نتایج جستجو برای: security management

تعداد نتایج: 1006782  

Journal: :مدیریت ورزشی 0
مهرعلی همتی نژاد . استاد مدیریت ورزشی، دانشکدۀ تربیت بدنی و علوم ورزشی دانشگاه گیلان، رشت، ایران تریسی تیلور . استاد مدیریت ورزشی، دانشکدۀ مدیریت دانشگاه تکنولوژی سیدنی، سیدنی، استرالیا محمدحسن قلی زاده دانشیار مدیریت مالی، دانشکدۀ ادبیات و علوم انسانی دانشگاه گیلان، رشت، ایران رسول فرجی . استادیار مدیریت ورزشی، دانشکدۀ علوم تربیتی و روان شناسی دانشگاه شهید مدنی آذربایجان، تبریز، ایران

this study aimed at identifying critical factors affecting the security of iranian football stadiums and prioritizing them using the analytical hierarchy process (ahp) for future decisions. in the qualitative stage of the study, the main factors affecting the security of iranian football stadiums were identified in 12 semi-structured interviews with experts. in the quantitative stage, 17 expert...

Journal: :Information & Security: An International Journal 2000

Journal: :IEEE Journal on Selected Areas in Communications 2009

Journal: :Facta Universitatis, Series: Physical Education and Sport 2020

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

Amir Ashkan Nasiripour, Sina Golesorkhi Somayeh Hamzeh

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

Journal: :Economics and Environmental Management 2018

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید