Results 241 to 250 of about 930,993 (302)
Some of the next articles are maybe not open access.
2010
Background checks for computer-related positions of trust and other general job positions are no longer something relegated only to the military and government agencies. Given that insiders commit the majority of serious computer crimes in addition to other white-collar crimes, the need for comprehensive personnel security background checks in 2005 ...
openaire +1 more source
Background checks for computer-related positions of trust and other general job positions are no longer something relegated only to the military and government agencies. Given that insiders commit the majority of serious computer crimes in addition to other white-collar crimes, the need for comprehensive personnel security background checks in 2005 ...
openaire +1 more source
Personnel Security: Personnel Addictive Behavior
Proceedings of the International Scientific-Practical Conference "Ensuring the Stability and Security of Socio-Economic Systems: Overcoming the Threats of the Crisis Space", 2021N. S. Mikhailova +2 more
openaire +1 more source
Railway security personnel scheduling problem considering personnel preferences
Journal of Transportation SecurityThis study discusses the shift scheduling problem of security personnel, considering personnel preferences for 43 stations on four lines of the Ankara metro, which carries more than 10 million passengers monthly. Firstly, 751 security personnel have been distributed to four lines of the Ankara metro according to personnel needs.
Muhammed Abdullah Gencer +3 more
openaire +1 more source
The relevance of the study of personnel security is determined by the beginning of the implementation of the national project "Personnel" in the Russian Federation, which is a key element of the human capital development strategy. In the textbook, from the perspective of understanding the essence of personnel security, which directly reflects both the ...
openaire +1 more source
openaire +1 more source
2015
What does computer security have to do with personnel? Well, security experts are not likely to make simple security mistakes, whereas ordinary staff are. If a social engineer pretends to be system administrator and asks an employee to do some suspicious actions, the security staff will not likely be fooled, but some ordinary staff could.
openaire +1 more source
What does computer security have to do with personnel? Well, security experts are not likely to make simple security mistakes, whereas ordinary staff are. If a social engineer pretends to be system administrator and asks an employee to do some suspicious actions, the security staff will not likely be fooled, but some ordinary staff could.
openaire +1 more source
Social Service Review, 1937
DURING the early months of work of the Division of Technical Training, Bureau of Public Assistance, Social Security Board, certain questions have emerged that seem vital. The immediate situation with reference to public welfare brings into vivid reality the differences in legislative structure existing in the states, varying personnel standards ...
openaire +1 more source
DURING the early months of work of the Division of Technical Training, Bureau of Public Assistance, Social Security Board, certain questions have emerged that seem vital. The immediate situation with reference to public welfare brings into vivid reality the differences in legislative structure existing in the states, varying personnel standards ...
openaire +1 more source
The political and security dimensions of the humanitarian health response to violent conflict
Lancet, The, 2021Eran Bendavid +2 more
exaly
Personnel Psychology and Security
Journal of Political & Military SociologyThe personnel selection based on ethnoreligious factors, with the readoption of Fulani herders, bandits, and unknown shooters into the defense organization, has challenged Nigerian troops’ perceived individual employability, perceived work ability, and fit between person and vocation.
Chiedozie Okafor +4 more
openaire +1 more source

