نتایج جستجو برای: security in procedures
تعداد نتایج: 17020606 فیلتر نتایج به سال:
• Approximately 48,000 FAA employees who provide air traffic control, flight service, security, field maintenance, certification, systems acquisitions, and a variety of other services. • Approximately 13,000 instrument flight procedures, including over 1,000 Instrument Landing System (ILS) procedures, over 1,700 nondirectional beacon (NDB) procedures, over 2,700 VHF omnidirectional range (VOR) ...
the employee engagement has emerged as a pivotal business driver for organizational success. high level of engagement in domestic and global firms is supposed to have multiple enriching effects on an organization. studies have highlighted the importance of both organizational and individual factors in ensuring highly engaged employees. the present paper explores the individual differs across fo...
Protecting corporate assets, both the physical and the digital is a major concern for managers. Managers seek ways to encourage employees to adhere to and follow organizational security policies to protect not only the organization as a whole but also the employee and the customer as well. Part of the reason existing security measures fail is because employees fail to follow organizational secu...
Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for building secure cryptosystems from primitives with lower level of security have been proposed. Providing security proofs has also become standard practice. There is, however, a lack of automated verification procedures that analyse such cryptosystems and provide security p...
The approach to network security analysis is suggested. It is based on simulation of malefactor’s behavior, generating attack graph and calculating different security metrics. The graph represents all possible attack scenarios taking into account network configuration, security policy, malefactor’s location, knowledge level and strategy. The security metrics describe computer network security a...
Even though software engineering have become a fundamental component to produce information systems and related software components, it is not adequate and effective for developing secure information systems. In this paper, we propose holistic, consistent, and integrated security engineering procedures for analyzing, designing, developing, testing, and maintaining secure enterprise information ...
The literature agrees that the major threat to IS security is constituted by careless employees. Therefore, effective IS security requires that users are not only aware of, but also comply with organizations’ IS security policies and procedures. To address this important concern, different IS security awareness, education and enforcement approaches have been proposed. Prior research on IS secur...
Voting technologies have undergone intense scrutiny in recent years [17]. In contrast, the human components of these socio-technical systems, including the policies and procedures that guide and bind behavior have received less attention. To begin to understand pollworker behavior, we conducted a two stage qualitative investigation in a single jurisdiction to explore the challenges pollworkers ...
As the popularity of online shopping grows, concerns about identity theft and fraud are increasing. While stronger customer authentication procedures may provide greater protection and thus benefit customers and retailers, security is often traded off against convenience. To provide insight into this security-convenience trade-off in customer authentication, we experimentally investigated how l...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید