Showing 1,921 - 1,940 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 1921
  2. 1922
  3. 1923

    DEMOCRATIC PRINCIPLES AND THE ROLES OF TRADITIONAL POLITICAL INSTITUTIONS IN PROMOTING PEACE AND SECURITY IN NORTHERN NIGERIA: A CASE STUDY OF GOMBE STATE. by AHMED MUSA, BASHIR ABDULLAHI, MOHAMMED AUWAL, UMAR MUHAMMAD JUNGUDO

    Published 2024-06-01
    “… The adoption of Western Democracy after independence has come with a lot of changes to the hitherto roles and powers of traditional political institutions of building peace and security generally inNorthern Nigeria and Gombe in particular. …”
    Get full text
    Article
  4. 1924
  5. 1925

    Risk Assessment Maturity Level of Academic Information System Using ISO 27001 System Security Engineering-Capability Maturity Model by Nurbojatmiko Nurbojatmiko, Qurrotul Aini, Nabil Cahya Wasiqi, Muhammad Fitra Alfajri, Zahra Ulinnuha, Yuni Kurnia Purwati, Indah Kusuma Ayu, Natasya Aurora Yasmin

    Published 2024-06-01
    “…This research aims to determine the current level of Academic Information System (AIS) service by measuring maturity and security risks. Three clauses measure the maturity level of information security controls with the ISO 27001 System Security Engineering-Capability Maturity Model (SSE-CMM). …”
    Get full text
    Article
  6. 1926

    Threats and Challenges to The International Legal Order: Legal Problems Of Ensuring International Security in Modern Conditions (Some Conceptual Conclusions and Conclusions) by O. G. Paramuzova

    Published 2024-01-01
    “…This study is aimed at considering topical international legal problems of ensuring international security in the modern environment of environmental and nuclear law. …”
    Get full text
    Article
  7. 1927
  8. 1928
  9. 1929
  10. 1930
  11. 1931
  12. 1932
  13. 1933
  14. 1934
  15. 1935

    An Extended Interval Type-2 Fuzzy VIKOR Technique with Equitable Linguistic Scales and Z-Numbers for Solving Water Security Problems in Malaysia by Wan Nur Amira Wan Azman, Nurnadiah Zamri, Siti Sabariah Abas, Azimah Ismail, Zamali Tarmudi, Syibrah Naim, Lazim Abdullah

    Published 2023-01-01
    “…The obtained solutions would help decision makers (DMs) identify the best solution to enhance water security projects in terms of finding the best strategies for water supply security in Malaysia.…”
    Get full text
    Article
  16. 1936

    Three Mediating Pathways of Anxiety and Security in the Relationship between Coping Style and Disordered Eating Behaviors among Chinese Female College Students by Wenyue Han, Zheng Zheng, Ning Zhang

    Published 2021-01-01
    “…According to previous studies, eating disorders and disordered eating behaviors are associated with coping style, anxiety, and sense of security. However, the specific mechanism between them has not been elucidated. …”
    Get full text
    Article
  17. 1937
  18. 1938
  19. 1939

    A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques by Lei Chen, Fushan Wei, Chuangui Ma

    Published 2015-04-01
    “…User authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. …”
    Get full text
    Article
  20. 1940