"The role of ict in peace and security" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 48 of 50 - About 500 Essays
  • Powerful Essays

    THE AGA KHAN UNIVERSITY Tanzania Institute of Higher Education Institute for Education Development‚ Eastern Africa STUDENTS’ PERCEPTIONS ON THE USE OF ICT IN LEARNING: A CASE STUDY OF A SECONDARY SCHOOL IN MOMBASA‚ KENYA. BY: ANG’ONDI ENOS KIFORO A dissertation submitted to the Institute of Education Development‚ Eastern Africa in partial fulfillment of the requirements for the degree of Master of Education (Teacher Education) Dar es Salaam‚ Tanzania June‚ 2008. THE AGA KHAN UNIVERSITY

    Premium Educational technology Education Information technology

    • 23139 Words
    • 93 Pages
    Powerful Essays
  • Better Essays

    A Separate Peace Essay

    • 954 Words
    • 4 Pages

    will see things in a different perspective every time. In time‚ a person’s perspective on certain things will change overtime no matter how set in stone the status-quo is. Personal experiences play a large role in shaping someone’s outlook on things. In John Knowles’ novel‚ A Separate Peace‚ Gene states‚ “So the more things remain the same‚ the more they change after all” (Knowles 6). This quote is being used as much older and mature Gene returns to Devon and reflects upon his childhood at the

    Premium John Knowles

    • 954 Words
    • 4 Pages
    Better Essays
  • Better Essays

    info security

    • 2065 Words
    • 8 Pages

    Student Name: RAIHANA TABASSUM KHAN NATASHA Student No.: 11535347 Subject Code: ITC 595 Subject Name: INFORMATION SECURITY Assessment No.: 02 Lecturer: NECTAR COSTADOPOULOS Assessment due date: 06/04/14 Date Assessment submitted: 06/04/14 Table of contents: Contents Answer 1: Confidentiality: Confidentiality refers to the information should be secret for the person except the authorized person. If information is confidential

    Premium Authentication Access control Computer security

    • 2065 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    THE USE OF ICT IN MANAGING LIBRARY RESOURCES By EKUDAYO OLUWAYEMISI Introduction 1. Background of the study ICT (information and communications technology - or technologies) is an umbrella term that includes any communication device or application‚ encompassing: radio‚ television‚ cellular phones‚ computer and network hardware and software‚ satellite systems and so on‚ as well as the various services and applications associated with them‚ such as videoconferencing and distance learning

    Free Library Librarian Library science

    • 4097 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Linux Security

    • 7689 Words
    • 31 Pages

    Contents 1. Introduction 1 1.1 Problem Statement 1 1.2 What Is Security? 1 1.3 OS Protection and Security 2 1.4 Assets and their Vulnerabilities 2 1.5 Protection 3 1.6 Intruders 3 1.7 Malicious Software 3 1.8 Trusted Systems 4 1.9 Protection and Security Design Principles 4 1.10 The Unix/Linux Security Model 5 1.10.1 Properties of the Unix Superuser 5 1.10.2 The Unix Security Model — Groups 6 1.10.3 Protection For Unix Files and Directories 6 1.10.4 The Meaning of Permissions 6

    Premium Access control Computer security

    • 7689 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    What can ICT Provide 1. List 6 things ICT can provide. ICT can provide fast‚ repetitive processing‚ vast storage capability‚ the facility to search and combine data in many different that would otherwise be impossible‚ improved presentation of information‚ improved accessibility to information and services and improved security of data and processes. 2. Why do things go wrong with ICT systems? ICT systems improve the way that we process data and make life easier

    Premium Computer Mainframe computer Computer-aided design

    • 980 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Security Awareness

    • 1637 Words
    • 7 Pages

    Change Management Plan CSIA 413 Jason Hess VERSION HISTORY Version # | ImplementedBy | RevisionDate | ApprovedBy | ApprovalDate | Reason | 1.0 | | | | | | UP Template Version: 12/05/11 TABLE OF CONTENTS 1 Introduction 4 1.1 Purpose of The Change Management Plan 4 2 Change management Process 4 2.1 Change Request Process Flow Requirements 4 2.2 Change Request Form and Change Management Log 5 2.3 Evaluating and Authorizing Change Requests 6 2.3.1 Change Control Board

    Premium Project management

    • 1637 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Security paper

    • 1480 Words
    • 6 Pages

    records to many other functions in the organization. Given the importance of information systems in tee organizations‚ malice‚ mischance or error can be detrimental to the organization’s existence and therefore a well laid out security policy is almost mandatory. Security policy therefore focuses on the processes‚ tools and methods necessary for the design‚ implementation and testing of the systems as well as adopt the existing systems to the ever changing environment. Global Distribution Inc. (GDI)

    Premium Security Information security Network security policy

    • 1480 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Aggression, War and Peace

    • 2366 Words
    • 10 Pages

    David C. Rapoport‚ 1999‚ "Terrorism‚" Encyclopedia of Violence‚ Peace and Conflict‚ San Diego‚ CA: Academic Press 3:497-510.   The phenomenon of terrorism may be quite ancient‚ but the concept is modern (p. 498). Examples of ancient terrorists include the Assassins in early Islam‚ the Zealots in 1st century Judaism‚ and the Thugs in 13th to 19th century Hinduism (501). During the French Revolution from 1789-1799 some groups used acts of terrorism‚ and even created a culture of terror‚ as a desperate

    Premium Terrorism

    • 2366 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Research on Security

    • 4956 Words
    • 20 Pages

    1. Most security plans start with infrastructure. If you were going to develop a Security plan from scratch‚ where would you start? Explain your answer. To develop a security plan from scratch‚ there are three steps which I would consider to implement first in the plan. a) Business impact analysis (BIA) and risk assessment The first question is to understand the impact of a loss or reduction of business functionality. I would first understand most critical assets and threats of the organization

    Premium Information security Security Computer security

    • 4956 Words
    • 20 Pages
    Powerful Essays
Page 1 42 43 44 45 46 47 48 49 50