Results 71 to 80 of about 55,115 (255)
Design and implementation of geographic information system with mobile terminal and 5G network
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley +1 more source
How Signals of Silence Sustain Sexual Harassment and What to Do About It
ABSTRACT Sexual harassment has persisted for decades as an open secret within organizations, creating an ongoing challenge for Human Resource practitioners. Many employees experience or witness harassment yet say nothing. When they contemplate complaining, they are discouraged from doing so. Some still muster the courage to speak out about these abuses,
Angela L. Workman‐Stark +6 more
wiley +1 more source
Password Security as a Game of Entropies
We consider a formal model of password security, in which two actors engage in a competition of optimal password choice against potential attacks. The proposed model is a multi-objective two-person game.
Stefan Rass, Sandra König
doaj +1 more source
Password Capabilities Revisited [PDF]
With reference to a distributed system consisting of nodes connected by a local area network, we present a new formulation of the password capability paradigm that takes advantage of techniques of symmetric-key cryptography to represent password capabilities in memory.We assign a cryptographic key to each application; the password capabilities held by ...
openaire +2 more sources
Abstract To determine the prevalence of postpartum depression (PPD) and postpartum stress (PPS) and identify associated risk factors among mothers of preterm and low birth weight (LBW) infants. We conducted a secondary analysis of data collected from 255 mothers with preterm and LBW infants admitted to the neonatal intensive care unit (NICU) at Korle ...
John Pellegrino +6 more
wiley +1 more source
Abstract Objective To assess an innovative technique of intra‐cesarean post‐placental insertion of the Copper T380A IUD (CPPIUD), and explore the role of predischarge ultrasound with replacement of low‐lying IUDs. Methods We conducted a prospective observational study at Princess Marina Hospital, Gaborone, Botswana, from May 31, 2023, to April 3, 2024.
Kyungu M. Kime +2 more
wiley +1 more source
The rise in internet-based services has raised risks of data exposure. The manipulation and exploitation of sensitive data significantly impact individuals’ resilience—the ability to protect and prepare against cyber incidents. Emerging technologies seek
Irfan Riasat +2 more
doaj +1 more source
Abstract Objective While cardiometabolic comorbidities have been well established in adults with polycystic ovary syndrome (PCOS), it remains unclear whether the early signs of cardiovascular morbidity emerge during adolescence. This study aimed to investigate whether metabolic and cardiovascular alterations begin in adolescents with PCOS.
Demet Aygün Ari +8 more
wiley +1 more source
Efficient Braille Transformation for Secure Password Hashing
In this work, we propose a novel approach to enhancing the security of passwords before storing them in databases. Our method utilizes Braille transformation to encrypt the password after generating the corresponding hash.
Hamza Touil +4 more
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source

