Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
job security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/123)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Organizational commitment in Estonian university libraries : a review and survey
Kont, Kate-Riin
;
Jantson, Signe
New review of academic librarianship
2014
/
p. 296-319 : ill
https://www.tandfonline.com/doi/abs/10.1080/13614533.2014.898671
https://doi.org/10.1080/13614533.2014.898671
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
119
1.
job security
2.
employment and job creation
3.
job autonomy
4.
job crafting
5.
job design
6.
Job dissatisfaction
7.
job generation
8.
job involvement
9.
job matching
10.
job satisfaction
11.
job scheduling
12.
job search
13.
job search theory
14.
job sector differences
15.
job selection
16.
job sequence
17.
job-exposure matrix
18.
on-the-job fatigue
19.
ad-hoc sensor networks security
20.
Automatic Security Verification
21.
Blockchain security
22.
cache security
23.
communication system security
24.
comprehensive system of economic security
25.
computer security
26.
cooperative security dilemma
27.
cyber security
28.
cyber security education
29.
cyber security exercises
30.
cyber security monitoring
31.
cyber security strategies
32.
cyber-security
33.
data security
34.
development of security cameras
35.
drinking water security
36.
economic security
37.
economic security of enterprise
38.
emotional security
39.
energy security
40.
energy security indicator
41.
Estonian information security standard
42.
graded security
43.
hardware security
44.
hardware security primitive
45.
human security
46.
information security
47.
internal security
48.
international security
49.
investment and innovation security
50.
IPv6 security
51.
IT security
52.
IT security management
53.
long-term security
54.
metadata model for security measures
55.
Middle Eastern security
56.
Mobile security
57.
national cyber security strategy
58.
national security
59.
NATO. Science for Peace and Security Program
60.
network security
61.
network security monitoring
62.
OSCE (Organization for Security and Co-operation in Europe)
63.
passenger’s security
64.
policy-based routing security
65.
political and security cultures
66.
post-quantum security
67.
power system security
68.
quantitative security
69.
regional security
70.
RISC-V Security Verification
71.
safety and security testing
72.
security
73.
security adaptation
74.
security alert prioritization
75.
security analysis
76.
security and justice (AFSJ)
77.
Security and political science
78.
security and privacy
79.
security and privacy in smart grids
80.
Security Assertion Mining
81.
security closure
82.
Security Coverage
83.
security dataset
84.
security dilemma
85.
Security evaluation
86.
security evaluation instruments
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security risk assessment
105.
security risk management
106.
security risks
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
system of economic security
116.
system security
117.
terrorism security
118.
transmission System Security
119.
voting privacy and security
author
2
1.
Harenberg, Job
2.
Job, Remo
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT