Results for 'Teaching, Information Security'

1000+ found
Order:
  1. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  2. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  3. Practicum Handbook. General Ed., Version 6. --.Walter Maner & National Information and Resource Center for the Teaching of Philosophy - 1978 - Published for the National Information and Resource Center for the Teaching of Philosophy by the Philosophy Documentation Center, Bowling Green State University.
    No categories
     
    Export citation  
     
    Bookmark  
  4. Teaching Philosophy Today. Edited by Terrell Ward Bynum and Sidney Reisberg. --.Terrell Ward Bynum, Sidney Reisberg & National Information and Resource Center for the Teaching of Philosophy - 1977 - The National Information and Resource Center for the Teaching of Philosophy, by the Philosophy Documentation Center.
    No categories
     
    Export citation  
     
    Bookmark  
  5. Part III. An emerging America.. Emerging technology and America's economy / excerpt: from "How will machine learning transform the labor market?" by Erik Brynjolfsson, Daniel Rock, and Prasanna Tambe ; Emerging technology and America's national security.Excerpt: From "Information: The New Pacific Coin of the Realm" by Admiral Gary Roughead, Emelia Spencer Probasco & Ralph Semmel - 2020 - In George P. Shultz (ed.), A hinge of history: governance in an emerging new world. Stanford, California: Hoover Institution Press, Stanford University.
     
    Export citation  
     
    Bookmark  
  6.  25
    Teaching & Learning Guide for: Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):152-157.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and informed (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. Information Security Culture in Russian ICT Small and Medium Size Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2013 - Iris 34.
    No categories
     
    Export citation  
     
    Bookmark  
  8. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  9.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Utilization of Scholarly Journal Articles in the Teaching and Learning of Teacher Education Courses.Derren Gaylo, Manuel Caingcoy & Daisy Mugot - 2020 - Balkan and Near Eastern Journal of Social Sciences 6 (3):59-66.
    The usage of scholarly journal articles in the academe is now gaining attention to cope with the ever dynamic and evolving teaching and learning processes. However, the use implies possible potential usage only because what is measured is the number of views and downloads of the articles. This paper explored how the teacher education faculty and students utilized scholarly journal articles in the teaching and learning of professional education courses. The study also determined the challenges in using these primary sources (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  14
    Academic Information Security Researchers: Hackers or Specialists?Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (2):785-790.
    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  14
    Do You Ignore Information Security in Your Journal Website?Mehdi Dadkhah, Glenn Borchardt & Mohammad Lagzian - 2017 - Science and Engineering Ethics 23 (4):1227-1231.
    Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  78
    Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
    This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  92
    Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15. Teaching Information Ethics.Miguel Alvarez - 2010 - International Review of Information Ethics 14:23-28.
    The emergence of social networking is closely related with the new technologies improving user interface experience thus making the interaction between users more natural and intuitive. Before, the first online communities of interest were user lists and asynchronous discussion groups resembling more the form of mass mailings than informal discussions in a cafe or in a classroom. The impact of web 2.0 on scientific practices has become evident in establishing more and more epistemic communities as virtual communities and vice versa. (...)
    No categories
     
    Export citation  
     
    Bookmark  
  16.  41
    Teaching Information Ethics.Elizabeth Buchanan, Dennis Ocholla, Rafael Capurro, Johannes Britz, Thomas Hausmanninger, Michael Nagenborg, Makoto Nakada & Felix Weil - 2010 - International Review of Information Ethics 14:12.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  50
    Information security in cross-enterprise collaborative knowledge work.Ann Majchrzak & Sirkka L. Jarvenpaa - 2004 - Emergence: Complexity and Organization 6 (4).
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Teaching Information Ethics in an iSchool.David J. Saab - 2010 - International Review of Information Ethics 14:12.
    The iSchool movement is an academic endeavor focusing on the information sciences and characterized by a number of features: concern with society-wide information problems, flexibility and adaptability of curricula, repositioning of research towards interdisciplinary and multidisciplinary exchange . Teaching information ethics in an iSchool would seem to be a requisite for students who will have an enormous impact on the information technologies that increasingly permeate our lives. The case for studying ethics in a college of (...) science and technology, as opposed to the liberal arts and humanities, has been regarded only marginally, however. In this paper I explore how I developed and delivered an information ethics course, paying attention to student receptivity and learning, course structure and assignments, as well as its connection to the wider curriculum and its efficacy. (shrink)
     
    Export citation  
     
    Bookmark   1 citation  
  19. Information Security Culture in Russian ICT Small and Medium Size Enterprises.Hannakaisa Isomäki & Oleksandr Bilozerov - 2013 - Iris 34.
    No categories
     
    Export citation  
     
    Bookmark  
  20. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki & Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  21.  45
    Ruth's Resolve: What Jesus' Great-Grandmother May Teach about Bioethics and Care.Amy Laura Hall - 2005 - Christian Bioethics 11 (1):35-50.
    When thinking about the intersection of care and Christian bioethics, it is helpful to follow closely the account of Ruth, who turned away from security and walked alongside her grieving mother-in-law to Bethlehem. Remembering Ruth may help one to heed Professor Kaveny?s summoning of Christians to remember ?the Order of Widows? and the church?s historic calling to bring ?the almanahinto its center rather than pushing her to its margins.? Disabled, elderly and terminally ill people often seem, at least implicitly, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Chapter 9. Information Security in the Structure of the Security Complex.Сергій СТАВЧЕНКО - 2024 - Epistemological studies in Philosophy, Social and Political Sciences 1 (1):259-280.
    The essence of the security complex is revealed. Approaches to understanding the essence of information security are determined, in particular, as a state of security, as a type of public information legal relations, the direction of information relations within the limits of information legislation, the state of information (information environment of society, information development). The informational component of national security is considered. The institutional landscape of information security (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  18
    Teaching informal logic and critical thinking.Jan Sobocan - 2003 - OSSA 5.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  6
    Teaching Informal Logic as an Emancipatory Activity.William Maker - 1983 - Informal Logic 5 (1).
  25.  60
    Critical Theory as an Approach to the Ethics of Information Security.Bernd Carsten Stahl, Neil F. Doherty, Mark Shaw & Helge Janicke - 2014 - Science and Engineering Ethics 20 (3):675-699.
    Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  26.  27
    On teaching information.Roy Gladstone - forthcoming - Journal of Thought.
  27.  23
    Semantic Information and Information Security : Definitional Issues.Björn Lundgren - unknown
    This licentiate thesis consist of two separate research papers which concern two tangential topics – that of semantic information and that of information security. Both topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I – concerning the concept of information, and a semantic conception thereof – the conceptual, and definitional, issues focus on one property, that of truthfulness. It is argued – against the veridicality thesis – that (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  7
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  6
    Developing a theory-based information security management framework for human service organizations.Sameera Mubarak - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):254-271.
    Purpose This paper aims to identify organizations’ information security issues and to explore dynamic, organizational culture and contingency theories to develop an implementable framework for information security systems in human service organizations based soundly in theory and practice. Design/methodology/approach The paper includes a critical review of global information security management issues for HSOs and relevant multi-disciplinary organizational theories to address them. Findings Effective information security management can be particularly challenging to HSO because (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  27
    Innovations and Challenges in Teaching Information Ethics Across Educa-tional Contexts.Michael Zimmer - 2010 - International Review of Information Ethics 14:12.
    Renewed attention to integrating information ethics within graduate library and information science programs has forced LIS educators to ensure that future information professionals - and the users they interact with - participate appropriately and ethically in our contemporary information society. Along with focusing on graduate LIS curricula, information ethics must become infused in multiple and varied educational contexts, ranging from elementary and secondary education, technical degrees and undergraduate programs, public libraries, through popular media, and within (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  9
    A Critical Evaluation of Information Security Risks Associated with Networked Information Systems: A Case Study of Beitbridge Town Council.Newten Mujena - unknown
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  22
    Control mechanisms in information security: a principal agent perspective.Tejaswini Herath & H. Raghav Rao - 2010 - International Journal of Business Governance and Ethics 5 (1/2):2.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  16
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  22
    CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices.Andrea M. Matwyshyn - 2009 - Journal of Business Ethics 88 (S4):579 - 594.
    Relying heavily on Thomas Dunfee's work, this article conducts an in-depth analysis of the relationship between law and business ethics in the context of corporate information security. It debunks the two dominant arguments against corporate investment in information security and explains why socially responsible corporate conduct necessitates strong information security practices. This article argues that companies have ethical obligations to improve information security arising out of a duty to avoid knowingly causing harm (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  61
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  19
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  37. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  11
    Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties.Rebecca Slayton - 2021 - Science, Technology, and Human Values 46 (1):81-111.
    Information security governance has become an elusive goal and a murky concept. This paper problematizes both information security governance and the broader concept of governance. What does it mean to govern information security, or for that matter, anything? Why have information technologies proven difficult to govern? And what assurances can governance provide for the billions of people who rely on information technologies every day? Drawing together several distinct bodies of literature—including multiple strands (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  10
    Risk management in digitalized educational environments: Teachers’ information security awareness levels.Hamza Fatih Sapanca & Sezer Kanbul - 2022 - Frontiers in Psychology 13.
    With the spread of Information and Communication Technologies tools and the Internet, Twenty first century technologies have significantly affected human life, and it has been desired to be obtained continuously. It has become challenging to protect information due to the increase in the methods by which malicious people can get information. As a result, it is crucial to determine people’s awareness levels by revealing the risks and threats to information security. In this context, a study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  25
    Organizational Repertoires and Rites in Health Information Security.Ted Cooper, Jeff Collmann & Henry Neidermeier - 2008 - Cambridge Quarterly of Healthcare Ethics 17 (4):441-452.
    The privacy and security rules of the Health Insurance Portability and Accountability Act of 1996 emphasize taking steps for protecting protected health information from unauthorized access and modification. Nonetheless, even organizations highly skilled in data security that comply with regulations and all good practices will suffer and must respond to breaches. This paper reports on a case study in responding to an important breach of the confidentiality and integrity of identifiable patient information of the Kaiser Internet (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  41.  5
    Critical Thinking as a Component of Information Security.Viktoriia Melnychuk & Lyudmyla Horokhova - forthcoming - Visnyk of the Lviv University Series Philosophical Sciences.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. A chaos-based robust software watermarking, information security practice and experience.Liu Fenlin, Lu Bin & Luo Xiangyang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3903--355.
     
    Export citation  
     
    Bookmark  
  43.  15
    The limits of Higher Education Institutions' websites as sources of learning and teaching information for prospective students: a survey of professional staff.Namrata Rao & Anesa Hosein - 2017 - Perspectives: Policy and Practice in Higher Education 21 (1):4-10.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  11
    Openness in Distance: Introductory Remarks on Academic Teaching Informed by Bracha L. Ettinger’s Matrixial Theory.Anna Kisiel - 2022 - Studies in Philosophy and Education 41 (5):497-509.
    This article aims at introducing the matrixial theory of Bracha L. Ettinger to the field of academic teaching. As it intends to prove, feminist pedagogy would benefit from a matrix-informed approach to teaching, especially in the times of social distancing imposed by the COVID-19 pandemic. Since of all student groups it is the university students who have been most directly affected by precarity and employment instability, they seem to be in an urgent need of openness, compassion, and understanding; the matrixial (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  8
    Teaching Analysis: Informed Consent: A Case for Multi‐Disciplinary Teaching: Informed Consent for Clinical Treatment: A Psychologist Speaks for Patients.Valerie J. Grant - 1996 - Health Care Analysis 4 (1):76-79.
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  35
    Teaching Energy Informed by the History and Epistemology of the Concept with Implications for Teacher Education.Manuel Bächtold & Muriel Guedj - 2014 - In Michael R. Matthews (ed.), International Handbook of Research in History, Philosophy and Science Teaching. Springer. pp. 211-243.
    In this article, we put forward a new strategy for teaching the concept of energy. In the first section, we discuss how the concept is currently treated in educational programmes at primary and secondary level (taking the case of France), the learning difficulties that arise as well as the main teaching strategies presented in science education literature. In the second section, we argue that due to the complexity of the concept of energy, rethinking how it is taught should involve teacher (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  47.  34
    Informed consent practices for surgical care at university teaching hospitals: a case in a low resource setting.Joseph Ochieng, Charles Ibingira, William Buwembo, Ian Munabi, Haruna Kiryowa, David Kitara, Paul Bukuluki, Gabriel Nzarubara & Erisa Mwaka - 2014 - BMC Medical Ethics 15 (1):40.
    Informed consent in medical practice is essential and a global standard that should be sought at all the times doctors interact with patients. Its intensity would vary depending on the invasiveness and risks associated with the anticipated treatment. To our knowledge there has not been any systematic review of consent practices to document best practices and identify areas that need improvement in our setting. The objective of the study was to evaluate the informed consent practices of surgeons at University teaching (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  48. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  21
    Information Ethics, Security and the Genre of Encylopedia.David E. DeCosse - 2008 - Metascience 17 (3):481-483.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  8
    Teaching Strategies and Psychological Effects of Entrepreneurship Education for College Students Majoring in Social Security Law Based on Deep Learning and Artificial Intelligence.Qinlei Zhu & Hao Zhang - 2022 - Frontiers in Psychology 13.
    This study aims to achieve the goal of cultivating and reserving emerging professional talents in social security law, improve the curriculum and mechanism of entrepreneurship education, and improve students’ entrepreneurial willingness and entrepreneurial ability. Deep learning technology is used to study the psychological effects of entrepreneurship education for college students majoring in social security law. Firstly, the concept of entrepreneurial psychology is elaborated and summarized. A related model is designed using the theory of proactive personality and planned behavior (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000