Results 71 to 80 of about 14,354,866 (342)
Information security: Listening to the perspective of organisational insiders
Aligned with the strategy-as-practice research tradition, this article investigates how organisational insiders understand and perceive their surrounding information security practices, how they interpret them, and how they turn such interpretations into
S. Choi, J. Martins, Igor Bernik
semanticscholar +1 more source
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme +7 more
wiley +1 more source
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang +6 more
doaj +1 more source
Detection of Electric Network Frequency in Audio Using Multi-HCNet
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li +6 more
doaj +1 more source
Quantum Private Query Protocol Based on Two Non-Orthogonal States
We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement.
Yan Chang +5 more
doaj +1 more source
An information-theoretic security proof for QKD protocols
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found.
A. Rényi +10 more
core +2 more sources
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health. Methods We conducted a search for keywords which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the list of
Joy Buie +11 more
wiley +1 more source
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li +4 more
doaj +1 more source
Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute.
Ithnin, Norafida Binti +1 more
core
The NPFIT strategy for information security of care record service [PDF]
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core

