Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Trust and Security on Semantic HIM (Health Information Management)
(Articles)
Nasim Khozouei
,
Razie Vanda
,
Peyman Khozouei
Intelligent Information Management
Vol.4 No.6
,November 30, 2012
DOI:
10.4236/iim.2012.46045
4,551
Downloads
7,550
Views
Citations
On the Improvement of Library Information Services In Higher Education Facilities of Excellent Engineers
(Articles)
Xu Dai
,
Zan Liu
,
Siyuan Chen
,
Jun Liu
,
Zhongning Guo
Creative Education
Vol.3 No.7B
,January 15, 2013
DOI:
10.4236/ce.2012.37B028
4,015
Downloads
5,644
Views
Citations
Opportunities for Remote Collaboration in a Social Web Search Model That Integrates Parents and Children
(Articles)
Sandra Regina Rocha Silva
,
Geraldo Bonorino Xexéo
,
Moacir Florentino da Silva Jr.
Social Networking
Vol.3 No.2
,February 28, 2014
DOI:
10.4236/sn.2014.32016
4,313
Downloads
6,217
Views
Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
7,054
Downloads
10,874
Views
Citations
The Market Pricing of Information Risk: From the Perspective of the Generating and Utilizing of Information
(Articles)
Xindong Zhang
,
Xin Li
Journal of Financial Risk Management
Vol.3 No.4
,December 15, 2014
DOI:
10.4236/jfrm.2014.34014
3,310
Downloads
4,447
Views
Citations
Analysis on the Effective Integration of Information Technology and Personnel Management in Colleges and Universities
(Articles)
Yong Liu
Creative Education
Vol.6 No.8
,May 21, 2015
DOI:
10.4236/ce.2015.68081
4,306
Downloads
5,210
Views
Citations
The Combination Operator of Information Sources by a New Expressive Matrix
(Articles)
A. Boualem
,
Y. Dahmani
,
A. Maatoug
Journal of Geographic Information System
Vol.7 No.4
,August 20, 2015
DOI:
10.4236/jgis.2015.74034
2,473
Downloads
3,226
Views
Citations
Internal Control Information Disclosure Quality, Agency Cost and Earnings Management—Based on the Empirical Data from 2011 to 2013
(Articles)
Yunchao Ying
Modern Economy
Vol.7 No.1
,January 25, 2016
DOI:
10.4236/me.2016.71007
6,329
Downloads
8,456
Views
Citations
A Fundamentally Irreversible World as an Opportunity towards a Consistent Understanding of Quantum and Cosmological Contexts
(Articles)
Helmut Tributsch
Journal of Modern Physics
Vol.7 No.12
,August 24, 2016
DOI:
10.4236/jmp.2016.712133
1,918
Downloads
3,063
Views
Citations
Convergence Analysis of Iterative Threshold Decoding Process
(Articles)
Mohammed Lahmer
,
Mostafa Belkasmi
,
Abdallah Rhattoy
Journal of Computer and Communications
Vol.4 No.14
,November 28, 2016
DOI:
10.4236/jcc.2016.414008
1,181
Downloads
2,139
Views
Citations
Developing Dependability Requirements Engineering for Secure and Safe Information Systems with Knowledge Acquisition for Automated Specification
(Articles)
Mohammed Abu Lamddi
Journal of Software Engineering and Applications
Vol.10 No.2
,February 28, 2017
DOI:
10.4236/jsea.2017.102013
1,684
Downloads
3,247
Views
Citations
Research on Accurate Information Pushing Based on Human Network
(Articles)
Meijie Yang
,
Yu Wang
,
Xiaorong Hou
Social Networking
Vol.6 No.2
,April 30, 2017
DOI:
10.4236/sn.2017.62011
1,260
Downloads
2,381
Views
Citations
Nursing Students’ Experience with Information Literacy Skill
(Articles)
Hawa Osman
Yangtze Medicine
Vol.1 No.3
,September 21, 2017
DOI:
10.4236/ym.2017.13016
1,371
Downloads
4,591
Views
Citations
Review and Reflection on the Disclosure of Government Information: Based on Guangdong’s Governmental Information Disclosure Annual Reports from 2008 to 2015
(Articles)
Haiqi Chen
Chinese Studies
Vol.7 No.1
,February 2, 2018
DOI:
10.4236/chnstd.2018.71003
1,086
Downloads
2,194
Views
Citations
Virtual Information Services in Academic Libraries in Kuwait
(Articles)
Sajjad ur Rehman
,
Aysha M. Al Kandari
Open Access Library Journal
Vol.6 No.7
,July 5, 2019
DOI:
10.4236/oalib.1105543
1,171
Downloads
2,207
Views
Citations
A Fourier Series Proof That the Axial like the Transverse Optical Doppler Shift Impacts Time and Information Rates
(Articles)
Samuel Reich
Journal of High Energy Physics, Gravitation and Cosmology
Vol.5 No.4
,September 12, 2019
DOI:
10.4236/jhepgc.2019.54054
439
Downloads
1,058
Views
Citations
Factors Limiting and Affecting the Use of Market Information Systems in Sahelian Countries
(Articles)
Ouédraogo Ferdinand
Theoretical Economics Letters
Vol.9 No.7
,September 30, 2019
DOI:
10.4236/tel.2019.97156
584
Downloads
2,020
Views
Citations
This article belongs to the Special Issue on
Microeconomics
Life from the Viewpoint of Information
(Articles)
Kazuhiko Kotani
Open Journal of Philosophy
Vol.9 No.4
,November 20, 2019
DOI:
10.4236/ojpp.2019.94031
728
Downloads
2,744
Views
Citations
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.2
,April 22, 2020
DOI:
10.4236/jis.2020.112006
877
Downloads
2,599
Views
Citations
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113008
785
Downloads
2,433
Views
Citations
<
...
21
22
23
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top