نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

  The purpose of this research was to analyze the perceptions of faculty members and instructors about the strengths, weaknesses, opportunities and threats posed by the implementation of the lesson study program at Farhangian University. A mixed research method was used, including both qualitative and quantitative for data collection. The statistical population of the qualitative section was c...

Journal: :Games and Economic Behavior 2018

Journal: :Social Psychological and Personality Science 2013

2011
Peter James

The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary before an effective organisational t...

2009
John A. Clark John Murdoch John A. McDermid Sevil Sen Howard R. Chivers Olwen Worthington

This paper introduces a threat model for ad hoc networks. It indicates components that can be used to form an adversary model for sensor networks and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats to the systems assets including: threats to communications, threats to infrastructure services, threats to individual nodes, and threats conce...

Journal: :iau international journal of social sciences 2012
mohammad hassan nami homa vaezi masoomeh rezaei nejad

our country, iran, is in the category of waterless and survived countries because of lack of climate downfalls to its unsuitable local to temporal transmittance. environmental concerns mainly after 1960s that have boon seriously proposed in universal politics, created a variety of assessments. in the late decades, environmental change such as: climate change, has caused chief challenges for the...

2007
Danny Smith

This paper examines the common threats to data security in open systems highlighting some of the more recent threats, and looks at some of the tools and techniques that are currently available to enhance the security of a Unix system. Since many programs are written without security issues in mind, the topic of secure programming methodologies is also discussed, with some examples of coding tec...

2010
Dina Hadziosmanovic Damiano Bolzoni Pieter H. Hartel

Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rights and performs actions which look legitimate, but which can disrupt the industrial process. We believe that it is possible to detect such behavio...

Journal: :JDFSL 2015
Manghui Tu

As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and organizations under obligations to take actions to prevent data breach. Among various threats, insider threats have been identified as a major threat on data loss. Thus, effective mechanisms to control insider threats on data loss a...

2006
Patrick C.K. Hung Miguel Vargas Martin

Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve sending voice transmissions as data packets over private or public IP networks as well as reassembled and decoded on the receiving side. Security concerns are always the major barrier that prevents many businesses from e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید