نتایج جستجو برای: security officers

تعداد نتایج: 189327  

2010
Thomas Trojer Basel Katt Florian Wozak Thomas Schabetsberger

Traditionally, the definition and the maintenance of security and access control policies has been the exclusive task of system administrators or security officers. In modern distributed and heterogeneous systems, there exist the need to allow different stakeholders to create and edit their security and access control preferences. In order to solve this problem two main challenges need to be me...

Journal: : 2021

The author has accomplished the analysis of essence organizational and legal principles community police officers’ activity (hereinafter – CPO), their interaction with other divisions National Police Ukraine, state authorities, local self-government agencies communities. analyzed a set tasks, functions powers CPO current regulatory provision officers activity: outlined algorithm actions within ...

Journal: : 2023

Abstract: the program for prevention of corruption relations in personnel teams security and defense sector Ukraine, which is a socio-psychological technology aimed at formation anti-corruption resistance law enforcement officers, outlined. It includes three functional units: diagnostic; psychoprophylactic; psychocorrective.

2003
Peggy P. K. Fung Lam-for Kwok Dennis Longley

Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing system risk. Such data collection is often an extremely onerous task, particularly if a substantial proportion of the required information is not adequately documented. Hence comprehensive, updated information security do...

, ,

Background: Considering the important role of rest and absence of tension in working environment and consequently promotion of working efficiency, finding ways with the best choices to reduce job stress, seems necessary. Municipality of Tehran with a huge number of employees and with the aim to reduce stress and promote work efficiency is studying this matter seriously. The aim of the present s...

2016
Abdullahi Walla Hamisu Ticha Muluh Johnson Kehinde Craig Pascal Mkanda Richard Banda Sisay G. Tegegne Ajiboye Oyetunji Nuhu Ningi Said M. Mohammed Mohammed Isa Adamu Khalid Abdulrahim Peter Nsubuga Rui G. Vaz Ado J. G. Muhammed

BACKGROUND The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance ...

2007
Juhani Anttila Reijo Savola Jorma Kajava Juha Lindfors Juha Röning

In information society and business world, there are different levels of needs for information security awareness and learning, e.g. the needs for ordinary citizens, business leaders, and experts. Users of information systems – factually all members of society – should have at least basic literacy of information security. In the day-to-day business life, advanced skills of information security ...

Journal: :International journal of humanities & social studies 2022

The study investigated factors affecting the quality of aviation security services at abeid amani karume international airport. specific objectives were: to determine effect good pay (GPY) on (QASS), establish employee promotion (EMP) services, and working conditions (WCs) services. A descriptive research design was used under quantitative approach. Data were collected using questionnaires whic...

Journal: :International Criminology 2023

Abstract Prison officer cynicism toward change (CTC) has received limited attention in the penal literature. In global south, there been very research on CTC among prison officers. addressing this gap, we utilized data from officers based low- and medium- security prisons Ghana to assess level of whether levels reported differed across different career stages. We also examine impact individual,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید