نتایج جستجو برای: especially security needs

تعداد نتایج: 778134  

2009
Jawed Siddiqi Babak Akhgar Mohammad Hjouj Btoush

A great deal of research works in the field information systems security has been based on a positivist paradigm. Applying the reductionism concept of the positivist paradigm for information security means missing the bigger picture and thus, the lack of holism which could be one of the reasons why security is still overlooked, comes as an afterthought or perceived from a purely technical dimen...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده هنر 1391

now-a-days graphic design plays a major role in influencing culture, society, business, and customers, in such a way that one could look upon every individual as a potential customer. graphic designers seek to identify customers needs and find an intelligent solution for them. correct identification and understanding of those needs is the first step towards achieving ones goals. marketing knowh...

2015
Arpita Banerjee Megha Sharma C. Banerjee Santosh K Pandey

Due to constant pressure on software development team for development of workable software at a fast pace, the focus of the development team has always been on the functional requirements. As such, the identification and implementation of nonfunctional requirements, especially, security which otherwise is considered as a time consuming and quality providing process has always been neglected. Bu...

2016
Karen Renaud Rénette J. Blignaut Isabella Margarethe Venter

Computer users often behave insecurely, and do not take the precautions they ought to. One reads almost daily about people not protecting their devices, not making backups and falling for phishing messages. This impacts all of society since people increasingly carry a computer in their pockets: their smartphones. It could be that smartphone owners simply do not know enough about security threat...

2007
Charlie C. Chen R. S. Shaw Samuel C. Yang

Organizations that lack security awareness can miss detecting many obvious security risks such as Trojans, phishing, viruses, and intellectual property theft in their daily activities. This lack of awareness can render sophisticated Internet security technologies useless and expose the organization to enormous risks. This paper adopts the systems development research methodology to investigate ...

Journal: :Wireless Personal Communications 2011
Tobias Heer Óscar García-Morchón René Hummen Sye Loong Keoh Sandeep S. Kumar Klaus Wehrle

A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and li...

Iniobong A. Akpabio Nsikak-Abasi A Etim Sunday Okon

As cost of living rises and people’s wages / salaries do not cover their basic food and dietary needs, interest in parttime farming has risen. Part-time farming activities are being practiced by different people as a food security strategy from vulnerable households. But these part-time farms have had limited success in providing food/nutrition security, increasing incomes and improving well-be...

The energy sector is a most promising area for commercial interactions between Iran and India. India is expected to become the third biggest oil consumer in the World by 2035, thanks to the country’s high population and high rate of economic growth.  On the other hand, Iran holds the world's largest gas reserves and third largest oil reserves, as such is able to meet India’s energy needs for a ...

Journal: :پژوهشنامه ایرانی سیاست بین الملل 0
مجید محمدشریفی مریم دارابی منش

security has been the most important issue in relations between turkey and the european :union:. turkish leaders have always tried to link their own security concerns with those of the :union:, trying to portray their country as net security provider to the eu. the european :union: in its new security strategy has tried to expand its security zone outside the eu, defining issues such as terrori...

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید