Results 41 to 50 of about 5,949,154 (313)
Computer security for data collection technologies
Many organizations in the developing world (e.g., NGOs), include digital data collection in their workflow. Data collected can include information that may be considered sensitive, such as medical or socioeconomic data, and which could be affected by ...
Camille Cobb +5 more
semanticscholar +1 more source
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
openaire +3 more sources
Analysis of the implications of digital voting through neutrosophic Delphi modeling [PDF]
The modernization of electoral systems through digital technologies, such as electronic voting, has marked significant progress in emerging regions like Santo Domingo de los Tsáchilas, Ecuador.
Diego Pablo Palma Rivera +3 more
doaj +1 more source
Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda.
Fredrick Kanobe +2 more
doaj +1 more source
Overcoming the insider: reducing employee crime through Situational Crime Prevention [PDF]
Information security has become increasingly important for organizations, given their dependence on ICT. Not surprisingly, therefore, the external threats posed by hackers and viruses have received extensive coverage in the mass media.
Cornish D. +4 more
core +1 more source
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece +18 more
wiley +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David +2 more
core +1 more source
Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core +4 more sources
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source

