Results 11 to 20 of about 2,521,807 (266)

Mobile device users' susceptibility to phishing attacks [PDF]

open access: yesIJCSIT 1 (2022) 1-18, 2022
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector. Mobile devices are used for everyday life, such as personal information exchange - chatting, email, shopping, and mobile banking, contributing to information security threats. Users' behavior can influence information security threats.
arxiv   +1 more source

Attention to Threats and Combat-Related Posttraumatic Stress Symptoms [PDF]

open access: yesJAMA Psychiatry, 2013
Combat places soldiers at risk for posttraumatic stress disorder (PTSD). The excessive rates of PTSD and other adjustment disorders in soldiers returning home make it imperative to identify risk and resilience factors that could be targeted by novel therapeutic treatments.To investigate the interplay among attention to threat, combat exposure, and ...
David Goldman   +9 more
openaire   +3 more sources

Evaluation of Threats Occurring During Provision of Road Transport Services in the EU Territory by Small and Medium-Sized Companies from Poland [PDF]

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2019
The aim of the paper is to conduct an analysis of various threats that may occur during road freight transport in the territory of the European Union. The research method consisted of a survey and the sample group selected for the survey were transport ...
Marek Krzywonos
doaj   +1 more source

Simulation of the logistic process of the industrial enterprise evacuation in wartime

open access: yesАвіаційно-космічна техніка та технологія, 2022
The complex problem of a multicriteria nature that is related to the justification of the new location for the evacuated enterprise is stated and solved.
Oleg Fedorovich   +3 more
doaj   +1 more source

ANALYSIS OF INTERNAL SOURCES OF HAZARDS IN CIVIL AIR OPERATIONS [PDF]

open access: yesScientific Journal of Silesian University of Technology. Series Transport, 2017
International air law imposes an obligation on the part of transport operators to operationalize risk management, and hence develop records of hazards and estimate the level of risk in the respective organization.
Katarzyna CHRUZIK   +2 more
doaj   +1 more source

Maritime Industry Cybersecurity: A Review of Contemporary Threats

open access: yesEUROPEAN RESEARCH STUDIES JOURNAL, 2023
: Purpose: This article aims to analyze the evolution of cyber threats in maritime transport, highlighting the increasing vulnerability of this sector to a variety of cyber attacks in the era of growing on advanced technologies.
Adrianna Karaś
semanticscholar   +1 more source

Different aspects in the safety of road transport [PDF]

open access: yesModern Management Review, 2018
Research terminology regarding the security of civilians and transport security used in source literature refers to a number of conditions. In the course of an analysis, it was observed that the level of security of populations inhabiting a given country
Michał KLIMEK
doaj   +1 more source

Settling Velocity of Microplastics Exposed to Wave Action

open access: yesJournal of Marine Science and Engineering, 2021
Microplastic (MP) debris is recognized to be one of the most serious threats to marine environments. They are found in all seas and oceanic basins worldwide, even in the most remote areas. This is further proof that the transport of MPs is very efficient.
Annalisa De Leo   +3 more
doaj   +1 more source

Potential sources of threats in the designing and constructing process of aircrafts

open access: yesJournal of KONBiN, 2023
Safety is the top priority in aviation. Air transport is one of the safest means of transport. This is the result of continuous activities aimed at eliminating sources of potential threats in all areas related to the performance of aviation operations ...
Zbigniew Uchman
semanticscholar   +1 more source

Cyber-Physical Systems: Security Threats and Countermeasures

open access: yesJ. Sens. Actuator Networks, 2023
The recent proliferation of sensors and actuators, which is related to the Internet of Things (IoT), provide smart living to the general public in many data-critical areas, from homes and healthcare to power grids and transport [...]
M. Hammoudeh   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy