Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Current Status of the Use of Cloud Computing in SMEs in the City of Latacunga, Ecuador
(Articles)
Gabriela Cajamarca-Palomo
,
Mauricio Quisimalin-Santamaría
,
Patricio Medina-Chicaiza
Open Journal of Business and Management
Vol.7 No.2
,April 4, 2019
DOI:
10.4236/ojbm.2019.72043
1,089
Downloads
2,450
Views
Citations
Examining the Neurocognitive Validity of Commercially Available, Smartphone-Based Puzzle Games
(Articles)
Oonagh Thompson
,
Suzanne Barrett
,
Christopher Patterson
,
David Craig
Psychology
Vol.3 No.7
,June 18, 2012
DOI:
10.4236/psych.2012.37076
4,923
Downloads
8,014
Views
Citations
Introducing Online Learning in Higher Education: An Evaluation
(Articles)
David Fincham
Creative Education
Vol.4 No.9
,September 2, 2013
DOI:
10.4236/ce.2013.49079
8,044
Downloads
11,902
Views
Citations
Using an Ontology to Help Reason about the Information Content of Data
(Articles)
Shuang Zhu
,
Junkang Feng
Journal of Software Engineering and Applications
Vol.3 No.7
,July 23, 2010
DOI:
10.4236/jsea.2010.37073
6,680
Downloads
10,394
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,456
Downloads
9,114
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,031
Downloads
2,849
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Multiple Choice Tests: Inferences Based on Estimators of Maximum Likelihood
(Articles)
Pedro Femia-Marzo
,
Antonio Martín-Andrés
Open Journal of Statistics
Vol.4 No.6
,August 27, 2014
DOI:
10.4236/ojs.2014.46045
3,424
Downloads
5,200
Views
Citations
This article belongs to the Special Issue on
Research on Reliability and Validity
Critical Role of Cyber Security in Global Economy
(Articles)
Emile S. Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.4
,December 25, 2023
DOI:
10.4236/ojsst.2023.134012
117
Downloads
1,042
Views
Citations
Classroom Assessment Techniques: An Assessment and Student Evaluation Method
(Articles)
Dawn-Marie Walker
Creative Education
Vol.3 No.6A
,October 25, 2012
DOI:
10.4236/ce.2012.326136
9,819
Downloads
17,921
Views
Citations
This article belongs to the Special Issue on
Higher Education
The Changes of Nursing Students’ Assessment Skills at a Simulated Setting: A Quasi Experimental Study
(Articles)
Yok Man Cymon Chan
,
Haobin Yuan
Creative Education
Vol.5 No.3
,February 15, 2014
DOI:
10.4236/ce.2014.53021
4,204
Downloads
6,676
Views
Citations
This article belongs to the Special Issue on
Adult Education
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
242
Downloads
1,905
Views
Citations
Research on the Contents and Indexes of Reservoir Operational Security
(Articles)
Jingchun Feng
,
Zhongnan Duan
Journal of Water Resource and Protection
Vol.2 No.11
,November 29, 2010
DOI:
10.4236/jwarp.2010.211115
6,097
Downloads
9,329
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,630
Downloads
7,948
Views
Citations
Exploring the Evolution of Brand Loyalty in the Age of Social Media
(Articles)
Muhammed Zakir Hossain
,
Habiba Kibria
Journal of Service Science and Management
Vol.17 No.3
,June 5, 2024
DOI:
10.4236/jssm.2024.173011
22
Downloads
80
Views
Citations
Dissent under Siege: Case Studies of Repression in the Digital Era of Bangladesh
(Articles)
Ahmed Tahsin Shams
Advances in Journalism and Communication
Vol.12 No.1
,March 29, 2024
DOI:
10.4236/ajc.2024.121011
40
Downloads
187
Views
Citations
Towards More Efficient Assessments: Increasing Information from Objective Examinations
(Articles)
Alan E. Dugdale
Creative Education
Vol.4 No.6A
,June 14, 2013
DOI:
10.4236/ce.2013.46A007
4,312
Downloads
5,749
Views
Citations
This article belongs to the Special Issue on
Medical Education and Health Education
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
120
Downloads
747
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,344
Downloads
9,646
Views
Citations
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
(Articles)
Fauziyah Fauziyah
,
Zhaosun Wang
,
Gabriel Joy
Journal of Information Security
Vol.13 No.4
,September 23, 2022
DOI:
10.4236/jis.2022.134016
373
Downloads
1,844
Views
Citations
Action Origin of the Cosmos
(Articles)
Hans Joachim Dudek
Journal of High Energy Physics, Gravitation and Cosmology
Vol.9 No.3
,July 27, 2023
DOI:
10.4236/jhepgc.2023.93065
58
Downloads
313
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top