نتایج جستجو برای: controls
تعداد نتایج: 255525 فیلتر نتایج به سال:
This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date...
Our new approach to information security provides more flexible, dynamic, and granular security controls than traditional enterprise security models. We have based the new approach to security on trust calculation, security zones, balanced security controls, and an expanded concept of perimeters that includes users and data. We are also focusing on survivability, based on the assumption that in...
Migration and Young Child Nutrition: Evidence from Rural China The unprecedented large scale rural-to-urban migration in China has left many rural children living apart from their parents. In this study, we examine the impact of parental migration on the nutritional status of young children in rural areas. We use the interaction terms between wage growth in provincial capital cities and initial...
Efforts to build "secure" computer systems have now been underway for more than a decade. Many designs have been proposed, some prototypes have been constructed, and a few systems are approaching the production stage. A small number of systems are even operating in what the Department of Defense calls the "multilevel" mode some information contained m these computer systems may have a clasmfica...
Using empirical methods, this paper examines household schooling and child labor decisions in rural Bangladesh. The results suggest the following: poverty and low parental education are associated with lower schooling and greater child labor; asset-owning households are more likely to have children combine child labor with schooling; households choose the same activity for all children within t...
* This article is a reprint of a technical report [19] published in June 1974. The program listings from the appendices have been omitted, due to space constraints. The text has been retyped and the figures redrawn, but with no substantive changes. The references have been updated, as some were not yet in final form in 1974. ABSTRACT A security evaluation of Multics for potential use as a two-l...
Since 1942 the United States Supreme Court has on several occasions considered individual rights related to sexual activity, and the extent to which the government permissibly may infringe these rights.' The individual's rights to make personal decisions regarding abortion and contraception free from governmental intrusion derive from a broader and more fundamental right of privacy 2 that the C...
As children increasingly use the Internet, there have been mounting concerns about their privacy online. As a result, the U.S. Congress enacted the Children’s Online Privacy Protection Act (COPPA) to prohibit websites from collecting information from children under 13 years of age without verifiable parental consent. Unfortunately, few technologies are available for parents to provide this cons...
Recent academic investigations of computer security policy violations have largely focused on non-malicious noncompliance due to poor training, low employee motivation, weak affective commitment, or individual oversight. Established theoretical foundations applied to this domain have related to protection motivation, deterrence, planned behavior, self-efficacy, individual adoption factors, orga...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید