Biblio

Export 21274 results:
2022
Fitriyani, Zenita Afifah, Yuyu Jahratu No Santy, Eka Indah Nur Laili, and Oktaviani Permatasari. "Is a Food Security Program a Solution in Family Economic Resilience? ." Mega Aktiva: Jurnal Ekonomi dan Manajemen 11, no. 1 (2022).
Deng, Xinyang, and Wen Jiang. "A framework for the fusion of non-exclusive and incomplete information on the basis of D number theory ." Applied Intelligence (2022).
Alzahrani, Ahmed G., Ahmed Alhomoud, and Gary Wills. "A Framework of the Critical Factors for Healthcare Providers in Data-Sharing Using Blockchain." IEEE Access (2022).
Delaney, Hannah. On the Fringe: An Analysis of Violent Discourse on Ideologically Motivated Violent Extremism on Less-Regulated Social Media Platforms In Norman Paterson School of International Affairs. Vol. Master of International Affairs. Ottawa, Ontario: Carleton University , 2022.
Shabana, Ihab. "From an Understanding to a Securitizing Discourse: The British Left’s Encounter with the Emergence of Political Islam, 1978–2001 ." Religions 13, no. 206 (2022).
Maurer, Claire. From Franco's Nightmare to a Globalized Spain: A Cinematic Analysis In Claremont-UC Undergraduate Research Conference on the European Union. Vol. 2022., 2022.
Dobias, Peter, Kyle Christensen, and William Freid. "Gaming Intermediate Force Capabilities: Strategic Implications of Tactical Decisions." Connections: The Quarterly Journal 21, no. 2 (2022): 97-109.
Brzostek, Agnieszka. Germany's Cybersecurity Policy In Teka Komisji Prawniczej PAN Oddział w Lublinie., 2022.
Penchev, Georgi, and Velizar Shalamanov. "Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain." Information & Security: An International Journal 53, no. 1 (2022): 147-160.
Mladenova, Irena, Velizar Shalamanov, and Antoniya Shalamanova-Filipova. "Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain." Information & Security: An International Journal 53, no. 1 (2022): 131-146.
Pasic, Aljosa. "Governance Mesh Approach for Cybersecurity Ecosystem." Information & Security: An International Journal 53, no. 1 (2022): 105-130.
Dobias, Peter, and Kyle Christensen. "The 'Grey Zone' and Hybrid Activities." Connections: The Quarterly Journal 21, no. 2 (2022): 41-54.
Polimenov, Ventsislav, Katya Dimitrova, Irena Mladenova, and Kamen Iliev. "The Hackathons as a First Step to Build Digital Competences." Information & Security: An International Journal 53, no. 2 (2022): 191-204.
Kanaan, Anas, Ahmad AL-Hawamleh, Anas Abulfaraj, Hazem Mohammad Al-Kaseasbeh, and Almuhannad Alorfi. "he effect of quality, security and privacy factors on trust and intention to use e-government services." International Journal of Data and Network Science 7 (2022): 185-198.
Abdel-Fattah, Dina, Christer Henrik Pursiainen, and Reidar Staupe-Delgado. "Higher Education and the Changing Situation of Societal Security in the Baltic Sea Region." Journal on Baltic Security 8, no. 2 (2022): 83-129.
Kovács, István. "Hofstede’s Power Distance Matrix: Law Enforcement Leadership Theory and Communication." Connections: The Quarterly Journal 21, no. 1 (2022): 61-72.
Grocholski, Krista Romita, and Scott Savitz. "How to Assess the Impact of Non-Lethal Weapons." Connections: The Quarterly Journal 21, no. 2 (2022): 85-95.
Spagnolli, Anna, Mariavittoria Masotina, Annalorena Scarcia, Beatrice Zuffi, and Luciano Gamberini. How to get away with cyberattacks: An argumentative approach to cyberattacks’ legitimization by common users In CHI '22: CHI Conference on Human Factors in Computing Systems., 2022.
Mygal, Galyna, and Olga Protasenko. "The Human Factor Issues in Biomedical Systems." Scientific Journal of Polonia University 54, no. 5 (2022): 150-158.
Ronchi, Alfredo M.. "Human Factor, Resilience, and Cyber/Hybrid Influence." Information & Security: An International Journal 53, no. 2 (2022): 221-239.
Dobias, Peter. "Hybrid Warfare and the Need for Intermediate Force Capabilities." Connections: The Quarterly Journal 21, no. 2 (2022): 5-9.
Bogdanov, Plamen. "Hypersonic Weapons in Achieving Maritime Superiority." Information & Security: An International Journal 51, no. 1 (2022): 57-71.
Gaurav, Akshat, and Brij B. Gupta. "Identificación de transacciones fraudulentas en línea y protección: técnicas de vanguardia." ESIC Digital Economy and Innovation Journal 1, no. 3 (2022).
Jimoh, Rasheed Gbenga, Olayinka Olufunmila Olusanya, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize, and Cheng-Chi Lee. "Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases." Future Internet 14, no. 305 (2022).
Ansari, Meraj Farheen, Bibhu Dash, Pawankumar Sharma, and Nikhitha Yathiraju. "The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review." International Journal of Advanced Research in Computer and Communication Engineering 11, no. 9 (2022).

Pages