نتایج جستجو برای: security officers
تعداد نتایج: 189327 فیلتر نتایج به سال:
abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...
this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...
The present research examined the determinants of private security officers’ job satisfaction. Specifically, impact perceived citizen views and supervisor support on satisfaction was explored while investigating mediating effect self-legitimacy. A convenience sample South Korean officers were by using a paper-and-pencil questionnaire in-depth interviews. results showed that positively affected ...
Abstract Researchers have played a significant role in influencing the public’s critical engagement with South African Police Service (SAPS). Resultantly, SAPS officers tend to be wary and/or untrusting of researchers. In present study, we sought understand how this climate suspicion impacts policing research Africa. To do so, employed Foucauldian Discourse Analysis on emails leading up study o...
Role-Based Access Control (RBAC) models are becoming a de facto standard, greatly simplifying management and administration tasks. Organizational constraints were introduced (e.g.: mutually exclusive roles, cardinality, prerequisite roles) to reflect peculiarities of organizations. Thus, the number of rules is increasing and policies are becoming more and more complex: understanding and analyzi...
In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organizations appear to have understood the necessity for computer security, especially data security. Electronic commerce can help enterprises reducing costs, obtaining gre...
Background: The effectiveness and adequacy of occupational health and safety management system should be monitored and evaluated at organization level on a regular basis. Safety audit has a clear role in the development of organizations safety management systems. Internal safety audit is a method to appraise to the management the current status of occupational health and safety at workplace. Se...
Role-based access control (RBAC) models are becoming a de facto standard, greatly simplifying management and administration tasks. Organizational constraints were introduced (e.g.: mutually exclusive roles, cardinality, prerequisite roles) to reflect peculiarities of organizations. Thus, the number of rules is increasing and policies are becoming more and more complex: understanding and analyzi...
The security infrastructure is ill-equipped to detect and deter the smuggling of non-explosive devices that enable terror attacks such as those recently perpetrated in western Europe. The detection of so-called “small metallic threats” (SMTs) in cargo containers currently relies on statistical risk analysis, intelligence reports, and visual inspection of X-ray images by security officers. The l...
Intrusion detection is one of the important aspects in computer security. Many commercial intrusion detection systems (IDSs) are available and are widely used by organizations. However, most of them suffer from the problem of high false alarm rate, which added heavy workload to security officers who are responsible for handling the alarms. In this paper, we propose a new method to reduce the nu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید