Scientific Research An Academic Publisher
OPEN ACCESS
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS (Articles)
Ahmad Bakhtiyari Shahri, Zuraini Ismail
Journal of Information Security Vol.3 No.2,April 26, 2012
DOI: 10.4236/jis.2012.32020 6,847 Downloads 10,711 Views Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy (Articles)
Joseph Elias Mbowe, Irina Zlotnikova, Simon S. Msanjila, George S. Oreku
Journal of Information Security Vol.5 No.4,September 29, 2014
DOI: 10.4236/jis.2014.54016 4,713 Downloads 6,249 Views Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach (Articles)
Joseph E. Mbowe, Simon S. Msanjila, George S. Oreku, Khamisi Kalegele
Journal of Software Engineering and Applications Vol.9 No.12,December 30, 2016
DOI: 10.4236/jsea.2016.912041 1,003 Downloads 1,455 Views Citations
Security Policy Management Process within Six Sigma Framework (Articles)
Vijay Anand, Jafar Saniie, Erdal Oruklu
Journal of Information Security Vol.3 No.1,December 31, 2011
DOI: 10.4236/jis.2012.31006 5,827 Downloads 11,646 Views Citations
Security Framework for Managing Data Security within Point of Care Tests (Articles)
Sivanesan Tulasidas, Ruth Mackay, Chris Hudson, Wamadeva Balachandran
Journal of Software Engineering and Applications Vol.10 No.2,February 24, 2017
DOI: 10.4236/jsea.2017.102011 1,130 Downloads 1,687 Views Citations
Integrated Model for Security and Protection of Critical Infrastructure (Articles)
Kiril Stoichev
Open Access Library Journal Vol.1 No.9,December 18, 2014
DOI: 10.4236/oalib.1101124 759 Downloads 1,117 Views Citations
A Financial Analysis Approach on the Promotion of Peace through Economic Interdependence (Articles)
Thomas Poufinas, Victoria Pistikou
Theoretical Economics Letters Vol.8 No.15,December 14, 2018
DOI: 10.4236/tel.2018.815222 152 Downloads 234 Views Citations
A Case Study on Security Recommendations for a Global Organization (Articles)
Devashi Tandon, Pratyush Parimal
Journal of Computer and Communications Vol.6 No.3,March 28, 2018
DOI: 10.4236/jcc.2018.63010 284 Downloads 950 Views Citations
Enhancing Multi-Factor Authentication in Modern Computing (Articles)
Ekwonwune Emmanuel Nwabueze, Iwuoha Obioha, Oju Onuoha
Communications and Network Vol.9 No.3,August 9, 2017
DOI: 10.4236/cn.2017.93012 513 Downloads 1,072 Views Citations
The Constitutional Transformation and a Threat of the Environment in Poland (Articles)
Krzysztof R. Mazurski
Journal of Environmental Protection Vol.2 No.4,June 17, 2011
DOI: 10.4236/jep.2011.24044 4,154 Downloads 6,848 Views Citations
Proposal to Disseminate the Knowledge of Tsunamis in the Caribbean Coast of Costa Rica, Central America (Articles)
Mario Fernández Arce, Daniel Solís, Juan Luis Porras, Gino González
World Journal of Engineering and Technology Vol.2 No.3B,September 18, 2014
DOI: 10.4236/wjet.2014.23B013 2,637 Downloads 2,668 Views Citations
Getting by with a Little Help from My Friends: Mental Rotation Ability after Tacit Peer Encouragement (Articles)
Sheila Brownlow, Amanda J. Janas, Kathleen A. Blake, Kathleen T. Rebadow, Lindsay M. Mello
Psychology Vol.2 No.4,July 25, 2011
DOI: 10.4236/psych.2011.24057 5,367 Downloads 8,804 Views Citations
Can Rewards Obviate Stereotype Threat Effects on Mental Rotation Tasks? (Articles)
Amanda Kanoy, Sheila Brownlow, Tiffany F. Sowers
Psychology Vol.3 No.7,June 18, 2012
DOI: 10.4236/psych.2012.37080 4,508 Downloads 7,169 Views Citations
Anything but Race: Avoiding Racial Discourse to Avoid Hurting You or Me (Articles)
Phillip Atiba Goff, Matthew Christian Jackson, Andrew H. Nichols, Brooke Allison Lewis Di Leone
Psychology Vol.4 No.3A,March 29, 2013
DOI: 10.4236/psych.2013.43A048 4,607 Downloads 7,077 Views Citations This article belongs to the Special Issue on Applied Psychology
The Pale Shades of Emotion: A Signal Detection Theory Analysis of the Emotional Stroop Task (Articles)
Boaz M. Ben-David, Eran Chajut, Daniel Algom
DOI: 10.4236/psych.2012.37079 4,120 Downloads 8,124 Views Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat (Articles)
Rita M. Barrios
Journal of Information Security Vol.4 No.1,January 30, 2013
DOI: 10.4236/jis.2013.41007 5,642 Downloads 9,254 Views Citations
Threat perception predicts cognitive behavioral therapy outcomes in anxious children (Articles)
Katharina Manassis, Kathryn M. Hum, Trevor Changgun Lee, Gloria Zhang, Marc D. Lewis
Open Journal of Psychiatry Vol.3 No.1A,February 26, 2013
DOI: 10.4236/ojpsych.2013.31A009 3,560 Downloads 6,169 Views Citations This article belongs to the Special Issue on
Concealed Environmental Threat in the Coastal Region Requires Persistent Attention: The Panglao Island, Philippines Example (Articles)
Daniel Edison Husana, Tomohiko Kikuchi
Journal of Environmental Protection Vol.4 No.10,October 10, 2013
DOI: 10.4236/jep.2013.410131 3,864 Downloads 5,372 Views Citations
Economic Natural Laws and Economics (Articles)
Yi-Jang Yu
Modern Economy Vol.6 No.1,January 12, 2015
DOI: 10.4236/me.2015.61002 2,331 Downloads 2,689 Views Citations
Women’s Mental Rotation Abilities as a Function of Priming (Articles)
Leah R. Ryan, Sheila Brownlow, Benjamin Patterson
Psychology Vol.6 No.3,February 12, 2015
DOI: 10.4236/psych.2015.63021 4,059 Downloads 4,591 Views Citations