نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

Journal: :Applied Ecology and Environmental Research 2019

2016
Charles D. Darrow Mario J. Scalora

Threat assessmentinvolves a set of investigative and operational techniques used to identify, assess, and manage the risks of targeted violence and other problematic approach behavior. The threat assessment approach continues to be refined through empirical research conducted in an effort to identify and better understand the risk factors for engaging in such behaviors, which accounts for the t...

2001
Bruce R. Klemz Thomas S. Gruca

While others have studied the awareness and action phases of incumbent response, there has been little research on the threat assessment phase. In this paper, we focus on the incumbent’s threat assessment decision process, i.e. how task characteristics can influence the evaluation of potential entrants. In an experiment using experienced marketing managers as subjects, we examine the influence ...

2016

Black and Wiliam (1998a, 1998b) demonstrate that formative assessment is one of the most effective strategies for promoting student learning. Since the publication of their reviews, formative assessment has gained increasing international prominence in both policy and practice. However, despite this early innovation, the theory and practice of formative assessment are currently at a crossroads....

2006
Alexander H. Jordan Benjamin J. Lovett

Ethical guidelines require school psychologists to ensure that their assessment practices are nondiscriminatory, but typical discussions on this topic neglect the possible discriminatory effects of cultural stereotypes on assessment results. Recent research on stereotype threat shows that students' knowledge of stereotype-based negative expectations about their test performance can depress thei...

2010
K. Ram Mohan Rao Durgesh Pant

Over the years, the focus has been on protecting network, host, database and standard applications from internal and external threats. The Rapid Application Development (RAD) process makes the web application extremely short and makes it difficult to eliminate the vulnerabilities. Here we study web application risk assessment technique called threat risk modeling to improve the security of the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید