نتایج جستجو برای: متخصصان it
تعداد نتایج: 2848304 فیلتر نتایج به سال:
In recent years, we have experienced the proliferation of videogames that have, as their main mode of play, the creation of in-game content. Even though existing literature has looked into various characteristics of these games, one of their aspects that warrants further exploration is the monetisation practices that can emerge in their context. Through our ongoing ethnographic study, we became...
As Information Technology (IT) has become increasingly important to the competitive position of firms, managers have grown more sensitive to their organization's overall IT risk management. Recent publicity concerning losses incurred by companies becauseofproblcms with their sophisticated information systems has focused attention on the importance of these systems to the organization. In an att...
Twitter has become a major source of data for social media researchers. One important aspect of Twitter not previously considered are deletions – removal of tweets from the stream. Deletions can be due to a multitude of reasons such as privacy concerns, rashness or attempts to undo public statements. We show how deletions can be automatically predicted ahead of time and analyse which tweets are...
We present a solution for modeling the dependencies of an IT infrastructure and determine the availability of components and services therein using Markov logic networks (MLN). MLNs offer a single representation of probability and first-order logic and are well suited to model dependencies and threats. We identify different kinds of dependency and show how they can be translated into an MLN. Th...
کتابخانه های دانشگاهی به دلیل نیاز فزاینده به منابع اطلاعاتی روزآمد با مسأله فراهم آوری، سازماندهی، دسترس پذیر نمودن منابع (اعم از چاپی و الکترونیکی) مواجه هستند. از این رو پژوهش درباره فواید و مشکلات فراهم آوری منابع الکترونیکی و هم چنین بررسی ویژگی ها و کاستی های کتاب های الکترونیکی از اهمیت خاصی برخوردار است. روش پژوهش، پیمایشی و ابزار جمع آوری داده ها، پرسشنامه و مصاحبه است. نمونه آماری مور...
هدف این تحقیق بررسی نگرش متخصصان بیوتکنولوژی مراکز دانشگاهی استان تهران در مورد کاربرد گیاهان تراریخته بود. این تحقیق به روش پیمایشی انجام شد و از نوع توصیفی – همبستگی است . جامعه آماری مورد نظر شامل متخصصان بیوتکنولوژی مراکز دانشگاهی استان تهران بودند (n=75) که از این تعداد 63 نفر با استفاده از جدول کرجیک و مورگان به روش نمونه گیری طبقه ای تناسبی به عنوان نمونه آماری انتخاب شدند(n=63) ابزار تح...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
A risk inventory provides an integrated view on risk management artifacts, e.g., risks, risk controls, and performance indicators. In this paper, we show how adapting the enterprise architecture management processes (EAM) may provide a foundation for an integrated IT risk inventory. Based on a design research approach, we develop a systematic approach for integrating the disciplines of risk man...
In this paper we propose a novel approach for the systematic assessment and analysis of IT related risks in organisations and projects. The approach is model-driven using an enterprise architecture as the basis for the security management process. Using an enterprise architecture it is possible to provide an integrated description of an organisation’s structure, processes and its underlying IT ...
IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [GLLR06] demonstrates. According to the survey, many companies consider it important to quantify the losses attacks against their IT systems cause but are unable to do so. In service-oriented architectures, we see a promi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید