نتایج جستجو برای: security officers
تعداد نتایج: 189327 فیلتر نتایج به سال:
The New Basel Capital Accord (Basel II) will include operational risk to the calculation of necessary regulatory capital in financial institutions after year-end 2006. Most of the banks have already developed sophisticated risk management frameworks helping to quantify and manage operational risk. Information security has direct impact on operational risk, but risk managers consider Information...
Computing Science addresses the security of real-life systems by using various security-oriented technologies (e.g., access control solutions and resource allocation strategies). These security technologies significantly increase the operational costs of the organizations in which systems are deployed, due to the highly dynamic, mobile and resource-constrained environments. As a result, the pro...
The US Army War College Quarterly, Parameters, is a refereed forum for contemporary strategy and Landpower issues. It furthers the education professional development of senior military officers members government academia concerned with national security affairs.
Information systems might access, manage and record sensitive data about citizens. In addition, the pervasiveness of these systems is dramatically increasing and increasing thanks to the mobile and the IoT revolutions. However, several unintended data breaches are reported every week, and this might compromise the privacy, safety, and security of citizens. For all these reasons, the European Pa...
The COVID-19 pandemic has become a global health security concern (World Health Organization, 2020), and governments have called upon police agencies to assist control the spread of virus. This study looks at new roles performed by in context Fiji Islands. addresses two main research questions. Firstly, what are issues challenges faced officers when carrying out their duties? Secondly, is publi...
This study examined Taiwanese female and male police officers’ perceptions of handling domestic violence. Specifically, it assessed officers’ attitudes toward whether female officers, male officers, or a combination of female and male officers are more suited for handling cases of battered women, offenders, and domestic violence overall. Survey data were collected from 96 female and 156 male of...
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theoretic methods to find optimal randomized security policies, including a fielded application at the Los Angeles International Airport (LAX). This approach has promising applications in many similar domains, including pol...
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our fram...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید