نتایج جستجو برای: cultural security

تعداد نتایج: 315882  

, ,

Introduction: Because if messengers and social networking channels are formed and hosted on foreign service platforms, we will see political, cultural, and so on threats. In this case, the control and monitoring of social emotions and the observation of political currents are out of reach of outsiders and the aliens take over the public opinion by analyzing the content. In the meantime, the cou...

ژورنال: Journal of Research and Health 2014
Pishvaei, Malihe, Pouryousefi, Hamid, Adhami, Abdoreza , Atarodi, Alireza , Bagheri, Pejman , Pishvaei, Zeynab ,

Abstract: Social confidence is a form of social relationships that means social interaction and action of all people of the society in all political, economic and cultural social different fields. The aim of this study is the sociology survey of students’ social confidence in two teacher training centers (TTC) of Shaheed Sharafat and Bahonar in Tehran and its effective social factors. The s...

Journal: :Computers & Security 2013
Robert E. Crossler Allen C. Johnston Paul Benjamin Lowry Qing Hu Merrill Warkentin Richard Baskerville

Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness in properly securing information assets is the individual user within an organization, much of the focus of extant security research is on tec...

Journal: :مدیریت ورزشی 0
مجتبی امیری دانشگاه تهران شهرزاد نیری دانشگاه تهران مرجان صفاری دانشگاه خوارزمی فاطمه دلبری راغب دانشگاه تهران

the aim of this study was to explain and prioritize the barriers facing privatization of sports in iran. first, complementary data were gathered, coded and analyzed through the review of the theoretical bases, comparative studies and deep semi–structured interviews with experts in order to identify the barriers facing privatization of sports. after identifying the barriers, the obtained variabl...

2003
Ryan Goodman Derek Jinks

INTRODUCTION.................................................................................................... 1750 I. THE MODEL: “WORLD POLITY” INSTITUTIONALISM AND THE STATE............. 1753 A. Understanding Social Organization: Sociological Institutionalism .......................................................................... 1754 B. Understanding the State as a Social Organization: ...

2012
Giampaolo Bella Lizzie Coles-Kemp

A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...

Journal: :پژوهش های روستایی 0
کرامت اله زیاری استاد گروه جغرافیا، دانشگاه تهران داود عیوضلو دانشجوی کارشناسی ارشد جغرافیا و برنامه¬ریزی شهری، دانشگاه تهران محمود عیوضلو دانشجوی دکتری جغرافیا و برنامه¬ریزی شهری، دانشگاه اصفهان جهانبخش ریکا دانشجوی کارشناسی ارشد جغرافیا و برنامه¬ریزی روستایی، دانشگاه شهید بهشتی

introduction society is a series of conditions and situations which makes the society sustainable and peaceful and fear and horror is finished from the public’s viewpoints. the insecurity of places and public spaces disrupt high spirits and health in life and it imposes extra expenses on the society by creating obstacles on the way of cultural growth and public cooperation. in this paper have b...

2008
Amanda Freeman

Automation and control systems such as integrated enterprise information technologies and distributed telemedical system architectures require highly secure information processing environments to ensure that costly (and even fatal) errors do not occur. However, research into systems development methodologies shows significant gaps in the treatment of systems security. Many methodologies do not ...

2013
Mari Karjalainen Mikko T. Siponen Petri Puhakainen Suprateek Sarker

Employees’ non-compliance with information systems (IS) security policies is a key concern for organizations. Previous studies have proposed different explanations for employees’ behavior, such as the use of sanctions and monitoring, fear appeal and training, which represent different paradigms of learning. Previous works do not test the validity of their models or methods across different cult...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید