Risk management in digitalized educational environments: Teachers' information security awareness levels. [PDF]
Sapanca HF, Kanbul S.
europepmc +1 more source
Conceptual Information Systems Discussed through an IT-Security Tool [PDF]
Klaus Becker+4 more
openalex +1 more source
Fabrication of in situ polymer‐encapsulated stable perovskite patterns of arbitrary shapes and pixel arrays with a resolution of 80 nm is reported by the femtosecond (fs) laser (800 nm) super‐resolution writing technique. The two‐photon absorption‐induced laser ablation is attributed to the achieved feature sizes as small as λ/10.
Xuebing Wen+8 more
wiley +1 more source
Necessity and Importance of Developing AI in Anesthesia from the Perspective of Clinical Safety and Information Security. [PDF]
Song B, Zhou M, Zhu J.
europepmc +1 more source
A flexible method for information system security policy specification
Rodolphe Ortalo
openalex +1 more source
Policies for Construction of Information Systems’ Security Guidelines [PDF]
Mikko Siponen
openalex +1 more source
Conformally Perforated Shellular Metamaterials with Tunable Thermomechanical and Acoustic Properties
This study introduces Conformally Perforated Shellular Metamaterials (CPSMs), which overcome TPMS design limitations by mapping 2D cellular layouts onto 3D surfaces. CPSMs exhibit enhanced elastic stiffness, thermal conductivity, and acoustic performance compared to intact P‐type shellulars, demonstrating their potential as multifunctional ...
Benyamin Shahryari+8 more
wiley +1 more source
The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. [PDF]
Jiang R, Zhang J.
europepmc +1 more source
Establishing an Information Systems Security Organization (ISSO)
Gerald L. Kovacich
openalex +1 more source
Information Security as a Resource
Michael W. Mislove+3 more
openaire +2 more sources