Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
(Articles)
Anna Sheri George
,
Jomin George
,
Judy Jenkins
E-Health Telecommunication Systems and Networks
Vol.13 No.3
,August 9, 2024
DOI:
10.4236/etsn.2024.133003
127
Downloads
1,298
Views
Citations
The Secretariat on Responsible Conduct of Research: Ethics Guardians or Keystone Cops?
(Articles)
John Lowman
Beijing Law Review
Vol.12 No.3
,August 6, 2021
DOI:
10.4236/blr.2021.123041
210
Downloads
805
Views
Citations
TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing
(Articles)
Sultan Ullah
,
Xuefeng Zheng
,
Feng Zhou
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 10, 2013
DOI:
10.4236/jsea.2013.63B006
4,527
Downloads
6,808
Views
Citations
A User Identity Management Protocol for Cloud Computing Paradigm
(Articles)
Safiriyu Eludiora
,
Olatunde Abiona
,
Ayodeji Oluwatope
,
Adeniran Oluwaranti
,
Clement Onime
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.4 No.3
,March 10, 2011
DOI:
10.4236/ijcns.2011.43019
9,676
Downloads
19,261
Views
Citations
Combining Public Key Encryption with Schnorr Digital Signature
(Articles)
Laura Savu
Journal of Software Engineering and Applications
Vol.5 No.2
,February 27, 2012
DOI:
10.4236/jsea.2012.52016
9,458
Downloads
14,845
Views
Citations
Risk Assessment Framework of mHealth System Vulnerabilities: A Multilayer Analysis of the Patient Hub
(Articles)
Mohammed Banu Ali
,
Trevor Wood-Harper
,
Abdullah Sultan Al-Qahtani
,
Abubakar Mohamed Ali Albakri
Communications and Network
Vol.12 No.2
,March 10, 2020
DOI:
10.4236/cn.2020.122003
782
Downloads
2,429
Views
Citations
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
(Articles)
Samantha Gorton
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.16 No.6
,June 8, 2023
DOI:
10.4236/ijcns.2023.166008
202
Downloads
3,003
Views
Citations
Optimizing Maritime Dispute Resolution in Tanzania: A Comprehensive Assessment of Arbitration’s Role
(Articles)
Edrick J. Mugisha
,
Msabaha J. Mwendapole
,
Werneld E. Ngongi
,
Diana D. Kiwia
Open Journal of Social Sciences
Vol.12 No.9
,September 23, 2024
DOI:
10.4236/jss.2024.129019
88
Downloads
550
Views
Citations
Frequent Breaches in Irrigation Canals in Sindh Pakistan
(Articles)
Riaz Bhanbhro
,
Nadhir Al-Ansari
,
Sven Knutsson
Journal of Water Resource and Protection
Vol.6 No.4
,March 20, 2014
DOI:
10.4236/jwarp.2014.64027
8,465
Downloads
11,643
Views
Citations
Medical Information Breaches Occurrence with Respect to Social Media Usage, in Selected Medical Institutions in Uganda
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Hussein Muhaise
,
Paul Akampurira
,
Maxwell Okello
Journal of Computer and Communications
Vol.10 No.10
,October 20, 2022
DOI:
10.4236/jcc.2022.1010002
162
Downloads
799
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
350
Downloads
2,608
Views
Citations
Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO
(Articles)
Nannan Wang
,
Zhiyi Fang
,
Kaige Yan
,
Yu Tang
,
Xingchao An
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310109
4,407
Downloads
8,231
Views
Citations
Balancing the Force in Criminal Mediation
(Articles)
Rathna N. Koman
Beijing Law Review
Vol.7 No.3
,August 1, 2016
DOI:
10.4236/blr.2016.73018
2,244
Downloads
4,866
Views
Citations
Customer Satisfaction at Galen House, Bulawayo, Zimbabwe, 2019
(Articles)
Munekayi Padingani
,
Nothando Dube
,
Simbarashe Chiwanda
,
Notion Gombe
,
Gerald Shambira
,
Ms T. Juru
,
Peter Nsubuga
,
Mufuta Tshimanga
Open Journal of Epidemiology
Vol.11 No.1
,February 4, 2021
DOI:
10.4236/ojepi.2021.111007
407
Downloads
1,802
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
1,044
Downloads
8,062
Views
Citations
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
(Articles)
Mohammed Mohammed Raoof
Journal of Information Security
Vol.15 No.2
,April 29, 2024
DOI:
10.4236/jis.2024.152014
98
Downloads
907
Views
Citations
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
(Articles)
Kpinna Tiekoura Coulibaly
,
Abdou Maïga
,
Jerome Diako
,
Moustapha Diaby
Open Journal of Applied Sciences
Vol.13 No.11
,November 28, 2023
DOI:
10.4236/ojapps.2023.1311163
127
Downloads
579
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
149
Downloads
849
Views
Citations
Cyberattack Ramifications, The Hidden Cost of a Security Breach
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152007
287
Downloads
1,599
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Enhancing Legal Document Analysis with Large Language Models: A Structured Approach to Accuracy, Context Preservation, and Risk Mitigation
(Articles)
Mark J. Davenport
Open Journal of Modern Linguistics
Vol.15 No.2
,April 11, 2025
DOI:
10.4236/ojml.2025.152016
87
Downloads
541
Views
Citations
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top