• Home
  • About Us
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • Security
    • List of Articles Security

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - The Causal Model of Corporate Identity,Security Leadership, and Work Ethics
        Elham Ghobadi Meimanat Tabbodi
        20.1001.1.23222301.2019.5.3.11.6
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - Subjectivity Reduction of Qualitative Approach in Information Security Risk Analysis
        Alireza TamjidYamcholo Abbas Toloie Eshlaghy
        10.30495/jsm.2022.1945866.1578
        20.1001.1.23222301.2022.8.1.9.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - Staff performance Competencies and Information Security: An Analysis of the Role of Library Software System Development
        Hojjatallah abadtalab Safiyeh Tahmasebi Limooni Mitra Ghiasi
        10.30495/jsm.2023.1968006.1690
        20.1001.1.23222301.2023.9.2.13.4
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
        Sana Javid Nour Mohammad Yaghoubi
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Investigating the Physical Security Dimensions Affecting Volleyball Stadiums Security
        Seyed Hasan Harati Farideh Ashraf Ganjouei Abdolreza Amirtash Zinat Nikaeen
        20.1001.1.23222301.2019.5.1.9.0
  • Home Page
  • Site Map
  • Contact Us
  • Home
  • Site Map
  • Islamic Azad University
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2021-2025

Home| Login| About Us| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • IAU
  • Login