نتایج جستجو برای: Misuse

تعداد نتایج: 9970  

Journal: :international journal of high risk behaviors and addiction 0
abbas abbasi-ghahramanloo department of epidemiology and biostatistics, school of public health, tehran university of medical sciences, tehran, ir iran akbar fotouhi department of epidemiology and biostatistics, school of public health, tehran university of medical sciences, tehran, ir iran hojjat zeraati department of epidemiology and biostatistics, school of public health, tehran university of medical sciences, tehran, ir iran afarin rahimi-movaghar iranian national center for addiction studies, iranian institute for reduction of high-risk behaviors, tehran university of medical sciences, tehran, ir iran; iranian national center for addiction studies, iranian institute for reduction of high-risk behaviors, tehran university of medical sciences, south karegar ave., p. o. box: 1336616357, tehran, ir iran. tel/fax: +98-2155412232

conclusions our results suggested that the prevalence of prescription drugs, alcohol and illicit substance use was relatively low, though still significant, among iranian students, which was strongly associated with family and friends’ use. the findings of this research can be used for planning and evaluating interventions by considering the risk factors and protective factors in universities. ...

2006
Victor Page Robin C. Laney Maurice Dixon Charles B. Haley

This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model obstacles. The TOMM allows a development team to anticipate malicious behaviour with respect to the operational database application and to document a priori how this malicious behaviour should be mitigated.

Abbas Ghaemi Bafghi Amin Rasoulifard

In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...

Journal: :JMIR public health and surveillance 2018
Roy Cherian Marisa Westbrook Danielle Ramo Urmimala Sarkar

BACKGROUND Prescription opioid misuse has doubled over the past 10 years and is now a public health epidemic. Analysis of social media data may provide additional insights into opioid misuse to supplement the traditional approaches of data collection (eg, self-report on surveys). OBJECTIVE The aim of this study was to characterize representations of codeine misuse through analysis of public p...

2016
Christopher Corbett Elmar Schoch Frank Kargl Felix Preussner

The automotive industry’s future trends, such as automated driving or advanced driver assistance, require large bandwidths to handle massive data streams and strongly depend on well timed communication. The Ethernet technology is seen as a suitable candidate to cover those needs for vehicle-internal networks; however, Ethernet involves security issues. Thus, by discussing automotive Ethernet at...

2004
John D'Arcy Anat Hovav

General deterrence theory suggests that deterrent security countermeasures (e.g., security policies, security awareness programs, security software) can be used to control IS misuse in organizations. However, empirical studies that have examined the effectiveness of such techniques have produced inconclusive results. A limitation of these studies is that they ignore the impacts of sanction perc...

Journal: :Cultural Studies Review 2016

Journal: :Nature 1993

Journal: :Reactions Weekly 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید