Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A New Construction Scheme for Information Security Lab
(Articles)
Li Zhu
,
Huaqing Mao
,
Zhiwen Hu
Creative Education
Vol.3 No.4
,August 13, 2012
DOI:
10.4236/ce.2012.34064
5,005
Downloads
7,172
Views
Citations
Camera and Voice Control Based Location Services and Information Security on Android
(Articles)
Jitendra G. Chouhan
,
Nikhil Kumar Singh
,
Prashant S. Modi
,
Keyurbhai A. Jani
,
Bhavin N. Joshi
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73015
3,643
Downloads
5,056
Views
Citations
Agricultural Extension for Enhancing Production and Productivity: The Case of Southern Ethiopia, Arba Minch Zuriya District
(Articles)
Molla Mekonnen Alemu
Open Access Library Journal
Vol.4 No.4
,April 25, 2017
DOI:
10.4236/oalib.1103427
1,348
Downloads
3,616
Views
Citations
Research on the Laboratory Management Mode Based on the Optimal Allocation of Resources
(Articles)
Bo Yang
Open Access Library Journal
Vol.8 No.1
,January 21, 2021
DOI:
10.4236/oalib.1107119
354
Downloads
1,280
Views
Citations
Farmers’ Access to Agricultural Information Sources: Evidences from Rural Pakistan
(Articles)
Muhammad Yaseen
,
Shiwei Xu
,
Wen Yu
,
Sadia Hassan
Journal of Agricultural Chemistry and Environment
Vol.5 No.1B
,April 30, 2016
DOI:
10.4236/jacen.2016.51B003
3,054
Downloads
10,470
Views
Citations
Analysis of Staffing and Training Needs for Effective Delivery of Extension Service in Sustainable Land Management in Kilimanjaro Region, Tanzania
(Articles)
John F. Kessy
Open Journal of Soil Science
Vol.4 No.13
,December 22, 2014
DOI:
10.4236/ojss.2014.413045
3,312
Downloads
4,449
Views
Citations
This article belongs to the Special Issue on
Sustainable Land Management: Intermediate Results and Future Perspectives from Kilimanjaro, Tanzania
Ideas and Practice of Medical Discipline Laboratory Construction under the Healthy China Strategy
(Articles)
Xiulan Yang
,
Xiaoguang Chen
,
Lian Liu
,
Jiangrong Huang
,
Limin Zhang
Open Journal of Social Sciences
Vol.9 No.1
,January 20, 2021
DOI:
10.4236/jss.2021.91017
265
Downloads
737
Views
Citations
Drugs Supply and Laboratory Services in Dots System of Kaduna State: A Health Care Worker Perspective
(Articles)
Shehu Usman Adamu
,
D. McGill
Journal of Tuberculosis Research
Vol.6 No.1
,March 7, 2018
DOI:
10.4236/jtr.2018.61003
811
Downloads
1,988
Views
Citations
Study on Effect of UHV Power Grid Construction Schemes on Short Circuit Current
(Articles)
Zaihua Li
,
Feng Gao
,
Qing Wang
,
Shuang Zhang
,
Hongmei Luo
,
Jian Liang
Journal of Power and Energy Engineering
Vol.3 No.4
,April 14, 2015
DOI:
10.4236/jpee.2015.34028
5,020
Downloads
5,527
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,445
Downloads
9,087
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,025
Downloads
2,815
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Evaluation of the Completeness in the Filling of Laboratory Request Forms Submitted to the Haematology Laboratory at a Tertiary Hospital in Kenya
(Articles)
Japheth C. Kipkulei
,
Teresa C. Lotodo
Health
Vol.11 No.7
,July 11, 2019
DOI:
10.4236/health.2019.117069
858
Downloads
3,044
Views
Citations
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
235
Downloads
1,827
Views
Citations
Research on Transformation Characteristics of Binomial Coefficient Formula and Its Extended Model
(Articles)
Minghan Zhu
,
Jeffrey Zheng
Journal of Applied Mathematics and Physics
Vol.7 No.11
,November 29, 2019
DOI:
10.4236/jamp.2019.711202
352
Downloads
941
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,629
Downloads
7,940
Views
Citations
Performance Measurement Model for Agriculture Extension Services for Sustainable Livelihood of the Farmers: Evidences from India
(Articles)
Rohit Joshi
,
Atulya Narayan
Theoretical Economics Letters
Vol.9 No.5
,May 27, 2019
DOI:
10.4236/tel.2019.95082
1,168
Downloads
4,643
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,333
Downloads
9,621
Views
Citations
Information Segmentation and Investing in Cybersecurity
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121006
674
Downloads
2,821
Views
Citations
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,299
Downloads
12,696
Views
Citations
Investing in Cybersecurity: Insights from the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.7 No.2
,March 23, 2016
DOI:
10.4236/jis.2016.72004
8,266
Downloads
14,864
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top