نتایج جستجو برای: security officers
تعداد نتایج: 189327 فیلتر نتایج به سال:
Traditionally, the definition and the maintenance of security and access control policies has been the exclusive task of system administrators or security officers. In modern distributed and heterogeneous systems, there exist the need to allow different stakeholders to create and edit their security and access control preferences. In order to solve this problem two main challenges need to be me...
The author has accomplished the analysis of essence organizational and legal principles community police officers’ activity (hereinafter – CPO), their interaction with other divisions National Police Ukraine, state authorities, local self-government agencies communities. analyzed a set tasks, functions powers CPO current regulatory provision officers activity: outlined algorithm actions within ...
CORRUPTIVE BEHAVIOR PREVENTION PROGRAM OF THE STAFF OF THE SECTOR OF SECURITY AND DEFENSE OF UKRAINE
Abstract: the program for prevention of corruption relations in personnel teams security and defense sector Ukraine, which is a socio-psychological technology aimed at formation anti-corruption resistance law enforcement officers, outlined. It includes three functional units: diagnostic; psychoprophylactic; psychocorrective.
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing system risk. Such data collection is often an extremely onerous task, particularly if a substantial proportion of the required information is not adequately documented. Hence comprehensive, updated information security do...
Background: Considering the important role of rest and absence of tension in working environment and consequently promotion of working efficiency, finding ways with the best choices to reduce job stress, seems necessary. Municipality of Tehran with a huge number of employees and with the aim to reduce stress and promote work efficiency is studying this matter seriously. The aim of the present s...
BACKGROUND The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance ...
In information society and business world, there are different levels of needs for information security awareness and learning, e.g. the needs for ordinary citizens, business leaders, and experts. Users of information systems – factually all members of society – should have at least basic literacy of information security. In the day-to-day business life, advanced skills of information security ...
The study investigated factors affecting the quality of aviation security services at abeid amani karume international airport. specific objectives were: to determine effect good pay (GPY) on (QASS), establish employee promotion (EMP) services, and working conditions (WCs) services. A descriptive research design was used under quantitative approach. Data were collected using questionnaires whic...
Abstract Prison officer cynicism toward change (CTC) has received limited attention in the penal literature. In global south, there been very research on CTC among prison officers. addressing this gap, we utilized data from officers based low- and medium- security prisons Ghana to assess level of whether levels reported differed across different career stages. We also examine impact individual,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید