نتایج جستجو برای: security in procedures

تعداد نتایج: 17020606  

ژورنال: مجله طب نظامی 2020

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

Journal: :فصلنامه علمی پژوهشی علوم سیاسی 0
آیة الله سید نورالدین شریعتمدار جزائری استاد فقه سیاسی در حوزه علمیه قم نجف لک زایی رئیس پژوهشکده علوم و اندیشه سیاسی و استاد فلسفه امنیت در اسلام اصغر افتخاری معاون پژوهشی دانشگاه امام صادق(ع) و از صاحب نظران مباحث امنیتی

.

2017
Jean-Louis Huynen Gabriele Lenzini

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodolog...

2004
Ziqi Liao Wing-Keung Wong

This paper examines the use of Internet banking systems and several critical factors related to Internet banking services. The analysis suggests that the constructs tested considerably explain the variation in customer interactions. Perceived usefulness and perceived ease of use are important in facilitating customer interactions. Perceived security, responsiveness and convenience also represen...

2000
CLIVE BAILEY JOHN TURNER

Ð Contribution evasion is a serious problem for social security ®nancing in many countries. A mixture of strategies may be most e€ective in reducing the underpayment and nonpayment of mandatory social security contributions by employers and workers. Contribution evasion can be reduced by changes in: (a) the incentives inherent in the design of social security systems, (b) employer, worker and g...

1995
Denis Trcek Borka Jerman Blazic

Implementations of security services in a global network are strongly based on asymmetric cryptography, which in turn depends on a public key certification infrastructure. Its properties and behaviour should prevent threats. Moreover, the infrastructure should be efficiently manageable and it should meet users' expectations regarding trust. Flexible guidelines and procedures are given in this p...

2011
Dongwan Kang

Recent communications environment significantly expands the mobile environment. The popularization of smartphones with various mobile services has emerged, and smartphone users are rapidly increasing. Because of these symptoms, existing wired environment in a variety of mobile traffic entering to mobile network has threatened the stability of the mobile network. Unlike traditional wired infrast...

Journal: :Digital Investigation 2005
Spike Quinn

KEYWORDS Security policy; Forensic policy; IT management; Forensic readiness; Statistics Computer security is of concern to those in IT (Information Technology) and forensic readiness (being prepared to deal effectively with events that may require forensic investigation) is a growing issue. Data held only on magnetic or other transient media require expert knowledge and special procedures to p...

2012
Dongwan Kang

Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and malicious traffic technologies was not ready. So Mal...

2005
Matt Bishop Helen Armstrong

The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realistic assumptions can then made and/or procedures implemented to protect against violation of the assumptions. A number of examples in the context...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید