نتایج جستجو برای: have always brought about security challenge

تعداد نتایج: 3825509  

Journal: :Computer and Information Science 2011
Abbas Toloie Eshlaghy Alireza Pourebrahimi Babak Zendehdel Nobari

Undoubtedly, in today’s new business information has donated the most competitive advantage for the organizations. Although just collecting, processing and retrieving of data were significant in the past, the subject of information security is turned into a serious challenge in micro and macro levels of organizational management. Indeed, observance of the information security principals is coun...

Journal: :Current Biology 2013
Jonathon D. Crystal

Avoiding what you know is bad is a major challenge for recovering addicts. New research suggests that powerful desire can develop even for cues that have always been repulsive. Memories about learned cues can promote addiction in certain conditions.

2010
Shirley Radack

These observations on measurements are relevant to our use of information technology (IT). Organizations rely on IT to carry out their daily operations and to deliver products and services to the public. Managers are challenged to use IT effectively and to protect their systems and information from security threats and risks. There have been many past efforts to develop security measurements th...

2011
Dieter Gollmann Marina Krotofil Harald Sauff

We critically analyze the state of the art in research on wireless sensor network security. Assumptions about security requirements are not always consistent with the assumptions about the nature of sensor nodes. There are deficiencies in the specification of attacker models. Work on wireless sensor network security often fails to give proper definitions and justifications of what constitutes n...

2009
Stere Preda Nora Cuppens-Boulahia Frédéric Cuppens Laurent Toutain

Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accurately evaluate the contexts viewed as constraints in which some security requirements are to be met. We are talking about dynamic or contextual requirements, and they are problematic since they rely on specific functionalit...

Journal: :مطالعات حقوق خصوصی 0
محمود صابر دانشکده حقوق و علوم سیاسی دانشگاه تهران نسرین طباطبائی حصاری دانشکده حقوق و علوم سیاسی، دانشگاه تهران

registration institution is important institution that guarantees economic and legal security. human societies always noted this point and then created several registration systems and practiced one of theses for achievement to the security. but lack of attention and knowledge about effects and aims of registration real properties and their documents of transactions and therefore violating thes...

Journal: :Organization Science 2013
Glenn B. Voss Zannie Giraud Voss

Balancing exploration and exploitation is a critical challenge that is particularly difficult for smaller, nascent organizations that lack the resources, capabilities, and experience necessary to successfully implement ambidexterity. To better understand how small and medium-sized enterprises achieve ambidexterity, we develop theoretical arguments that link organizational performance to strateg...

Journal: :international journal of epidemiology research 0
rouhullah dehghani social determinants of health (sdh) research center and department of environment health, kashan university of medical sciences, kashan, iran masoud amiri social health determinants research center

due to special conditions of iran; i.e., neighboring to major centers of drug production in afghanistan during the last few decades, it was the passageway of the drug to europe. moreover, because of appropriate context of social, economic and cultural situations, there was an increased addiction and drug trafficking in iran. it is obvious that a lot of people would be involved directly and indi...

2006
Murdoch Watney

The purpose of this paper is to investigate the legal justifiability of measures contained in state surveillance laws pertaining to the Internet. Prior to the terrorist attack on the United States of America (U.S.) on 11 September 2001, the concept ‘surveillance’ was nothing new and is indeed as old as human society. As far back as the sixteenth century the first central state surveillance appe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید