نتایج جستجو برای: airport security
تعداد نتایج: 184356 فیلتر نتایج به سال:
Workers in less-secure jobs are often paid less than identical-looking workers in more secure jobs. We show that this lack of compensating differentials for unemployment risk can arise in equilibrium when all workers are identical and firms differ only in job security (i.e. the probability that the worker is not sent into unemployment). In a setting where workers search for new positions both o...
We review the current strategies to counter Internet threats under the light of the classic strategy literature. The literature often advocates proactive action, and dominance of the (virtual, in our case) battlefield, which is the opposite from what we see defenders deploy today. Their actions are instead reactive and exclusively defensive. We propose strategies for defenders to regain the ini...
The Work Ability Index (WAI) is a well-accepted questionnaire designed to assess an individual’s work ability. However, most research with WAI has focused on occupational populations with physical demands at work. The purpose of this study is to explore the value of WAI as screening instrument among professionals in a Dutch university. Based on database data about absenteeism, questionnaire dat...
Applications often use behavior control mechanisms in order to ensure that individuals create sufficiently strong passwords. Behavior controls, which force individuals to utilize specific password characteristics, are assumed to be the best mechanism to encourage strong password creation. However, an over reliance on them could lead to counterproductive security behaviors. This study examines t...
The globalization and the continuing growth of internet-based processes and services makes it necessary to examine the emerging user resistance phenomenon from a new theoretical perspective. In order to verify the user resistance’s core claims, we designed a research model and subsequently developed measurement instruments to empirically analyze and test why people reject or use a process in a ...
UK small to medium sized enterprises (SMEs) are suffering increasing levels of cybersecurity breaches and are a major point of vulnerability in the supply chain networks in which they participate. A key factor for achieving optimal security levels within supply chains is the management and sharing of cybersecurity information associated with specific metrics. Such information sharing schemes am...
INTRODUCTION We performed a questionnaire study to establish the frequency and consequences of the detection of orthopaedic implants by airport security and to help us advise patients correctly. All published literature on this subject is based on experimental studies and no 'real-life' data are available. PATIENTS AND METHODS A total of 200 patients with a variety of implants were identified...
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent full security coverage at all times, which allows adversaries to observe and exploit patterns in selective patrolling or monitoring, e.g. they can plan an attack avoiding existing patrols. Hence, randomized patrolling o...
W ireless network security based on the IEEE 802.11 standard has received a lot of negative attention over the past few years. The attention was warranted, but 802.11 certainly wasn’t the only product to suffer from poor security. For example, operating systems and browsers have also posed significant security problems. Why then did Wi-Fi–based networks become such a lightning rod for criticism...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید