Results 31 to 40 of about 240,934 (135)

A Community Assets Infrastructure for the Secure Use of Mobile Computing Devices in the Rural Health Landscape

open access: yes, 2016
The ubiquity of mobile computing devices in the workplace has created a vast landscape of opportunity in rural communities centered on the increased population access owing to the improved mobility. Healthcare workers are able to reach previously disconnected communities and homesteads to deliver health related services through the use of custom mobile
Kativu, Kevin, Pottas, Dalenca
openaire   +2 more sources

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Persuasiveness of inclusive language in organizational communication

open access: yesRes Rhetorica
The study hypothesized that employees better receive messages containing inclusive forms. A review of the existing literature on inclusive language and its impact on employee well-being and organizational innovation was conducted.
Jacek Wasilewski, Agata Kostrzewa
doaj   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2005
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core   +1 more source

Enhancing IDS performance through a comparative analysis of Random Forest, XGBoost, and Deep Neural Networks

open access: yesMachine Learning with Applications
Intrusion Detection Systems (IDS) face major challenges in network security, notably the need to combine a high detection rate with reliable performance.
Sow Thierno Hamidou, Adda Mehdi
doaj   +1 more source

Buffer or Enabler? The Effect of Financial Slack on R&D Investment in Different Environments

open access: yesSystems
Prior studies have shown mixed findings on the role of financial slack. This study examines how environmental factors such as munificence, dynamism, and complexity moderate the relationship between financial slack and innovation activity. Using data from
Hye Kyung Yu, Minji Kim, Tohyun Kim
doaj   +1 more source

Defense against Insider Threat: a Framework for Gathering Goal-based Requirements [PDF]

open access: yes, 2006
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments

open access: yesIEEE Open Journal of the Industrial Electronics Society
In recent years, concepts and components of information technology (IT) have made their way into the shop floor, today better known as operational technology (OT).
Mukund Bhole   +2 more
doaj   +1 more source

A Computational Model for Gender Asset Gap Management with a Focus on Gender Disparity in Land Acquisition and Land Tenure Security

open access: yesAmerican Journal of Operations Research
Gender inequality is a significant concern in many cultures, as women face significant barriers to asset acquisition particularly land ownership and control. Land acquisition and land tenure security are complex issues that affect various cultural groups differently, leading to disparities in access and ownership especially when superimposed with other
Ogundare, Oluwatosin, Njualem, Lewis
openaire   +2 more sources

Integrated Dynamic Power Management Strategy with a Field Programmable Gate Array-Based Cryptoprocessor System for Secured Internet-of-Medical Things Networks

open access: yesTechnologies
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking.
Javier Vázquez-Castillo   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy