Results 191 to 200 of about 3,475,621 (326)
Influencing factors of information security behavior among college students based on protection motivation theory: evidence from China. [PDF]
Han M, Zhao H, Ma X, Shi R.
europepmc +1 more source
Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. [PDF]
Sari PK +4 more
europepmc +1 more source
Grain Boundary Space Charge Engineering of Solid Oxide Electrolytes: Model Thin Film Study
This study demonstrates unprecedented control of grain boundary electrical properties in solid electrolytes. Selective diffusion of cations through grain boundaries in thin films enables 12 orders of magnitude variation in ionic resistance, proving that systematic chemical modification of grain boundary electrical properties is feasible.
Thomas Defferriere +5 more
wiley +1 more source
Metasurface-enabled optical encryption and steganography with enhanced information security. [PDF]
Xing W +9 more
europepmc +1 more source
The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. [PDF]
Jiang R, Zhang J.
europepmc +1 more source
A pattern-based method for establishing a cloud-specific information security management system
Kristian Beckers +4 more
openalex +2 more sources
Charge‐Induced Morphing Gels for Bioinspired Actuation
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu +4 more
wiley +1 more source

