نتایج جستجو برای: internal security

تعداد نتایج: 406278  

2007
Sushma Mishra Gurpreet Dhillon

In the literature it has been argued that individual values play an important role in creation and implementation of internal controls for information systems security. However majority of approaches that help in designing internal control overlook the importance of individual values. In this paper we argue that individual values should form the basis for defining internal control objectives. W...

2008
Michael Yanguo Liu Issa Traore Kin Fun Li Stephen W. Neville John Mullins

Supervisory Committee Dr. Issa Traore Supervisor Dr. Kin Fun Li Departmental Member Dr. Stephen W. Neville Departmental Member Weber-Jahnke, J.H. Outside Member Dr. John Mullins Additional Member Due to the dramatic increase in intrusion activities, the definition and evaluation of software security requirements have become important aspects of the development of software services. It is now a ...

2004
Dr. David Brewer

Laws and regulations concerning corporate governance dictate that a system of internal control is an essential element in the structure. Information security is a subset of that internal control system. Well formed controls provide assurance that the majority of events will be detected in sufficient time to counter any adverse impact on the organisation, whilst others assist recovery when disas...

2012
Geoffrey B. Duggan Hilary Johnson Beate Grawemeyer Geoffrey Duggan

To inform the design of security policy, task models of password behaviour were constructed for different user groups – Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password securi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

2012
Geoffrey B. Duggan Hilary Johnson Beate Grawemeyer Geoffrey Duggan

To inform the design of security policy, task models of password behaviour were constructed for different user groups – Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password securi...

1998
Jussipekka Leiwo Chandana Gamage Yuliang Zheng

Information Security Requirement Harmonizer (shortly, har-monizer) is a software tool that aids information security personnel in organizations to formulate, organize and automatically harmonize various information security requirements from various sources within the development of information security. Various levels of abstraction are represented as the information security development organ...

2013
Iznan Husainy Hasbullah Raja Kumar Murugesan Sureswaran Ramadass

IPv6 is a network layer protocol of the OSI reference model. IPv6 uses the Neighbor Discovery Protocol (NDP) that works on link local scope of IPv6 network. NDP covers host initialization and address auto configuration that is one of IPv6 advantages and other important functionalities. IPv6 mandates to support Internet Protocol Security (IPSec) for end‐to‐end communication security. However, th...

2015
Mohamed Ibrahim Mohamed Shanavas

The Service Oriented Architecture (SOA) became a dominant paradigm for enterprise computing. The web services are the implementation of SOA that works for heterogeneous platforms as they use common Internet protocols for communication and simple text format such as XML for data representation. The basic SOA architecture does not contain any security solution within it and the security is applie...

ژورنال: پرستاری کودکان 2019

Introduction: The nutritional dependency of infants on parents put them among the most vulnerable groups affected by food insecurity. The present study aimed to determine demographic characteristics related to food insecurity in Bushehrian households with infants aged 1-2 years. Methods: In a descriptive and analytical cross-sectional study, 400 mothers with infants aged 1-2 years were randomly...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید