Results 41 to 50 of about 247,400 (347)

The application of useless Japanese inventions for requirements elicitation in information security [PDF]

open access: yes, 2016
Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements.
Faily S   +5 more
core   +2 more sources

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

Stereotactic Body Radiation Therapy for Pediatric, Adolescent, and Young Adult Patients With Osteosarcoma: Local Control Outcomes With Dosimetric Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis   +13 more
wiley   +1 more source

Usable pasts forum: critically engaging food security

open access: yes, 2019
In this inaugural Usable Pasts Forum, we make the case that archaeology has a critical role to play in reframing approaches to food security in the African ...
Goldstein, S.   +4 more
core   +1 more source

Evaluating Security and Usability of Profile Based Challenge Questions Authentication in Online Examinations [PDF]

open access: yes, 2014
© 2014 Ullah et al.; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in
Barker, Trevor   +3 more
core   +1 more source

Developmental Disorders in Children Recently Diagnosed With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag   +5 more
wiley   +1 more source

Have Usability and Security Trade-offs in Mobile Financial Services (MFS) become Untrustworthy? [PDF]

open access: yes, 2018
The trade-off between Usability and Security has been well researched with various models proposed on how best to improve Usability without jeopardizing Security and vice visa. Usable Security has become a key factor in Mobile Financial Services (MFS),
Ambore, S.   +3 more
core  

Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]

open access: yes, 2017
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian   +6 more
core   +1 more source

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Deriving Usability Evaluation Criteria for Threat Modeling Tools

open access: yesIEEE Access
As the domestic and international landscape rapidly changes, the importance of implementing security measures in response to the growing threats that businesses face has increased.
Inno Hwang, Hyunsuk Cho, Seungjoo Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy