Results 41 to 50 of about 247,400 (347)
The application of useless Japanese inventions for requirements elicitation in information security [PDF]
Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements.
Faily S +5 more
core +2 more sources
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis +13 more
wiley +1 more source
Usable pasts forum: critically engaging food security
In this inaugural Usable Pasts Forum, we make the case that archaeology has a critical role to play in reframing approaches to food security in the African ...
Goldstein, S. +4 more
core +1 more source
Evaluating Security and Usability of Profile Based Challenge Questions Authentication in Online Examinations [PDF]
© 2014 Ullah et al.; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in
Barker, Trevor +3 more
core +1 more source
Developmental Disorders in Children Recently Diagnosed With Cancer
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag +5 more
wiley +1 more source
Have Usability and Security Trade-offs in Mobile Financial Services (MFS) become Untrustworthy? [PDF]
The trade-off between Usability and Security has been well researched with various models proposed on how best to improve Usability without jeopardizing Security and vice visa. Usable Security has become a key factor in Mobile Financial Services (MFS),
Ambore, S. +3 more
core
Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian +6 more
core +1 more source
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source
Deriving Usability Evaluation Criteria for Threat Modeling Tools
As the domestic and international landscape rapidly changes, the importance of implementing security measures in response to the growing threats that businesses face has increased.
Inno Hwang, Hyunsuk Cho, Seungjoo Kim
doaj +1 more source

