نتایج جستجو برای: security environment

تعداد نتایج: 678646  

Journal: :مطالعات و تحقیقات اجتماعی ایران 0
سعید گودرزی عضو هیأت علمی گروه جامعه شناسی دانشگاه پیام نور تهران محمدجواد زاهدی مازندرانی عضو هیأت علمی گروه جامعه شناسی دانشگاه پیام نور علی ربیعی عضو هیأت علمی گروه جامعه شناسی دانشگاه پیام نور تهران اسداله نقدی عضو هیأت علمی دانشگاه بوعلی سینا همدان

security has two dimensions of subjective (security feeling) and objective. there are preconditions for security feeling in society that one of the preconditions, the existence of security in the society. these levels are linked together and the interaction between these two levels of objective and subjective that security in the society is achieved.therefore, in this article we have tried to e...

2012
James A. Nelson

The history of technology and banking is examined as it relates to risk and technological determinism. It is proposed that the services that banks offer are determined by technology and that banks must adopt new technologies to be competitive. The adoption of technologies paradoxically forces the adoption of other new technologies to protect the bank from the increased risk of technology. This ...

2017
Matthew Cotton

This paper is a review of existing literature on the topic of user-friendliness in online banking security systems. The research presented herein seeks to promote critical thought on finding the most effective immediate steps online banks can take to better protect their customers, given what is currently understood about how users perceive and interact with online security systems.

2002
Holger M Müller

Credit Risk Analysis and Security Design* This Paper considers the potential cost of subjective judgement and discretion in credit decisions. We show that subjectivity and discretion in the evaluation of borrowers create an incentive problem on the part of the lender. The lender’s incentives to accept or reject a borrower depend only on the value of their own claims, not on the total value of t...

2015
Christos Parizas Geeth de Mel Alun D. Preece Murat Sensoy Seraphin B. Calo Tien Pham

Resources sharing is an important but complex problem to be solved. The problem is exacerbated in a coalition context due to policy constraints, that reflect concerns regarding security, privacy and performance to name a few, placed on the resources. Thus, to effectively share resources, members of a coalition need to negotiate on policies and at times refine them to meet the needs of the opera...

2003
Bharat N. Anand Alexander Galetovic

This paper looks at the industrial organization of the investment banking industry. Longterm relationships between business firms and investment banks are pervasive in developed security markets. A vast literature argues that better monitoring and information result from relationships. Thus, security markets should allocate resources better when an investment banking industry exists. We study n...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

Abstract  According to the World Health Organization in 2007, peoplechr('39')s vulnerability to severe, rapid and new threats to their health security must be reduced. Because most people today feel insecure about worries about their daily lives, it is essential to create a new environment in which health security becomes a basic concern for all. Meanwhile, the marine crew needs special attent...

2014
Utz Roedig

Wireless sensor networks have been identified as being useful in a variety of domains to include military sensing and tracking, environment monitoring, patient monitoring and tracking smart environment, etc. When sensor networks are deployed in a hostile environment, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource limitations ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید