نتایج جستجو برای: internal security
تعداد نتایج: 406278 فیلتر نتایج به سال:
The year 1999 marks a remarkable turnaround in Nigeria’s history and bid for global reckoning as a democratic nation having grappled with a sustained military rule for many decades after her independence. However, with the country’s return to democratic rule, many teething problems evolved which of course is not strange to young and emerging democracies such as Nigeria’s particularly after many...
nowadays, advances in information and communication technologies, has provided an opportunity for banks to provide their electronic services to their customers in remote areas. this technological innovation by e–banking systems has brought about many benefits to customers while it has been accompanied by a number of risks including the operational ones. this risks need to be identified and mana...
Due to both internal and external factors, Western Asia has long been suffering from security problems and political instability. The institution of various military and militia groups in the region in the absence of powerful central governments is the focal point of the crises, where the internal and external factors meet. The development of such security and military interactions outside the ...
this paper argues for a broader emphasis on sustainable security and smart power, for examining both opportunities as well as threats to security. sustainable security is a new concept in the security studies. deep attention to all possible threats against human life is necessary for continuation of security in a sustainable and dynamic base. this aim can be achieved in a highest level by mergi...
The present study aimed at investigating the physical security dimensions affecting the security of volleyball stadiums in Iran. The study employed a descriptive-exploratory research method conducted on 115 managers and officials in volleyball stadiums, presidents and experts of Provincial Volleyball Boards as well as experts in the field of sports facilities and events as wel...
Purpose: Study aims to: 1. Develop a comprehensive framework for the effective application of information security encompassing the internal and external technical environment, formal and informal management, and includes several aspects from an organizational perspective and between organizations in the context of the supply chain. 2. Exploring the potential outcomes and outcomes of the effect...
There are several approaches to elicit, analyze and specify security requirements ranging from formal mathematical models for proof of certain security properties to informal methods which are easily understood. Applicability of formal security models is limited since they are complex and it is time consuming to develop. On the other hand, informal security requirements analysis methods are not...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید