Likert-scale questions and examined the physical, social and cultural aspects of school safety in order to procure a comprehensive overview of important factors related to safety. The completed surveys were analyzed. The results showed that, the school physical, social, and cultural safety levels were in an acceptable situation. Majority of all students agree or strongly agree that social environment safety (73.2%), cultural environment safety (71.6%) and physical environment safety (65%) levels were
Words: 4302 - Pages: 18
Patient information security has become a major concern, especially with the wide adoption of electronic medical records. Mobile Forensics has been utilized by law enforcement to systematically procure and preserve mobile evidence. However, the adoption of mobile forensics in the healthcare lags behind. The goal of our project is to examine the options and to provide recommendations for adoption and customization of mobile forensics in the healthcare field. An open-ended survey of local healthcare
Words: 4340 - Pages: 18
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009 A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks Dr. G. Padmavathi, Mrs. D. Shanmugapriya, Prof and Head, Dept. of Computer Science, Avinashilingam University for Women, Coimbatore, India, ganapathi.padmavathi@gmail.com Lecturer, Dept. of Information Technology, Avinashilingam University for Women, Coimbatore, India, ds_priyaa@rediffmail.com
Words: 5174 - Pages: 21
planning units in partner ministries to effectively implement and monitor the Plan of Action of the NFP in order to improve food availability, enhance physical, social and economic access to food, and ensure safe and nutritious food. It also aims at expanding and deepening the civil society capacity to conduct high quality research on food security, and to establish an effective platform for dialogue between government policy officials and civil society researchers to better inform the elaboration
Words: 54214 - Pages: 217
Computer and network security has become very important to businesses, government, military, and individuals. Many companies have been compromised and personal information obtained and used without authorization. It is very important to have computer and network security to keep hackers and malware from collecting data and destroying a computer system and network. Computer security protects all of the data that is stored on your computer. Every component should be protected that includes hardware
Words: 1025 - Pages: 5
Society The Abstract Why is there such an issue with obesity in the United States? To determine this there have been many studies in which I will present three if the studies I found in this report, along with my own observation and mailing surveys. Some of the major findings that I noticed that came up over and over are that the serving sizes in most restaurants are too big, TV ads that show fatty foods to influence people to want to try them, and why is fast food being served at schools?
Words: 2697 - Pages: 11
Work stress and job performance Jungwee Park W ork stress is defined as the harmful physical and emotional responses that occur when job requirements do not match the worker’s capabilities, resources, and needs (National Institute of Occupational Safety and Health 1999). It is recognized world-wide as a major challenge to individual mental and physical health, and organizational health (ILO 1986). Stressed workers are also more likely to be unhealthy, poorly motivated, less productive and
Words: 2340 - Pages: 10
Food Security Almost half of the world's population, which exceeds over 3 billion people, struggle to find food. It is apparent that the world is facing many food security problems, this report identifies the meaning of food security and discusses the reasons behind this globally widespread problem; throughout the report a supportive survey results were be used. Food security is not a new expression; however according to the survey 4 out of 10 people are not aware of it, there are numerous definitions
Words: 495 - Pages: 2
classified patients information private. The HIPAA was designed to protect the consumer. The Healthcare Information and Management Systems Society annual survey gave percentages of log sources. Firewall and Application Logs, servers, intrusion detection and network devices each accounting for over 60%. In addition the Storage area network survey notes a 15-20% increase of log data being collect every year due new regulations, increased log sources and inclusion of application logs. All of data that
Words: 1094 - Pages: 5
Proposal, Your College, Project Procurement. Key Terms: access control, biometrics, convenience sampling, customer perceptions, fingerprint identification, in-house research, long-term customer, quantitative research, quota sampling, respondent, security. This research was designed to study the acceptance of fingerprint scanning technology among customers and employees. This project addressed the need for fingerprint scanning technology at Associated Bank to reduce the need for photo identification
Words: 4138 - Pages: 17