Results 51 to 60 of about 801,622 (296)

Oneiric stress and safety and security at work: the discovery of a new universal symbol [PDF]

open access: yes, 2015
Cox and Griffiths define as psychosocial risks at work “those aspects of the planning, organization and management of work, which, along with their environmental and social contexts, may affect mental and physical health of the employees, directly or ...
Accettura, Antonella   +14 more
core   +1 more source

A Systematic Comparison of Alpha‐Synuclein Seed Amplification Assays for Increasing Reproducibility

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Seed amplification assays (SAAs) enable ultrasensitive detection of misfolded α‐synuclein across biofluids and tissues. Yet, heterogeneity in protocols limits cross‐study comparability and clinical translation. Here, we review α‐synuclein SAA methods and their performance across various biological matrices.
Manuela Amaral‐do‐Nascimento   +3 more
wiley   +1 more source

A Session and Dialogue-Based Social Engineering Framework

open access: yesIEEE Access, 2019
Social engineering has been increasingly used during the past few years. Social engineering attacks have resulted in great financial losses. Research on social engineering models and frameworks is still in its elementary stage.
Kangfeng Zheng   +4 more
doaj   +1 more source

YOLO-UAV: Object Detection Method of Unmanned Aerial Vehicle Imagery Based on Efficient Multi-Scale Feature Fusion

open access: yesIEEE Access, 2023
As Unmanned Aerial Vehicle (UAV) remote sensing technology progresses, the utilization of deep learning in UAV imagery object detection has become more prevalent.
Chengji Ma   +5 more
doaj   +1 more source

Usable Security: Why Do We Need It? How Do We Get It? [PDF]

open access: yes, 2005
Security experts frequently refer to people as “the weakest link in the chain” of system security. Famed hacker Kevin Mitnick revealed that he hardly ever cracked a password, because it “was easier to dupe people into revealing it” by employing a range
Flechais, I, Sasse, MA
core  

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

New Onset of Fibromyalgia After Exposure to a Combat Environment: A Longitudinal Cohort Study

open access: yesArthritis Care &Research, EarlyView.
Objective Traumatic life events are hypothesized to be triggers for the onset of fibromyalgia. Posttraumatic stress disorder (PTSD) is a common comorbidity of fibromyalgia. However, limited prospective data are available on the development of fibromyalgia after exposure to high‐magnitude stress.
Jay B. Higgs   +15 more
wiley   +1 more source

Social Engineering and Inter-Device Eavesdropping Using SCRCPY for Spoofing and Sniffing

open access: yesSistemasi: Jurnal Sistem Informasi
The rapid development of technology opens up new avenues for cybercriminals to carry out acts of social engineering and eavesdropping between devices. Social engineering refers to manipulation, influence, or deception used to gain control of a computer ...
Anne Ivena Wijaya   +6 more
doaj   +1 more source

Cyber security threats: A never-ending challenge for e-commerce

open access: yesFrontiers in Psychology, 2022
This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry.
Xiang Liu   +7 more
doaj   +1 more source

The innocent hill walker [PDF]

open access: yes, 2012
Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie ...
Ball, Les, Coull, Natalie
core   +3 more sources

Home - About - Disclaimer - Privacy