Showing 1 - 20 results of 22 for search 'SECURITIES REGULATIONS', query time: 2.27s Refine Results
  1. 1
    by Hwang, JeeHyun
    Published 2014
    ...<p> Systems such as web applications, database systems, and cloud services regulate users&rsquo...
    Get full text
  2. 2
    by Zambotti, Michael J.
    Published 2017
    ...<p> The purpose of this research project was to analyze the current state of data security...
    Get full text
  3. 3
    by Chowdhury, Omar Haider
    Published 2013
    ... are required to manage and share such information in a manner that conforms to specific privacy regulations (<i...
    Get full text
  4. 4
    by Azhar, Mahmood Javed
    Published 2019
    ... stable on-chip clock generation circuits, on-chip voltage regulation circuits, and Physical unclonable...
    Get full text
  5. 5
    by Merchant, Erin K.
    Published 2018
    ...&rsquo;s ability to effectively regulate their emotions and connect with others. Adoptive parents may...
    Get full text
  6. 6
    by Liberty, Arthur A.
    Published 2015
    ... the EPCRA. In the post-9/11 homeland security environment, knowing of the existence of a hazard plan &ndash...
    Get full text
  7. 7
    by Shirke, Parth P.
    Published 2016
    ...<p>VPN (Virtual Private Network) is a method of providing a secure connection between a source...
    Get full text
  8. 8
    by Harper, Dana C.
    Published 2017
    ...:</i> information sharing, regulations, penalties, safety, security, Professor Paul Pantani.</p>...
    Get full text
  9. 9
  10. 10
    by Jarek, Holly Elaine
    Published 2016
    ... the rules, regulations, and protocols that are currently geriatric focused, develop pediatric long-term care...
    Get full text
  11. 11
    by Hulsey, Amber Lee
    Published 2018
    ... uses the theoretical lens of Human Security as a unique approach in that it is people-centered...
    Get full text
  12. 12
    by Bristol-Faulhammer, Michaela
    Published 2017
    ... within the institutional environment (e.g., tax and social security regulations), lack of human capital...
    Get full text
  13. 13
    by Pelletier, Justin M.
    Published 2017
    ... are decreasingly effective. Some information security economists also suggested that further regulation...
    Get full text
  14. 14
    by Aho, Kelsey B.
    Published 2016
    ... able to manage transboundary challenges to food security. Two case studies, the <i>Polar Bear Agreement...
    Get full text
  15. 15
    by Keck, Andrew G.
    Published 2016
    ...<p> Cyber incidents continue to increase across the entire globe. The increase in security threats...
    Get full text
  16. 16
    by Alpert, Carrie
    Published 2015
    ... secure attachment relationships, cultivating pre-academic skills, and acquiring social-emotional...
    Get full text
  17. 17
    by Kim, Eun
    Published 2015
    ... youth secure and retain successful employment can include the interpersonal skills of better...
    Get full text
  18. 18
    by Javed, Yousra
    Published 2017
    ...<p> Computer security dialogs communicate important information to users. One avenue where...
    Get full text
  19. 19
    by Susral, Bradley
    Published 2017
    ... and is perceived as a great threat to world security, and financial institutions are bound by law to exercise...
    Get full text
  20. 20
    by Blum, Petra S.
    Published 2016
    ..., and objectification served as the primary manner of regulating the women&rsquo;s sexuality within their religious...
    Get full text