نتایج جستجو برای: فنآوری اطلاعات it
تعداد نتایج: 2942070 فیلتر نتایج به سال:
Phytoextraction may be applied at field scale when the removal of bioavailable metals is the specific target of the technology. Residual metals in soil can be considered substantially inert or to be evaluated by site specific risk analysis.
Employees increasingly use cloud services of third party providers to efficiently perform their job. Interestingly, the majority adopts the cloud without approval of the organization. IT resources like that are commonly referred to as shadow IT. Although widespread in practice, the present literature on shadow IT is scarce lacking a clear definition of the phenomenon and exclusively focusing on...
It is very difficult to get a realistic picture of organizational activity. Yet without such a picture it is well nigh impossible to design Information Technology (IT) systems to properly support the work of the healthcare professional. This article reports on a study undertaken in conjunction with Mancunian Community Health Trust to model certain Trust processes. A number of different professi...
When two groups of market actors differ in how to interpret a common label, each can make claims over the label. One categorical interpretation and the group that supports it risk disappearance if the rival interpretation gains ground. We argue that when members of the endangered category become partial defectors that span categories, their history presents challenges to the identity of nondefe...
Creating effective global eLearning initiatives requires strategic planning and process development to avoid mistakes that can turn off global learners. In order to successfully implement a global training program in a cost effective, efficient way, corporations must consider budget, timing, design, and content relevancy. These factors become more complex when considering lingual, regional and ...
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about shedding liability as about minimising risk. Banks use computer security mechanisms to transfer liability to their customers; companies use them to transfer liability to their insurers, or (via the public prosecutor) ...
این تحقیق در صدد بررسی تاثیر انعطاف پذیری فناوری اطلاعات و آمادگی فنی سازمان بر اثربخشی فناوری اطلاعات در گمرک تهران می باشد . محققان پیشین درباره این که چه پدیده هایی با اثر بخشی فناوری اطلاعات در ارتباط هستند مطالعات گسترده انجام داده اند . در میان این تحقیقات مطالعاتی وجود رابطه معنی دار میان آمادگی فنی و انعطاف پذیری فناوری اطلاعات با اثربخشی فناوری اطلاعات را تائید نموده اند . هدف این تحقی...
(IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." To learn the ...
1 Authors listed in alphabetical order.
It has been found that risk analyses carried out in accordance with the European Standards and reflecting the specific detail of each application has led to a great escalation of cost of safety approval. Producing a separate risk analysis for each installation in a country increases the costs without discernable benefit. There is scope for making substantial cost reduction through new approache...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید