نتایج جستجو برای: emotional security

تعداد نتایج: 283587  

2012

Information and communication service providers (ICSP) that are significant in size and provide Internet-based services take administrative, technical, and physical protection measures via the information security check service (ISCS). These protection measures are the minimum action necessary to secure the stability and continuity of the information and communication services (ICS) that they p...

2010
Gengbiao Chen Zhuo Wang Ruoyu Zhang Kan Zhou Shiqiu Huang Kangqi Ni Zhengwei Qi

As a key part of reverse engineering, decompilation plays a very important role in software security and maintenance. Many decompilation techniques and tools have been developed while all of them have defects in different aspects. For example, IDA Hex rays generates pseudocodes with poor readability, and Boomerang is unable to identify composite structures such as Classes and multidimensional a...

2012

Information and communication service providers (ICSP) that are significant in size and provide Internet-based services take administrative, technical, and physical protection measures via the information security check service (ISCS). These protection measures are the minimum action necessary to secure the stability and continuity of the information and communication services (ICS) that they p...

2011
A. Rezk H. Ali M. El-Mikkawy S. Barakat

A database intrusion detection system (DIDS) is used to detect potential violations in database security. DIDS follows other traditional database security mechanisms and network security mechanisms such as firewall and network intrusion detection. Therefore, it faces the intrusion from internal users or the intrusion that can be passed through other security layers. This means that the number o...

Journal: :Journal of child psychology and psychiatry, and allied disciplines 2005
Evan M Forman Patrick T Davies

BACKGROUND Although delineating the processes by which children appraise the family as a source of security from their collective experiences in the family subsystem has assumed center stage in many conceptualizations of child development, the dearth of measures of child adaptation in the family system has hindered empirical advances. Therefore, this study introduced and tested the psychometric...

2011
Patrick T. Davies

We examined the joint role of constructive and destructive interparental conflict in predicting children’s emotional insecurity and psychological problems. In Study 1, 250 early adolescents (M = 12.6 years) and their primary caregivers completed assessments of family and child functioning. In Study 2, 201 mothers and their two-year old children participated in a multi-method, longitudinal desig...

Journal: :Journal of the Canadian Academy of Child and Adolescent Psychiatry = Journal de l'Academie canadienne de psychiatrie de l'enfant et de l'adolescent 2009
Sharon E Clark Douglas K Symons

INTRODUCTION This research examines the interrelations of attachment security, feelings towards the self, and attributions about others in middle childhood. METHODS Five-to nine-year-old children (n=176) completed the Separation Anxiety Test, which provided a measure of attachment security and a puppet interview was used to assess feelings towards the self. A subset of 89 participants receive...

Journal: :J. UCS 2016
Dilek Karahoca Adem Karahoca Ayçça Kurnaz

This study aims to investigate certain communication dimensions to assess the impact of Computer Mediated Communication (CMC) tendencies of students on ubiquitous environments. Communication dimensions were determined as message content, message interaction, semantic of message, emotional situation, and security. Message content was used as a determiner indicator to measure the effectiveness of...

2011
Gaurav Bansal

Even though Privacy concerns (PC) and security concerns (SC) are acknowledged as separate constructs, many studies argue that they are related or, even worse, confused. Building upon the non-overlapping SC and PC dimensions, we propose Internet Users Information Transmission Security Concern (IUITSC) scale. We argue that the scale when used in conjunction with PC scale would cover the entire ga...

2013
Raj Sharman

The use of Internet for sharing health-related information has served to empower patients, improve self-health management knowledge and provide emotional support to patients. This paper investigates the factors that influence the use of Internet to share health-related information by patients covered under Medicare, especially, the impact of security and privacy concern. This paper adapts the I...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید