نتایج جستجو برای: it can influence security dimensions including economic

تعداد نتایج: 5650268  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

after the soviet union dissolution, a chaotic period was begun in the russia. russia lost its glory and felt disgrace. the first group of elites came to power under yeltsin; they tried to re-define russia’s identity as a european country and build a foreign policy on this baseline. therefore russia tried to become closer with the west especially with the u.s. according to their view the sovie...

ژورنال: مدیریت شهری 2016
Emami, Ali, Rahneshan, Nasrin,

Typology solution in architecture science seeks classifying constructions and spaces in terms of join features. Typology studies can be infrastructure of design in micro and minor levels. Therefore being oblivious of it in architecture and city planning can lead to state of chaos in urban aspect and makes heterogeneous urban textures. Current paper seeks to find factors influencing on formation...

2015
Eva Weishäupl Emrah Yasasin Guido Schryen

IT security has become a major issue for organizations as they need to protect their assets, including IT resources, intellectual property and business processes, against security attacks. Disruptions of ITbased business activities can easily lead to economic damage, such as loss of productivity, revenue and

2015

IT security has become a major issue for organizations as they need to protect their assets, including IT resources, intellectual property and business processes, against security attacks. Disruptions of ITbased business activities can easily lead to economic damage, such as loss of productivity, revenue and

Journal: :زن در توسعه و سیاست 0
رضا صفری شالی ? مدرس جهاد دانشگاهی، کارشناس ارشد در دو رشته توسعه روستایی و برنامه¬ریزی رفاه اجتماعی

the general purpose of the present study is to investigate the social and cultural factors related to the participation level of rural women in familial and meta-familial (social, political, economic and cultural) issues. the study is carried out using documental and fieldwork (questionnaire) methods. the theoretical framework of the study is based on pattern variables of parsons and gender str...

2014
Qing Yang Xinhua Qian Chuan Pang Baoxu An

This paper takes the potential release of online transaction market size as the starting point of research, and discusses how Chinese consumer perceived risks influence online payment willingness. This study divides consumer perceived risks of online payment into eight dimensions: Economic risk, Functional risk, Private risk, Security risk, Time risk, Service risk, Psychological risk and Social...

Journal: :تحقیقات سیاسی بین المللی 0
سید شمس الدین صادقی عضو هیأت علمی دانشگاه رازی کرمانشاه مسعود اخوان کاظمی استادیارگروه علوم سیاسی و روابط بین الملل دانشگاه رازی کرمانشاه وحید زرافشان دانش آموخته کارشناسی ارشد علوم سیاسی- دانشگاه رازی کرمانشاه

in the decentralized international system and lack of central authority, the first objective, priority and precedence of states, is maintenance of national security and preservation of self. from the past, durable national security provision has been include ,three readily type: 1. military readily2. political readily 3. economic readily. but economic factors of national security by the end col...

Journal: :journal of health management and informatics 0
roya khalili parisa nabeiei mohamad hosein yarmohammadian shohre etemad

fire is one of the most dangerous phenomena in the world which yields main damages, healthy and economical, and is thus a major threat to hospitals. since, most of the residents in hospitals are the individuals who cannot rescue themselves in such situations, fire in hospitals is more hazardous than any other public place; hence, it can endanger several sophisticated medical equipment. therefor...

2017

Synopsis: Cyber security refers to the ability to prepare for, react to and recover from incidents (i.e. attacks) initiated from an Internet-connected device against other devices or the information they contain. Recent developments in the cyber security field show an increasing number of industries becoming targets of cyber attacks. With vessels, terminals, ports and transport operators relyin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید