Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A New Construction Scheme for Information Security Lab
(Articles)
Li Zhu
,
Huaqing Mao
,
Zhiwen Hu
Creative Education
Vol.3 No.4
,August 13, 2012
DOI:
10.4236/ce.2012.34064
4,996
Downloads
7,341
Views
Citations
Camera and Voice Control Based Location Services and Information Security on Android
(Articles)
Jitendra G. Chouhan
,
Nikhil Kumar Singh
,
Prashant S. Modi
,
Keyurbhai A. Jani
,
Bhavin N. Joshi
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73015
3,639
Downloads
5,106
Views
Citations
Agricultural Extension for Enhancing Production and Productivity: The Case of Southern Ethiopia, Arba Minch Zuriya District
(Articles)
Molla Mekonnen Alemu
Open Access Library Journal
Vol.4 No.4
,April 25, 2017
DOI:
10.4236/oalib.1103427
1,341
Downloads
3,666
Views
Citations
Research on the Laboratory Management Mode Based on the Optimal Allocation of Resources
(Articles)
Bo Yang
Open Access Library Journal
Vol.8 No.1
,January 21, 2021
DOI:
10.4236/oalib.1107119
351
Downloads
1,511
Views
Citations
Farmers’ Access to Agricultural Information Sources: Evidences from Rural Pakistan
(Articles)
Muhammad Yaseen
,
Shiwei Xu
,
Wen Yu
,
Sadia Hassan
Journal of Agricultural Chemistry and Environment
Vol.5 No.1B
,April 30, 2016
DOI:
10.4236/jacen.2016.51B003
3,039
Downloads
10,628
Views
Citations
Analysis of Staffing and Training Needs for Effective Delivery of Extension Service in Sustainable Land Management in Kilimanjaro Region, Tanzania
(Articles)
John F. Kessy
Open Journal of Soil Science
Vol.4 No.13
,December 22, 2014
DOI:
10.4236/ojss.2014.413045
3,310
Downloads
4,572
Views
Citations
This article belongs to the Special Issue on
Sustainable Land Management: Intermediate Results and Future Perspectives from Kilimanjaro, Tanzania
Ideas and Practice of Medical Discipline Laboratory Construction under the Healthy China Strategy
(Articles)
Xiulan Yang
,
Xiaoguang Chen
,
Lian Liu
,
Jiangrong Huang
,
Limin Zhang
Open Journal of Social Sciences
Vol.9 No.1
,January 20, 2021
DOI:
10.4236/jss.2021.91017
262
Downloads
792
Views
Citations
Drugs Supply and Laboratory Services in Dots System of Kaduna State: A Health Care Worker Perspective
(Articles)
Shehu Usman Adamu
,
D. McGill
Journal of Tuberculosis Research
Vol.6 No.1
,March 7, 2018
DOI:
10.4236/jtr.2018.61003
804
Downloads
2,013
Views
Citations
Study on Effect of UHV Power Grid Construction Schemes on Short Circuit Current
(Articles)
Zaihua Li
,
Feng Gao
,
Qing Wang
,
Shuang Zhang
,
Hongmei Luo
,
Jian Liang
Journal of Power and Energy Engineering
Vol.3 No.4
,April 14, 2015
DOI:
10.4236/jpee.2015.34028
5,013
Downloads
5,578
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,424
Downloads
9,737
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,014
Downloads
3,188
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Evaluation of the Completeness in the Filling of Laboratory Request Forms Submitted to the Haematology Laboratory at a Tertiary Hospital in Kenya
(Articles)
Japheth C. Kipkulei
,
Teresa C. Lotodo
Health
Vol.11 No.7
,July 11, 2019
DOI:
10.4236/health.2019.117069
854
Downloads
3,296
Views
Citations
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
228
Downloads
1,893
Views
Citations
Research on Transformation Characteristics of Binomial Coefficient Formula and Its Extended Model
(Articles)
Minghan Zhu
,
Jeffrey Zheng
Journal of Applied Mathematics and Physics
Vol.7 No.11
,November 29, 2019
DOI:
10.4236/jamp.2019.711202
349
Downloads
983
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,624
Downloads
8,132
Views
Citations
Performance Measurement Model for Agriculture Extension Services for Sustainable Livelihood of the Farmers: Evidences from India
(Articles)
Rohit Joshi
,
Atulya Narayan
Theoretical Economics Letters
Vol.9 No.5
,May 27, 2019
DOI:
10.4236/tel.2019.95082
1,158
Downloads
5,076
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,325
Downloads
10,489
Views
Citations
Information Segmentation and Investing in Cybersecurity
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121006
664
Downloads
3,042
Views
Citations
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,293
Downloads
13,121
Views
Citations
Investing in Cybersecurity: Insights from the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.7 No.2
,March 23, 2016
DOI:
10.4236/jis.2016.72004
8,248
Downloads
16,988
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top