نتایج جستجو برای: Security threats
تعداد نتایج: 201039 فیلتر نتایج به سال:
security building processes after world war ii, were under the influence of realistic thoughts. this was considered a reaction to idealistic and institutional approaches. critical school attempted to criticize classical and structural realism. new security theoreticians emphasize on extended subjects and diverse threats and believe it to be beyond the competition of countries. they believe that...
association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...
our country, iran, is in the category of waterless and survived countries because of lack of climate downfalls to its unsuitable local to temporal transmittance. environmental concerns mainly after 1960s that have boon seriously proposed in universal politics, created a variety of assessments. in the late decades, environmental change such as: climate change, has caused chief challenges for the...
there are a lot of researches in the world about attacks on information systems (is). although there have been many attempts to classify threats of is’s especially in health information systems (his), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. the main aim of this paper is to present a research agend...
Abstract This article takes into consideration cyber security economics to understand whether and is a partnership among equals or any of these two disciplines have the upper hand. Cyber more than just computer science, studies in holistic way, it dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument that there no clear definition cybersecurity, apart fr...
there are a variety of definitions about social security and threats indicating a lack of consensus on this issue, and not considering the impact of social conditions of different countries. thus, although in a scientific study considering other viewpoints can be useful, in order to be practical, we should indigenously note indigenous conditions and domestic scholar’s comments. based on this id...
various and complex human activities in geographical contexts need proper ground if at most efficiency is to be achieved. land preparation regulates the relationship between human, space, and human activities. land preparation has various dimensions related to value system, political, scientific, artistic, and defense-security aspects. one of the most important dimensions of land preparation is...
Having reviewed and evaluated the aggressive intentions security threats in United States' behavior against the Islamic Republic of Iran, this article puts the greatest emphasis on aggressive intention especially "national security doctrine" and mentioning some of its characteristics so by categorizing different approaches toward national security clarify some of vague aspects of this concept. ...
after the cold war, the concept of international security underwent a modification. among the most important components of such a transformation, the consolidation of ‘environmental security’, a topic in international security, can be taken into account. environmental security deal with threats that are not only the unintentional result of social and economic activities but are very slow in...
Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید