Biblio

Export 21359 results:
2022
Vivek, Yelleti, Vadlamani Ravi, Abhay Anand Mane, and Laveti Ramesh Naidu. "Explainable Artificial Intelligence and Causal Inference based ATM Fraud Detection ." arXiv preprint arXiv:2211.10595 (2022).
Okomanyi, Abraham Onipe. Exploring Risk-Based Approach for Preventing Cyberattacks in the Automotive Industry. Phoenix, Arizona: Grand Canyon University, 2022.
Saura, Jose Ramon, Domingo Ribeiro-Soriano, and PabloZegarra Saldaña. "Exploring the challenges of remote work on Twitter users' sentiments: From digital technology development to a post-pandemic era Author links open overlay panel." Journal of Business Research 142 (2022).
Alanazi, Marfua, Mark Freeman, and Holly Tootell. "Exploring the factors that influence the cybersecurity behaviors of young adults Author links open overlay panel." Computers in Human Behavior 136 (2022).
Alzarooni, Abdelrahim, and Mohammed Lataifeh. Exploring the relationship between IT competence and digital transformation within government projects in the UAE In 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). Dalian, China, 2022.
Chambers, Michael David. Exploring the Standards Cybersecurity Practitioners Need to Comply with Multinational Cybersecurity Requirements. Vol. Doctor of Computer Science. Colorado Technical University, 2022.
Kashyapa, Kamal, Robin Thakur, Raj Kumar, and Sunil Kumar. "Feasibility analysis for conversion of existing traditional watermills in Western Himalayan region of India to micro-hydropower plants using a low head Archimedes screw turbine for rural electrification." International Journal of Ambient Energy 43, no. 1 (2022).
Hilal, Waleed, Andrew S. Gadsden, and John Yawney. "Financial Fraud: A Review of Anomaly Detection Techniques and Recent Advances." Expert Systems with Applications 193 (2022).
Lanier, Stacy Terrill. The Financial Implications of Information Security: A Correlational Study. Northcentral University, 2022.
Ebbeler, Raymond Walter. Following the Path of Small and Medium-Sized Medical Technology Startups Seeking Funding Before FDA Clearance. Scottsdale, AZ: Northcentral University, 2022.
Fitriyani, Zenita Afifah, Yuyu Jahratu No Santy, Eka Indah Nur Laili, and Oktaviani Permatasari. "Is a Food Security Program a Solution in Family Economic Resilience? ." Mega Aktiva: Jurnal Ekonomi dan Manajemen 11, no. 1 (2022).
Deng, Xinyang, and Wen Jiang. "A framework for the fusion of non-exclusive and incomplete information on the basis of D number theory ." Applied Intelligence (2022).
Alzahrani, Ahmed G., Ahmed Alhomoud, and Gary Wills. "A Framework of the Critical Factors for Healthcare Providers in Data-Sharing Using Blockchain." IEEE Access (2022).
Delaney, Hannah. On the Fringe: An Analysis of Violent Discourse on Ideologically Motivated Violent Extremism on Less-Regulated Social Media Platforms In Norman Paterson School of International Affairs. Vol. Master of International Affairs. Ottawa, Ontario: Carleton University , 2022.
Shabana, Ihab. "From an Understanding to a Securitizing Discourse: The British Left’s Encounter with the Emergence of Political Islam, 1978–2001 ." Religions 13, no. 206 (2022).
Maurer, Claire. From Franco's Nightmare to a Globalized Spain: A Cinematic Analysis In Claremont-UC Undergraduate Research Conference on the European Union. Vol. 2022., 2022.
Dobias, Peter, Kyle Christensen, and William Freid. "Gaming Intermediate Force Capabilities: Strategic Implications of Tactical Decisions." Connections: The Quarterly Journal 21, no. 2 (2022): 97-109.
Brzostek, Agnieszka. Germany's Cybersecurity Policy In Teka Komisji Prawniczej PAN Oddział w Lublinie., 2022.
Penchev, Georgi, and Velizar Shalamanov. "Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain." Information & Security: An International Journal 53, no. 1 (2022): 147-160.
Mladenova, Irena, Velizar Shalamanov, and Antoniya Shalamanova-Filipova. "Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain." Information & Security: An International Journal 53, no. 1 (2022): 131-146.
Pasic, Aljosa. "Governance Mesh Approach for Cybersecurity Ecosystem." Information & Security: An International Journal 53, no. 1 (2022): 105-130.
Dobias, Peter, and Kyle Christensen. "The 'Grey Zone' and Hybrid Activities." Connections: The Quarterly Journal 21, no. 2 (2022): 41-54.
Polimenov, Ventsislav, Katya Dimitrova, Irena Mladenova, and Kamen Iliev. "The Hackathons as a First Step to Build Digital Competences." Information & Security: An International Journal 53, no. 2 (2022): 191-204.
Kanaan, Anas, Ahmad AL-Hawamleh, Anas Abulfaraj, Hazem Mohammad Al-Kaseasbeh, and Almuhannad Alorfi. "he effect of quality, security and privacy factors on trust and intention to use e-government services." International Journal of Data and Network Science 7 (2022): 185-198.
Abdel-Fattah, Dina, Christer Henrik Pursiainen, and Reidar Staupe-Delgado. "Higher Education and the Changing Situation of Societal Security in the Baltic Sea Region." Journal on Baltic Security 8, no. 2 (2022): 83-129.

Pages