Visual Analysis of International Environmental Security Management Research (1997-2021) Based on VOSviewer and CiteSpace. [PDF]
Cao H, Ou H, Ju W, Pan M, Xue H, Zhu F.
europepmc +1 more source
ICT Governance: Towards Federalized Structure and Solution [PDF]
The ICT (Information and Communication Technology) Governance means actively identifying the service needs of the Government and her customers and to focus on planning and delivering these services to meet availability, performance, and security ...
Connelly, John
core +1 more source
The security implications of geoengineering:blame,imposed agreement and the security of critical infrastructure [PDF]
The prospect of solar geoengineering in response to climate change (on the basis of its supposedly significantly lower cost and/or more rapid impact on global temperature than carbon reduction strategies) raises a number of security concerns that have ...
Cairns, Rose, Nightingale, Paul
core
Objective Knee osteoarthritis (OA) commonly affects individuals with Type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King +10 more
wiley +1 more source
Impact of Security Management Activities on Corporate Performance
The digital business environment is rapidly evolving with advancements in information technology (IT), increasing the risk of information security incidents.
Hyunwoo Cho, Keuntae Cho
doaj +1 more source
New Onset of Fibromyalgia After Exposure to a Combat Environment: A Longitudinal Cohort Study
Objective Traumatic life events are hypothesized to be triggers for the onset of fibromyalgia. Posttraumatic stress disorder (PTSD) is a common comorbidity of fibromyalgia. However, limited prospective data are available on the development of fibromyalgia after exposure to high‐magnitude stress.
Jay B. Higgs +15 more
wiley +1 more source
The effectiveness of business management in precarious economic conditions can decrease due to the lack of a well-established economic security system and relevant accounting information that is also an object of special protection.
О. PYLYPENKO
doaj
Research on Scientific Data Security Behavior Based on Scientific Research Process
[Purpose/significance] This paper defines the concept of scientific data security behavior, and combines different stages of research activities to analyze how to ensure the safety of scientific data in the ...
Yang Yan, Ruan Jianhai
doaj +1 more source
Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology. [PDF]
Sun H, Bai S.
europepmc +1 more source
Security of Supply for Natural Gas Markets. What is it and What is it not? [PDF]
The issue of security of gas supplies is frequently discussed on the basis of intuitive and non-systematic arguments. Greater import dependence is normally equated with greater insecurity, and strategic stocks are the risk management tool most commonly ...
Giacomo Luciani
core

