نتایج جستجو برای: especially security needs
تعداد نتایج: 778134 فیلتر نتایج به سال:
A great deal of research works in the field information systems security has been based on a positivist paradigm. Applying the reductionism concept of the positivist paradigm for information security means missing the bigger picture and thus, the lack of holism which could be one of the reasons why security is still overlooked, comes as an afterthought or perceived from a purely technical dimen...
now-a-days graphic design plays a major role in influencing culture, society, business, and customers, in such a way that one could look upon every individual as a potential customer. graphic designers seek to identify customers needs and find an intelligent solution for them. correct identification and understanding of those needs is the first step towards achieving ones goals. marketing knowh...
Due to constant pressure on software development team for development of workable software at a fast pace, the focus of the development team has always been on the functional requirements. As such, the identification and implementation of nonfunctional requirements, especially, security which otherwise is considered as a time consuming and quality providing process has always been neglected. Bu...
Computer users often behave insecurely, and do not take the precautions they ought to. One reads almost daily about people not protecting their devices, not making backups and falling for phishing messages. This impacts all of society since people increasingly carry a computer in their pockets: their smartphones. It could be that smartphone owners simply do not know enough about security threat...
Organizations that lack security awareness can miss detecting many obvious security risks such as Trojans, phishing, viruses, and intellectual property theft in their daily activities. This lack of awareness can render sophisticated Internet security technologies useless and expose the organization to enormous risks. This paper adopts the systems development research methodology to investigate ...
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and li...
As cost of living rises and people’s wages / salaries do not cover their basic food and dietary needs, interest in parttime farming has risen. Part-time farming activities are being practiced by different people as a food security strategy from vulnerable households. But these part-time farms have had limited success in providing food/nutrition security, increasing incomes and improving well-be...
The energy sector is a most promising area for commercial interactions between Iran and India. India is expected to become the third biggest oil consumer in the World by 2035, thanks to the country’s high population and high rate of economic growth. On the other hand, Iran holds the world's largest gas reserves and third largest oil reserves, as such is able to meet India’s energy needs for a ...
security has been the most important issue in relations between turkey and the european :union:. turkish leaders have always tried to link their own security concerns with those of the :union:, trying to portray their country as net security provider to the eu. the european :union: in its new security strategy has tried to expand its security zone outside the eu, defining issues such as terrori...
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید