نتایج جستجو برای: counter intelligence
تعداد نتایج: 147504 فیلتر نتایج به سال:
Cybercrime is any IT-based criminal offense. Because freely accessing to the Internet, cybercriminal entities threaten everyone, everywhere, every day. From remote individuals to the most powerful governments, none is absolutely immune from cybercrime constantly-mutating and devastating operations. Fortunately, there are scientific methods and technological means to counter it. This paper attem...
educational researchers have provided evidence that teachers’ emotional intelligence has strong effects on various aspects of teaching and learning. yet, in the field of teaching english to speakers of other languages (tesol), inquiry into teachers’ emotional intelligence is nearly limited. given its documented powerful impact on teaching practices and student learning, it is critical to pursue...
This paper discusses challenges the US intelligence community faces in helping to counter bioterrorism—a real and emerging threat that has the potential to cause mass destruction in the United States. It includes background material on a number of issues related to the threat of bioterrorism to help the reader understand why the bioterrorism threat is real, why it may be growing, and why it cou...
With the growing popularity of competitive intelligence, few ®rms consider the opposite side of data collection Ð defensive intelligence (DI). This viewpoint article addresses the reasons for information compromise and lack of control measures in organizations. Speci®c sources of vulnerability to counter intelligence are outlined and ways to secure operations are presented. Finally strategies f...
The realities of today testify to the urgency development modern theories intelligence and counterintelligence activities, in particular aspect ensuring national economic interests. above confirms relevance studying theoretical applied principles counterintelligence. In this regard, purpose article is analyze role interests through prism legal aspect. To achieve goal, a system general scientifi...
the present research has been deducted from a provincial research project which aims at determining the relationship of variables of variables of occupational self-concept, intelligence beliefs and metacognitive with entrepreneurship among the students of payame noor university of kurdistan. the volume of the samples was 1080 students (576 female and 504 male students). the research methodology...
The United States armed forces could be considered the world's most powerful military force. However, in modern conflicts, techniques of asymmetric warfare (terrorism) wreak havoc on the inflexible, regardless of technological or numerical advantage. In order to be more effective, the US military must improve its counter-terrorism (CT) capabilities and flexibility. In this light, the authors mo...
For a little over two years, Sterling Software lTD has been developing the Automatic Templating System (ATS) [1] for automatically extracting entity and event data in the counter-narcotics domain from military messages. This system, part of the Counter Drug Intelligence System (CDIS), was built around the NLToolset [2], which was originally developed by GE and is now being developed and support...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید