نتایج جستجو برای: sense of security

تعداد نتایج: 21185043  

2014
Hamid Salim Stuart Madnick Hamid M. Salim Stuart E. Madnick

If we are to manage security risks more effectively in today’s complex and dynamic cyber environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec’s 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eig...

Journal: :Crime and Justice in Digital Society 2021

The purpose of this study was to evaluate the impact a cybercrime prevention campaign that run by Canadian financial institution. More specifically, we examined how participants/clients perceived institution’s initiative inform them about cybercrimes. also explored whether or not had desired effect, which reinforce clients’ sense security. This took place on October 2018 and 1452 adults (831 ma...

عجم, محمد,

The Western Sahara and Kashmir are the oldest unresolved crises left behind the colonial period which have the same fate. Although the executing the regulation of fate determination has been foreseen for both territories in the Security Council resolutions, the destiny of both movements have been forgotten due to various regional and international ups and downs. The reason of inefficacy of this...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1389

the purpose of this study is to investigate the relationships between teachers’ immediacy behaviors and iranian students’ willingness to talk in english classes. analysis of the results from willingness to talk scale represents a relatively high level of willingness to talk in english classrooms among iranian language learners. the total mean score of students’ willingness to talk was 66.3 ou...

Economic disruption inflicts irreparable damage on various sections of society and causes tensions at various levels of society. In the meantime, the role of institutions such as the judiciary in dealing with such harms is highlighted; Because this institution is the main authority in the fight against economic and non-economic corruption. One of the ways to deal with this corruption is to cont...

ژورنال: اعتیاد پژوهی 2017

Objective: The current study was an attempt to conduct a comparative evaluation of the success of the actions and measures taken by clinics, camps, and NA groups, and also to develop an efficient model for the prevention and reduction of drug addiction. Method: For this purpose, 150 addicted people (40 men and 10 women) from clinics, camps, and NA groups were qualitatively studied using in-dept...

Journal: :journal of computing and security 0
bahman rajabi shahid beheshti university, g.c., tehran, iran ziba eslami department of computer science, shahid beheshti university, g.c., tehran, iran

in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...

2005
Nizar Habash Owen Rambow

We present an approach to using a morphological analyzer for tokenizing and morphologically tagging (including partof-speech tagging) Arabic words in one process. We learn classifiers for individual morphological features, as well as ways of using these classifiers to choose among entries from the output of the analyzer. We obtain accuracy rates on all tasks in the

2014
Laila Nielsen

The article aims to discuss the school's education for citizenship and democracy in light of the economic crisis in the early 1990s and the subsequent depletion of the Swedish welfare state. Increased economic inequality, exclusion and marginalization of the school as well as in society in general raise the question about the school equivalency. The discussion sets out from a theoretical approa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید