Aromatic cation-π induced multifluorescence tunable two-dimensional co-assemblies for encoded information security. [PDF]
Gao Z, Sun J, Shi L, Yuan W, Tian W.
europepmc +1 more source
Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology. [PDF]
Sun H, Bai S.
europepmc +1 more source
Information Security Through Penetration Testing and Analysis: Final Report CRADA No. TC-1217-95
S. Andy Sparks, Russell J. Miller
openalex +4 more sources
Managing Information Security in Healthcare — an Action Research Experience
H. L. Armstrong
openalex +1 more source
Security or opportunity: the effects of individual and situational factors on risk information preference [PDF]
René Lion
openalex +1 more source
An analysis on the dimensions of information security culture concept: A review
Akhyari Nasir+3 more
semanticscholar +1 more source
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers. [PDF]
Vrhovec S, Markelj B.
europepmc +1 more source
Networked Organizational Structure of Enterprise Information Security Management Based on Digital Transformation and Genetic Algorithm. [PDF]
Di Z, Liu Y, Li S.
europepmc +1 more source
Efficiency of Experimental Security Markets with Insider Information: An Application of Rational-Expectations Models [PDF]
Charles R. Plott, Shyam Sunder
openalex +1 more source