نتایج جستجو برای: security personnel

تعداد نتایج: 213695  

Journal: :Academic and applied research in military and public management science 2022

Security-conscious behaviour is of paramount importance, both in the field information security and various public institutions. Thus, administration, especially armed bodies, training personnel this direction strategic as a person with low awareness can endanger entire organisation. Human issues may even have national or intelligence relevance.

2007
Victor Fukalov

In the Russian Federation safety of patients, medical and attendant personnel in specialized psychiatric hospitals for compulsory treatment is an actual problem. The psychiatric care of the patients in these establishments demands specially organized constant and intensive supervision with observance of the raised security measures. Necessity of special security measures is dictated by clinical...

2012
Abdul Rauf Memon Kashif Shafique Ashraf Memon Agha Umer Draz Mohammad Uzair Abdul Rauf Salahuddin Afsar

UNLABELLED BACKGROUND Hepatitis B and C cause significant morbidity and mortality worldwide. Little is known about the existence of hepatitis B and C among high risk groups of the Pakistani population. The present study was conducted to determine the prevalence of Hepatitis B and C in high risk groups, their comparison and the possible mode of acquisition by obtaining the history of exposure...

2015
Jelena Nikcevic

The existence and enforcement of legal regulations is imperative of maritime navigation. All legal regulations relating to maritime security and whose goal is securing the safety at sea, can be divided to regulations relating to navigable vessels, regulations relating to cargo carried by ships; regulations governing maintenance of waterways; regulations relating to human factor (regulations con...

Journal: :Studies in health technology and informatics 2005
Francis H. Roger France Etienne De Clercq Marc Bangels

Although other alternatives might exist, identification cards have been chosen as an acceptable and adequate tool to be used to identify patients and health professionals.They are planned for a digital signature and for access to electronic health records as well as for health information exchange and for databases querying. Local applications might exist independently, but the Federal State ha...

Journal: :Sentinel event alert 2010

Once considered safe havens, health care institutions today are confronting steadily increasing rates of crime, including violent crimes such as assault, rape and homicide. As criminal activity spills over from the streets onto the campuses and through the doors, providing for the safety and security of all patients, visitors and staff within the walls of a health care institution, as well as o...

Journal: :Intelligent Automation & Soft Computing 2012
Haijun Wu Yue Chen Lu Liu

The typical diseases of stone arch bridge in the Three Gorges Reservoir area are summarized through the investigation, and four kinds of typical diseases of stone arch bridges are investigated and evaluated by spatial finite element software. Based on these investigations, the limited value index of the security and the identification technology of the four typical diseases of the bridge are ob...

1971
Janet Napolitano Tom Horne Danelle Kelling

Governor of Arizona . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Janet Napolitano Superintendent of Public Instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tom Horne Student Regent (voting), appointed to June 2004 ....

2015
George Edafese Alakpa John W Collins

BACKGROUND The global war on terrorism has prompted an increase in the deployment of security personnel from multi-national forces on foreign lands, especially in places where known terrorist groups are based. The aim of this study was to obtain U.S. military and security personnel's perceptions of the possibility of encountering a human-borne with bioagent (HBBA) terrorist at an entry control ...

2013
D. Roselin Selvarani

Security is a major concern for any mobile computing device such as Laptop, Notebook, Mobile Phone, Personal Digital Assistant (PDA), Smart phone etc. which contains sensitive data and accesses the Internet. Due to the inherent nature of these devices such as Mobility and Portability, they encounter additional security issues compare to the conventional computing devices. Now-a-days, business a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید