Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
(Articles)
Mohammed Mohammed Raoof
Journal of Information Security
Vol.15 No.2
,April 29, 2024
DOI:
10.4236/jis.2024.152014
109
Downloads
1,029
Views
Citations
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
(Articles)
Anna Sheri George
,
Jomin George
,
Judy Jenkins
E-Health Telecommunication Systems and Networks
Vol.13 No.3
,August 9, 2024
DOI:
10.4236/etsn.2024.133003
148
Downloads
1,462
Views
Citations
Methodology of Safety Behavior Management from a Cross-Culture Perspective
(Articles)
Nguembi Ines Pamela
,
Li Yang
,
Cety Gessica Abraham Mahanga Tsoni
,
Loundou Ndonda Elsi Othniel
,
Bakala Mboungou Marcel Merimee
Open Journal of Safety Science and Technology
Vol.15 No.2
,May 15, 2025
DOI:
10.4236/ojsst.2025.152005
27
Downloads
171
Views
Citations
The Double Role Dilemma: A Conceptual Analysis of Therapist Strategies in Mandated Counselling
(Articles)
Denise Edna Jeevan Ponnampalam
,
Christopher Fong
,
Shilpi Tripathi
Psychology
Vol.16 No.6
,June 27, 2025
DOI:
10.4236/psych.2025.166043
50
Downloads
354
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
162
Downloads
982
Views
Citations
Software Taxation from the Perspective of the Recent Decisions of the Brazilian Supreme Court (STF) in ADI’s 1945/MT and 5659/MG
(Articles)
Gustavo de Mello Vianna Gudin Di Marzo
,
Elizabeth Nazar Carrazza
Beijing Law Review
Vol.15 No.3
,September 14, 2024
DOI:
10.4236/blr.2024.153071
49
Downloads
275
Views
Citations
Transforming Government Procurement through Electronic Bidding—A Case Study on the City of Somerville’s Implementation of BidExpress Infotech
(Articles)
Prajkta Waditwar
Open Journal of Leadership
Vol.14 No.1
,March 7, 2025
DOI:
10.4236/ojl.2025.141007
57
Downloads
372
Views
Citations
AI-Driven Procurement in Ayurveda and Ayurvedic Medicines & Treatments
(Articles)
Prajkta Waditwar
Open Journal of Business and Management
Vol.13 No.3
,May 15, 2025
DOI:
10.4236/ojbm.2025.133096
60
Downloads
435
Views
Citations
Validation of a Questionnaire to Diagnose the Baumann Skin Type in All Ethnicities and in Various Geographic Locations
(Articles)
Leslie Baumann
J. of Cosmetics, Dermatological Sciences and Applications
Vol.6 No.1
,March 15, 2016
DOI:
10.4236/jcdsa.2016.61005
4,396
Downloads
10,710
Views
Citations
A Comparative Analysis of the New -3(-
n
) - 1 Remer Conjecture and a Proof of the 3
n
+ 1 Collatz Conjecture
(Articles)
Mike Remer
Journal of Applied Mathematics and Physics
Vol.11 No.8
,August 14, 2023
DOI:
10.4236/jamp.2023.118143
160
Downloads
820
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
231
Downloads
1,005
Views
Citations
Cyberattack Ramifications, The Hidden Cost of a Security Breach
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152007
340
Downloads
1,831
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
...
7
8
9
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top