Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Universities and colleges – Security measures – Zimbabwe“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Universities and colleges – Security measures – Zimbabwe" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Universities and colleges – Security measures – Zimbabwe"
Zhao, Ying. „Applied-Information Technology in the Internet of Things in the Construction of File Security System in Colleges and Universities“. Advanced Materials Research 1014 (Juli 2014): 399–403. http://dx.doi.org/10.4028/www.scientific.net/amr.1014.399.
Der volle Inhalt der QuelleYaokumah, Winfred. „The Influence of Students' Characteristics on Mobile Device Security Measures“. International Journal of Information Systems and Social Change 7, Nr. 3 (Juli 2016): 44–66. http://dx.doi.org/10.4018/ijissc.2016070104.
Der volle Inhalt der QuelleLiu, Yongli, Weifang Zhai und Song Ji. „Research on Campus Network Security Problem and Protection Strategy“. International Journal of Advanced Pervasive and Ubiquitous Computing 9, Nr. 3 (Juli 2017): 15–31. http://dx.doi.org/10.4018/ijapuc.2017070102.
Der volle Inhalt der QuelleSun, Xiu Juan. „Personal Computer Network Security Prevention Research“. Advanced Materials Research 971-973 (Juni 2014): 1684–87. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1684.
Der volle Inhalt der QuellePiscikiene, Inga, Jurate Romeikiene und Brigita Šustickienė. „CYBER VULNERABILITY IN LIGHT OF ONLINE LEARNING REALITY“. SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 5 (28.05.2021): 426–35. http://dx.doi.org/10.17770/sie2021vol5.6367.
Der volle Inhalt der QuelleXie, Jian Hua, und Jian Hua Xiao. „Constructing an University Scientific Research Management Information System of NET Platform“. Applied Mechanics and Materials 441 (Dezember 2013): 984–88. http://dx.doi.org/10.4028/www.scientific.net/amm.441.984.
Der volle Inhalt der QuelleSilumba, Cassim, und Show Chibango. „Online Education in Promoting Continued Education during Coronavirus Outbreak in Zimbabwe: ‘Challenges and Solutions’“. Asian Journal of Interdisciplinary Research 3, Nr. 4 (02.12.2020): 74–88. http://dx.doi.org/10.34256/ajir2047.
Der volle Inhalt der QuelleTatomur, Irina. „UNIVERSITY CYBER SECURITY AS A METHOD FOR ANTI-FISHING FRAUD“. Economic discourse, Nr. 1 (März 2020): 59–67. http://dx.doi.org/10.36742/2410-0919-2020-1-7.
Der volle Inhalt der QuelleMoore, Carolyn, Kathleen Davis und Wanyi Wang. „Low Food Security Present on Texas College Campuses Despite High Nutrition Literacy“. Current Developments in Nutrition 4, Supplement_2 (29.05.2020): 246. http://dx.doi.org/10.1093/cdn/nzaa043_097.
Der volle Inhalt der QuelleZhang, Dong, und Zhongyi Guo. „Mobile Sentry Robot for Laboratory Safety Inspection Based on Machine Vision and Infrared Thermal Imaging Detection“. Security and Communication Networks 2021 (28.04.2021): 1–16. http://dx.doi.org/10.1155/2021/6612438.
Der volle Inhalt der QuelleDissertationen zum Thema "Universities and colleges – Security measures – Zimbabwe"
Viljoen, Stephen. „Applying a framework for IT governance in South African higher education institutions“. Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/416.
Der volle Inhalt der QuelleNcube, Lashias. „Campus policing : an ethnography of the University of Cape Town Campus Control Unit“. Master's thesis, University of Cape Town, 1996. http://hdl.handle.net/11427/17205.
Der volle Inhalt der QuelleThe aim of undertaking the project was to investigate the activities of the University of Cape Town Campus Control unit. The study is based on the premise that there is an underestimation of Campus Control work. A number of basic questions were examined in the field. The researcher sought to determine, among other things, the extent to which the unit's work is invisible, and the extent to which the university community's reported ambivalence and indifference to Campus Control practice a result of a lack of clarity regarding the role of the unit within the university. The research also moved from the premise that there is too great an emphasis on the use of crime statistics as indices of the unit' effectiveness. The racial and gender configuration of assignments was also investigated as was the training offered to new and old recruits. Participant observation as a body of different methods and techniques of research was used. The researcher spent six weeks in the field with the campus control officers in order to experience the demands of policing from "the native's point of view". The unit is in the process of transforming. It seeks to embrace the discourse of community participation with a view to getting the entire community involved in the provision of its own safety and security. The community involvement initiatives are also designed to improve the relationship between the unit and the community. In the past, the relationship has been a very traumatic one, fraught with mistrust and had far-reaching consequences for the unit's performance. The study comes to the conclusion that both women and blacks in Campus Control are a case of structural marginality. The unit does not reflect the racial and gender composition of the community it serves. It was also discovered that some of the unit's glaring shortcomings are played out in the sphere of training. The study should help members of the university community to understand and appreciate the role of this indispensable unit within the university community.
Osburn, Toby W. „Hazard mitigation and disaster preparedness planning at American Coastal University: Seeking the disaster-resistant university“. Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9745/.
Der volle Inhalt der QuelleHall, Dennis H. H. „Impact of the Clery Act: An Examination of the Relationship between Clery Act Data and Recruitment at Private Colleges and Universities“. Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc984250/.
Der volle Inhalt der QuelleTsang, Yuenting. „GIS application in emergency management of terrorism events on the University of North Texas campus“. Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9021/.
Der volle Inhalt der QuelleMurphy, Michael William. „Campus Sexual Assault: How Oregon University System Schools Respond“. PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/281.
Der volle Inhalt der QuelleMaguraushe, Kudakwashe. „Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university“. Thesis, 2021. http://hdl.handle.net/10500/27557.
Der volle Inhalt der QuelleSchool of Computing
Ph. D. (Information Systems)
„Mitigating social media threats towards information security : a case study of two academic institutions“. Thesis, 2015. http://hdl.handle.net/10210/14355.
Der volle Inhalt der QuelleSince the introduction of Web 2.0, there has been an increase in the number of applications that promote the use of user-generated content, support social and collaborative interaction on the Web, and provide engaging user interactions. This together with the continuous increase in internet speed gave rise to the formation of interactive online communication channels, such as Social Media (SM). SM moved from just being a purely social platform to being an integral part of many organisations` business practices. Organisations saw an opportunity through SM to market themselves and interact with customers more efficiently and cost effectively, whist reaching a larger number of potential clients online ...
Jordaan, Ansa. „An information security policy architecture with special reference to a tertiary institution“. Thesis, 2008. http://hdl.handle.net/10210/497.
Der volle Inhalt der Quellevon Solms, S.H., Prof.
Mohlabeng, Moyahabo Rossett. „An investigation of the information security implementation strategies in further education and training colleges in South Africa“. 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001597.
Der volle Inhalt der QuelleThe increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in higher education institutions. Research was undertaken to investigate the implementation of information security strategies in higher education institutions in South Africa. This thesis investigates the following: How will the formulation of an information security strategy improve information security in higher education institutions; in what way should higher education institutions employ information security policies in order to improve information security; and how may the adoption of information security framework create information security awareness among employees in higher education institutions?
Bücher zum Thema "Universities and colleges – Security measures – Zimbabwe"
Thomas, Bacigalupi, Hrsg. Campus security for public and private colleges and universities. 2. Aufl. [Eagan,Minn.]: West, a Thomson Reuters business, 2009.
Den vollen Inhalt der Quelle findenState Council of Higher Education for Virginia. Security on Virginia's campuses: Report of the State Council of Higher Education and the Advisoy Committee for Campus Security to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 1994.
Den vollen Inhalt der Quelle findenWisconsin. Governor's Task Force on Campus Safety. Governor's Task Force on Campus Safety: Final report. Madison, WI: Wisconsin Office of Justice Assistance, 2007.
Den vollen Inhalt der Quelle findenWensyel, James W. Campus public safety and security: With guidance as well for high schools and private secondary schools. Springfield, Ill., U.S.A: Thomas, 1987.
Den vollen Inhalt der Quelle findenNew York (State). Legislature. Senate. Higher Education Committee. Public hearing on college campus safety: Before the New York State Senate Standing Committee on Higher Education. Clifton Park, NY: Candyco Transcription Service, Inc., 2007.
Den vollen Inhalt der Quelle findenCommission, Virginia State Crime. HJR 122 final report: Study on campus safety : report of the Virginia State Crime Commission to the Governor and the General Assembly of Virginia. Richmond, Va: Commonwealth of Virginia, 2006.
Den vollen Inhalt der Quelle findenThe administration of public safety in higher education. Springfield, Ill., U.S.A: C.C. Thomas, 1987.
Den vollen Inhalt der Quelle findenCommission on Accreditation for Law Enforcement Agencies. CALEA standards for campus security agencies: The standards manual for the CALEA Campus Security Accreditation Program. Gainesville, VA: Commission on Accreditation for Law Enforcement Agencies, Inc., 2011., 2011.
Den vollen Inhalt der Quelle findenGao xiao bao mi gong zuo de li lun yu shi jian. Kunming Shi: Yunnan da xue chu ban she, 2009.
Den vollen Inhalt der Quelle findenNew York (State). Legislature. Senate. Higher Education Committee. Public hearing, security on campus. [Albany, NY: New York State Senate Standing Committee on Higher Education, 2007.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Universities and colleges – Security measures – Zimbabwe"
Ran, Deling. „Research on the Development Trend and Protective Measures of Campus Network Security in Colleges and Universities“. In Advances in Intelligent Systems and Computing, 550–58. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15235-2_79.
Der volle Inhalt der QuelleLiu, Yongli, Weifang Zhai und Song Ji. „Research on Campus Network Security Problem and Protection Strategy“. In Research Anthology on Artificial Intelligence Applications in Security, 1352–69. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch060.
Der volle Inhalt der QuelleLiu, Yongli, Weifang Zhai und Song Ji. „Research on Campus Network Security Problem and Protection Strategy“. In Research Anthology on Artificial Intelligence Applications in Security, 1352–69. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch060.
Der volle Inhalt der Quelle