派博傳思國(guó)際中心

標(biāo)題: Titlebook: Human Aspects of Information Security and Assurance; 15th IFIP WG 11.12 I Steven Furnell,Nathan Clarke Conference proceedings 2021 IFIP Int [打印本頁(yè)]

作者: GURU    時(shí)間: 2025-3-21 16:03
書目名稱Human Aspects of Information Security and Assurance影響因子(影響力)




書目名稱Human Aspects of Information Security and Assurance影響因子(影響力)學(xué)科排名




書目名稱Human Aspects of Information Security and Assurance網(wǎng)絡(luò)公開(kāi)度




書目名稱Human Aspects of Information Security and Assurance網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Human Aspects of Information Security and Assurance被引頻次




書目名稱Human Aspects of Information Security and Assurance被引頻次學(xué)科排名




書目名稱Human Aspects of Information Security and Assurance年度引用




書目名稱Human Aspects of Information Security and Assurance年度引用學(xué)科排名




書目名稱Human Aspects of Information Security and Assurance讀者反饋




書目名稱Human Aspects of Information Security and Assurance讀者反饋學(xué)科排名





作者: 烤架    時(shí)間: 2025-3-21 20:21
Sarah Turner,Jason Nurse,Shujun Li Grundlagen ableitbaren Voraussetzungen der Messverfahren wie z.?B. die Anforderungen an die Schallfelder und die daraus ableitbaren Festlegungen der Messverfahren (z.?B. Position und Anzahl von Lautsprechern und Mikrofonen) werden eingehend diskutiert. Auf praktische Fragestellungen wie die Notwend
作者: Injunction    時(shí)間: 2025-3-22 04:00

作者: 泄露    時(shí)間: 2025-3-22 06:50

作者: Tempor    時(shí)間: 2025-3-22 09:34
Exploring Experiences of Using SETA in?Nordic Municipalitiesd how the respondents would ideally like to conduct SETA. The results show that a majority of the participating organizations use SETA and that e-learning is the most common delivery method. However, the results also show that gamification and embedded training is seldom used in practice nor a part
作者: 領(lǐng)袖氣質(zhì)    時(shí)間: 2025-3-22 16:43

作者: 情愛(ài)    時(shí)間: 2025-3-22 17:53

作者: 阻擋    時(shí)間: 2025-3-23 01:09

作者: 口訣    時(shí)間: 2025-3-23 02:59

作者: Foment    時(shí)間: 2025-3-23 05:49
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation education and training curricula towards building a multidisciplinary cybersecurity workforce. This paper investigated these aspects in a Further Education and Higher Education College in the UK, where 88 students from 5 disciplines were surveyed, providing valuable observations as to the interest
作者: –DOX    時(shí)間: 2025-3-23 12:41

作者: 過(guò)份艷麗    時(shí)間: 2025-3-23 17:42
Towards a Risk Assessment Matrix for Information Security Workaroundstion security workarounds and an accompanying Information Security Workaround Risk Index. Using the tools proposed in this paper, information security officers can respond appropriately to information security workarounds and, where necessary, make modifications to their information security policie
作者: cruise    時(shí)間: 2025-3-23 21:46
A Conceptual Information Security Culture Framework for Higher Learning Institutions
作者: 疲憊的老馬    時(shí)間: 2025-3-23 23:18

作者: VOK    時(shí)間: 2025-3-24 02:34

作者: HEPA-filter    時(shí)間: 2025-3-24 07:57

作者: prolate    時(shí)間: 2025-3-24 12:54
Dirk P. Snyman,Gunther R. Drevin,Hennie A. Kruger,Lynette Drevin,Johann Allers
作者: 憤怒歷史    時(shí)間: 2025-3-24 17:28

作者: Fluctuate    時(shí)間: 2025-3-24 19:34

作者: 爭(zhēng)吵加    時(shí)間: 2025-3-25 01:36
Exploring Experiences of Using SETA in?Nordic Municipalitiesurity incidents. Security Education, Training, and Awareness (SETA) is described by practitioners and researchers as the most important tool for improving cybersecurity behavior and has been for several decades. Further, there are several ways to work with SETA found in academic literature and a lot
作者: 社團(tuán)    時(shí)間: 2025-3-25 06:56
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Educationengage students with content and can complement more traditional approaches to learning. This article proposes SherLOCKED, a new serious game created in the style of a 2D top-down puzzle adventure. The game is situated in the context of an undergraduate cyber security course, and is used to consolid
作者: HPA533    時(shí)間: 2025-3-25 10:40

作者: FOVEA    時(shí)間: 2025-3-25 13:36
What Can We Learn from the Analysis of Information Security Policies? The Case of UK’s Schoolsecurity policy is contextually dependent and there is no agreement on what organisations should include in their security policies. This paper argues that analysing information security policy documents could potentially provide new insights into existing issues with security practices. The paper ex
作者: 擁護(hù)    時(shí)間: 2025-3-25 18:37
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Childrenly with the result that cell phones, tablets and similar devices are more accessible to both young and old. Technological advancements create many opportunities, however it also exposes its users to many threats. Pre-school children are especially vulnerable to these threats, as they are rarely made
作者: craving    時(shí)間: 2025-3-25 19:59

作者: trigger    時(shí)間: 2025-3-26 00:30
When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devicesndamental means of ensuring safe use. Given the paucity of information provided with many devices at the time of purchase, this paper engages in a critical study of the type of advice that home Internet of Things (IoT) or smart device users might be presented with on the Internet to inform their cyb
作者: nepotism    時(shí)間: 2025-3-26 05:13
Making Access Control Easy in IoTiguration Manufacturer Usage Description (MUD) has been developed by Internet Engineering Task Force (IETF) to automate the protection of IoT devices by micro-segmentation using dynamic access control lists. The protocol defines a conceptually straightforward method to implement access control upon
作者: Osteoporosis    時(shí)間: 2025-3-26 09:43
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigationological advances and the cyber threat landscape. This outcome highlighted once more the cybersecurity skills shortage and the necessity to address this gap. A solution to this, is to consider a multidisciplinary cybersecurity workforce with professionals originating from different backgrounds, beyo
作者: 拖網(wǎng)    時(shí)間: 2025-3-26 14:42
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishinghe convenient use of a mobile phone. At the same time, criminals are able to utilise this technology to their own benefit, such as by sending phishing messages that convince their victims into sharing sensitive information or installing dangerous software on their devices. Indeed, Proofpoint’s State
作者: 競(jìng)選運(yùn)動(dòng)    時(shí)間: 2025-3-26 19:48

作者: overhaul    時(shí)間: 2025-3-26 23:40
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagonion infrastructure of an organization. It has been reasoned that the framing of the Fraud Pentagon may assist in predicting and preventing white collar crimes such as fraud. The Fraud Pentagon considers the elements of motivation, capability, rationalization, opportunity and arrogance which converge
作者: 準(zhǔn)則    時(shí)間: 2025-3-27 01:53

作者: 原告    時(shí)間: 2025-3-27 07:06

作者: 過(guò)于平凡    時(shí)間: 2025-3-27 10:27

作者: Mercurial    時(shí)間: 2025-3-27 17:40
Vafa Andalibi,Jayati Dev,DongInn Kim,Eliot Lear,L. Jean Campen bilden allerdings alle jene F?lle, in denen nach vollzogener Unterfahrung st?rkere Setzungen des Nachbarhauses erfolgen, so da? Rissebildungen in Erscheinung treten. über die m?glichen Gründe dieser Setzungen — wobei sie keineswegs zwingend mit der Unterfahrung in urs?chlichen Zusammenhange stehe
作者: Ballerina    時(shí)間: 2025-3-27 20:54

作者: figure    時(shí)間: 2025-3-27 22:01
A Literature Review on Virtual Reality Authenticationrature review give a detailed overview of VR-based authentication schemes and highlight trends as well as current research gaps. These findings drive future research direction to create robust and usable authentication strategies.
作者: 輕觸    時(shí)間: 2025-3-28 05:21
1868-4238 ce, HAISA 2021, held virtually in July 2021..The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology..978-3-030-81113-6978-3-
作者: 上下倒置    時(shí)間: 2025-3-28 09:55
What Can We Learn from the Analysis of Information Security Policies? The Case of UK’s Schoolsow that the content varied widely between schools but tended to have a technical focus, many security policies had not been updated to address changes to work practices due to the Covid-19 situation and many policies have poor readability scores preventing readers from engaging with them.
作者: 漸強(qiáng)    時(shí)間: 2025-3-28 12:25
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagontical framing from an insider threat perspective, thereby assisting researchers, organizations and information security practitioners in understanding its complexity and its application to the insider threat problem.
作者: Ligament    時(shí)間: 2025-3-28 14:54
1868-4238 organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology..978-3-030-81113-6978-3-030-81111-2Series ISSN 1868-4238 Series E-ISSN 1868-422X
作者: 并置    時(shí)間: 2025-3-28 19:19
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children aware of, or empowered to defend themselves against these threats. An approach to solving this problem is to create a mobile serious game that promotes cybersecurity awareness among pre-school children. The focus of this paper is the part of the game that promotes the use of strong passwords and not sharing these passwords with one’s friends.
作者: 溫室    時(shí)間: 2025-3-29 01:32
Conference proceedings 20212021, held virtually in July 2021..The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology..
作者: leniency    時(shí)間: 2025-3-29 06:38

作者: 勉勵(lì)    時(shí)間: 2025-3-29 10:45
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/h/image/428968.jpg
作者: 字形刻痕    時(shí)間: 2025-3-29 11:57

作者: 碎石    時(shí)間: 2025-3-29 19:08

作者: nautical    時(shí)間: 2025-3-29 21:33

作者: BULLY    時(shí)間: 2025-3-30 03:40
Determination of Ballast Parameters of a Railway Track Using an Optimization Technique,t extra vertical load applied to a track. Finally, a track model with the obtained ballast parameters has been applied to determine train speed limits for a renewed track basing on the safety criteria given in UIC Leaflet 720. The results are presented and discussed.
作者: Canyon    時(shí)間: 2025-3-30 07:00

作者: 黃油沒(méi)有    時(shí)間: 2025-3-30 10:26

作者: SENT    時(shí)間: 2025-3-30 12:34
Pests and Their Enemies in Spring Oilseed Rape in Europe and Challenges to Integrated Pest Managemeing this pest. Certain pests such as the cabbage aphid, the pod midge and the pollen beetle may be affected by the close proximity of spring and winter oilseed rape. Phenologies of these pests and their enemies are examined in relation to spring rape cultivation. The implications for integrated pest
作者: 都相信我的話    時(shí)間: 2025-3-30 18:07
Bayesian Data—Model Integration in Plant Physiological and Ecosystem Ecologyted with models of photosynthesis and stomatal conductance, and Bayesian approaches to estimating parameters in complex ecosystem simulation models. The paper concludes with some practical issues and thoughts on the direction of hierarchical Bayesian modeling in plant physiological and ecosystem ecology.
作者: Angioplasty    時(shí)間: 2025-3-31 00:43
2192-4333 management.Includes case studies that illustrate digital tra.Digitization, the global networking of individuals and organizations, and the transition from an industrial to an information society are key reasons for the importance of digital government. In particular, the enormous influence of the In
作者: 責(zé)怪    時(shí)間: 2025-3-31 04:37
Infinite-Dimensional Elliptic Differential operators of the Second Order,hich must be studied. For example, applications to theoretical physics are mainly based on operator problems whose contents have many similar features for different model situations and can be characterized by close connection with spectral theory. An essential place among these problems is occupied
作者: MANIA    時(shí)間: 2025-3-31 07:01
the e?ect of demographic parameters on bird diversi?cation. This was a new issue for me, so I searched for relevant data analysis methods, but I failed to ?nd exactly what I needed. I started to conduct my own 978-0-387-35100-1Series ISSN 2197-5736 Series E-ISSN 2197-5744




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
铜鼓县| 平陆县| 青海省| 白河县| 梅州市| 留坝县| 葵青区| 车险| 岢岚县| 甘孜| 集贤县| 白水县| 尼玛县| 泸州市| 冕宁县| 高密市| 新和县| 苍梧县| 沭阳县| 泾阳县| 双峰县| 锡林浩特市| 无极县| 汶川县| 焦作市| 出国| 瓦房店市| 蒲江县| 江达县| 麦盖提县| 阳泉市| 义马市| 宁远县| 灵武市| 永清县| 长海县| 庐江县| 依兰县| 赞皇县| 中超| 张北县|