نتایج جستجو برای: 2013 1 but

تعداد نتایج: 4293705  

2013
Katerina Oikonomopoulou Davor Brinc Kyriacos Kyriacou Eleftherios. P. Diamandis Eleftherios P. Diamandis

Total number of figures and tables: 1 figure and 1 table Research. on January 7, 2018. © 2013 American Association for Cancer clincancerres.aacrjournals.org Downloaded from Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Author Manuscript Published OnlineFirst on March 27, 2013; DOI: 10.1158/1078-0432.CCR-12-3661

Journal: :IJCWT 2013
José Martins Henrique dos Santos António Rosinha Agostinho Valente

The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning a...

Journal: :CoRR 2012
Heru Susanto Mohammad Nabil Almunawar Yong Chee Tuan Mehmet Sabih Aksoy Wahyudin P. Syam

Actually Information security becomes a very important part for the organization’s intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, we need a standard or benchmark which regulates governance over information security. The ma...

2007
Ioannis Karatzas Ingrid - Mona Zamfirescu

We develop a martingale approach for studying continuous-time stochastic differential games of control and stopping, in a non-Markovian framework and with the control affecting only the drift term of the state-process. Under appropriate conditions, we show that the game has a value and construct a saddle pair of optimal control and stopping strategies. Crucial in this construction is a characte...

Journal: :Antimicrobial agents and chemotherapy 2011
Mar Solé Cristina Pitart Ignasi Roca Anna Fàbrega Pilar Salvador Laura Muñoz Inés Oliveira Joaquim Gascón Francesc Marco Jordi Vila

A carbapenem-resistant Escherichia coli strain (DVR22) was recovered from a stool specimen from a patient with traveler's diarrhea who had traveled to India. Molecular screening led to the first identification of NDM-1 in Spain. The bla(NDM-1) gene was located in a conjugative plasmid of ca. 300 kb that also contained the bla(CTX-M-15), bla(TEM-1), Δbla(DHA-1), and armA genes. In addition, bla(...

Journal: :Zootaxa 2015
Hong-Thai Pham Young June Lee Jerome Constant

The genus Pomponia Stål, 1866 from Vietnam and Cambodia is reviewed . Pomponia brevialata Lee & Pham, sp. nov. is described from Vietnam. Pomponia backanensis Pham & Yang, 2009 is added to the Cambodian cicada fauna. A key to the seven Vietnamese and Cambodian species of the genus Pomponia Stål, 1866 is provided: P. linearis (Walker, 1850), P. backanensis Pham & Yang, 2009, P. brevialata Lee & ...

Journal: :CoRR 2011
Tolga Mataracioglu Sevgi Özkan

This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fun...

2017
Dora Capozza Gian Antonio Di Bernardo Rossella Falvo

The attribution of uniquely human characteristics to the outgroup may favor the search for contact with outgroup members and, vice versa, contact experiences may improve humanity attributions to the outgroup. To explore this bidirectional relationship, two studies were performed. In Study 1, humanity perceptions were manipulated using subliminal conditioning. Two experimental conditions were cr...

Journal: :CoRR 2011
Phuc V. Nguyen

IT operates in dynamic environments with the need always to change and adapt. There is a need to improve performance. Many gaps were found when we conduct the IT audit and we tried to seek to close gaps in capabilities. One way to the close these gaps is the adoption of good practices in wide industry use. There are several sources for good practices including public frameworks and standards su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید