Academic literature on the topic 'Security Components'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Components.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Components"

1

Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.

Full text
Abstract:
The modern development of the world economy is increasingly defined by its reliance on vast and complex information flows. In today's interconnected global marketplace, the seamless exchange of data underpins almost every aspect of economic activity, from financial transactions and supply chain management to customer interactions and business intelligence. As a result, the importance of addressing issues related to safeguarding data flows and ensuring the confidentiality, integrity, and availability of information during its processing and transmission is growing at an unprecedented pace. Info
APA, Harvard, Vancouver, ISO, and other styles
2

Metodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.

Full text
Abstract:
A new element has been added to the components of corporate security - migration security. The proposed new author's terms for our scientific community - "migration security" will facilitate future research in the field of the impact of migration processes on the security of regions and business organizations.
APA, Harvard, Vancouver, ISO, and other styles
3

Wood, Charles Cresson, and Howard M. Zeidler. "Security modules: Potent information security system components." Computers & Security 5, no. 2 (1986): 114–21. http://dx.doi.org/10.1016/0167-4048(86)90133-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Baranovskyi, О. І., and M. O. Moroz. "INVESTMENT COMPONENTS OF FINANCIAL SECURITY." Financial and credit activity: problems of theory and practice 1, no. 22 (2017): 46–59. http://dx.doi.org/10.18371/fcaptp.v1i22.109926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Filippov, D. L. "Components of physical security risk." Issues of Risk Analysis 16, no. 4 (2019): 82–93. http://dx.doi.org/10.32686/1812-5220-2019-16-4-82-93.

Full text
Abstract:
The article considers the existing methods of risk analysis in the design of physical protection systems. It is noted that in the expert method vulnerability assessed integrally, that does not guarantee the principle of equal strength, vulnerability elements of physical protection are considered without regard to the vulnerability of the object itself, and parameters of the model of the intruder, not taking into account such factors as catalysts and inhibitors of the threat. Noted that to improve the adequacy of physical protection required the formation of a databank of security threats and v
APA, Harvard, Vancouver, ISO, and other styles
6

Qun Zhong and N. Edwards. "Security control for COTS components." Computer 31, no. 6 (1998): 67–73. http://dx.doi.org/10.1109/2.683010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ganna, Smokvina, and Yankovska Olga. "Personnel security of the industrial enterprise: essence, components and measures of threats minimization." Economic journal Odessa polytechnic university 1, no. 7 (2019): 38–45. https://doi.org/10.5281/zenodo.3402729.

Full text
Abstract:
The article defines the essence of personnel security, examines approaches to its definition, examines and suggests key components of personnel security, their subspecies (labour safety, technological safety, administrative security, aesthetic safety, anti-conflict security, career safety), defines the component "anti-conflict security". The personnel security threats, their classification, on the basis of which have been proposed a set of measures to minimize threats to personnel security of industrial enterprises and organizational directions to strengthen the personnel component o
APA, Harvard, Vancouver, ISO, and other styles
8

Прядко, И. П., and С. А. Мудрак. "Food security and its main components." Экономика и предпринимательство, no. 10(123) (November 15, 2020): 1097–105. http://dx.doi.org/10.34925/eip.2020.123.10.218.

Full text
Abstract:
Целью настоящей работы выступает анализ состояния российского агрокомплекса в начале XXI в. - в период экономических санкций и падения промышленного производства, этими санкциями вызванного. Чтобы определить вектор развития российского Агропрома, а вместе с ним и социального развития российского села, авторы обращаются к истории русского села в XIX-XX вв., к фактам непростых отношений между традиционным крестьянским миром и индустриальной цивилизацией, промышленным городом. Для достижения целей исследования авторами используется метод ретроспективного анализа источников, анализируются данные с
APA, Harvard, Vancouver, ISO, and other styles
9

Havas, Karyn, and Mo Salman. "Food security: its components and challenges." International Journal of Food Safety, Nutrition and Public Health 4, no. 1 (2011): 4. http://dx.doi.org/10.1504/ijfsnph.2011.042571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meyer, Helen. "Security gap uncovered in ActiveX components." Computers & Security 15, no. 6 (1996): 516. http://dx.doi.org/10.1016/s0167-4048(97)83130-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security Components"

1

Martinez, Salvador. "Automatic reconstruction and analysis of security policies from deployed security components." Phd thesis, Ecole des Mines de Nantes, 2014. http://tel.archives-ouvertes.fr/tel-01065944.

Full text
Abstract:
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed by a number of heterogeneous subsystems, each subsystem plays a key role in the global system security. For the specific case of access-control, access-control policies may be found in several components (databases, networksand applications) all, supposedly, working together. Nevertheless since most times these policies have been manually implemented a
APA, Harvard, Vancouver, ISO, and other styles
2

Pidhrushnyi, D. O. "Scenario analysis model of economic security components." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40837.

Full text
Abstract:
Tendencies of recent years have shown that economic security is the most important part of the sustainable development of nations and the world in general. That is why the forefront every state puts improves their economic situation, their international resource dependencies and explores new methods of management economic situation.
APA, Harvard, Vancouver, ISO, and other styles
3

Schönefeld, Marc. "Refactoring of security antipatterns in distributed Java components." Bamberg Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheung, Lai-sze, and 張麗詩. "Delegation of rights using PKI-based components." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29973053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure
APA, Harvard, Vancouver, ISO, and other styles
6

Poxon, David Allen Louis. "Static analysis of software components for information flow security." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/226908/1/David_Poxon_Thesis.pdf.

Full text
Abstract:
For developers to predict whether their code will leak secrets typically requires analysing the whole program; for programs that are independently composed of software components by a third-party, this is a challenging prediction for the component developers to make. The outcome of this research is a set of tools that bridges that gap. This includes Security Contracts, which enable the abstract definition of software component behaviour. These abstractions can be used by developers to understand how their component will interact with other components, which enable our new analyses that can pre
APA, Harvard, Vancouver, ISO, and other styles
7

Andersson, Richard. "Evaluation of the Security of Components in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2091.

Full text
Abstract:
<p>This thesis suggests a security evaluation framework for distributed information systems, responsible for generating a system modelling technique and an evaluation method. The framework is flexible and divides the problem space into smaller, more accomplishable subtasks with the means to focus on specific problems, aspects or system scopes. The information system is modelled by dividing it into increasingly smaller parts, evaluate the separate parts and then build up the system “bottom up” by combining the components. Evaluated components are stored as reusable instances in a component libr
APA, Harvard, Vancouver, ISO, and other styles
8

Yao, Ming. "A security architecture for protecting dynamic components of mobile agents." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15913/1/Ming_Yao_Thesis.pdf.

Full text
Abstract:
New techniques,languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the mobile agent concept. A mobile agent in a large scale network can be viewed as a software program that travels through a heterogeneous network, crossing various security domains and executing autonomously in its destination. Mobile agent technology extends the traditional network communication model by including mobile processes, which can autonomously migrate to new remote servers. This basic idea results in
APA, Harvard, Vancouver, ISO, and other styles
9

Yao, Ming. "A security architecture for protecting dynamic components of mobile agents." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15913/.

Full text
Abstract:
New techniques,languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the mobile agent concept. A mobile agent in a large scale network can be viewed as a software program that travels through a heterogeneous network, crossing various security domains and executing autonomously in its destination. Mobile agent technology extends the traditional network communication model by including mobile processes, which can autonomously migrate to new remote servers. This basic idea results in
APA, Harvard, Vancouver, ISO, and other styles
10

Schönefeld, Marc [Verfasser]. "Refactoring of security antipatterns in distributed Java components / von Marc Schönefeld." Bamberg : Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security Components"

1

Gopal, Malviya, Centre for Security Analysis (Madras, India), University of Poona. Dept. of Defence and Strategic Studies. National Centre of International Security and Defence Analysis., and University of Madras. Dept. of Defence and Strategic Studies., eds. Essential components of national security. Centre for Security Analysis, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

E, Burr William, and National Institute of Standards and Technology (U.S.), eds. Minimum interoperability specification for PKI components (MISPC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

T, Kenna B., Murray D. W, U.S. Nuclear Regulatory Commission. Office of Nuclear Material Safety and Safeguards. Division of Safeguards and Transportation., and Sandia National Laboratories, eds. Entry/exit control components for physical protection systems. Division of Safeguards and Transportation, Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Department of Homeland Security. Office of Inspector General. Implementation challenges remain in securing DHS components' intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States International Trade Commission. In the matter of certain vehicle security systems and components thereof. U.S. International Trade Commission, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Department of Homeland Security. Office of Inspector General. Status report on open recommendations to DHS components. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States International Trade Commission. In the matter of certain anti-theft deactivatable resonant tags and components thereof. U.S. International Trade Commission, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sharer, Elizabeth. Inventory Control (Known Demand): Choosing an Inventory Model for Industrial Security System Components. Edited by Hari Rajagopalan. SAGE Publications, Inc., 2024. http://dx.doi.org/10.4135/9781071974438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nkwiine, Charles. The effects of market-oriented agriculture on selected agrobiodiversity, household income, and food security components. NURRU Publications, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Division, United States Office of Strategic Industries and Economic Security Strategic Analysis. National security assessment of the high performance explosives and explosive components industries: A report for the U.S. Department of the Navy. The Division, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security Components"

1

Eronen, Pasi, and Jari Arkko. "Authentication Components: Engineering Experiences and Guidelines." In Security Protocols. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11861386_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jürjens, Jan. "Model-Based Security Engineering with UML: Introducing Security Aspects." In Formal Methods for Components and Objects. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11804192_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Khaled, Jun Han, and Yuliang Zheng. "Security Properties of Software Components." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sullivan, Daniel, Eric Luiijf, and Edward J. M. Colbert. "Components of Industrial Control Systems." In Advances in Information Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32125-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chevalier, Yannick, Mohamed Anis Mekki, and Michaël Rusinowitch. "Orchestration under Security Constraints." In Formal Methods for Components and Objects. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25271-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schreck, Jörg. "Selected User Modeling Components." In Security and Privacy in User Modeling. Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eronen, Pasi. "Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion)." In Security Protocols. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11861386_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Milkevich, Andrei A. "Concept and Components of National Security." In Business 4.0 as a Subject of the Digital Economy. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90324-4_81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Herath, Pushpa. "Overview of Basic Azure Security Components." In Azure Cloud Security for Absolute Beginners. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7860-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sheikh, Ahmed F. "Email, Instant Messaging, and Web Components." In CompTIA Security+ Certification Study Guide. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6234-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Components"

1

Gabštur, Peter, Martin Pollák, Marek Kočiško, and Jakub Kaščak. "Modification of Components Using Generative Design Tools." In Materials and Technologies for Defense and Security. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-7tgpug.

Full text
Abstract:
Parametric and generative design represent key elements of contemporary design, offering faster and more efficient ways of creating compared to traditional approaches. This article explores the use of generative design and parametric design in the field of industrial design, focusing on the application of generative design tools in Fusion 360 software for designing functional objects. Generative design, through algorithms and rules, enables the exploration of various design variants to find the optimal solution. It focuses on creating organic shapes and optimizing them based on specific criter
APA, Harvard, Vancouver, ISO, and other styles
2

Arazi, Benjamin. "Mobile components security." In the 4th annual workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1413140.1413179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bartolac, Thomas J., and Paul L. McCarley. "Digital emulation of analog components." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.547489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fadhel, Nawfal F., Richard M. Crowder, Fatimah Akeel, and Gary B. Wills. "Component for 3D printing provenance framework: Security properties components for provenance framework." In 2014 World Congress on Internet Security (WorldCIS). IEEE, 2014. http://dx.doi.org/10.1109/worldcis.2014.7028174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Holy, Radek, Marek Kalika, and Jan Scherks. "Application of ID cards - security components." In 2012 6th International Conference on Signal Processing and Communication Systems (ICSPCS 2012). IEEE, 2012. http://dx.doi.org/10.1109/icspcs.2012.6507955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Muhammad Umair Ahmed, and Mohammad Zulkernine. "Building components with embedded security monitors." In the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS. ACM Press, 2011. http://dx.doi.org/10.1145/2000259.2000282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Marconot, Johan, Florian Pebay-Peyroula, and David Hely. "IoT Components LifeCycle Based Security Analysis." In 2017 Euromicro Conference on Digital System Design (DSD). IEEE, 2017. http://dx.doi.org/10.1109/dsd.2017.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guimaraes, Mario, Herb Mattord, and Richard Austin. "Incorporating security components into database courses." In the 1st annual conference. ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boryssenko, A. O. "Optimization of RF components in omnidirectional sensor." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2017. http://dx.doi.org/10.1117/12.2267704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schonlau, William J. "Autonomous vehicle platforms from modular robotic components." In Defense and Security, edited by Grant R. Gerhart, Chuck M. Shoemaker, and Douglas W. Gage. SPIE, 2004. http://dx.doi.org/10.1117/12.564555.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security Components"

1

Haddad, Ibrahim. Strengthening License Compliance and Software Security with SBOM Adoption: A Definitive SBOM Guide for Enterprises. The Linux Foundation, 2024. https://doi.org/10.70828/vhin7583.

Full text
Abstract:
Software security remains a top priority for every enterprise, industry, and government around the world. A fundamental step in securing a software supply chain is the ability to certify that the different software components being used are secure, but this can be challenging to adequately address. A Software Bill of Materials (SBOM) is an inventory of the entire constituent software components within a system that is used to enhance transparency, license compliance, and security within software supply chains. This report gives an overview of the history of SBOMs, the legislative context that
APA, Harvard, Vancouver, ISO, and other styles
2

Souppaya, Souppaya. Workshop on Enhancing Security of Devices and Components Across the Supply Chain. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8532.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rekhi, Sanjay. Workshop on Enhancing Security of Devices and Components Across the Supply Chain. National Institute of Standards and Technology, 2024. https://doi.org/10.6028/nist.ir.8532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Franusich, Michael D. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1242462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Murdick, Dewey, Daniel Chou, Ryan Fedasiuk, and Emily Weinstein. The Public AI Research Portfolio of China’s Security Forces. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200057.

Full text
Abstract:
New analytic tools are used in this data brief to explore the public artificial intelligence (AI) research portfolio of China’s security forces. The methods contextualize Chinese-language scholarly papers that claim a direct working affiliation with components of the Ministry of Public Security, People's Armed Police Force, and People’s Liberation Army. The authors review potential uses of computer vision, robotics, natural language processing and general AI research.
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, Ronald L. Nation Assistance: Does an Exercise in Guatemala by Reserve Components Support United States National Security Strategy? Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada345884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Edwards, Frances, Joseph Szyliowicz, Dan Goodrich, William Medigovich, Liz Lange, and Autumn Anderton. Surface Transportation Supply Chain Security: Creating a Blueprint for Future Research. Mineta Transportation Institute, 2021. http://dx.doi.org/10.31979/mti.2021.1937.

Full text
Abstract:
Ninety percent of the world’s trade goods travel by surface transportation, using maritime, road and rail assets. The security of the goods in transit, the infrastructure supporting the movement, and the vehicles, are required to ensure that international commerce proceeds successfully. Much has been written about the surface supply chain itself, but little has focused on the security of these components. This report provides a guide for those wanting an increased understanding of the security issues that supply chain surface transportation systems confront and a blueprint to guide their futur
APA, Harvard, Vancouver, ISO, and other styles
8

Grand-Clément, Sarah, and Theò Bajon. Uncrewed Ground Systems: A Primer. UNIDIR, 2022. http://dx.doi.org/10.37559/caap/22/erc/11.

Full text
Abstract:
The development of uncrewed ground systems (UGSs) – which include vehicles that can be piloted either remotely or semi-autonomously – is increasing. This primer introduces the different types of UGS (or "ground robots"), describes their key components and functions, and outlines the main challenges that these systems can pose to international security. The focus of the primer is on describing the main areas of technological innovation and development related to the key components that comprise UGSs, outlining the anticipated areas of progress and potential concern.
APA, Harvard, Vancouver, ISO, and other styles
9

Grand-Clément, Sarah, and Theò Bajon. Uncrewed Maritime Systems: A Primer. UNIDIR, 2022. http://dx.doi.org/10.37559/caap/22/erc/13.

Full text
Abstract:
The development of uncrewed maritime systems (UMSs) – which include vehicles that can be piloted either remotely or semi-autonomously – has increased. This primer introduces the different types of UMS, otherwise known as surface, underwater or maritime drones. It also describes their key components and functions, as well as outlining the main challenges that these systems can pose to international security. The focus of the primer is on describing the main areas of technological innovation and development related to the key components that comprise UMSs, outlining the anticipated areas of prog
APA, Harvard, Vancouver, ISO, and other styles
10

Tranchant, Jean-Pierre, Jessica Gordon, Jo Carpenter, et al. Bangladesh Initiative to Enhance Nutrition Security and Governance (BIeNGS) Final Evaluation Report. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ids.2024.036.

Full text
Abstract:
The BIeNGS programme was ultimately designed to lead to improved nutrition status of children and mothers in the two Bangladeshi districts of Jamalpur and Sherpur. This report summarises the endline findings from the evaluation of the BIeNGS programme. This comprised of a mixed methods design combining quantitative surveys with project beneficiary households, Community Clinic and CNP staff together with a qualitative and process component to gather community and implementer perspectives and process monitoring data. Quantitative findings provide a ‘before-after’ comparison of project logframe i
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!