Results 41 to 50 of about 3,404,399 (295)

The economics of user effort in information security [PDF]

open access: yes, 2009
A significant number of security breaches result from employees' failures to comply with security policies. The cause is often an honest mistake, such as when an employee enters their password in a phishing website, believing it to be a legitimate one.1 ...
Beautement, A, Sasse, A
core   +1 more source

Thrombolytic proteins profiling: High‐throughput activity, selectivity, and resistance assays

open access: yesFEBS Open Bio, EarlyView.
We present optimized biochemical protocols for evaluating thrombolytic proteins, enabling rapid and robust screening of enzymatic activity, inhibition resistance, and fibrin affinity, stimulation, and selectivity. The outcome translates to key clinical indicators such as biological half‐life and bleeding risk. These assays streamline the development of
Martin Toul   +3 more
wiley   +1 more source

Impact of a senior research thesis on students' perceptions of scientific inquiry in distinct student populations

open access: yesFEBS Open Bio, EarlyView.
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart   +4 more
wiley   +1 more source

Criminal Trajectory Reconstruction Method Based on a Mobile Reference System

open access: yesComputational Urban Science
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding   +4 more
doaj   +1 more source

On the Performance Analysis for CSIDH-Based Cryptosystems

open access: yesApplied Sciences, 2020
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo   +3 more
doaj   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Empowering Online Adult Educators: Integrating Artificial Intelligence for Enhanced Instructional Strategies

open access: yesNew Directions for Adult and Continuing Education, EarlyView.
ABSTRACT This article explores how artificial intelligence (AI) can support online adult learning by aligning with Knowles’ four principles of andragogy: involvement, experience, problem‐centeredness, and relevance. Three activities were analyzed using a comparative case study (CCS) method.
Xi Lin, Steve W. Schmidt
wiley   +1 more source

Comments on the Clique Number of Zero-Divisor Graphs of Zn

open access: yesJournal of Mathematics, 2022
In 2008, J. Skowronek-kazio´w extended the study of the clique number ωGZn to the zero-divisor graph of the ring Zn, but their result was imperfect. In this paper, we reconsider ωGZn of the ring Zn and give some counterexamples. We propose a constructive
Yanzhao Tian, Lixiang Li
doaj   +1 more source

Institutional Policies on Artificial Intelligence in Higher Education: Frameworks and Best Practices for Faculty

open access: yesNew Directions for Adult and Continuing Education, EarlyView.
ABSTRACT This article explores institutional policies on artificial intelligence (AI) in higher education. As AI tools become increasingly utilized in academia—from research and teaching to assessment and student support—institutions face growing pressure to establish clear, ethical, and practical guidelines to help guide faculty.
Lauren Azevedo   +3 more
wiley   +1 more source

DyCARS: A dynamic context-aware recommendation system

open access: yesMathematical Biosciences and Engineering
Dynamic recommendation systems aim to achieve real-time updates and dynamic migration of user interests, primarily utilizing user-item interaction sequences with timestamps to capture the dynamic changes in user interests and item attributes.
Zhiwen Hou   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy