Results 131 to 140 of about 104,418 (235)

Implementation of a novel secured authentication protocol for cyber security applications. [PDF]

open access: yesSci Rep
Suresh Kumar V   +7 more
europepmc   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. [PDF]

open access: yesSensors (Basel), 2021
Nifakos S   +6 more
europepmc   +1 more source

Conceptualizing and measuring consumers’ negative attitudes towards online shopping

open access: yesBritish Journal of Management, EarlyView.
Abstract Despite the advantages of online shopping, increasing evidence indicates the prevalence of negative consumer attitudes towards online shopping (NATOS). Yet existing research exhibits a nearly exclusive focus on measuring positive attitudes, creating limited conceptual breadth. Moreover, despite the existence of conceptually related constructs (
Kaj‐Johanna Stichnoth   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy