Filtry
wszystkich: 1255
-
Katalog
- Publikacje 889 wyników po odfiltrowaniu
- Czasopisma 119 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 51 wyników po odfiltrowaniu
- Wynalazki 5 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Kursy Online 34 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 63 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: JOB SECURITY
-
Organizational Conditioning of Job Satisfaction. A Model of Job Satisfaction
Publikacja -
Modelling AOB-NOB competition in shortcut nitrification compared with conventional nitrification-denitrification process
PublikacjaIn particular, mainstream deammonification and/or shortened nitrificationdenitrification via nitrite (so-called “nitrite shunt”) is a promising new treatment concept that has the potential to revolutionise how nitrogen removal is achieved at WWTPs. Understanding the role of the AOB/NOB competition in the nitrogen cycle in wastewater treatment systems will change operational strategies of the novel nitrogen removal processes. The...
-
Job-related emotions and job burnout among civil servants: examining the shape of the relationship in cross-sectional and longitudinal models
PublikacjaWstęp: Związek pozytywności, czyli proporcji między pozytywnymi a negatywnymi emocjami, z wypaleniem zawodowym może przybierać kształt krzywoliniowy. Ponadto z perspektywy teoretycznej jest to relacja przyczynowo - skutkowa, w której pozytywność jest proksymalnym, a wypalenie – dystalnym wymiarem dobrostanu zawodowego. Dotychczasowe badania były jednak prowadzone najczęściej w planie poprzecznym i testowały relacje prostoliniowe....
-
Job satisfaction in the multicultural environment of multinational corporations
PublikacjaPurpose – Since prior research into the effects of multiculturalism on job satisfaction in multinational corporations (MNCs) is rather scant and inconclusive, the authors attempt to review the literature and explain why these results are inconsistent as well as propose a new model aimed at responding to these irregularities. Design/methodology/approach – In the narrative review of the prior research and the proposed model the...
-
THRIVING AND JOB SATISFACTION IN MULTICULTURAL ENVIRONMENTS OF MNCS
PublikacjaPurpose of the article The aim of the paper is to analyze the relationship between thriving and job satisfaction in multicultural environments of multinational corporations (MNCs). Methodology/methods The quantitative cross-sectional study was conducted on the sample of 128 individuals from subsidiaries of various MNCs located in Poland involved in intercultural interactions. Scientific aim The aim of this study was to examine...
-
Web Based Application for Probability Job Scheduling
Publikacja -
EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY
Publikacja -
On UMTS security.
PublikacjaW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
Gender and Job Satisfaction of Information Technology Professionals in Poland
Publikacja -
Internal Security
Czasopisma -
Development of Strategies for AOB and NOB Competition Supported by Mathematical Modeling in Terms of Successful Deammonification Implementation for Energy-Efficient WWTPs
PublikacjaNovel technologies such as partial nitritation (PN) and partial denitritation (PDN) could be combined with the anammox-based process in order to alleviate energy input. The former combination, also noted as deammonification, has been intensively studied in a frame of lab and full-scale wastewater treatment in order to optimize operational costs and process efficiency. For the deammonification process, key functional microbes include...
-
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
JOB SATISFACTION OF IT PROFESSIONALS IN POLAND: DOES BUSINESS COMPETENCE MATTER?
Publikacja -
Approximation algorithms for job scheduling with block-type conflict graphs
PublikacjaThe problem of scheduling jobs on parallel machines (identical, uniform, or unrelated), under incompatibility relation modeled as a block graph, under the makespan optimality criterion, is considered in this paper. No two jobs that are in the relation (equivalently in the same block) may be scheduled on the same machine in this model. The presented model stems from a well-established line of research combining scheduling theory...
-
Security and knowledge management
PublikacjaOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Security of Web Services
PublikacjaArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Freelance technical writing application for a job which I did not get.
PublikacjaIn this essay I am going to explore the different ways in which developments in engineering technology and materials science have improved the quality of learning and at the same time somewhat diminished students innate intellectual ability which came as the result of what we know as A.I. According to wikipedia.org the word "education" comes from the conjunction of a Latin words "I lead" or "duco" meaning "I...
-
Positivity and job burnout in emergency personnel: examining linear and curvilinear relationship
PublikacjaThe aim of this study was to examine whether the relationship between the ratio of job-related positive to negative emotions (positivity ratio) and job burnout is best described as linear or curvilinear. Participants were 89 police officers (12% women) and 86 firefighters. The positivity ratio was evaluated using the Job-related Affective Wellbeing Scale (Van Katwyk, Fox, Spector, & Kelloway, 2000). Exhaustion and disengagement,...
-
Work Values of Police Officers and Their Relationship With Job Burnout and Work Engagement
PublikacjaValues represent people’s highest priorities and are cognitive representations of basic motivations. Past research shows that levels of both aspects of job-related well-being, job burnout and work engagement, are related to work values. The policing profession is associated with high engagement and a risk of burnout. There is a gap in the literature regarding the hierarchy of work values in police officers, how work values are...
-
Knowledge Sharing and Organizational Culture Dimensions: Does Job Satisfaction Matter?
PublikacjaThe aim of this study is to examine how job satisfaction influences the relationship between company performance, knowledge sharing, and organizational culture, perceived through the prism of Hofstede’s cultural dimensions, controlled by company size and staff position. A survey of 910 Polish employees (mainly knowledge workers) with different roles and experiences across different industries was conducted. The data were analyzed...
-
Security ontology construction and integration
PublikacjaThere are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...
-
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Security Mechanisms in the Comcute System
PublikacjaThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Extendable Safety and Security Ontology
PublikacjaSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Areas of research in maritime security
PublikacjaW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Ukraine’s Energy Security in Strategies
PublikacjaDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Plant Biotechnology in Food Security
Publikacja -
The EU's Cyber Security Strategy
Publikacja -
External Security Strategies of Belarus
PublikacjaUnder President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...
-
On some aspects of maritime security
PublikacjaZostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach
-
Psychometric properties of the polish version of the job-related affective well-being scale
PublikacjaObjectives: The aim of this study was to verify psychometric properties of the Polish version of the Job-related Affective Well-being Scale (JAWS). Specifically, theoretical 4-factor structure (based on the dimensions of pleasure and arousal) and reliability of the original – 20-item JAWS (van Katwyk et al., 2000) and the shortened – 12-item (Schaufeli and Van Rhenen, 2006) versions were tested. Material and Methods: Two independent...
-
Perceived supervisor support as a relevant factor for subordinates’ job satisfaction – model verification
Publikacja -
The influence of IT-competency dimensions on job satisfaction, knowledge sharing and performance across industries
PublikacjaPurpose – Technology makes knowledge management easier. Knowledge sharing is essential for organizational development. Job satisfaction fosters knowledge sharing. Hence, this study aims to develop an understanding of the mutual relationship between knowledge sharing and job satisfaction when both are predicted by information technology (IT)-competency dimensions such as IT-operations, IT-knowledge and IT-infrastructure in the context...
-
The Mediation Function of Job Satisfaction's between Organizational Culture Dimensions and Knowledge Sharing
PublikacjaIt is commonly acknowledged that organizational culture is a valuable element of intellectual capital and as a hidden source of competitive advantage can considerably affect the achieving of strategic business goals. The axiological dimension of organizational culture is mostly identified with a set of shared assumptions and values, while work practices mainly define its behavioral dimension. Both these dimensions influence, among...
-
AoB Plants
Czasopisma -
AJOB Neuroscience
Czasopisma -
JOR Spine
Czasopisma -
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Cost assessment of computer security activities
PublikacjaComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
An integrated method for security protocols analysis
Publikacja -
An integrated framework for security protocol analysis
PublikacjaAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
Automatic sound recognition for security purposes
PublikacjaIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Architecture supporting security of agent systems
PublikacjaW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Resilience and Security in Software Defined Networking
PublikacjaThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...