Biblio

Export 21341 results:
2022
Rajamäki, Jyri, and Aarne Hummelholm. "Ethical Resilience Management Framework for Critical Healthcare Information Infrastructure." WSEAS Transactions on Biology and Biomedicine 19, no. 9 (2022): 67-76.
Uchida, Shu. "The EU Actorness in the Security Field: The Case of Georgia." In EU Global Actorness in a World of Contested Leadership: Policies, Instruments and Perceptions. Palgrave Macmillan, 2022.
Shinohara, Mamoru. Evaluating the framework of maritime domain awareness in Japan: opportunities for improvement In Maritime Safety and Environmental Administration. Vol. Master of Science in maritime affars. Malmö, Sweden: World Maritime University, 2022.
Bryczek-Wróbel, Patrycja, and Maciej Moszczyński. "The evolution of the concept of information warfare in the modern information society of the post-truth era." Przegląd Nauk o Obronności 13 (2022): 48-62.
Townsend, III, Howard E.. An Examination of the Significance of Security Knowledge and Attitudes on Security Behavior In School of Business, Technology, and Health Care Administration. Vol. Doctor of Philosophy. Capella University, 2022.
Starodubska, Maryna. "Excessive Brotherly Love? - 'Fraternity' of Russians and Ukrainians as a Russian Propaganda Narrative." Connections: The Quarterly Journal 21, no. 3 (2022): 47-66.
Pérez, Virgilio, Cristina Aybar, and Jose Pavía. "Expanding the New Roles of the Military—The Case of Spain’s Military Emergency Unit: A Research Note." Armed Forces & Society (2022).
Angelov, Grudi. "The Experience of Rakovski National Defense College in Organizing the Communication in the Educational Process During Covid-19 Pandemic." Information & Security: An International Journal 51 (2022): 89-96.
Vivek, Yelleti, Vadlamani Ravi, Abhay Anand Mane, and Laveti Ramesh Naidu. "Explainable Artificial Intelligence and Causal Inference based ATM Fraud Detection ." arXiv preprint arXiv:2211.10595 (2022).
Okomanyi, Abraham Onipe. Exploring Risk-Based Approach for Preventing Cyberattacks in the Automotive Industry. Phoenix, Arizona: Grand Canyon University, 2022.
Saura, Jose Ramon, Domingo Ribeiro-Soriano, and PabloZegarra Saldaña. "Exploring the challenges of remote work on Twitter users' sentiments: From digital technology development to a post-pandemic era Author links open overlay panel." Journal of Business Research 142 (2022).
Alanazi, Marfua, Mark Freeman, and Holly Tootell. "Exploring the factors that influence the cybersecurity behaviors of young adults Author links open overlay panel." Computers in Human Behavior 136 (2022).
Alzarooni, Abdelrahim, and Mohammed Lataifeh. Exploring the relationship between IT competence and digital transformation within government projects in the UAE In 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). Dalian, China, 2022.
Chambers, Michael David. Exploring the Standards Cybersecurity Practitioners Need to Comply with Multinational Cybersecurity Requirements. Vol. Doctor of Computer Science. Colorado Technical University, 2022.
Kashyapa, Kamal, Robin Thakur, Raj Kumar, and Sunil Kumar. "Feasibility analysis for conversion of existing traditional watermills in Western Himalayan region of India to micro-hydropower plants using a low head Archimedes screw turbine for rural electrification." International Journal of Ambient Energy 43, no. 1 (2022).
Hilal, Waleed, Andrew S. Gadsden, and John Yawney. "Financial Fraud: A Review of Anomaly Detection Techniques and Recent Advances." Expert Systems with Applications 193 (2022).
Lanier, Stacy Terrill. The Financial Implications of Information Security: A Correlational Study. Northcentral University, 2022.
Ebbeler, Raymond Walter. Following the Path of Small and Medium-Sized Medical Technology Startups Seeking Funding Before FDA Clearance. Scottsdale, AZ: Northcentral University, 2022.
Fitriyani, Zenita Afifah, Yuyu Jahratu No Santy, Eka Indah Nur Laili, and Oktaviani Permatasari. "Is a Food Security Program a Solution in Family Economic Resilience? ." Mega Aktiva: Jurnal Ekonomi dan Manajemen 11, no. 1 (2022).
Deng, Xinyang, and Wen Jiang. "A framework for the fusion of non-exclusive and incomplete information on the basis of D number theory ." Applied Intelligence (2022).
Alzahrani, Ahmed G., Ahmed Alhomoud, and Gary Wills. "A Framework of the Critical Factors for Healthcare Providers in Data-Sharing Using Blockchain." IEEE Access (2022).
Delaney, Hannah. On the Fringe: An Analysis of Violent Discourse on Ideologically Motivated Violent Extremism on Less-Regulated Social Media Platforms In Norman Paterson School of International Affairs. Vol. Master of International Affairs. Ottawa, Ontario: Carleton University , 2022.
Shabana, Ihab. "From an Understanding to a Securitizing Discourse: The British Left’s Encounter with the Emergence of Political Islam, 1978–2001 ." Religions 13, no. 206 (2022).
Maurer, Claire. From Franco's Nightmare to a Globalized Spain: A Cinematic Analysis In Claremont-UC Undergraduate Research Conference on the European Union. Vol. 2022., 2022.
Dobias, Peter, Kyle Christensen, and William Freid. "Gaming Intermediate Force Capabilities: Strategic Implications of Tactical Decisions." Connections: The Quarterly Journal 21, no. 2 (2022): 97-109.

Pages