321 |
Competitive Strategy Analyses for Security Industry - the case of China Steel Security CorpChen, Lien-Pao 09 September 2008 (has links)
ABSTRACT
This research aims to understand the influence of work values on job efficiency through an investigation on the cognitive recognition of work values on private security guards. The main purpose of the research is to understand if personal variables will have a tremendous effect on job performance, and secondly to explore if work values are related to job performance.
This text takes winning steel security company(CSS) as a case study target.Because it is 100% enterprises that the Chinese Steel Corp. invests, the steel female subsidiary is all to keep intact business in the catcher and have efficient scale in operating business.
This text adoption observation method and interview investigate a method, the basis competition strategy model launches to become a questionnaire, and in person interview medium steel security company 18 members, carry on income data analysis research, and according to medium the steel keep intact object and advantage factor of strategy to carry on analysis, with the standpoint of SWOT"the model of the competitive advantage environment" by outside and inside analyze, with the standpoint of "the mode of the resource foundation" by inside and outside analyze, will analysis conclusion sorting explanation, keep intact an industry competition to provide measure to promote to organize the progress of the organization results.
After halting Jing to withdraw from government operated unit, the security company stations in organizations, such as each state-owned company, bank and school...etc. and completely starts to undertake originally the Wei work of halting of public security police, close because of the ability and the police of the concert developed good effect and subsidized the shortage of police strength and stop a crime to contain notable contribution towards guarding against crime.
Key words: Security industry, Strategy of Competition
|
322 |
A RSU-Based Message Authentication Scheme in Vehicular NetworksLiao, Yu-cheng 15 July 2009 (has links)
In the recent years, it comes into more notice for Vehicular Ad-hoc Network (VANET) due to good applications of VANET. For example, those applications include the driving secure and some serviced applications (e.g., loading electric maps, web Service, and so on). The delivered message about driving secure is called the traffic messages, and the delivered message about serviced applications is called the routine message. The traffic message is more important than the routine message. When vehicle is driven on the road and the events are happened (example of accident, or jam), it can broadcast these happened events to notify others on the same road by VANET and let others to earlier get the awareness to avoid the more serious accident or traffic jam. In fact, these traffic messages are related to the life of driver and passengers. Thus, we must pay attention to the correctness of these traffic messages when these messages are sent in VANET, i.e., it will result the serious traffic disorder if these messages are altered or forged by illegal offenders and we don¡¦t permit this situation to occur. Hence, the network security in VANET is the emphasis in this paper.
There are some studies that have proposed some scheme for message authentication in VANET. However, there still exist some imperfections in these schemes (for example, the communication overhead is too heavy). Thus, this thesis proposes two schemes to improve these drawbacks based on some schemes which had been proposed. The first proposed scheme verifies message with the RSU¡¦s aid in the RSU scenario. The second proposed scheme uses the clustering to work a rotation for verifying message for no RSU scenario. The two schemes can efficiently reduce the communication overhead to form an integrity message authentication system.
|
323 |
Managing IT Security In Organizations : A look at Physical and Administrative ControlsAsmah, Gilbert Yaw, Baruwa, Adebola Abdulrafiu January 2005 (has links)
<p>Introduction</p><p>Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control.</p><p>Purpose</p><p>Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls.</p><p>Methods</p><p>When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study.</p><p>Conclusion</p><p>Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.</p>
|
324 |
Security of the mobile devices in VäxjöKommun and corporationKrkusic, Enis January 2009 (has links)
No description available.
|
325 |
Internet-Attacken und SchutzmoeglichkeitenMueller, Thomas 21 June 1995 (has links) (PDF)
Dieser Vortrag befasst sich mit Attacken im Internet.
Es werden Protokolle sowie Mechanismen der Datenuebertragung
betrachtet.
Es werden Schutzmoeglichkeiten und entsprechende Software
afgefuehrt.
|
326 |
CuWITH a curiosity driven robot for office environmental security : a thesis submitted in partial fufilment for the degree of Master of Computer and Information Sciences at Auckland University of Technology, September 20, 2009 /Gordon, Sean William. January 2009 (has links)
Thesis (MCIS - Computer and Information Sciences) -- AUT University, 2009. / Includes bibliographical references. Also held in print (96 leaves ; 30 cm.) in the Archive at the City Campus (T 621.38928 GOR)
|
327 |
Two essays in supplementary commodity taxation /Costa, Carlos Eugênio Ellery Lustosa da. January 2001 (has links)
Thesis (Ph. D.)--University of Chicago, Dept. of Economics, 2001. / Includes bibliographical references. Also available on the Internet.
|
328 |
Making the nation safe in the twenty-first centuryHeck, Brenda L. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Simeral, Robert L. Second Reader: Rollins, John. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: National Security Organization, Federal Bureau of Investigation (FBI), megacommunity, starfish, evolving threats Includes bibliographical references (p. 69-75). Also available in print.
|
329 |
The impact of changes in state identity on alliance cohesion in Northeast AsiaKoo, Boncheul. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Far East, Southeast Asia, Pacific))--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Moltz, James Clay. Second Reader: Knopf, Jeffrey W. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: State Identity, Collective Identity, Alliance, Alliance Cohesion, Constructivism, U.S.-ROK alliance, PRC-DPRK alliance, Common Values. Includes bibliographical references (p. 118-128). Also available in print.
|
330 |
Analysis of the distribution of vaccine using Department of Defense assets versus contracts with private-sector delivery companiesLatta, Jason E. January 2009 (has links) (PDF)
Thesis (M.S. in Management)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Apte, Aruna. Second Reader: Ferrer, Geraldo. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Pandemic Influenza, Vaccine Distribution, Vaccine Distribution with DoD Assets, DoD Pandemic Influenza Response Plan. Includes bibliographical references (p. 63-64). Also available in print.
|
Page generated in 0.0566 seconds