Results 131 to 140 of about 196,474 (374)

The Theory of Individual Values in the Chinese Population: Psychometric Examination Based on the Revised Portrait Value Questionnaire

open access: yesPsyCh Journal, EarlyView.
ABSTRACT This study aims to assess the validity of the Revised Portrait Value Questionnaire (PVQ‐RR) within the Chinese population to examine the applicability of the 19‐factor Theory of Individual Values in the Chinese cultural context. A sample of 9590 Chinese participants (age range: 11–60; 4360 males) completed the Chinese version of the PVQ‐RR ...
Xu Wang   +5 more
wiley   +1 more source

CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA

open access: yesComputer Science & IT Research Journal
This paper provides a comprehensive review and comparative analysis of cybersecurity challenges and strategies within the financial sectors of the United States of America (USA) and Nigeria.
Babajide Tolulope Familoni   +1 more
semanticscholar   +1 more source

A Systematic Review of Empirical Studies on Situation Awareness: Perspectives From the Interaction Among Humans, Machines, and the Task Environment

open access: yesPsyCh Journal, EarlyView.
ABSTRACT Situational awareness (SA) refers to “knowing what is going on” in a situation. As an essential concept originating in aviation literature approximately 40 years ago, SA has demonstrated significant potential and has since been extended across various fields, leading to a growing body of research.
Rong Fang   +7 more
wiley   +1 more source

Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks

open access: yesSensors, 2019
The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources.
Liang Liu, Wen Chen, Tao Li, Yuling Liu
doaj   +1 more source

Cybersecurity: mapping the ethical terrain [PDF]

open access: yes
This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others ...
Adam C. Gastineau   +5 more
core  

DICED (Database of Identified Cleavage Sites Endemic to Diseases States): A Searchable Web Interface for Terminomics/Degradomics

open access: yesPROTEOMICS, EarlyView.
ABSTRACT Proteolysis is an irreversible posttranslational modification with immense biological impact. Owing to its high disease significance, there is growing interest in investigating proteolysis on the proteome scale, termed degradomics. We developed ‘Database of Identified Cleavage sites Endemic to Disease states’ (DICED; https://diced.lerner.ccf ...
Jayadev Joshi   +5 more
wiley   +1 more source

A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION

open access: yesComputer Science & IT Research Journal
In an era where digital threats are increasingly pervasive, understanding the evolution and efficacy of cybersecurity strategies in modern organizations is paramount. This study provides a comprehensive analysis of the dynamic landscape of cybersecurity,
Temitayo Oluwaseun Abrahams   +4 more
semanticscholar   +1 more source

Evaluating the Effectiveness of Control Charting Schemes in Detecting Malicious Attacks Targeting Manufacturing Systems

open access: yesQuality and Reliability Engineering International, EarlyView.
ABSTRACT The increasing risk and impact of cyber‐physical attacks on the manufacturing industry are driven by vulnerabilities in industrial control systems and digital manufacturing technologies. These attacks can be strategically engineered to modify product dimensions while evading detection by current quality control (QC) tools.
Ahmad Al Majali   +2 more
wiley   +1 more source

Cybersecurity, Capital Allocations and Management Control Systems [PDF]

open access: green, 2008
Lawrence A. Gordon   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy