Works matching DE "INFORMATION assurance"
Results: 95
Facet Selectivity Guided Assembly of Nanoarchitectures onto Two‐Dimensional Metal–Organic Framework Nanosheets.
- Published in:
- Angewandte Chemie, 2021, v. 133, n. 32, p. 17705, doi. 10.1002/ange.202103486
- By:
- Publication type:
- Article
A novel approach for dual layer security of message using Steganography and Cryptography.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 15, p. 20669, doi. 10.1007/s11042-022-12084-y
- By:
- Publication type:
- Article
Community Corner.
- Published in:
- ISSA Journal, 2022, v. 20, n. 10, p. 14
- Publication type:
- Article
Python Programming: Log Analysis Series.
- Published in:
- ISSA Journal, 2021, v. 19, n. 11, p. 17
- By:
- Publication type:
- Article
Python Programming Log Analysis Series.
- Published in:
- ISSA Journal, 2021, v. 19, n. 10, p. 20
- By:
- Publication type:
- Article
News from the Foundation.
- Published in:
- ISSA Journal, 2021, v. 19, n. 10, p. 14
- Publication type:
- Article
Medical Students' Perception of Anatomy Education Environment in Universiti Putra Malaysia.
- Published in:
- Malaysian Journal of Medicine & Health Sciences, 2021, v. 17, n. 4, p. 37
- By:
- Publication type:
- Article
Improved and Secure Differential LSB Embedding Steganography.
- Published in:
- Journal of Information Assurance & Security, 2017, v. 12, n. 5, p. 170
- By:
- Publication type:
- Article
How to Challenge University Students to Work on Integrated Reporting and Integrated Reporting Assurance.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 19, p. 10761, doi. 10.3390/su131910761
- By:
- Publication type:
- Article
Thermal Comfort in Places of Worship within a Mediterranean Climate.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 13, p. 7233, doi. 10.3390/su13137233
- By:
- Publication type:
- Article
European Financial Services SMEs: Language in Their Sustainability Reporting.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 20, p. 8377, doi. 10.3390/su12208377
- By:
- Publication type:
- Article
Sustainability Reporting Quality of Peruvian Listed Companies and the Impact of Regulatory Requirements of Sustainability Disclosures.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 3, p. 1135, doi. 10.3390/su12031135
- By:
- Publication type:
- Article
The association between vaccination confidence, vaccination behavior, and willingness to recommend vaccines among Finnish healthcare workers.
- Published in:
- PLoS ONE, 2019, v. 14, n. 10, p. 1, doi. 10.1371/journal.pone.0224330
- By:
- Publication type:
- Article
Preserving Continuity of Behavioral Health Clinical Care to Patients Using Mobile Devices.
- Published in:
- 2021
- By:
- Publication type:
- journal article
Effective information management and assurance for a modern organisation during a crisis.
- Published in:
- Journal of Business Continuity & Emergency Planning, 2015, v. 9, n. 1, p. 52, doi. 10.69554/vgeh4748
- By:
- Publication type:
- Article
Comprometidos con la Renovación de la Acreditación del programa de Contaduría Pública de la Universidad Libre, seccional Barranquilla.
- Published in:
- Dictamen Libre, 2023, n. 32, p. 11, doi. 10.18041/2619-4244/dl.32.10393
- By:
- Publication type:
- Article
Cybersecurity Implications in Mobile Device Augmented Reality Applications.
- Published in:
- GSTF Journal on Computing, 2014, v. 4, n. 1, p. 74, doi. 10.5176/2251-3043_4.1.311
- By:
- Publication type:
- Article
Message Passing for Distributed QoS-Security Tradeoffs†.
- Published in:
- Computer Journal, 2014, v. 57, n. 6, p. 840, doi. 10.1093/comjnl/bxt064
- By:
- Publication type:
- Article
Risk Management Framework (RMF) and the Implementation Challenges.
- Published in:
- Proceedings of the Northeast Business & Economics Association, 2017, p. 11
- By:
- Publication type:
- Article
A Centralized Holistic Approach to Information Assurance Testing.
- Published in:
- ITEA Journal of Test & Evaluation, 2015, v. 36, n. 3, p. 208
- By:
- Publication type:
- Article
DISASTER EXPERIENCE AND HOSPITAL INFORMATION SYSTEMS: AN EXAMINATION OF PERCEIVED INFORMATION ASSURANCE, RISK, RESILIENCE, AND HIS USEFULNESS.
- Published in:
- MIS Quarterly, 2015, v. 39, n. 2, p. 317
- By:
- Publication type:
- Article
Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies.
- Published in:
- International Journal of Information & Knowledge Management (22318836), 2024, v. 14, n. 2, p. 127, doi. 10.24191/jikm.v14i2.4474
- By:
- Publication type:
- Article
Connecting with Citizens Through Ethical Behavior.
- Published in:
- Journal of Government Financial Management, 2021, v. 70, n. 1, p. 54
- By:
- Publication type:
- Article
MORE CONFIDENCE OF THE FINANCIAL AND NON-FINANCIAL INFORMATION WITH THE ASSURANCE OF SUSTAINABILITY REPORTING.
- Published in:
- Annales Universitatis Apulensis - Series Oeconomica, 2020, v. 22, n. 2, p. 26, doi. 10.29302/oeconomica.2020.22.2.3
- By:
- Publication type:
- Article
INFORMATION ASSURANCE BENEFITS AND CHALLENGES: AN INTRODUCTION.
- Published in:
- Information & Security, 2017, v. 36, n. 1, p. 1, doi. 10.11610/isij.3604
- By:
- Publication type:
- Article
PRECISION OF COBAS C311 ROCHE ANALYZER IN DETERMINING THE VALUES OF TOTAL CHOLESTEROL–VERIFICATION STUDY.
- Published in:
- Turkish Journal of Biochemistry / Turk Biyokimya Dergisi, 2023, v. 48, p. 142
- By:
- Publication type:
- Article
Improved Searchable Attribute Based Encryption in Cloud.
- Published in:
- Journal of Information Science & Engineering, 2017, v. 33, n. 3, p. 823, doi. 10.6688/JISE.2017.33.3.14
- By:
- Publication type:
- Article
An SDN-based Sampling System for Cloud P2P Bots Detection.
- Published in:
- Journal of Information Science & Engineering, 2017, v. 33, n. 3, p. 807, doi. 10.6688/JISE.2017.33.3.13
- By:
- Publication type:
- Article
What topics should or should not be included in software security education—Qualitative content analysis.
- Published in:
- Computer Applications in Engineering Education, 2022, v. 30, n. 6, p. 1753, doi. 10.1002/cae.22554
- By:
- Publication type:
- Article
THE URGENCY OF PERSONAL DATA PROTECTION AGENCIES IN SUSTAINING THE RESILIENCE OF THE DIGITAL WORLD.
- Published in:
- Journal Edunity, 2024, v. 3, n. 6, p. 345, doi. 10.57096/edunity.v3i6.251
- By:
- Publication type:
- Article
Cybersecurity and Information Assurance for the Clinical Laboratory.
- Published in:
- Journal of Applied Laboratory Medicine, 2023, v. 8, n. 1, p. 145, doi. 10.1093/jalm/jfac119
- By:
- Publication type:
- Article
Hybrid Cryptography for Random-key Generation based on ECC Algorithm.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2017, v. 7, n. 3, p. 1293, doi. 10.11591/ijece.v7i3.pp1293-1298
- By:
- Publication type:
- Article
The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes.
- Published in:
- 2018
- By:
- Publication type:
- journal article
Implementing Benford's law in continuous monitoring applications.
- Published in:
- Journal of Accounting & Management Information Systems / Contabilitate si Informatica de Gestiune, 2020, v. 19, n. 2, p. 379, doi. 10.24818/jamis.2020.02008
- By:
- Publication type:
- Article
Communicating Assurance Using Practitioner-Customized Procedures: An Experiment and Emerging Research Opportunities.
- Published in:
- Auditing: A Journal of Practice & Theory, 2020, v. 39, n. 4, p. 201, doi. 10.2308/AJPT-19-103
- By:
- Publication type:
- Article
Organizational information security as a complex adaptive system: insights from three agent-based models.
- Published in:
- Information Systems Frontiers, 2017, v. 19, n. 3, p. 509, doi. 10.1007/s10796-015-9608-8
- By:
- Publication type:
- Article
Proactive Prevention Key Solution for Wormhole Attack in IEEE 802.11 Networks Using AODV.
- Published in:
- Wireless Personal Communications, 2023, v. 128, n. 1, p. 89, doi. 10.1007/s11277-022-09942-1
- By:
- Publication type:
- Article
Enhancing Detection of R2L Attacks by Multistage Clustering Based Outlier Detection.
- Published in:
- Wireless Personal Communications, 2022, v. 124, n. 3, p. 2637, doi. 10.1007/s11277-022-09482-8
- By:
- Publication type:
- Article
Secret Key Generation by Exploiting Traffic Load for Mobile Adhoc Networks.
- Published in:
- Wireless Personal Communications, 2021, v. 119, n. 2, p. 1899, doi. 10.1007/s11277-021-08311-8
- By:
- Publication type:
- Article
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5253, doi. 10.1007/s11277-016-3739-1
- By:
- Publication type:
- Article
Економічний взаємозв’язок розвитку сільського господарства та сільськогосподарського машинобудування.
- Published in:
- Problems of Economy, 2020, v. 45, n. 4, p. 134, doi. 10.32983/2222-0712-2020-4-134-145
- By:
- Publication type:
- Article
Extracting network based attack narratives through use of the cyber kill chain: A replication study.
- Published in:
- IT: Information Technology, 2022, v. 64, n. 1/2, p. 29, doi. 10.1515/itit-2021-0059
- By:
- Publication type:
- Article
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game.
- Published in:
- Computer Journal, 2024, v. 67, n. 1, p. 338, doi. 10.1093/comjnl/bxac177
- By:
- Publication type:
- Article
Erfahrungswerte zur Prognose der axialen Grenztragfähigkeit von Duktilrammpfählen.
- Published in:
- Bautechnik, 2023, v. 100, n. 12, p. 751, doi. 10.1002/bate.202300059
- By:
- Publication type:
- Article
ECONOMIC ASPECTS AND CHALLENGES IN PRECISION AGRICULTURE.
- Published in:
- Trakia Journal of Sciences, 2021, v. 19, p. 162, doi. 10.15547/tjs.2021.s.01.024
- By:
- Publication type:
- Article
Reply to Rajakumar.
- Published in:
- European Journal of Cardio-Thoracic Surgery, 2025, v. 67, n. 1, p. 1, doi. 10.1093/ejcts/ezaf002
- By:
- Publication type:
- Article
A New Method Encryption and Decryption.
- Published in:
- Webology, 2021, v. 18, n. 1, p. 20, doi. 10.14704/WEB/V18I1/WEB18002
- By:
- Publication type:
- Article
Message Authentication over Noisy Channels.
- Published in:
- Entropy, 2015, v. 17, n. 1, p. 368, doi. 10.3390/e17010368
- By:
- Publication type:
- Article
Physician and patient's insights towards generic prescribing: The scenario in the United Arab Emirates.
- Published in:
- Journal of Generic Medicines, 2019, v. 15, n. 4, p. 193, doi. 10.1177/1741134319882722
- By:
- Publication type:
- Article
IMAGE ENCRYPTION TECHNIQUE BASED ON BINARY COMBINATION OF MULTIPLE CHAOTIC MAPS AND DNA SEQUENCE OPERATIONS.
- Published in:
- Jordanian Journal of Computers & Information Technology, 2024, v. 10, n. 4, p. 412
- By:
- Publication type:
- Article