Results 81 to 90 of about 3,352,449 (323)

Information security

open access: yesUbiquity, 2006
Nowadays, information is one of the very important assets in almost all organizations. Once the internal networks of those organizations are connected to the Internet, it becomes a potential target for cyber attacks. In order to secure the systems and information, each company or organization should conduct a self-hacking-audit, analyze the threats and
openaire   +2 more sources

Human Factors in Information Security [PDF]

open access: yes, 2017
It is a well-know fact that there is no unbreakable system in the world. Nowadays, creating secure information system is a big challenge. Besides, it is a desired goal for all IT security managers and engineers in the world.
Kostrytska, S.I.   +2 more
core  

Information Security as Strategic (In)effectivity

open access: yes, 2016
Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have.
A Fielder   +11 more
core   +1 more source

Patient Perceptions of Medication Therapy for Prevention of Posttraumatic Osteoarthritis Following Anterior Cruciate Ligament Injury: A Qualitative Content Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell   +10 more
wiley   +1 more source

Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention

open access: yesApplied Sciences
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li   +4 more
doaj   +1 more source

Considering the Risks and Costs of Solid Organ Xenotransplantation

open access: yesAdvanced Biology, EarlyView.
This perspective discusses the rationale, risks, and costs of whole‐organ xenotransplantation. It considers alternative strategies to obviate the demand for transplants and optimize allotransplantation systems and practices that do not impose xenotransplantation's harms and risks, and whether they are the most ethical and effective means to increase ...
Catharine E. Krebs   +5 more
wiley   +1 more source

Information Security Methodology, Replication Studies and Information Security Education [PDF]

open access: yesJUCS - Journal of Universal Computer Science, 2020
Steffen Wendzel   +6 more
openaire   +7 more sources

Health Information and Social Security Entitlements [PDF]

open access: yes, 2013
This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition ...
Perry Singleton
core   +1 more source

RhoA and Rac1 as Mechanotransduction Mediators in Colorectal Cancer

open access: yesAdvanced Biology, EarlyView.
Analysing RhoA and Rac1 protein levels in Colorectal cancer (CRC) samples under mechanical strain highlights their potential as diagnostic markers. Monitoring their activity could offer valuable insights into how cancer spreads, paving the way for new approaches to better understand and diagnose colorectal cancer.
Sharda Yadav   +5 more
wiley   +1 more source

Ontology‐Based Data Acquisition, Refinement, and Utilization in the Development of a Multilayer Ferrite Inductor

open access: yesAdvanced Engineering Materials, EarlyView.
Multilayer ferrite inductor prototypes are fabricated by cofiring metallized tapes of NiCuZn ferrite and glass‐ceramic composite. Prerequisites for a predictive component simulation are discussed. An automated data‐pipeline stores and semantically links the experimental data acquired in the study according to a domain ontology.
Björn Mieller   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy