Results 31 to 40 of about 240,934 (135)
The ubiquity of mobile computing devices in the workplace has created a vast landscape of opportunity in rural communities centered on the increased population access owing to the improved mobility. Healthcare workers are able to reach previously disconnected communities and homesteads to deliver health related services through the use of custom mobile
Kativu, Kevin, Pottas, Dalenca
openaire +2 more sources
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
Persuasiveness of inclusive language in organizational communication
The study hypothesized that employees better receive messages containing inclusive forms. A review of the existing literature on inclusive language and its impact on employee well-being and organizational innovation was conducted.
Jacek Wasilewski, Agata Kostrzewa
doaj +1 more source
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +1 more source
Intrusion Detection Systems (IDS) face major challenges in network security, notably the need to combine a high detection rate with reliable performance.
Sow Thierno Hamidou, Adda Mehdi
doaj +1 more source
Buffer or Enabler? The Effect of Financial Slack on R&D Investment in Different Environments
Prior studies have shown mixed findings on the role of financial slack. This study examines how environmental factors such as munificence, dynamism, and complexity moderate the relationship between financial slack and innovation activity. Using data from
Hye Kyung Yu, Minji Kim, Tohyun Kim
doaj +1 more source
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements [PDF]
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources
In recent years, concepts and components of information technology (IT) have made their way into the shop floor, today better known as operational technology (OT).
Mukund Bhole +2 more
doaj +1 more source
Gender inequality is a significant concern in many cultures, as women face significant barriers to asset acquisition particularly land ownership and control. Land acquisition and land tenure security are complex issues that affect various cultural groups differently, leading to disparities in access and ownership especially when superimposed with other
Ogundare, Oluwatosin, Njualem, Lewis
openaire +2 more sources
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking.
Javier Vázquez-Castillo +7 more
doaj +1 more source

