نتایج جستجو برای: 2013 1 but
تعداد نتایج: 4293705 فیلتر نتایج به سال:
Total number of figures and tables: 1 figure and 1 table Research. on January 7, 2018. © 2013 American Association for Cancer clincancerres.aacrjournals.org Downloaded from Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Author Manuscript Published OnlineFirst on March 27, 2013; DOI: 10.1158/1078-0432.CCR-12-3661
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning a...
Actually Information security becomes a very important part for the organization’s intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, we need a standard or benchmark which regulates governance over information security. The ma...
We develop a martingale approach for studying continuous-time stochastic differential games of control and stopping, in a non-Markovian framework and with the control affecting only the drift term of the state-process. Under appropriate conditions, we show that the game has a value and construct a saddle pair of optimal control and stopping strategies. Crucial in this construction is a characte...
A carbapenem-resistant Escherichia coli strain (DVR22) was recovered from a stool specimen from a patient with traveler's diarrhea who had traveled to India. Molecular screening led to the first identification of NDM-1 in Spain. The bla(NDM-1) gene was located in a conjugative plasmid of ca. 300 kb that also contained the bla(CTX-M-15), bla(TEM-1), Δbla(DHA-1), and armA genes. In addition, bla(...
The genus Pomponia Stål, 1866 from Vietnam and Cambodia is reviewed . Pomponia brevialata Lee & Pham, sp. nov. is described from Vietnam. Pomponia backanensis Pham & Yang, 2009 is added to the Cambodian cicada fauna. A key to the seven Vietnamese and Cambodian species of the genus Pomponia Stål, 1866 is provided: P. linearis (Walker, 1850), P. backanensis Pham & Yang, 2009, P. brevialata Lee & ...
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fun...
The attribution of uniquely human characteristics to the outgroup may favor the search for contact with outgroup members and, vice versa, contact experiences may improve humanity attributions to the outgroup. To explore this bidirectional relationship, two studies were performed. In Study 1, humanity perceptions were manipulated using subliminal conditioning. Two experimental conditions were cr...
IT operates in dynamic environments with the need always to change and adapt. There is a need to improve performance. Many gaps were found when we conduct the IT audit and we tried to seek to close gaps in capabilities. One way to the close these gaps is the adoption of good practices in wide industry use. There are several sources for good practices including public frameworks and standards su...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید