نتایج جستجو برای: perceived web security

تعداد نتایج: 514285  

2012
Jiping Xiong Lifeng Xuan Jian Zhao Tao Huang

In recent years, with the frequent occurrence of security incidents, enterprises and organizations have now realized the importance of designing a safety information system. Today, information systems are heavily relied on web and database technologies, thus the risks and threats those technologies faced will also affect the security of information systems. Web and database security technologie...

Journal: :مدیریت دولتی 0
نورمحمد یعقوبی استاد مدیریت دولتی، دانشکدۀ اقتصاد و مدیریت، دانشگاه سیستان و بلوجستان، زاهدان، ایران حبیب ابراهیم پور دانشیار مدیریت دولتی، دانشکدۀ ادبیات و علوم انسانی، دانشگاه محقق اردبیلی، اردبیل، ایران رویا شاکری مربی گروه مدیریت، دانشکدۀ علوم انسانی، دانشگاه آزاد اسلامی، واحد سنندج، سنندج، ایران

abstract: the profound effect of mgovernment on the future of businesses and communities has been proven in numerous studies. the aim of the present study is provide a model for user requirements and validate the proposed model is based on a literature review of research. the findings suggest that effective and efficient transactions including time, security, privacy, reliability and cost of th...

2002
P Virtanen J Vahtera M Kivimäki J Pentti J Ferrie

Objective: To study the relation of contractual and perceived employment security to employee health. Design: Cross sectional survey. Setting: Municipal sector employees in eight Finnish towns. Participants: 5981 employees with a permanent contract and 2786 employees with a non-permanent contract (2194 fixed term contract, 682 government subsidised contract). Outcome measures: Poor self rated h...

2009
Chen-Ya Wang Seng-cho Timothy Chou Hsia-Ching Chang

Web 2.0 is now an important internet application because of the integration of social interaction and web technologies. Previous information system studies usually specified their research context as a utilitarian system or hedonic system and the results were concluded within one specific system type. Web 2.0 application provides a flexible environment for different kinds of user motivations th...

2016
Amor Lazzez Thabet Slimani

Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and ...

Journal: :JSW 2011
Li Jiang Hao Chen Fei Deng Qiusheng Zhong

Web service is a distributed computing model constructed on the basis of open standard technology with the characteristics of loose coupling, language neutrality, platform-independence, etc., how to efficiently evaluate the security of Web service is a challenging research topic. Current researches concern more about the testing of Web service and rarely about the issue of service security eval...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1392

abstract this study investigated the predictability of variables from a motivational framework as well as individuals qualities to predict three non-linguistic outcomes of language learning. gardners socio-educational model with its measures has been used in the current study. individual qualities presented in this study include (1) age, (2) gender, and (3) language learning experience. the...

Journal: :InformingSciJ 2008
Terry J. Smith

Many companies now actively use the Web as a key marketing and sales vehicle for their goods or services. To be successful, e-commerce Web sites must be useful, easy to use, easy to navigate, and easy to understand – measures of the Technology Acceptance Model’s (TAM) variables Perceived Usefulness and Perceived Ease of Use. Although many studies have used the model to better understand e-comme...

2006
C. Onwubiko A. P. Lenaghan

With the significant reliance of proactive monitoring of computer networks on security information management systems, a requirement is to provide appropriate and comprehensive countermeasures to perceived threats on the entire network. A security response mechanism is proposed that combines both generic and fuzzy response models to provide automated (static and dynamic) security countermeasure...

Journal: :Information Systems Security 2005
Rami Jaamour

Web services security constitutes the technological and managerial procedures applied to the system to ensure the confidentiality, integrity, and availability of information that is exchanged by the Web service. This article explores security issues specific to Web services and illustrates the engineering and testing practices required to ensure security throughout the Web services development ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید