نتایج جستجو برای: security of data
تعداد نتایج: 21331580 فیلتر نتایج به سال:
abstract: the present study was undertaken to investigate whether 1) there is any significant correlation between iranian efl/eap learners’ l2 writing proficiency and their willingness to communicate, 2) there is any significant difference between efl and eap learners in terms of willingness to communicate, 3) there is any significant difference in wtc of iranian efl/eap learners with 1- nati...
تاثیر آموزش تفکر انتقادی به شیوه مباحثه بر روی مهارت درک متن یادگیرندگان انگلیسی به عنوان زبان خارجی
the purpose of the present study was to investigate the effect of instruction through debate on male and female efl learners’ reading comprehension, to examine the differences between the performance of male and female participants on the five dimensions of cctst including analysis, evaluation, inference, deductive reasoning, and inductive reasoning, and to examine the differences between male ...
knowledge transfer was the most important factors of success for organizations in today's complex and changing environment as one of aspects of knowledge management. the aim of this study was to investigate the relationship between intrinsic motivation and extrinsic motivation by transfer the employee’s knowledge in social security organizations in kerman. the method research is descriptiv...
abstract: advertisements are the most accessible type of authentic materials, and this is one reason why they are used more and more in english teaching classes. for this cause, studies in the field of advertisements are very widespread nowadays. for pun is one aspect which makes advertisements more interesting, it is used more than before in advertisements. use of puns makes an advertisement m...
this paper argues for a broader emphasis on sustainable security and smart power, for examining both opportunities as well as threats to security. sustainable security is a new concept in the security studies. deep attention to all possible threats against human life is necessary for continuation of security in a sustainable and dynamic base. this aim can be achieved in a highest level by mergi...
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
the prioritization of effective factors on electronic health information security in medical centers
introduction: the use of new technologies has created much concern about privacy and security of health information. as regards health care workers are the main users of hospital information system aiming to improve the quality of care, this study as aimed to evaluate employee's perspective towards electronic health information security. methods: this descriptive study was performed on 400 wo...
this study was carried out to investigate the effects of integrative vs. instrumental motivation, learning strategy use and gender on iranian efl learners. to this end, 120 efl learners both male and female majoring in english language and literature at shiraz university participated in the study. in order to conduct this study three instruments were used: oxford quick placement test, motivatio...
this research study aimed to investigate the relationship between field-dependence/independence cognitive style and vocabulary learning strategies among iranian efl learners. ninety participants majoring in english translation at arak university were chosen. the participants were classified into two groups of field-dependent and independent based on the results of group embedded figure test (ge...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید