Social network analysis in the context of information security risk management
Hele tekst
GERELATEERDE DOCUMENTEN
• Several new mining layouts were evaluated in terms of maximum expected output levels, build-up period to optimum production and the equipment requirements
An algebra task was chosen because previous efforts to model algebra tasks in the ACT-R architecture showed activity in five different modules when solving algebra problem;
Objectives To investigate the Maslach Burnout Inven- tory—General Survey (MBI—GS) and the Utrecht Work Engagement Scale (UWES) for their ability to identify non-sicklisted
this phase showed less mitigation strategies specific to the contracting risk, but rather was used to reduce the impact of risks stemming from the supplier selection, as
To sum up, the development of the Tocharian vowel system can be understood very well in light of the South Siberian system represented by Ket. Although theoretically this could be
If the option foot was passed to the package, you may consider numbering authors’ names so that you can use numbered footnotes for the affiliations. \author{author one$^1$ and
The package is primarily intended for use with the aeb mobile package, for format- ting document for the smartphone, but I’ve since developed other applications of a package that
The present study demon- strated that patients with preoperative dyspeptic symptoms and patients using psychotropic medication are both at risk of persistence of the preexisting