نتایج جستجو برای: security officers

تعداد نتایج: 189327  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1391

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

Journal: :Security Journal 2021

The present research examined the determinants of private security officers’ job satisfaction. Specifically, impact perceived citizen views and supervisor support on satisfaction was explored while investigating mediating effect self-legitimacy. A convenience sample South Korean officers were by using a paper-and-pencil questionnaire in-depth interviews. results showed that positively affected ...

Journal: :Policing: A Journal of Policy and Practice 2022

Abstract Researchers have played a significant role in influencing the public’s critical engagement with South African Police Service (SAPS). Resultantly, SAPS officers tend to be wary and/or untrusting of researchers. In present study, we sought understand how this climate suspicion impacts policing research Africa. To do so, employed Foucauldian Discourse Analysis on emails leading up study o...

2006
Romuald Thion Stéphane Coulondre

Role-Based Access Control (RBAC) models are becoming a de facto standard, greatly simplifying management and administration tasks. Organizational constraints were introduced (e.g.: mutually exclusive roles, cardinality, prerequisite roles) to reflect peculiarities of organizations. Thus, the number of rules is increasing and policies are becoming more and more complex: understanding and analyzi...

2014
Sumeer Kumar Sumit Kumar

In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organizations appear to have understood the necessity for computer security, especially data security. Electronic commerce can help enterprises reducing costs, obtaining gre...

Background: The effectiveness and adequacy of occupational health and safety management system should be monitored and evaluated at organization level on a regular basis. Safety audit has a clear role in the development of organizations safety management systems. Internal safety audit is a method to appraise to the management the current status of occupational health and safety at workplace. Se...

2006
Romuald Thion Stéphane Coulondre

Role-based access control (RBAC) models are becoming a de facto standard, greatly simplifying management and administration tasks. Organizational constraints were introduced (e.g.: mutually exclusive roles, cardinality, prerequisite roles) to reflect peculiarities of organizations. Thus, the number of rules is increasing and policies are becoming more and more complex: understanding and analyzi...

Journal: :CoRR 2016
Nicolas Jaccard Thomas W. Rogers Edward J. Morton Lewis D. Griffin

The security infrastructure is ill-equipped to detect and deter the smuggling of non-explosive devices that enable terror attacks such as those recently perpetrated in western Europe. The detection of so-called “small metallic threats” (SMTs) in cargo containers currently relies on statistical risk analysis, intelligence reports, and visual inspection of X-ray images by security officers. The l...

2013
Tapan P. Gondaliya Nitin Mohan Sharma

Intrusion detection is one of the important aspects in computer security. Many commercial intrusion detection systems (IDSs) are available and are widely used by organizations. However, most of them suffer from the problem of high false alarm rate, which added heavy workload to security officers who are responsible for handling the alarms. In this paper, we propose a new method to reduce the nu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید