Scientific Research An Academic Publisher
OPEN ACCESS
Assess the Level of Occupational Stress and to Evaluate the Effectiveness of Planned Teaching Programme on Knowledge Regarding Occupational Stress and Its Management among Security Guards of a Selected Organization, Shimoga, Karnataka (Articles)
M. Siddesh, H. N. Ravindra
Open Journal of Nursing Vol.10 No.2,January 31, 2020
DOI: 10.4236/ojn.2020.102005 291 Downloads 439 Views Citations
Occupation, Physical Fitness and Adiposity Markers among Security Guards and Students of Delhi University (Articles)
Imkongtenla Pongen, Shumayla, Meenal Dhall, Satwanti Kapoor
Health Vol.8 No.10,July 22, 2016
DOI: 10.4236/health.2016.810101 1,337 Downloads 2,000 Views Citations
Proactive Security Mechanism and Design for Firewall (Articles)
Saleem-Ullah Lar, Xiaofeng Liao, Aqeel ur Rehman, MA Qinglu
Journal of Information Security Vol.2 No.3,July 29, 2011
DOI: 10.4236/jis.2011.23012 6,320 Downloads 11,568 Views Citations
Gender Differences in Information Security Management (Articles)
Fayez Alotaibi, Aziz Alshehri
Journal of Computer and Communications Vol.8 No.3,March 9, 2020
DOI: 10.4236/jcc.2020.83006 294 Downloads 424 Views Citations This article belongs to the Special Issue on Information, Network & Computer Security
Research on the Contents and Indexes of Reservoir Operational Security (Articles)
Jingchun Feng, Zhongnan Duan
Journal of Water Resource and Protection Vol.2 No.11,November 29, 2010
DOI: 10.4236/jwarp.2010.211115 5,616 Downloads 8,613 Views Citations
Food Is Security: The Nexus of Health Security in Fragile and Failed States (Articles)
John Quinn, Tomas Zeleny, Vladimir Bencko
Food and Nutrition Sciences Vol.5 No.19,October 14, 2014
DOI: 10.4236/fns.2014.519197 4,425 Downloads 5,264 Views Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach (Articles)
Joseph E. Mbowe, Simon S. Msanjila, George S. Oreku, Khamisi Kalegele
Journal of Software Engineering and Applications Vol.9 No.12,December 30, 2016
DOI: 10.4236/jsea.2016.912041 1,313 Downloads 1,933 Views Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry (Articles)
Shawn Josette Roberts
Journal of Information Security Vol.5 No.4,September 25, 2014
DOI: 10.4236/jis.2014.54014 5,220 Downloads 6,875 Views Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model (Articles)
Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, Lei Zhou
Journal of Information Security Vol.6 No.1,January 7, 2015
DOI: 10.4236/jis.2015.61003 5,723 Downloads 7,118 Views Citations
Association between the Performance of the University Security Officers and Their Physical Fitness: A Case Study (Articles)
A. M. Razmy, A. Jabeer
Open Access Library Journal Vol.4 No.6,June 12, 2017
DOI: 10.4236/oalib.1103239 900 Downloads 1,286 Views Citations
Computer – Based Infrastructure Sector Interdependencies and Security Implications (Articles)
Aghware Fidelis Obukohwo
Int'l J. of Communications, Network and System Sciences Vol.4 No.11,October 31, 2011
DOI: 10.4236/ijcns.2011.411090 3,196 Downloads 5,591 Views Citations
Food insecurity: How to orchestrate a global health crisis (Articles)
John Quinn, Vladimir Bencko
Health Vol.5 No.6,June 20, 2013
DOI: 10.4236/health.2013.56141 4,380 Downloads 6,421 Views Citations
Myths and Realities about Mexico-United States Migration (Articles)
Luis Arturo Rivas Tovar, Adela Chávez, Juan Enrique Azuara Munguía, Ana Gabriela Benítez Jurado
iBusiness Vol.6 No.2,May 23, 2014
DOI: 10.4236/ib.2014.62008 4,581 Downloads 6,320 Views Citations
Improved High Definition Multimedia Interface Authentication Mechanism (Articles)
R. N. Iyare, S. D. Walker
Journal of Computer and Communications Vol.2 No.12,October 22, 2014
DOI: 10.4236/jcc.2014.212003 3,021 Downloads 3,494 Views Citations
Education Technology Cloud Platform Framework Establishment and Security (Articles)
Guoqiang Hu, Yanrong Yang, Li Li
Journal of Computer and Communications Vol.4 No.7,May 19, 2016
DOI: 10.4236/jcc.2016.47002 1,812 Downloads 2,300 Views Citations
A Political Theory Approach to Understanding Conflict in Selected African States (Articles)
Solomon Owuoche
Open Access Library Journal Vol.2 No.2,February 16, 2015
DOI: 10.4236/oalib.1101248 367 Downloads 590 Views Citations
Sensors Applied in Healthcare Environments (Articles)
Wei Vivien Shi
Journal of Computer and Communications Vol.4 No.5,May 29, 2016
DOI: 10.4236/jcc.2016.45015 1,310 Downloads 2,058 Views Citations
A Review of Security Concerns in Internet of Things (Articles)
Engin Leloglu
Journal of Computer and Communications Vol.5 No.1,January 22, 2017
DOI: 10.4236/jcc.2017.51010 2,842 Downloads 8,197 Views Citations
Statistical Approach to Regulation of Nanotechnology: Need, Advantages and Disadvantages (Articles)
Ricardo Santana Cabello, José Vega-Baudrit, Robin Zuluaga, Piedad Gañán
Journal of Biomaterials and Nanobiotechnology Vol.11 No.1,November 18, 2019
DOI: 10.4236/jbnb.2020.111002 483 Downloads 1,146 Views Citations
The G5 Sahel: Security Implementation and Challenges (Articles)
Alassane Camara
Open Journal of Political Science Vol.10 No.3,July 10, 2020
DOI: 10.4236/ojps.2020.103030 191 Downloads 545 Views Citations