Showing 661 - 680 results of 72,530 for search 'IXFORM~', query time: 3.91s Refine Results
  1. 661
  2. 662

    A non-linear model of information seeking behaviour by Allen E. Foster

    Published 2005-01-01
    Subjects: “…Information seeking behaviour…”
    Get full text
    Article
  3. 663
  4. 664

    The effect of formal and informal communication on managerial satisfaction and performance by Christopher Orpen

    Published 2022-11-01
    “…Significantly positive relations were formed between unscheduled communications and job satisfaction, especially horizontal communication None of the relations between scheduled or unscheduled communications and job performance were significant …”
    Get full text
    Article
  5. 665
  6. 666
  7. 667

    Youtube as a Source of Patient Information for Gummy Smile by Emrah Turkmen, Merve Can, Melis Yılmaz

    Published 2024-08-01
    “… Purpose:To evaluate the content and quality of information on gummy smile offered by YouTube videos for patients.Materials and Methods:The keyword “gummy smile” was searched on Youtube. …”
    Get full text
    Article
  8. 668
  9. 669

    Information security vulnerability scoring model for intelligent vehicles by Haiyang YU, Xiuzhen CHEN, Jin MA, Zhihong ZHOU, Shuning HOU

    Published 2022-02-01
    “…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
    Get full text
    Article
  10. 670
  11. 671
  12. 672

    Scientific information management in the research education of Medicine students by Elso Manuel Cruz Cruz, Eslhey Sánchez Domínguez

    Published 2009-09-01
    “…<p>In any scientific research it is very important to achieve an appropriate information management to allow creating and transmitting new knowledge. …”
    Get full text
    Article
  13. 673
  14. 674
  15. 675
  16. 676

    Financial Reporting Quality and Sustainability Information Disclosure in Brazil by João Antônio Salvador de Souza, Leonardo Flach, José Alonso Borba, Cleber Broietti

    Published 2019-01-01
    “…Currently, businesses face an information disclosure approach involving the triple bottom line (social, environmental, and financial). …”
    Get full text
    Article
  17. 677

    Reputation Detection for Information Diffusion in Social Network Systems by Yifeng Zhou, Fang Yu

    Published 2022-01-01
    “…The main idea is that the positive (or negative) observation of an information diffusion process increases (or decreases) the belief of the corresponding diffusion path, which further increases (or decreases) the reputation of each involved agent. …”
    Get full text
    Article
  18. 678
  19. 679

    Sources of Extension Information for Growers in Miami-Dade County by Rafael Muñoz-Carpena, Jonathan H. Crane, Glenn Israel

    Published 2005-04-01
    “… This fact sheet reports on the part of a survey that addressed growers sources of notification and information on water management and conservation in Miami-Dade County. …”
    Get full text
    Article
  20. 680