To see the other types of publications on this topic, follow the link: Computer organization.

Journal articles on the topic 'Computer organization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer organization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO, and other styles
2

Vesa, Mikko, Juho Hamari, J. Tuomas Harviainen, and Harald Warmelink. "Computer Games and Organization Studies." Organization Studies 38, no. 2 (September 27, 2016): 273–84. http://dx.doi.org/10.1177/0170840616663242.

Full text
Abstract:
Computer games and organizations are becoming increasingly interwoven in the 21st century. Sophisticated computer games connected by networks are turning into spaces for organizing. Therefore, it may not be surprising that conventional organizations are now scrounging these games for novel ways to enhance efficiency. The result is the formation of game/organization hybrids; uneasy recontextualizations of partly incompatible ideas, values and practices. We begin this essay by elucidating what it is socially that makes something a game by exploring the notion’s anthropological foundations. We then introduce two examples of actual game/organization hybrids; raiding in computer games and gamification in formal organizations. We conclude by discussing the implications of such hybridization and suggest venues for how organization and management scholars can benefit from studying computer games and theories of play.
APA, Harvard, Vancouver, ISO, and other styles
3

Magagnosc, David. "Simulation in computer organization." ACM SIGCSE Bulletin 26, no. 1 (March 12, 1994): 178–82. http://dx.doi.org/10.1145/191033.191100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stojcev, M. "Computer Organization and Architecture." Microelectronics Journal 31, no. 5 (May 2000): 375–76. http://dx.doi.org/10.1016/s0026-2692(99)00155-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vanhala, Erno, Jussi Kasurinen, and Kari Smolander. "Evolution of computer game developer organizations." Journal of Advances in Management Research 12, no. 3 (November 2, 2015): 268–91. http://dx.doi.org/10.1108/jamr-10-2014-0059.

Full text
Abstract:
Purpose – The purpose of this paper is to identify the peculiarity of computer game organizations and their human resources. It presents a stage model including four phases covering the growth from demo group to full business. This study extends the research on how computer game organizations are formed and what it takes them to grow to financially self-sufficient. The study also broadens the understanding of the beginning phase of an organization. Design/methodology/approach – The paper utilizes the grounded theory research method with 34 interview sessions among 11 computer game organizations. The interviewed persons include chief executive officers, designers and developers. Findings – This paper presents empirical findings on what a computer game organization go through when they evolve from demo group phase, which is not discussed in existing literature, to full business. The authors observed that the core team is formed over a game designer and one or more developers. The team fortifies as the organization moves onwards to next phases. At the same time its reliance on partners and outsourcing changes to need based. Research limitations/implications – As this is a qualitative study the observations are directly applicable only in the context of observed organizations. In the other context they are merely suggestions. Practical implications – The study presents concrete growth model that can be utilized when building a computer game organization. Originality/value – This paper illustrates the specialty of computer game organizations and their growth process. It also presents discussion of the beginning phase of organizations.
APA, Harvard, Vancouver, ISO, and other styles
6

Yulchiyev, I. I., Sh Sh Abdullayev, B. J. Ahmadaliyev, and D. Sh Khidirov. "VISUAL ORGANIZATION OF GEOMETRY LESSONS WITH COMPUTER SOFTWARE." International Journal of Pedagogics 02, no. 05 (May 1, 2022): 13–17. http://dx.doi.org/10.37547/ijp/volume02issue05-04.

Full text
Abstract:
Improving the effectiveness of lessons, which are the main organizational part of the educational process, the organization of lessons in the form of demonstrations is one of the most pressing issues of education today. We now live in the 21st century - the age of information technology. Today, the use of information technology in the introduction of pedagogical technologies in the educational process serves to dramatically increase the effectiveness of education. There are several ways in which teaching and learning can be organized. Classes can be organized in the process of organizing with the use of new advanced pedagogical technologies and modern information technologies. In today's world, there is a growing interest in the use of computer graphics in the educational process. The organization of lessons using computer graphics and computer programs in the process of lesson organization creates several conveniences for both the teacher and the student. Geometry lessons by a teacher are given in the articleGeoGebra 3D, MS PowerPoint, When created using computer programs such as Macromedia Flash MX, 3D Maxstudio, Matlab, it is easier for students to understand and master the topic, and in this regard, the teacher can achieve very good results in the meaningful organization of the lesson.
APA, Harvard, Vancouver, ISO, and other styles
7

Michael J. Diacin and Jennifer L. VanSickle. "Computer Program Usage in Sport Organizations and Computer Competencies Desired by Sport Organization Personnel." IJASS(International Journal of Applied Sports Sciences) 26, no. 2 (December 2014): 124–37. http://dx.doi.org/10.24985/ijass.2014.26.2.124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Талипов, Алмамбет, Дамира Тагаева, and Шахсонамхон Эргашева. "ORGANIZATION OF MATHEMATICS LESSONS USING INFORMATION TOOLS." Илимий-маалыматтык журналы 23, no. 6 (2023): 103–8. http://dx.doi.org/10.58494/esai.23(6).2023.19.

Full text
Abstract:
In order to improve the computer literacy of students, the organization of lessons using computer technologies, their impact on the efficiency of counting, memorization, quick work of students, and the development of creative skills are described. Currently, there are no educational institutions that do not use computers and the Internet during the period when digitalization activities are actively carried out in the fields of education in all regions of the Kyrgyz Republic. In this direction, every teacher, student and parent should be aware of information technology. Therefore, it is necessary to make it mandatory to use computer technologies, their types and means in educational processes. The article notes that the use of computer technology in the organization of lessons will undoubtedly increase students’ interest in the subject.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Xuesong, Ken Surendran, and Ming Wang. "A computer organization course project." ACM SIGCSE Bulletin 36, no. 2 (June 2004): 68–71. http://dx.doi.org/10.1145/1024338.1024375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
APA, Harvard, Vancouver, ISO, and other styles
11

Cumming, Alister. "Change, Organization, and Achievement: Teachers' Concerns in Implementing a Computer Learning Environment." Journal of Educational Technology Systems 17, no. 2 (December 1988): 141–63. http://dx.doi.org/10.2190/19pp-58nc-vtjj-vt51.

Full text
Abstract:
The viewpoints of two experienced teachers implementing a novel computer program in their grade five and six classes were documented through biweekly debriefing interviews over the period of one school year. The teachers proved to be fundamentally concerned with three issues: learning to accommodate changes required by this innovation; organizing new, efficient classroom routines around the computers; and seeking indications of students' achievements through their uses of the computers. These three considerations appeared integral to the teachers' senses that they were effectively implementing the computer learning environment in their classrooms.
APA, Harvard, Vancouver, ISO, and other styles
12

Lyu, Bing, Ami Tanaka, and Lin Meng. "Computer-assisted Ancient Documents Re-organization." Procedia Computer Science 202 (2022): 295–300. http://dx.doi.org/10.1016/j.procs.2022.04.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Barnes, Sue, and Leonore M. Greller. "Computer‐mediated communication in the organization." Communication Education 43, no. 2 (April 1994): 129–42. http://dx.doi.org/10.1080/03634529409378970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lorenzen, Torben, Abdul Sattar, and Lee Mondshein. "Tools for computer architecture and organization." ACM Inroads 2, no. 1 (February 25, 2011): 29–30. http://dx.doi.org/10.1145/1929887.1929901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Estrin, Deborah. "Access to inter-organization computer networks." ACM SIGOIS Bulletin 7, no. 2-3 (December 1986): 11–20. http://dx.doi.org/10.1145/15847.15849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Nadi, Najib. "Simulation programs for studying computer organization." ACM SIGCSE Bulletin 28, SI (June 2, 1996): 233. http://dx.doi.org/10.1145/237477.237678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Parkinson, Stanley R., Norwood Sisson, and Kathleen Snowberry. "Organization of broad computer menu displays." International Journal of Man-Machine Studies 23, no. 6 (December 1985): 689–97. http://dx.doi.org/10.1016/s0020-7373(85)80063-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Andreev, A. N., N. K. Yurkov, and A. V. Blinov. "Model for organization of computer teaching." Measurement Techniques 43, no. 8 (August 2000): 675–78. http://dx.doi.org/10.1007/bf02503633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Artamonov, Eugeniy. "Organization of computer-aided design systems." Mathematics and Computers in Simulation 33, no. 4 (December 1991): 275–79. http://dx.doi.org/10.1016/0378-4754(91)90105-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nadi, Najib. "Simulation programs for studying computer organization." ACM SIGCUE Outlook 24, no. 1-3 (January 1996): 233. http://dx.doi.org/10.1145/1013718.237678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Yallamanda, C., and P. Ramaiah Chowdary. "Computer business organization on cloud platform." Journal of Physics: Conference Series 1228 (May 2019): 012029. http://dx.doi.org/10.1088/1742-6596/1228/1/012029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Good, David J., and Robert W. Stone. "Computer technology and the marketing organization." Journal of Business Research 34, no. 3 (November 1995): 197–209. http://dx.doi.org/10.1016/0148-2963(94)00118-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Thompson, Warren. "Marketing Information Systems and Management Information Systems: Education and Training." Journal of Educational Technology Systems 20, no. 2 (December 1991): 143–52. http://dx.doi.org/10.2190/rj6q-car3-8cdf-2ra3.

Full text
Abstract:
Computer education and computer training is becoming more important as technology advances. Human resource specialists will be forced to make crucial decisions that will impact the total organization as more organizations use computer technology. Information is important to the organization. Business executives and managers need to be educated and continuously trained on computer information systems. The benefits from computer education and training outweigh its costs. This is evident by the increasing interest in education and training in business organizations. This article compares and discusses management information systems and marketing information systems and focuses upon the training that is needed for today's managers and executives. It is an attempt to review the major concerns of MKIS and MIS education and training.
APA, Harvard, Vancouver, ISO, and other styles
24

Waguespack, Leslie J. "A structural computer system resource model for teaching computer organization." ACM SIGCSE Bulletin 17, no. 1 (March 1985): 63–67. http://dx.doi.org/10.1145/323275.323289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hugentobler, Hans Kaspar. "Hacking the organization: Organizational Transformation by Design." Design Journal 20, sup1 (July 28, 2017): S522—S530. http://dx.doi.org/10.1080/14606925.2017.1353001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kaiser, Marcus. "Brain architecture: a design for natural computation." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 365, no. 1861 (September 13, 2007): 3033–45. http://dx.doi.org/10.1098/rsta.2007.0007.

Full text
Abstract:
Fifty years ago, John von Neumann compared the architecture of the brain with that of the computers he invented and which are still in use today. In those days, the organization of computers was based on concepts of brain organization. Here, we give an update on current results on the global organization of neural systems. For neural systems, we outline how the spatial and topological architecture of neuronal and cortical networks facilitates robustness against failures, fast processing and balanced network activation. Finally, we discuss mechanisms of self-organization for such architectures. After all, the organization of the brain might again inspire computer architecture.
APA, Harvard, Vancouver, ISO, and other styles
27

Al-Fedaghi, Sabah. "Conceptual Modeling for Computer Organization and Architecture." Journal of Computer Science 17, no. 2 (February 1, 2021): 123–34. http://dx.doi.org/10.3844/jcssp.2021.123.134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

MARTIN, Willy. "On the Dynamic Organization of (Computer) Lexicons." Cahiers de l'Institut de Linguistique de Louvain 17, no. 1 (January 1, 1991): 43–50. http://dx.doi.org/10.2143/cill.17.1.2016695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cornford, James. "Computer Systems Development: History, organization and implementation." European Journal of Information Systems 1, no. 2 (March 1991): 144–45. http://dx.doi.org/10.1057/ejis.1991.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tew, Allison Elliott, Brian Dorn, William D. Leahy, and Mark Guzdial. "Context as Support for Learning Computer Organization." Journal on Educational Resources in Computing 8, no. 3 (October 2008): 1–18. http://dx.doi.org/10.1145/1404935.1404937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Frieze, Carol, and Lenore Blum. "Building an effective computer science student organization." ACM SIGCSE Bulletin 34, no. 2 (June 2002): 74–78. http://dx.doi.org/10.1145/543812.543835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Atamas, Sergei P. "Self-organization in computer simulated selective systems." Biosystems 39, no. 2 (January 1996): 143–51. http://dx.doi.org/10.1016/0303-2647(96)01612-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rein, Gail L., Clyde W. Holsapple, and Andrew B. Whinston. "Computer support of organization design and learning." Journal of Organizational Computing 3, no. 1 (January 1993): 87–120. http://dx.doi.org/10.1080/10919399309540196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Levy, Paul, John Bessant, David Tranfield, Stuart Smith, and Clive Ley. "Organization design implications of computer-integrated technologies." International Journal of Human Factors in Manufacturing 3, no. 2 (April 1993): 169–82. http://dx.doi.org/10.1002/hfm.4530030206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Radivojevic, Zaharije, Zarko Stanisavljevic, and Marija Punt. "Configurable simulator for computer architecture and organization." Computer Applications in Engineering Education 26, no. 5 (July 23, 2018): 1711–24. http://dx.doi.org/10.1002/cae.22034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Iip Yulianto Windra. "Simulasi Perancangan Infrastruktur Jaringan Komputer Pada Institut Teknologi Keling Kumang Menggunakan Pendekatan Network Development Life Cycle (NDLC)." Hunatech 1, no. 2 (October 21, 2022): 39–54. http://dx.doi.org/10.59967/hunatech.v1i2.24.

Full text
Abstract:
At this time, the development of information technology is growing very quickly, so the information needed is very easy to obtain via smartphones, laptops or computers connected to the internet. To support information technology, so that it can be used by the community or organization, a good computer network infrastructure is needed. The Keling Kumang Institute of Technology (ITKK) is a newly established university and will continue to grow, requiring computer network infrastructure that is in accordance with ITKK needs so that work in each field is more effective and efficient. In this study, using the Network Development Life Cycle (NDLC) method that can be used in designing computer network infrastructure that is in line with the organization's business processes. The application used for computer network infrastructure simulation in this study is GNS3.
APA, Harvard, Vancouver, ISO, and other styles
37

Seshadri, T. V., and N. Kinra. "Marketing a Computer System: Implications of the Buyers' Decision Processes." Vikalpa: The Journal for Decision Makers 13, no. 1 (January 1988): 25–32. http://dx.doi.org/10.1177/0256090919880104.

Full text
Abstract:
Who, in the organization, buys the computer system? How are various departments involved in the organizational decision process? T V Seshadri and N Kinra analyse the decision processes of 30 organizations that had bought a computer system—mini, mainframe, or macro. Based on a questionnaire study and factor analysis, the authors conclude that the EDP department and Board of Directors are critical in the buying grids of the purchasing organizations. They draw implications of their findings for managers marketing computer systems.
APA, Harvard, Vancouver, ISO, and other styles
38

Wheeler, Thomas L. "Organization Security Metrics: Can Organizations Protect Themselves?" Information Security Journal: A Global Perspective 17, no. 5-6 (December 5, 2008): 228–42. http://dx.doi.org/10.1080/19393550802541200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Xie, Linjiang, Zhouyuan Liao, and Hanruo Li. "Research and Design of an Automated Security Event Analysis and Handling Framework Based on Threat Intelligence." Scalable Computing: Practice and Experience 25, no. 3 (April 12, 2024): 1872–81. http://dx.doi.org/10.12694/scpe.v25i3.2779.

Full text
Abstract:
In order to deeply explore and utilize the value of threat intelligence, strengthen research on attack organizations, and grasp the correlation between attack organizations, the author proposes the research and design of an automated security event analysis and handling framework based on threat intelligence. The author extracts the behavioral characteristics of the attack organization based on known APT attacks, and uses the machine learning framework Light GBM to establish a multi classification model to complete the analysis of unknown APT attack organizations. Through the study of multi-dimensional analysis of multi-source threat intelligence, attack organization correlation and judgment, an attack organization correlation and judgment system has been designed and implemented. The system includes six modules: threat intelligence collection module, threat intelligence multi-dimensional analysis module, attack organization fingerprint library module, attack organization correlation module, attack organization analysis module, and user module, providing attack organization correlation and judgment services for network security. The test results show that the intelligence reading and search query function can achieve the reading of various information of attack organizations, and achieve visual display of threat intelligence. The intelligence management function can achieve operations such as adding, deleting, and updating intelligence. The user management function of the system can achieve the management of administrator users and ordinary users. After testing, all functions of the system have been implemented and meet expectations.
APA, Harvard, Vancouver, ISO, and other styles
40

Saleh, Mohamed Munser. "A Review of Security Threats by The Unauthorized in The E-Learning." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (August 11, 2015): 6240–43. http://dx.doi.org/10.24297/ijct.v14i11.1808.

Full text
Abstract:
Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials. In today's focused world, each Organization is endeavoring to enhance its proficiency and guarantee the nature of data asset. Computer networking technologies - intranet, web - have progressed to the point where data can be put away, transmitted, and available to people accessing the resource anytime and from anywhere. These advantages additionally push organizations into executing web based innovation without considering the security dangers that this involves.
APA, Harvard, Vancouver, ISO, and other styles
41

Bakhrombekovna, Djuraeva Ra'no. "Organization of computer monitoring in assessing student knowledge of a computer system." ACADEMICIA: An International Multidisciplinary Research Journal 10, no. 6 (2020): 532. http://dx.doi.org/10.5958/2249-7137.2020.00535.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

SUSANTO, YULIUS KURNIA, and RATIH HANDAYANI. "INTENSITAS ANCAMAN KEAMANAN SISTEM INFORMASI AKUNTANSI KOMPUTERISASIAN." Jurnal Bisnis dan Akuntansi 10, no. 3 (April 19, 2018): 113–26. http://dx.doi.org/10.34208/jba.v10i3.223.

Full text
Abstract:
The objective of the paper was (1) there are significant security threats of CAIS on the organization types, (2) there is difference among the organization types regarding the security threats of CAIS, (3) there are difference between integration-on line and integration-manual CAIS regarding the security threats of CAIS. Eighty four respondents from Jakarta organizations had participated in this research. The collecting data used a questionnaire survey via electronicmail and post. Data were analyzed using a Kruskal-Wallis test. The resultsshowed that first there is significant security threats of CAIS in Jakarta Organizations, like that the accidental entry of bad data, accidental destruction of data, employees’ sharing of passwords and introduction of computer viruses the to CAIS are the significant security threats of CAIS in Jakarta Organizations. Second, there is no difference among the organization types regarding the security threats of CAIS. Third, there is no difference between integration-on line and integration-manual CAIS regarding the security threats of CAIS. But, there is difference between integration-on line and integration-manual CAIS regarding introduction of computer viruses to the CAIS.
APA, Harvard, Vancouver, ISO, and other styles
43

Hoogendoorn, Mark, Catholijn M. Jonker, Martijn C. Schut, and Jan Treur. "Modeling centralized organization of organizational change." Computational and Mathematical Organization Theory 13, no. 2 (September 1, 2006): 147–84. http://dx.doi.org/10.1007/s10588-006-9004-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Crable, Elaine A., James D. Brodzinski, Robert F. Scherer, and Phillip D. Jones. "The Impact of Cognitive Appraisal, Locus of Control, and Level of Exposure on the Computer Anxiety of Novice Computer Users." Journal of Educational Computing Research 10, no. 4 (June 1994): 329–40. http://dx.doi.org/10.2190/k2yh-mmjv-gbbl-yttu.

Full text
Abstract:
With the mass introduction of computers in the workplace researchers have spent considerable time, over the last two decades, investigating methods to effectively integrate this technology into the daily routines of employees at all levels within the organization [1–3]. An exogenous variable, and precursor to introduction of computers, is computer anxiety [4–6]. Computer anxiety is generally defined as an anxious response by the individual to the anticipated or actual contact with computers [7]. This article examined the relationship of cognitive appraisal, locus of control, prior exposure, and computer anxiety. It was hypothesized that an individual's appraisal of a computing situation, whether the person was internally or externally focused, and their prior experience with computers would affect their level of computer anxiety as measured by the Computer Concerns Questionnaire. A stepwise multiple regression was performed and the results indicated that cognitive appraisal and exposure were significant predictors of computer anxiety. The authors conclude that early assessments of a novice user's appraisal of the situation should be used to tailor training programs to the specific individual's needs.
APA, Harvard, Vancouver, ISO, and other styles
45

Hristov, Hristo, Petar Boyanov, and Tihomir Trifonov. "APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES." Journal scientific and applied research 5, no. 1 (May 5, 2014): 101–7. http://dx.doi.org/10.46687/jsar.v5i1.115.

Full text
Abstract:
Essential component of organizing stage of the counteraction for the en-croachment against the business organization is to identify vulnerabilities of the social organization. The purpose of this stage is to identify all existing and potential weaknesses and disadvantages of the security system of the organization, creating a circumstance for adversely effects on the sources of threat.
APA, Harvard, Vancouver, ISO, and other styles
46

Kleshchev, A. S., and S. V. Smagin. "Organization of computer experiments on inductive knowledge discovery." Automatic Documentation and Mathematical Linguistics 42, no. 1 (February 2008): 17–26. http://dx.doi.org/10.3103/s0005105508010032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, P. M. "An Automated Feedback System for Computer Organization Projects." IEEE Transactions on Education 47, no. 2 (May 2004): 232–40. http://dx.doi.org/10.1109/te.2004.825220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Aronson, Jay E., and Gary Klein. "A Clustering Algorithm for Computer-Assisted Process Organization." Decision Sciences 20, no. 4 (December 1989): 730–45. http://dx.doi.org/10.1111/j.1540-5915.1989.tb01416.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Scragg, Greg W. "Most computer organization courses are built upside down." ACM SIGCSE Bulletin 23, no. 1 (March 1991): 341–46. http://dx.doi.org/10.1145/107005.107079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Fekete, Alan. "Enhancing generic skills in the computer organization course." ACM SIGCSE Bulletin 27, no. 1 (March 15, 1995): 273–77. http://dx.doi.org/10.1145/199691.199817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography