Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
7,007
Downloads
10,727
Views
Citations
AssessITS
: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
(Articles)
Mir Mehedi Rahman
,
Naresh Kshetri
,
Sayed Abu Sayeed
,
Md Masud Rana
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154032
112
Downloads
566
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
202
Downloads
823
Views
Citations
Exploring Cyber Threat Intelligence into Land Administration Systems for Enhanced Cyber Resilience
(Articles)
Pierre-François Blin
,
Trias Aditya
,
Purnama Budi Santosa
,
Christophe Claramunt
Journal of Geographic Information System
Vol.17 No.1
,February 12, 2025
DOI:
10.4236/jgis.2025.171003
50
Downloads
272
Views
Citations
A Comparative Analysis of Cybersecurity Threat Taxonomies for Healthcare Organizations
(Articles)
Mahima Jaikanth
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175020
172
Downloads
826
Views
Citations
Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and TAXII Standards
(Articles)
Gang Wang
,
Yuanzhi Huo
,
Zhao Ma Ma
Journal of Information Security
Vol.10 No.4
,October 29, 2019
DOI:
10.4236/jis.2019.104015
1,461
Downloads
3,889
Views
Citations
The Constitutional Transformation and a Threat of the Environment in Poland
(Articles)
Krzysztof R. Mazurski
Journal of Environmental Protection
Vol.2 No.4
,June 17, 2011
DOI:
10.4236/jep.2011.24044
4,890
Downloads
8,036
Views
Citations
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,395
Downloads
12,972
Views
Citations
Proposal to Disseminate the Knowledge of Tsunamis in the Caribbean Coast of Costa Rica, Central America
(Articles)
Mario Fernández Arce
,
Daniel Solís
,
Juan Luis Porras
,
Gino González
World Journal of Engineering and Technology
Vol.2 No.3B
,September 18, 2014
DOI:
10.4236/wjet.2014.23B013
3,162
Downloads
3,224
Views
Citations
Groundless Threat of Infringement of Patent
(Articles)
Dharmapuri Selvakumar Madhumitha
Beijing Law Review
Vol.10 No.3
,June 4, 2019
DOI:
10.4236/blr.2019.103029
1,201
Downloads
3,058
Views
Citations
Generative Adversarial Network Based Approach towards Synthetically Generating Insider Threat Scenarios
(Articles)
Mayesh Mohapatra
,
Anshumaan Phukan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.16 No.11
,November 28, 2023
DOI:
10.4236/jsea.2023.1611030
140
Downloads
580
Views
Citations
Handwriting Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection
(Articles)
Jason Slaughter
,
Carole E. Chaski
,
Kellep Charles
Journal of Information Security
Vol.15 No.3
,June 11, 2024
DOI:
10.4236/jis.2024.153018
80
Downloads
454
Views
Citations
Getting by with a Little Help from My Friends: Mental Rotation Ability after Tacit Peer Encouragement
(Articles)
Sheila Brownlow
,
Amanda J. Janas
,
Kathleen A. Blake
,
Kathleen T. Rebadow
,
Lindsay M. Mello
Psychology
Vol.2 No.4
,July 25, 2011
DOI:
10.4236/psych.2011.24057
6,306
Downloads
10,342
Views
Citations
Can Rewards Obviate Stereotype Threat Effects on Mental Rotation Tasks?
(Articles)
Amanda Kanoy
,
Sheila Brownlow
,
Tiffany F. Sowers
Psychology
Vol.3 No.7
,June 18, 2012
DOI:
10.4236/psych.2012.37080
5,273
Downloads
8,573
Views
Citations
Anything but Race: Avoiding Racial Discourse to Avoid Hurting You or Me
(Articles)
Phillip Atiba Goff
,
Matthew Christian Jackson
,
Andrew H. Nichols
,
Brooke Allison Lewis Di Leone
Psychology
Vol.4 No.3A
,March 29, 2013
DOI:
10.4236/psych.2013.43A048
5,900
Downloads
9,231
Views
Citations
This article belongs to the Special Issue on
Applied Psychology
Movement for the “Emancipation of the Niger Delta” (MEND) Constitutes a Threat to the U.S. National Security
(Articles)
Mustapha Kulungu
Open Access Library Journal
Vol.8 No.6
,June 15, 2021
DOI:
10.4236/oalib.1107465
287
Downloads
4,852
Views
Citations
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
(Articles)
Josiah Dykstra
,
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.13 No.3
,June 9, 2022
DOI:
10.4236/jis.2022.133006
247
Downloads
1,351
Views
Citations
Threats to Rural Livelihoods in Nigeria: Implications for Social Order and Crisis Management
(Articles)
Iwundu Anthony Onyekwere
,
Kingsley Onyebuchim Nworgu
Advances in Applied Sociology
Vol.10 No.3
,March 16, 2020
DOI:
10.4236/aasoci.2020.103004
791
Downloads
3,059
Views
Citations
Security Policy Management Process within Six Sigma Framework
(Articles)
Vijay Anand
,
Jafar Saniie
,
Erdal Oruklu
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31006
7,095
Downloads
13,969
Views
Citations
The Pale Shades of Emotion: A Signal Detection Theory Analysis of the Emotional Stroop Task
(Articles)
Boaz M. Ben-David
,
Eran Chajut
,
Daniel Algom
Psychology
Vol.3 No.7
,June 18, 2012
DOI:
10.4236/psych.2012.37079
6,056
Downloads
11,663
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top