نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
Threat assessmentinvolves a set of investigative and operational techniques used to identify, assess, and manage the risks of targeted violence and other problematic approach behavior. The threat assessment approach continues to be refined through empirical research conducted in an effort to identify and better understand the risk factors for engaging in such behaviors, which accounts for the t...
While others have studied the awareness and action phases of incumbent response, there has been little research on the threat assessment phase. In this paper, we focus on the incumbent’s threat assessment decision process, i.e. how task characteristics can influence the evaluation of potential entrants. In an experiment using experienced marketing managers as subjects, we examine the influence ...
Black and Wiliam (1998a, 1998b) demonstrate that formative assessment is one of the most effective strategies for promoting student learning. Since the publication of their reviews, formative assessment has gained increasing international prominence in both policy and practice. However, despite this early innovation, the theory and practice of formative assessment are currently at a crossroads....
Ethical guidelines require school psychologists to ensure that their assessment practices are nondiscriminatory, but typical discussions on this topic neglect the possible discriminatory effects of cultural stereotypes on assessment results. Recent research on stereotype threat shows that students' knowledge of stereotype-based negative expectations about their test performance can depress thei...
Over the years, the focus has been on protecting network, host, database and standard applications from internal and external threats. The Rapid Application Development (RAD) process makes the web application extremely short and makes it difficult to eliminate the vulnerabilities. Here we study web application risk assessment technique called threat risk modeling to improve the security of the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید