Results 71 to 80 of about 2,067,027 (330)
Teaching Information Security Management Using an Incident of Intellectual Property Leakage [PDF]
Case-based learning is a powerful pedagogical method of creating dialogue between theory and practice. CBL is particularly suited to executive learning as it instigates critical discussion and draws out relevant experiences. In this paper we used a real-world case to teach Information Security Management to students in Management Information Systems ...
arxiv
High-Level Self-Sustaining Information Security Management Framework
. This paper is aimed to provide the inclusive approach of collaborative information security management framework architectural reference model. Integration and performance based design of information security models will be revised in sake to provide ...
Laima Kauspadiene+4 more
semanticscholar +1 more source
Bi‐directionally assembled BN µ‐platelets in micropatterns formed by a micro‐molding method for thermal interface materials are demonstrated. The BN µ‐platelets are vertically aligned selectively, while compressed regions without patterns accommodate horizontally assembled BN µ‐platelets. Through anisotropic orientation, high thermal conductivities for
Young Gil Kim+12 more
wiley +1 more source
Layered Security Guidance for Data Asset Management in Additive Manufacturing [PDF]
Manufacturing industries are increasingly adopting additive manufacturing (AM) technologies to produce functional parts in critical systems. However, the inherent complexity of both AM designs and AM processes render them attractive targets for cyber-attacks.
arxiv
Tin‐Based 2D/3D Perovskite Vertical Heterojunction for High‐Performance Synaptic Phototransistors
Phototransistors based on tin‐based 2D/3D perovskite heterostructures show an ultrahigh responsivity and detectivity at a low gate voltage across a broad wavelength region from ultraviolet to near‐infrared. The devices can replicate neuromorphic learning and remembering behaviors to light stimuli, in addition to electric depression and memory erasure ...
Hok‐Leung Loi+10 more
wiley +1 more source
Introduction: Recently, the accreditation program has been used increasingly by an emphasis on patient safety. In Iran, efforts have been made to establish the accreditation program.
Shirin Abbasi+2 more
doaj
Information Security Policy: A Management Practice Perspective [PDF]
Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices.
arxiv
A Security Policy Model Transformation and Verification Approach for Software Defined Networking [PDF]
Software defined networking (SDN) has been adopted to enforce the security of large-scale and complex networks because of its programmable, abstract, centralized intelligent control and global and real-time traffic view. However, the current SDN-based security enforcement mechanisms require network managers to fully understand the underlying ...
arxiv
Categorizing Security for Security Management and Information Resource Management
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the ...
Yejun Wu, Fansong Meng
semanticscholar +1 more source
Multi‐Scaled Cellulosic Nanonetworks from Tunicates
Microbial and plant nanonetworks of cellulose have enabled a wide range of high‐performance yet sustainable materials. Herein, a third class of cellulosic nanonetworks is showcased by exploiting the only animal tissue‐producing cellulose nanofibers, i.e., ascidians. An ultrastructure including spherical cells and a microvasculature with diameters of 50–
Mano Govindharaj+10 more
wiley +1 more source