نتایج جستجو برای: security in procedures

تعداد نتایج: 17020606  

2004

• Approximately 48,000 FAA employees who provide air traffic control, flight service, security, field maintenance, certification, systems acquisitions, and a variety of other services. • Approximately 13,000 instrument flight procedures, including over 1,000 Instrument Landing System (ILS) procedures, over 1,700 nondirectional beacon (NDB) procedures, over 2,700 VHF omnidirectional range (VOR) ...

Journal: :management studies and economic systems 2014
naval garg

the employee engagement has emerged as a pivotal business driver for organizational success. high level of engagement in domestic and global firms is supposed to have multiple enriching effects on an organization. studies have highlighted the importance of both organizational and individual factors in ensuring highly engaged employees. the present paper explores the individual differs across fo...

2010
Queen Esther Booker Fred L Kitchens

Protecting corporate assets, both the physical and the digital is a major concern for managers. Managers seek ways to encourage employees to adhere to and follow organizational security policies to protect not only the organization as a whole but also the employee and the customer as well. Part of the reason existing security measures fail is because employees fail to follow organizational secu...

2008
J. Courant M. Daubignard C. Ene P. Lafourcade

Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for building secure cryptosystems from primitives with lower level of security have been proposed. Providing security proofs has also become standard practice. There is, however, a lack of automated verification procedures that analyse such cryptosystems and provide security p...

2006
Igor Kotenko Mikhail Stepashkin

The approach to network security analysis is suggested. It is based on simulation of malefactor’s behavior, generating attack graph and calculating different security metrics. The graph represents all possible attack scenarios taking into account network configuration, security policy, malefactor’s location, knowledge level and strategy. The security metrics describe computer network security a...

2012
Young-Gab Kim Sungdeok Cha

Even though software engineering have become a fundamental component to produce information systems and related software components, it is not adequate and effective for developing secure information systems. In this paper, we propose holistic, consistent, and integrated security engineering procedures for analyzing, designing, developing, testing, and maintaining secure enterprise information ...

2006
Mikko T. Siponen Seppo Pahnila Mo Adam Mahmood

The literature agrees that the major threat to IS security is constituted by careless employees. Therefore, effective IS security requires that users are not only aware of, but also comply with organizations’ IS security policies and procedures. To address this important concern, different IS security awareness, education and enforcement approaches have been proposed. Prior research on IS secur...

2012
Joseph Lorenzo Hall Emily Barabas Gregory Shapiro Deirdre K. Mulligan Coye Cheshire

Voting technologies have undergone intense scrutiny in recent years [17]. In contrast, the human components of these socio-technical systems, including the policies and procedures that guide and bind behavior have received less attention. To begin to understand pollworker behavior, we conducted a two stage qualitative investigation in a single jurisdiction to explore the challenges pollworkers ...

Journal: :Int. J. Hum.-Comput. Stud. 2012
Jong-Eun Roselyn Lee Shailendra Rao Clifford Nass Karin Forssell Jae Min John

As the popularity of online shopping grows, concerns about identity theft and fraud are increasing. While stronger customer authentication procedures may provide greater protection and thus benefit customers and retailers, security is often traded off against convenience. To provide insight into this security-convenience trade-off in customer authentication, we experimentally investigated how l...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید