organizations have tried to reduce the rate through methodological approaches but with little perceived success. A model of software development maturity (the capability maturity model (CMM)) describes managerial processes that can be used to attack software development difficulties from the managerial control perspective at five maturity levels. O...

2010
Akira Kubo Hiroyuki Sato

In modern information service architectures, security is one of the most critical criteria. Almost every standard on information security is concerned with internal control of an organization, and particularly with authentication. If an RP (relying party) has valuable information assets, and requires a high level to authentication for accepting access to the valuable assets, then a strong mecha...

2005
Asif Ali Munshi Fareed Hussain

Electronic business provides many benefits to organizations that embrace on it. It is true that ebusiness improve business processes, integrate business processes and its corresponding value chain, give speed to internal and external organizational activities etc, but it poses the greatest challenge to today’s organizations to transform their traditional businesses into electronic business. To ...

Journal: :Journal of Computer-Mediated Communication 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید