نتایج جستجو برای: security management
تعداد نتایج: 1006782 فیلتر نتایج به سال:
A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...
the study determined optimum inventory levels for various bakery resources using the bread supply chain network in onitsha city. structured questionnaires were administered among bakery factories. the optimum design achieved through the optimization model was compared with the existing systems. analysis of 90 bakeries with a combined capacity of 3960 revealed that total money n 564,408,477.28 i...
the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...
information security is one of the most important enterprise assets. for any organization, information is valuable and should be appropriately protected. also, security is to combine systems, operations, and internal controls to ensure the integrity and confidentiality of data and operation procedures in an organization. knowing the fact that with serious threat of unauthorized users on the int...
Borders are known as places where government institutions implement their own law in a variety of ways and forms. Given the different approaches to border control and management, it can be seen that this issue is still viewed as a security issue in developing countries, including Iran, and most of the approaches related to this are from a purely security perspective. The boundary view must be m...
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
application of antagonistic agents in the rhizosphere of plants is an important approach in control of soil-borne pathogens. establishment and persistence of biocontrol agents in the soil is a major concern in biological control. this study aimed to determine the effect of plant debris of oak forests on activity of pseudomonas fluorescens and trichoderma vierns against meloidogyne javanica in t...
the aim of this study is to investigate and determine the best aja’s information confrontation methods and techniques against the extra-regional forces. according researches in various sources can be realized, trans-regional forces approaches in the world of modern communications, brought under control the international community as a village and many of the information in the fields communicat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید