Results 71 to 80 of about 2,067,027 (330)

Teaching Information Security Management Using an Incident of Intellectual Property Leakage [PDF]

open access: yesAustralasian Conference on Information Systems, Wellington, 2020, pp. 1-11, 2021
Case-based learning is a powerful pedagogical method of creating dialogue between theory and practice. CBL is particularly suited to executive learning as it instigates critical discussion and draws out relevant experiences. In this paper we used a real-world case to teach Information Security Management to students in Management Information Systems ...
arxiv  

High-Level Self-Sustaining Information Security Management Framework

open access: yesBaltic Journal of Modern Computing, 2017
. This paper is aimed to provide the inclusive approach of collaborative information security management framework architectural reference model. Integration and performance based design of information security models will be revised in sake to provide ...
Laima Kauspadiene   +4 more
semanticscholar   +1 more source

Bi‐Directional Assembly of Boron Nitride µ‐Platelets by Micro‐Molding for Advanced Thermal Interface Materials

open access: yesAdvanced Functional Materials, EarlyView.
Bi‐directionally assembled BN µ‐platelets in micropatterns formed by a micro‐molding method for thermal interface materials are demonstrated. The BN µ‐platelets are vertically aligned selectively, while compressed regions without patterns accommodate horizontally assembled BN µ‐platelets. Through anisotropic orientation, high thermal conductivities for
Young Gil Kim   +12 more
wiley   +1 more source

Layered Security Guidance for Data Asset Management in Additive Manufacturing [PDF]

open access: yesarXiv, 2023
Manufacturing industries are increasingly adopting additive manufacturing (AM) technologies to produce functional parts in critical systems. However, the inherent complexity of both AM designs and AM processes render them attractive targets for cyber-attacks.
arxiv  

Tin‐Based 2D/3D Perovskite Vertical Heterojunction for High‐Performance Synaptic Phototransistors

open access: yesAdvanced Functional Materials, EarlyView.
Phototransistors based on tin‐based 2D/3D perovskite heterostructures show an ultrahigh responsivity and detectivity at a low gate voltage across a broad wavelength region from ultraviolet to near‐infrared. The devices can replicate neuromorphic learning and remembering behaviors to light stimuli, in addition to electric depression and memory erasure ...
Hok‐Leung Loi   +10 more
wiley   +1 more source

Readiness of Hospitals with Quality Management Systems Based on Joint Commission on Accreditation Standards

open access: yesمدیریت اطلاعات سلامت, 2012
Introduction: Recently, the accreditation program has been used increasingly by an emphasis on patient safety. In Iran, efforts have been made to establish the accreditation program.
Shirin Abbasi   +2 more
doaj  

Information Security Policy: A Management Practice Perspective [PDF]

open access: yesarXiv, 2016
Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices.
arxiv  

A Security Policy Model Transformation and Verification Approach for Software Defined Networking [PDF]

open access: yesarXiv, 2020
Software defined networking (SDN) has been adopted to enforce the security of large-scale and complex networks because of its programmable, abstract, centralized intelligent control and global and real-time traffic view. However, the current SDN-based security enforcement mechanisms require network managers to fully understand the underlying ...
arxiv  

Categorizing Security for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2019
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the ...
Yejun Wu, Fansong Meng
semanticscholar   +1 more source

Multi‐Scaled Cellulosic Nanonetworks from Tunicates

open access: yesAdvanced Functional Materials, EarlyView.
Microbial and plant nanonetworks of cellulose have enabled a wide range of high‐performance yet sustainable materials. Herein, a third class of cellulosic nanonetworks is showcased by exploiting the only animal tissue‐producing cellulose nanofibers, i.e., ascidians. An ultrastructure including spherical cells and a microvasculature with diameters of 50–
Mano Govindharaj   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy