Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1921
The roles of urban agriculture to household food security: a case study in Kirkos sub-city, Addis Ababa city, Ethiopia
Published 2025-02-01Subjects: “…food security…”
Get full text
Article -
1922
Securing E.U. Democracy and Citizenship at what Costs? Reflections on Defence Spendings Between North-South and West-East Divergens
Published 2024-12-01Subjects: Get full text
Article -
1923
DEMOCRATIC PRINCIPLES AND THE ROLES OF TRADITIONAL POLITICAL INSTITUTIONS IN PROMOTING PEACE AND SECURITY IN NORTHERN NIGERIA: A CASE STUDY OF GOMBE STATE.
Published 2024-06-01“… The adoption of Western Democracy after independence has come with a lot of changes to the hitherto roles and powers of traditional political institutions of building peace and security generally inNorthern Nigeria and Gombe in particular. …”
Get full text
Article -
1924
Food Availability, Accessibility, and Affordability through the Scope of Food Security Level and Food Environment Perception in Mexico City’s Marginated Area
Published 2025-02-01Subjects: “…food security…”
Get full text
Article -
1925
Risk Assessment Maturity Level of Academic Information System Using ISO 27001 System Security Engineering-Capability Maturity Model
Published 2024-06-01“…This research aims to determine the current level of Academic Information System (AIS) service by measuring maturity and security risks. Three clauses measure the maturity level of information security controls with the ISO 27001 System Security Engineering-Capability Maturity Model (SSE-CMM). …”
Get full text
Article -
1926
Threats and Challenges to The International Legal Order: Legal Problems Of Ensuring International Security in Modern Conditions (Some Conceptual Conclusions and Conclusions)
Published 2024-01-01“…This study is aimed at considering topical international legal problems of ensuring international security in the modern environment of environmental and nuclear law. …”
Get full text
Article -
1927
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01Subjects: Get full text
Article -
1928
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
1929
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
Published 2025-01-01Subjects: “…Secure channel…”
Get full text
Article -
1930
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
Published 2025-01-01Subjects: Get full text
Article -
1931
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
Published 2025-03-01Subjects: “…Information security policy…”
Get full text
Article -
1932
-
1933
MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA
Published 2024-05-01Subjects: “…information security management…”
Article -
1934
Performance of RIS-Secured Short-Packet NOMA Systems With Discrete Phase-Shifter to Protect Digital Content and Copyright Against Untrusted User
Published 2025-01-01Subjects: “…Content security…”
Get full text
Article -
1935
An Extended Interval Type-2 Fuzzy VIKOR Technique with Equitable Linguistic Scales and Z-Numbers for Solving Water Security Problems in Malaysia
Published 2023-01-01“…The obtained solutions would help decision makers (DMs) identify the best solution to enhance water security projects in terms of finding the best strategies for water supply security in Malaysia.…”
Get full text
Article -
1936
Three Mediating Pathways of Anxiety and Security in the Relationship between Coping Style and Disordered Eating Behaviors among Chinese Female College Students
Published 2021-01-01“…According to previous studies, eating disorders and disordered eating behaviors are associated with coping style, anxiety, and sense of security. However, the specific mechanism between them has not been elucidated. …”
Get full text
Article -
1937
-
1938
-
1939
A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques
Published 2015-04-01“…User authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. …”
Get full text
Article -
1940
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia
Published 2025-02-01Subjects: Get full text
Article