搜索结果: 1-15 共查到“管理学 Security”相关记录50条 . 查询时间(0.468 秒)
2017“质量管理、运输、信息安全、信息技术”国际会议(2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS))
2017 质量管理 运输 信息安全 信息技术 国际会议
2017/8/30
We invite you to participate in the International conference «Quality Management, Transport and Information Security, Information Technologies» (IT&QM&IS-2016). The conference will take plac...
Tim Close has found himself, happily, stuck in a library. But it’s not your typical library with shelves and books. It’s a genetic library of cowpea varieties, also known as black-eyed peas. This gene...
How Do Unemployment Insurance Benefi ts Affect the Decision to Apply for Social Security Disability Insurance?
Social Security Disability Unemployment Insurance Benefi
2016/3/2
This paper examines whether Unemployment Insurance (UI) benefi ts affect
the decision to apply for Social Security Disability Insurance (DI). Using
data from the Survey of Income and Bene...
Direct and Indirect Effects of Malawi’s Public Works Program on Food Security
Food Security agricultural inputs
2015/9/18
Labor-intensive public works programs (PWPs) are an important social protection
tool in low-income settings, intended to supplement income of poor households and improve
public infrastructure. The M...
Security Constrained Optimal Power Flow via Proximal Message Passing
Constrained Optimal Power Flow Proximal Message Passing
2015/7/9
In this paper, we propose a distributed algorithm to solve the Security Constrained Optimal Power Flow (SC-OPF) Problem. We consider a network of devices, each with its own dynamic constraints and obj...
Efficient Monte Carlo Simulation of Security Prices
Efficient Monte Carlo Simulation Security Prices
2015/7/8
This paper provides an asymptotically efficient algorithm for the allocation of computing resources to the problem of Monte Carlo integration of continuous-time security prices. The tradeoff between i...
Conservation Officers: A Force Multiplier for Homeland Security
intelligence led policing threat prevention biological terrorism
2014/11/27
Today's law enforcement officers—both conservation and police—find themselves adapting to an emerging and dynamic threat environment. Policies and practices aimed at the prevention of threats have foc...
In the wake of a series of tragic events impacting public health in the United States, the Department of Health and Human Services Centers for Disease Control and Prevention and the Department of Home...
Haryana Industrial Security Services
Haryana Industrial Security Services protecting Persononel and Property
2014/4/3
Ours is one of the leading professional organizations which is totally integrated and is a dependable security service provider. We specialize in protecting Persononel and Property in a wide variety o...
Biofuel development,food security and the use of marginal land in China
Bioethanol Development Food Security Marginal Lands China
2014/3/12
With concerns of energy shortages, China, like the US, EU and other countries, is promoting the development of biofuels. However, China also faces high future demand for food and feed, and so its bioe...
A University of Queensland researcher has warned that refugee women and children face increased risks under the Federal Government’s policy of sending asylum seekers to Nauru and Papua New Guinea.
The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux
R Security Linux Sandbox AppArmor
2013/5/2
With the increasing availability of public cloud computing facilities and scientific super computers, there is a great potential for making R available through public or shared resources. This allows ...
Managing Social Security Data in the Web 2.0 Era
Human Resource Management Social Security Data Management Information System
2013/2/23
Social security data management is an important topic both in application of information management and in social security management. In the Web 2.0 era, more and more human information and healthcar...
Privacy Accountability Model and Policy for Security Organizations
Privacy Data Protection Accountability Regulation Self-Regulation Privacy by Design PATS Project
2013/2/23
This paper describes a new model of privacy accountability and associates its dimensions with elements of the proposed European Commission regulation on the protection of individuals with regard to th...
USER PARTICIPATION IN INFORMATION SYSTEMS SECURITY RISK MANAGEMENT
Information security Sarbanes-Oxley Act security risk management user participation
2011/10/15
This paper examines user participation in information systems security risk management and its influence in the context of regulatory compliance via a multi-method study at the organizational level. F...