Results 1 to 10 of about 7,372,576 (288)
Background Women’s mobile health (mHealth) is a growing phenomenon in the mobile app global market. An increasing number of women worldwide use apps geared to female audiences (female technology).
Alfawzan N +3 more
europepmc +2 more sources
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies
The Content Security Policy (CSP) mechanism was developed as a mitigation against script injection attacks in 2010. In this paper, we leverage the unique vantage point of the Internet Archive to conduct a historical and longitudinal analysis of how CSP deployment has evolved for a set of 10,000 highly ranked domains.
Roth, S +4 more
openaire +3 more sources
Family Economic Security Policies and Child and Family Health. [PDF]
Spencer RA, Komro KA.
europepmc +2 more sources
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and ...
Ribeiro, Carlos +3 more
openaire +5 more sources
Verifying Security Policies in Multi-agent Workflows with Loops [PDF]
We consider the automatic verification of information flow security policies of web-based workflows, such as conference submission systems like EasyChair.
B. Finkbeiner +3 more
semanticscholar +1 more source
Purpose This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs).
M. Sadok, Steven L. Alter, P. Bednar
semanticscholar +1 more source
On Security Policy Migrations [PDF]
There has been over the past decade a rapid change towards computational environments that are comprised of large and diverse sets of devices, many of them mobile, which can connect in flexible and context-dependent ways. Examples range from networks where we can have communications between powerful cloud centers, to the myriad of simple sensor devices
Lobo, Jorge +2 more
openaire +1 more source
The European Union's 'Comprehensive Approach' in Chad: securitisation and/or compartmentalisation? [PDF]
The European Union (EU) aims for a comprehensive approach to security in developing countries. As a result, attempts have been made to enhance the nexus between the EU's security policy and other policy areas, particularly development, humanitarian ...
Del Biondo, Karen, Orbie, Jan
core +1 more source
American hegemony or global governance? Competing visions of international security [PDF]
An overview is given of two competing visions of contemporary international security: United States hegemony and security governance. According to these perspectives, the current generation is either witnessing the return to classical balance-of-power ...
Krahmann, E
core +1 more source
Information security policies: Investigation of compliance in universities
Information security awareness (ISA) is signified as a state of consciousness and acquaintance about the potential security issues/breaches and is found to have an association with security policies compliance in organizations.
Sadaf Hina, D. D. Dominic
semanticscholar +1 more source

