Results 1 to 10 of about 25,093 (292)

A Taxonomy of SETA Methods and Linkage to Delivery Preferences

open access: greenACM Sigmis Database, 2023
Cybersecurity threats targeting users are common in today's information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data.
Joakim Kävrestad   +2 more
openalex   +3 more sources

Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling

open access: yesEuropean Journal of Information Systems, 2020
Online self-disclosure (OSD) on social networking sites can leave individuals and organisations vulnerable to security threats. Following a design science research (DSR) method, we created a gamified, “choose your own adventure” style security education,
Ersin Dincelli   +1 more
exaly   +2 more sources

Molecular and mechanical insights into gecko seta adhesion: multiscale simulations combining molecular dynamics and the finite element method [PDF]

open access: yesBeilstein Journal of Nanotechnology
Gecko adhesion, enabled by micro- and nanoscale structures known as setae and spatulae, has prompted extensive research. We present a concurrent multiscale computational model of a seta that integrates molecular dynamics to capture molecular interactions
Yash Jain   +4 more
doaj   +2 more sources

The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model

open access: yesInformation Technology and People, 2023
PurposeThis study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies ...
Areej Alyami   +2 more
exaly   +2 more sources

Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives [PDF]

open access: hybridInformation and Computer Security, 2023
Purpose Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals ...
Areej Alyami   +3 more
openalex   +2 more sources

Development of a Series Elastic Tendon Actuator (SETA) Based on Gait Analysis for a Knee Assistive Exosuit

open access: yesActuators, 2022
An exosuit is a wearable robot that assists the muscular strength of a human that wears it by using multiple wires with similar functions to human muscles. This study focuses on the development of a series elastic tendon actuator (SETA) for the actuation
Hee Don Lee   +3 more
doaj   +2 more sources

Domain organization of Legionella effector SetA

open access: yesCellular Microbiology, 2012
Legionella pneumophila is a human pathogen causing severe pneumonia called Legionnaires' disease. Multiple Legionella effectors are type IV‐secreted into the host cell to establish a specific vesicular compartment for pathogen replication.
Carsten Schwan   +2 more
exaly   +2 more sources

Esophageal cancer responsive to the combination of immune cell therapy and low-dose nivolumab: two case reports

open access: yesJournal of Medical Case Reports, 2021
Background Blocking the programmed death 1 pathway by immune checkpoint inhibitors induces dramatic antitumor activity in patients with malignant tumors. However, the clinical response to immune checkpoint inhibitors remains limited owing to the patients’
Rishu Takimoto   +7 more
doaj   +1 more source

Morphological Characters and Histology of Pheretima darnleiensis

open access: yesHayati Journal of Biosciences, 2012
Pheretima darnleiensis is a native earthworm of Southeast Asia, India, and Japan. Although it is commonly found in Indonesia, the earthworm has never been studied well.
ANDY DARMAWAN   +2 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy