نتایج جستجو برای: security personnel
تعداد نتایج: 213695 فیلتر نتایج به سال:
Compared with traditional files, electronic personnel files have the characteristics of economy, environmental protection, convenience, and sharing are gradually replacing paper files. However, development archives is still in its infancy, there many problems, including professional quality personnel, information management, security storage. As an emerging technology, blockchain technology has...
Güvenlik hizmetlerinin doğası gereği, 7 gün-24 saat aralıksız bir şekilde devam eden çalışma düzeni nedeniyle bu hizmetlerin çizelgelenmesinde vardiya sistemine ihtiyaç duyulmaktadır. Buna ek olarak, güvenlik insani koşulları ve iş kanunu ile zorunlu kılınan kısıtlar gibi diğer bazı problem kısıtlarını da dikkate alacak yerine getirilebilmesi çeşitli kriterlerin alınmasını gerektirmektedir. Bu ...
While there is an overwhelming amount of literature that recognises the need for organisations to create a security culture in order to effectively manage security, little is known about how to create a good security culture or even what constitutes a good security culture. In this paper, we report on one of two case studies performed to examine how security governance influences security cultu...
research, method and technology development, as well as studies conducted in the interests of Swedish defence and the safety and security of society. The organisation employs approximately 1000 personnel of whom about 800 are scientists. This makes FOI Sweden’s largest research institute. FOI gives its customers access to leading-edge expertise in a large number of fields such as security polic...
Notwithstanding the debate in recent months between the Bush administration and members of Congress about how personnel should be managed in the Department of Homeland Security (DHS), the secretary of the new department will be faced with the challenge of implementing and further improving the human resources (HR) system agreed upon by the President and Congress. This challenge will be made mor...
Although the development and deployment of an effective information security infrastructure within the company is imperative to the success of the overall information security discipline, it will be a futile exercise if those people who are expected to maintain and monitor information security in the company do not know what is expected and demanded of them. The importance of information securi...
1. There are major opportunities in vulnerable countries to bolster stability and democratic transitions if there are US capabilities to take advantage of such openings. 2. This required capability would develop better strategies with a political focus for such countries along with specialist personnel—expeditionary diplomats— to concentrate on the implementation of these strategies over the lo...
In the present study, a large scale, structured problem regarding the routing and rostering of security personnel is investigated. Structured problems are combinatorial optimization problems that encompass characteristics of more than one known problem in operational research. The problem deals with assigning the available personnel to visits associated with a set of customers. This objective j...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید