Results 251 to 260 of about 1,052,863 (298)
Some of the next articles are maybe not open access.
Perception of information security
Behaviour & Information Technology, 2010The objective of this study was to investigate people's perception of information security and to unveil the factors that influence people's perception of different threats to information security. In the survey study, 602 respondents were asked to evaluate one of 21 common threats to information security with regard to its rank related to each of the ...
Ding-Long Huang +2 more
openaire +3 more sources
Perceptions of Randomized Security Schedules
Risk Analysis, 2013Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have ...
Nicholas, Scurich, Richard S, John
openaire +2 more sources
Patient perceptions of medium secure care
Medicine, Science and the Law, 2007Research into patients' experience of medium secure psychiatric services is in its infancy despite growing interest in user involvement in mental health care as a whole. The work reported here aimed to provide an opportunity for patients to reflect upon their understanding of their route into secure psychiatric provision and their time spent in one ...
Sharon, Riordan, Martin, Humphreys
openaire +2 more sources
The security perception and security policy of Serbia
Defense & Security Analysis, 2020Serbia has important role in the regional peace and stability in South Eastern Europe. Over the last three decades Serbian security policies have been directly shaped by numerous turbulent politica...
openaire +1 more source
User Perceptions of Security Technologies
International Journal of Information Security and Privacy, 2011In this paper, user perceptions of information systems security are explored through a study of university students. Server authentication, which is often ignored by users, clouded by system administrators, and exploited by hackers, is explored in detail, as it significantly affects usability and requires user knowledge and participation.
Douglas M. Kline +2 more
openaire +1 more source
Food Security Stakeholders in Hawai`i: Perceptions of Food Security Monitoring
Journal of Nutrition Education and Behavior, 2002The purpose of this study was to document Hawai'i's food security stakeholders' perceptions of (1) definitions of food insecurity and hunger, (2) what should be measured, (3) how stakeholders interpret the Core Food Security Module (CFSM) and Face Valid Food Security Measure (FVFSM), and (4) the value of specific items in the CFSM.Perceptions were ...
Joda P, Derrickson, Amy Christine, Brown
openaire +2 more sources
PERCEPTION OF THE ENTITY'S SECURITY
Rocznik Bezpieczeństwa Morskiego, 2020The article analyzes the definition of security as the state of affairs in which the subject is located. Attention was focused on objective and subjective perception of security. On the basis of the quoted views, an attempt was made to create a conceptual apparatus enabling the assessment of safety states and danger in correlation with the right and ...
openaire +1 more source
Perceptions of Security Concerns
2001The Al Saud family articulated two major security goals throughout its 65-year rule: to maintain custodianship over the holy sites of Makkah and Madinah and to preserve the commanding role of the ruling family. Both, it was posited by every ruler, ensured their legitimacy and, as a consequence, their power.
openaire +1 more source
Shop Thieves' Perceptions of Retail Security
The Police Journal: Theory, Practice and Principles, 1998Shop theft is both an expensive and prevalent crime. Despite the introduction of security measures into retailing and refinement of the technology, the war against shop thieves does not yet appear to have been won. Many of these “situational measures” work on the assumption that offenders perceive such technology to increase their risk of apprehension
Martin Gill +2 more
openaire +1 more source

