نتایج جستجو برای: security personnel
تعداد نتایج: 213695 فیلتر نتایج به سال:
Protecting the integrity, confidentiality, and availability of mission critical data is one of the primary objectives shared among security/risk management and IT departments in various vertical industries, government, and research. Standard techniques to realize these objectives are often confined to network and host-based intrusion detection systems, which are known to be inappropriate for ha...
Abstract Scholars and practitioners continue to debate transatlantic burden sharing, which has implications for broader questions of collective action international organizations. Little research, however, analyzed domestic institutional drivers burden-sharing behavior; even less disaggregated defense spending measure sharing more precisely. This paper enhances understanding the relationship be...
IS security threats have increased significantly in recent years. We identified the gaps between manager perceptions of IS security threats and the security countermeasures adopted by firms by collecting empirical data from 109 Taiwanese enterprises. Industry type and organizational use of IT were seen as the two factors that affected the motivation of firms to adopt security countermeasures, b...
Computer and network systems process information critical to enterprise security. Should these information systems be vulnerable to security failures or attacks, the consequences could be grave. Although individual components may provide security features and assurance of correct policy enforcement, their encompassing systems and subsystems are frequently large and complex. How can a system own...
Given unexpected incidents on routes of guards that check security objects, like banks, one of the most challenging problems is still how to support improvisation by security personnel in taking decisions to prevent or resolve such incidents. Another as important associated problem is how a security company can naturally take advantage of its existing and novel knowledge about its organizationa...
Recently, algorithms for computing game-theoretic solutions have been deployed in real-world security applications, such as the placement of checkpoints and canine units at Los Angeles International Airport. These algorithms assume that the defender (security personnel) can commit to a mixed strategy, a so-called Stackelberg model. As pointed out by Kiekintveld et al. (2009), in these applicati...
Unmanned ground vehicle is an autonomous vehicle that mainly capable to do tasks independent of humans. Automated vehicle works during off road navigation and mainly used in military operations. The radio environment on electrically small platforms is changing rapidly. In order to support high speed audio and video, processing needs higher data rates concerned with sending and receiving data pa...
The body scanning device, used at some airports to view through passenger's clothing to the surface of the skin, is considered to be a major improvement toward ensuring that weapons or explosives are not carried onto commercial aircraft, making airline travel safer, and the nation more secure. In the ten years since September 11, 2001, airport security has become increasingly invasive. Air pass...
Health workers of the emergency service are frequently exposed to different dangers, among them the contact with biological polluting agents. This is a study of descriptive character, with the objective to characterize workers on social demographic aspects, and also to verify the level of application of the bio-security norms at the emergency services of a health institution in the city of Bogo...
Public safety organizations include emergency and law enforcement agencies, fire departments, rescue squads, and Emergency Medical Services (EMS). In response to increasing threats of terrorism and natural disasters, safety and security personnel must overcome technology barriers to enhance their efficiency, especially in the neuralgic section of information exchange. Limited availability of in...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید