نتایج جستجو برای: cultural security
تعداد نتایج: 315882 فیلتر نتایج به سال:
Introduction: Because if messengers and social networking channels are formed and hosted on foreign service platforms, we will see political, cultural, and so on threats. In this case, the control and monitoring of social emotions and the observation of political currents are out of reach of outsiders and the aliens take over the public opinion by analyzing the content. In the meantime, the cou...
Abstract: Social confidence is a form of social relationships that means social interaction and action of all people of the society in all political, economic and cultural social different fields. The aim of this study is the sociology survey of students’ social confidence in two teacher training centers (TTC) of Shaheed Sharafat and Bahonar in Tehran and its effective social factors. The s...
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness in properly securing information assets is the individual user within an organization, much of the focus of extant security research is on tec...
the aim of this study was to explain and prioritize the barriers facing privatization of sports in iran. first, complementary data were gathered, coded and analyzed through the review of the theoretical bases, comparative studies and deep semi–structured interviews with experts in order to identify the barriers facing privatization of sports. after identifying the barriers, the obtained variabl...
INTRODUCTION.................................................................................................... 1750 I. THE MODEL: WORLD POLITY INSTITUTIONALISM AND THE STATE............. 1753 A. Understanding Social Organization: Sociological Institutionalism .......................................................................... 1754 B. Understanding the State as a Social Organization: ...
A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...
introduction society is a series of conditions and situations which makes the society sustainable and peaceful and fear and horror is finished from the public’s viewpoints. the insecurity of places and public spaces disrupt high spirits and health in life and it imposes extra expenses on the society by creating obstacles on the way of cultural growth and public cooperation. in this paper have b...
Automation and control systems such as integrated enterprise information technologies and distributed telemedical system architectures require highly secure information processing environments to ensure that costly (and even fatal) errors do not occur. However, research into systems development methodologies shows significant gaps in the treatment of systems security. Many methodologies do not ...
Employees’ non-compliance with information systems (IS) security policies is a key concern for organizations. Previous studies have proposed different explanations for employees’ behavior, such as the use of sanctions and monitoring, fear appeal and training, which represent different paradigms of learning. Previous works do not test the validity of their models or methods across different cult...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید