Results 251 to 260 of about 1,052,863 (298)
Some of the next articles are maybe not open access.

Perception of information security

Behaviour & Information Technology, 2010
The objective of this study was to investigate people's perception of information security and to unveil the factors that influence people's perception of different threats to information security. In the survey study, 602 respondents were asked to evaluate one of 21 common threats to information security with regard to its rank related to each of the ...
Ding-Long Huang   +2 more
openaire   +3 more sources

Perceptions of Randomized Security Schedules

Risk Analysis, 2013
Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have ...
Nicholas, Scurich, Richard S, John
openaire   +2 more sources

Patient perceptions of medium secure care

Medicine, Science and the Law, 2007
Research into patients' experience of medium secure psychiatric services is in its infancy despite growing interest in user involvement in mental health care as a whole. The work reported here aimed to provide an opportunity for patients to reflect upon their understanding of their route into secure psychiatric provision and their time spent in one ...
Sharon, Riordan, Martin, Humphreys
openaire   +2 more sources

The security perception and security policy of Serbia

Defense & Security Analysis, 2020
Serbia has important role in the regional peace and stability in South Eastern Europe. Over the last three decades Serbian security policies have been directly shaped by numerous turbulent politica...
openaire   +1 more source

User Perceptions of Security Technologies

International Journal of Information Security and Privacy, 2011
In this paper, user perceptions of information systems security are explored through a study of university students. Server authentication, which is often ignored by users, clouded by system administrators, and exploited by hackers, is explored in detail, as it significantly affects usability and requires user knowledge and participation.
Douglas M. Kline   +2 more
openaire   +1 more source

Food Security Stakeholders in Hawai`i: Perceptions of Food Security Monitoring

Journal of Nutrition Education and Behavior, 2002
The purpose of this study was to document Hawai'i's food security stakeholders' perceptions of (1) definitions of food insecurity and hunger, (2) what should be measured, (3) how stakeholders interpret the Core Food Security Module (CFSM) and Face Valid Food Security Measure (FVFSM), and (4) the value of specific items in the CFSM.Perceptions were ...
Joda P, Derrickson, Amy Christine, Brown
openaire   +2 more sources

PERCEPTION OF THE ENTITY'S SECURITY

Rocznik Bezpieczeństwa Morskiego, 2020
The article analyzes the definition of security as the state of affairs in which the subject is located. Attention was focused on objective and subjective perception of security. On the basis of the quoted views, an attempt was made to create a conceptual apparatus enabling the assessment of safety states and danger in correlation with the right and ...
openaire   +1 more source

Perceptions of Security Concerns

2001
The Al Saud family articulated two major security goals throughout its 65-year rule: to maintain custodianship over the holy sites of Makkah and Madinah and to preserve the commanding role of the ruling family. Both, it was posited by every ruler, ensured their legitimacy and, as a consequence, their power.
openaire   +1 more source

Shop Thieves' Perceptions of Retail Security

The Police Journal: Theory, Practice and Principles, 1998
Shop theft is both an expensive and prevalent crime. Despite the introduction of security measures into retailing and refinement of the technology, the war against shop thieves does not yet appear to have been won. Many of these “situational measures” work on the assumption that offenders perceive such technology to increase their risk of apprehension
Martin Gill   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy