Results for 'Security studies'

999 found
Order:
  1.  24
    Tracer Study of Teacher Education Graduates of Western Philippines University - Puerto Princesa Campus: Basis for Curriculum Review and Revision.Jupeth Pentang, David R. Perez, Katherine H. Cuanan, Mailyn B. Recla, Romelyn T. Dacanay, Rastanura M. Bober, Cheche E. Dela Cruz, Susana P. Egger, Ruth L. Herrera, Carolyn M. Illescas, Josephine M. Salmo, Manuel L. Bucad Jr, Joann V. Agasa & Nur-Aina A. Abaca - 2022 - International Journal of Multidisciplinary: Applied Business and Education Research 3 (3):419-432.
    Graduates' employability indicates the excellent education and relevant preparation they obtained from their respective degrees. Tracer studies have enabled higher education institutions to profile their graduates while also reflecting on the quality of education they provide. With the foregoing, a tracer study determined the demographic and academic profile of teacher education graduates from 2017 to 2020 in a state university in the West Philippines. It also ascertained the advanced studies they attended after college, their employment data, the relevance (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  68
    Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. New York, NY, USA: pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  4.  52
    The Effects of Fake News on Consumers’ Brand Trust: An Exploratory Study in the Food Security Context.Farte Gheorghe-Ilie & Obadă Rareș - 2021 - Romanian Journal of Communication and Public Relations 23 (3):47-61.
    The aim of this study is to explore the effects of fake news on consumers’ brand trust in the food security context. The starting point of our research is the finding that issues related to food security cannot be addressed without the contribution of multinational food corporations. The efficiency of their intervention depends on their capacity to build and preserve their brand trust despite the multifarious fake news stories that contaminate the information flow. Is brand trust sensitive to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  73
    White Supremacy as an Existential Threat: A Response to Rita Floyd’s 'The Morality of Security: A Theory of Just Securitization'.Jessica Wolfendale - 2022 - European Journal of International Security 1:9-18.
    Rita Floyd’s "The Morality of Security: A Theory of Just Securitization" is an important and insightful book that delineates a theory of just securitization (modified from the jus ad bellum and jus in bello criteria in just war theory) involving three sets of principles governing the just initiation of securitization, just conduct of securitization, and just desecuritization. This book is a much-needed addition to the security studies and just war scholarship. -/- Here, I explore the potential of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. An Intelligent Tutoring System for Teaching Advanced Topics in Information Security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the intelligent (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  7. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  9. Security, Local Community, and the Democratic Political Culture in Africa.Krzysztof Trzcinski - 2021 - In Adeshina Afolayan (ed.), Pathways to Alternative Epistemologies in Africa. Palgrave Macmillan. pp. 111-122.
    In this study, the idea of the local African community as a social structure ensuring the security of its members is presented. An understanding of the concept of security is first briefly discussed, followed by the meaning of the concept of the local African community. The chapter also makes an a priori distinction between what one can call “moderate” and “radical” types of communal life and two case studies exemplifying them are presented. The chapter aims to analyze (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Global Security and Economic Asymmetry: A Comparison of Developed and Developing Countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Matters of Trust as Matters of Attachment Security.Andrew Kirton - 2020 - International Journal of Philosophical Studies 28 (5):583-602.
    I argue for an account of the vulnerability of trust, as a product of our need for secure social attachments to individuals and to a group. This account seeks to explain why it is true that, when we trust or distrust someone, we are susceptible to being betrayed by them, rather than merely disappointed or frustrated in our goals. What we are concerned about in matters of trust is, at the basic level, whether we matter, in a non-instrumental way, to (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  12.  58
    Modern Information and Communication Technologies in the Digital Economy in the System of Economic Security of the Enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an organized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  17
    Motivational Strategies and Security Service Delive Ry in Universities in Cross River State, Nigeria.Comfort Robert Etor & Michael Ekpenyong Asuquo - 2021 - International Journal of Educational Administrati on, Planning, and Research 13 (1):55-65.
    This study assessed two motivational strategies and their respective ties to the service delivery in public universities in Cross River State. In achieving the central and specific targets of this research, four research questions and two null hypotheses were answered and tested in the study. The entire population of 440 security personnel in two public universities was studied, based on the census approach and following the ex-post facto research design. Three sets of expert-validated questionnaires, with Cronbach reliability estimates of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Torture Pornopticon: (In)Security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  27
    ENSURING ECONOMIC SECURITY OF TRADE ENTERPRISES IN THE FORMATION OF PRICING POLICY.Maksym Bezpartochnyi & Igor Britchenko - 2022 - Financial and Credit Activity: Problems of Theory and Practice 43 (2):146-156.
    The article considers the problem of ensuring the economic security of trade enterprises by forming an optimal pricing policy. The methodology of formation the minimum and maximum selling prices of trade enterprise, maintenance of margin of economic security, which is based on research of turnover costs and working capital of trade enterprise is offered. Based on statistical data of trade enterprises, the types of prices by product range are determined, which form a stable economic situation and ensure economic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Institutional Variables and the Supervision of Security in Public Secondary Schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  18. Internal Instability as a Security Challenge for Vietnam.Nguyen Hoang Tien, Nguyen Van Tien, Rewel Jimenez Santural Jose, Nguyen Minh Duc & Nguyen Minh Ngoc - 2020 - Journal of Southwest Jiaotong University 55 (4):1-13.
    National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. In the contemporary world with advanced technology and rapid globalization process taking place, beside many extant economic, social and political benefits there are many appearing challenges and threats that could endanger and destabilize the current socio-economic and political system of any country, including Vietnam. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  19
    Research of the Intelligent Resource Security of the Nanoeconomic Development Innovation Paradigm.Tetiana Ostapenko, Igor Britchenko & Peter Lošonczi - 2021 - Baltic Journal of Economic Studies 7 (5):159-168.
    The resources and resource potential of the innovative component of nanoeconomics are analyzed. The factors of production – classical types of resources such as land, labor, capital and technology – are described. Ways of influencing the security resources of nanoeconomics within the innovation paradigm are evaluated. The purpose of the study is to identify the factor of nanoeconomics in the formation of resource security potential in the innovation paradigm. To achieve this goal, the following tasks were set: to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was found (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  36
    State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...) of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  22. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. An Analytical Study of the Reality of Electronic Documents and Electronic Archiving in the Management of Electronic Documents in the Palestinian Pension Agency (PPA).Mohammed Khair I. Kassab, Samy S. Abu Naser & Mazen J. Al Shobaki - 2017 - European Academic Research 4 (12):10052-10102.
    The study aims to identify the reality of management of electronic documents and electronic archiving retirement in the Palestinian Pension Agency -analytical study, as well as to recognize the reality of the current document management system in the Palestinian Pension Agency. The study found the following results: that the reality of the current system for the management of documents in the agency is weak and suffers from many jams. Employee in the agency understand the importance and benefits of the management (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  40
    The Pragmatic Pyramid: John Dewey on Gardening and Food Security.Shane J. Ralston - 2014 - Social Philosophy Today 30 (1):63-76.
    Despite the minimal attention paid by philosophers to gardening, the activity has a myriad of philosophical implications—aesthetic, ethical, political, and even edible. The same could be said of community food security and struggles for food justice. Two of gardening’s most significant practical benefits are that it generates communal solidarity and provides sustenance for the needy and undernourished during periods of crisis. In the twentieth century, large-scale community gardening in the U.S. and Canada coincided with relief projects during war-time and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  64
    The Politics of Military Force: Antimilitarism, Ideational Change, and Post-Cold War German Security Discourse.Frank Stengel - 2020 - Ann Arbor, MI, USA: University of Michigan Press.
    The Politics of Military Force uses discourse theory to examine the dynamics of discursive change that made participation in military operations possible against the background of German antimilitarist culture. Once considered a strict taboo, so-called out-of-area operations have now become widely considered by German policymakers to be without alternative. The book argues that an understanding of how certain policies are made possible (in this case, military operations abroad and force transformation), one needs to focus on processes of discursive change that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Justice After Catastrophe: Responsibility and Security.Makoto Usami - 2015 - Ritsumeikan Studies in Language and Culture 26 (4):215-230.
    The issue of justice after catastrophe is an enormous challenge to contemporary theories of distributive justice. In the past three decades, the controversy over distributive justice has centered on the ideal of equality. One of intensely debated issues concerns what is often called the “equality of what,” on which there are three primary views: welfarism, resourcism, and the capabilities approach. Another major point of dispute can be termed the “equality or another,” about which three positions debate: egalitarianism, prioritarianism, and sufficientarianism. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  54
    ROLE OF WOMEN IN ENVIRONMENTAL SECURITY AND CONSERVATION IN INDIA.Rashmee Yadav - 2020 - In A. K. Verma (ed.), ENVIRONMENT AND SOCIETY. Prayagraj: Government P.G. College Saidabad, Prayagraj (U.P.). pp. 252-256.
    Women are significant actors in natural resources management and they are major contributors to environment rehabilitation and conservation. Women are not only knowledgeable about the environment; they are also protective and caring. Women being primarily responsible for domestic and household management interact more intensively with both the natural and built environment. This study was carried out on role of women in environmental security in India with the objective to socio-economic status of women.
    Download  
     
    Export citation  
     
    Bookmark  
  28. Assessment of the Determinants of the Financial Security of Railways in Ukraine.Igor Britchenko, N. I. Bohomolova, S. S. Pinchuk & O. O. Kravchenko - 2018 - Financial and Credit Activity: Problems of Theory and Practice 4 (27):270-282.
    The paper is devoted to the study of determinants determined the level of financial security of economic systems. It is shown that the financial security of an economic system implies the achievement of a level of financial stability that will contribute to simultaneously maintaining financial equilibrium and ensuring targeted growth in line with the development strategy. The level of financial security of rail transport in Ukraine was analyzed and it was determined that the decline in its (...) was the result of a complex interaction of external and internal factors, the main of which were tight government regulation, shifting the financial burden of social responsibilities to Ukrzaliznytsya, PJSC, lack of competition in the transportation of the main nomenclature of cargo and the unsatisfactory state of non-current assets. Based on the Argenti’s method, it is shown that the consequence of the inefficient financial management of Ukrzaliznytsia, PJSC are the reduction of its insolvency. Three main determinants of the financial security of rail enterprises were identified: a reduction in traffic volumes, an unstable capital structure and the impossibility of timely repayment of current liabilities. An additive model for assessing the impact of selected determinants on the level of financial security of Ukrzaliznytsia, PJSC is proposed. The analysis of the model parameters showed that the greatest impact has the index of industrial production, which is due to the predominant formation of its own financial resources of rail transport due to income from freight traffic. A complex of measures designed to improve the financial condition of rail enterprises was proposed. It is substantiated that in order to equalize existing threats, it is necessary to take political decisions aimed at improving the financial condition of Ukrzaliznytsia, PJSC by reducing the intensity of leaching of its financial resources, as well as implementing an anti-crisis financial strategy aimed at optimizing the capital structure and financial rehabilitation of rail enterprises. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  48
    Forecasting of the Number of Air Passengers in the United States in Terms of the Maintenance of Economic Security During the Impact of COVID-19.Bartosz Kozicki, Igor Britchenko, Arsen Ovsepyan & Sabina Grabowska - 2021 - Studies in Politics and Society 19 (3):29-40.
    The purpose of the study is to forecast the number of passengers transported by air in the United States for 2021-2022. The forecast is preceded by a multidimensional comparative analysis of the number of passengers transported by air in the United States from 1 January 2019 to 2 November 2021. To achieve this goal, the data were grouped as dependent variables: years, months-years. The observed similarities, the analysis and evaluation of the literature as well as the own experience made it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Arrow’s Impossibility Theorem and the National Security State.S. M. Amadae - 2005 - Studies in History and Philosophy of Science Part A 36 (4):734-743.
    This paper critically engages Philip Mirowki's essay, "The scientific dimensions of social knowledge and their distant echoes in 20th-century American philosophy of science." It argues that although the cold war context of anti-democratic elitism best suited for making decisions about engaging in nuclear war may seem to be politically and ideologically motivated, in fact we need to carefully consider the arguments underlying the new rational choice based political philosophies of the post-WWII era typified by Arrow's impossibility theorem. A distrust of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Understanding Terrorism in the Context of Global Security.Shreyasi Ghosh - 2014 - SOCRATES 2 (JUNE 2014):89-106.
    Understanding Terrorism in the context of Global Security -/- Author / Authors : Shreyasi Ghosh Page no. 89-106 Discipline : Political Science/Polity/ Democratic studies Script/language : Roman/English Category : Research paper Keywords: Terrorism, Violence, Threat, Global Security, Globalization.
    Download  
     
    Export citation  
     
    Bookmark  
  32. ITS for Teaching DES Information Security Algorithm.Abed Elhaleem A. Alnajar & Monnes Hanjory - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  63
    Selection and Application of Appropriate Analytical Methods Needed to Assess the Risks Reducing the Security of the Protected System.Josef Reitšpís, Martin Mašľan & Igor Britchenko - 2021 - Baltic Journal of Economic Studies 7 (3):1 – 8.
    Risk assessment is one of the prerequisites for understanding its causes and possible consequences. We base our risk assessment on the principles described in the European standard EN 31000 - Risk Management Process. This standard comprehensively describes the continuous activities that are necessary in managing risks and minimizing their possible adverse effects on the operation of the system under investigation. In this activity, it is necessary to first identify the existing risks, then analyze and evaluate the identified risks. In the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. AN EMPIRICAL STUDY ON MEASUREMENT OF EMPLOYEE's SATISFACTION WITH SPECIAL REFERENCE TO AREVA, ALLAHABAD.Indal Kumar - 2014 - SOCRATES 2 (1):222-233.
    This study has been done to measure the satisfaction level of employees with special reference to AREVA, Allahabad. Nowadays scenario has been changed to sustain in such a competitive market. It is very important to retain good employees that contribute towards the achievement of organizational goal and employee’s satisfaction as well. The research papers highlight some of these problems and present a picture of level of job satisfaction among employees of AREVA Companies. It also identifies unique issues of job satisfaction (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Controlled Vocabularies in Bioinformatics: A Case Study in the Gene Ontology.Barry Smith & Anand Kumar - 2004 - Drug Discovery Today: Biosilico 2 (6):246-252.
    The automatic integration of information resources in the life sciences is one of the most challenging goals facing biomedical informatics today. Controlled vocabularies have played an important role in realizing this goal, by making it possible to draw together information from heterogeneous sources secure in the knowledge that the same terms will also represent the same entities on all occasions of use. One of the most impressive achievements in this regard is the Gene Ontology (GO), which is rapidly acquiring the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  39. Web-Based School Information and Publication System: A Developmental Study.Kevin Caratiquit - 2021 - Global Education and Social Sciences Journal 1 (3):45-55.
    The study aimed to promote the school online, provide timely, engaging, and current information of the school to employees, learners, parents, and community, share updates of school activities online, supply downloadable instructional materials and resources for both employees and students. Also, it evaluated the assessment of teaching and non-teaching staff, learners, parents and IT specialists to the ISO 25010:2011 software quality standards of the developed Web-based School Information and Publication System along functional and suitability, maintainability, usability, security, reliability, performance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Transnational Macro-Narrative Descendancy in Violent Conflict: A Case Study of the Mujahidin Indonesia Timur in Central Sulawesi.Andrew D. Henshaw - unknown
    This thesis investigates transnational macro-narrative decendancy in violent conflicts and identifies enabling dynamics that facilitate re-framing. To date there has been little focus on processes involved, explicitly narrative descendancy, bridging, resonance building, or grafting, representing a critical knowledge gap. -/- This thesis reviews relevant literature on constructivism and rational choice theory and tests the findings against an empirical case study in Central Sulawesi. The findings demonstrate a mixture of approaches is present, though this is likely due to a range of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Making Better Informed, More Confident COVID-19 Decisions: Vaccine Hesitancy, Its Barriers and Impact Studies: Taking Bayelsa State as an Example.Morufu Olalekan Raimi, Emeka Chisom Lucky, Ebikapaye Okoyen, Angalabiri Clement, Christopher Ogbointuwei & Atoyebi Babatunde - 2021 - International Journal of Vaccines and Immunization 5 (1):1-13.
    Background: Health care practitioners are recognized to have a large influence in shaping uptake of vaccine in new borns, children, adolescents, as well as adults. Parents remain more secure in their decisions when health care practitioners communicate successfully with them about vaccine dangers and benefits, the value as well as necessity for vaccinations, as well as vaccine safety. Thus, immunization remain the foundation of the primary health care system, an indisputable human right as well as a global health and development (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  46
    Assessment of Factors of Employee’s Turnover: Case Study in My Village (MVi).Narith Por - 2018 - International Journal of Information Research and Review 5 (08):5637-5649.
    Employee is the main resource for organization. Recently, there were many concerns of staff resignation within industries. High staff turnovers cause increase of costs of hiring workforces. Owing this issue, “Assessment of Factor of Employee’s Turnover” was proposed for research with the objective of examination of factors causing staff resignation from MVi. In total 26 staff both women and men who resigned 2016 and 2017 was selected for interview. Quantitative data was used. Three main steps were done including research questionnaires (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Women Abuse Screening Tool: A Validation Study on Nigerian Pregnant Women.Ibukunoluwa B. Bello, Ebernezer O. Akinnawo & Bede C. Akpunn - 2020 - International Journal of Scientific Research and Management (IJSRM) 8 (6).
    Domestic violence is identified across the globe as a menace as it poses a threat to the mental health of its victims, the significant others of the victim and the security of a nation at large. In some cases, the victim of domestic violence is a pregnant woman and harm is caused not only to a woman but her fetus also and this calls for urgent psychological assessment and intervention. Although there is no doubt that psychological tests are effective (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  44.  91
    The Perception Movement Economy of Ukraine to Business/Igor Britchenko, Volodymyr Saienko//Списание «Икономически Изследвания (Economic Studies)». – Институт За Икономически Изследвания При БАН, София (България). – № 4. – 2017. – P. 163 - 181. ISSN 02053292.Igor Britchenko & Volodymyr Saienko - 2017 - Списание «Икономически Изследвания (Economic Studies)» 4 (4):163 - 181.
    The article provides the analysis of the entrance into the innovative activity and organized regulation of interaction which is based on the scientific and technological changes, concentration of production and the feasibility study of administrative decisions, which are dominated by a conglomerate of technical, technological and engineering management decisions. The research formulates the provisions for the productive use of business as the form of economic relations which is based on the entrepreneur function. These provisions are formulated basing on the conditions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  42
    Management of Data in Higher Education and the Quality of Academic Research of University Lecturers : A Case Study in South-South Nigeria.Francisca Nonyelum Odigwe & Valentine Joseph Owan - 2020 - International Journal of Innovative Business Strategies (IJIBS) 6 (1):378-387.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. The study adopted a factorial research design. The population of this study includes all the Faculty of Education academic staff in both public and private universities situated in South-South Nigeria. Using results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Analytic Narratives: What They Are and How They Contribute to Historical Explanation.Philippe Mongin - 2019 - In Claude Diebolt & Michael Haupert (eds.), Handbook of Cliometrics. Berlin: Springer.
    The expression "analytic narratives" is used to refer to a range of quite recent studies that lie on the boundaries between history, political science, and economics. These studies purport to explain specific historical events by combining the usual narrative approach of historians with the analytic tools that economists and political scientists draw from formal rational choice theories. Game theory, especially of the extensive form version, is currently prominent among these tools, but there is nothing inevitable about such a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Déjà Vu: The Shared History of SOF - Switzerland as a Case Study.Matthias Fiala - 2019 - Combating Terrorism Exchange 9 (2):39-48.
    Special operations forces have become a mainstay of military operations in the twenty-first century, but the journey to reach this point has been neither quick nor painless. Most of the existing literature on SOF history, the theories and principles of its use, SOF’s role in achieving national security objectives, and its strategic utility and disutility, was written from the perspective of major military powers like the United States.1 Although Sweden, Denmark, Norway, and Finland, in particular, have expanded the analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  63
    ILLICIT DRUG USE AND TRADE: AN ETHNOGRAPHIC STUDY OF KUMASE (2000–2018).Samuel Adu-Gyamfi, Ali Yakubu Nyaaba, Kwasi Amakye-Boateng, Daniel Owusu-Ansah & Michael Nimoh - 2020 - Sociological Studies 26 (1):59-81.
    The illegal drug trade is a world phenomenon, which has had some adverse impact on societies. Significantly, the impact is damning in developing economies in Africa and Ghana in particular. This paper therefore seeks to address the causes and effects of the use and peddle of these illegal drugs in three communities in the capital city of the Asante Region of Ghana. It further ascertains the extent to which these drugs burden the security agencies in the communities and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  2
    EMPLOYABILITY OF CARAGA STATE UNIVERSITY CABADBARAN CITY TEACHER EDUCATION GRADUATES ACADEMIC YEAR: 2016-2018.Nathalie L. Daminar, Jona J. Biongcog, Rica Florabel N. Remulta & Ronilo P. Biongcog - 2022 - Science International 34 (5):449-454.
    This study aimed to determine the employability of Teacher Education graduates within the year 2016-2018 from a state university in Caraga Region, Philippines. The study made used of the descriptive method. The quantitative method used survey questionnaire to gather data from 179 Teacher Education graduates. The data gathering instrument used by the researchers is the Graduate Tracer Study approved by the university anchored on the educational philosophy of the Commission on Higher Education (CHED). There were 90 out of the 142 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  29
    The Mindsponge and BMF Analytics for Innovative Thinking in Social Sciences and Humanities.Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La (eds.) - 2022 - Berlin, Germany: De Gruyter.
    Academia is a competitive environment. Early Career Researchers (ECRs) are limited in experience and resources and especially need achievements to secure and expand their careers. To help with these issues, this book offers a new approach for conducting research using the combination of mindsponge innovative thinking and Bayesian analytics. This is not just another analytics book. 1. A new perspective on psychological processes: Mindsponge is a novel approach for examining the human mind’s information processing mechanism. This conceptual framework is used (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 999