Showing 121 - 140 results of 460 for search '"Information management"', query time: 0.03s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124
  5. 125
  6. 126
  7. 127
  8. 128
  9. 129

    Public Librarians’ Needs for in-service Training in Turkey by Şenol Karadeniz, Bülent Yılmaz

    Published 2013-11-01
    “…In the research, 106 librarians, 37 directors / vice di­rectors are exemplifıed out of the total number of 143 graduates of Department of Information Management. The questionnaire was applied to all subjects in Ja- nuary and February 2008. …”
    Get full text
    Article
  10. 130

    Master of Information Science (MIS) by Kabale University

    Published 2022
    “…The main objective of the program is to raise the profile of the profession by producing highly trained professionals who are competent and proficient in matters pertaining to information management.…”
    Get full text
    Other
  11. 131
  12. 132
  13. 133
  14. 134
  15. 135
  16. 136
  17. 137

    Privacy protection system based on Hook for Android by Xiaoyan ZHU, Hui ZHANG, Jianfeng MA

    Published 2018-04-01
    “…A privacy protection system based on Hook technology was designed and implemented to address the problem of user privacy leakage caused by malicious applications in Android.The system consists of three modules:application classification module,privacy information management module and collusion attack management module.The application classification module constructs classification model by using permission feature vectors and then classifies mobile applications into malicious applications and normal applications.The privacy information management module hooks all privacy-related application programming interfaces (API) based on Hook technology and then intercepts malicious applications by returning false data or empty data.The collusion attack management module hooks all inter-application communication channels and then intercepts corresponding communication contents by using the permission rules of collusion attack.Finally,the proposed privacy protection scheme on Android virtual machine was implemented to prove and its feasibility and effectiveness were proved.In addition,the system can intercept application behaviors of breaching privacy in real time with less memory,which does not need to modify Android system and applications.…”
    Get full text
    Article
  18. 138
  19. 139
  20. 140