Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cyber Threats, Harsh Environment and the European High North (EHN) in a Human Security and Multi-Level Regulatory Global Dimension: Which Framework Applicable to Critical Infrastructures under “Exceptionally Critical Infrastructure Conditions” (ECIC)?
(Articles)
Sandra Cassotta
,
Roman Sidortsov
,
Christer Pursiainen
,
Michael Evan Goodsite
Beijing Law Review
Vol.10 No.2
,March 25, 2019
DOI:
10.4236/blr.2019.102020
1,062
Downloads
2,728
Views
Citations
This article belongs to the Special Issue on
Law, Policy and Globalization
Impact of Statelessness: Are We Ready to Face?
(Articles)
Bilkis Afroza Siddika
Open Journal of Social Sciences
Vol.7 No.12
,December 3, 2019
DOI:
10.4236/jss.2019.712001
1,088
Downloads
6,054
Views
Citations
This article belongs to the Special Issue on
Human Rights and Social Justice
The Legitimacy of Military Intervention in Yemen and Its Impacts
(Articles)
Junxiang Mao
,
Ammar Ahmad Ahmad Gady
Beijing Law Review
Vol.12 No.2
,June 4, 2021
DOI:
10.4236/blr.2021.122030
387
Downloads
2,274
Views
Citations
Finding Food Security through Changing the Agricultural Model to Sustain Insect Biodiversity
(Articles)
Astrid Jankielsohn
Advances in Entomology
Vol.9 No.3
,July 16, 2021
DOI:
10.4236/ae.2021.93011
380
Downloads
1,314
Views
Citations
A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality
(Articles)
Mohammed Hussein Kurdi
,
Mohsen Denden
,
David Paul
Journal of Information Security
Vol.15 No.2
,April 24, 2024
DOI:
10.4236/jis.2024.152013
331
Downloads
1,641
Views
Citations
Assessing the Relationship between Human Resources Management Practices and Job Satisfaction among Private Food Industrial Sector in Jeddah, KSA
(Articles)
Abdulsalam Salem
,
Maged Al-Dubai
Open Journal of Business and Management
Vol.12 No.3
,May 22, 2024
DOI:
10.4236/ojbm.2024.123091
173
Downloads
777
Views
Citations
The Cyberpsychology of Small and Medium-Sized Enterprises Cybersecurity: A Human-Centric Approach to Policy Development
(Articles)
Troy C. Troublefield
Journal of Information Security
Vol.16 No.1
,January 15, 2025
DOI:
10.4236/jis.2025.161009
130
Downloads
836
Views
Citations
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,217
Downloads
13,138
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,194
Downloads
3,829
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Cyberspace Security Using Adversarial Learning and Conformal Prediction
(Articles)
Harry Wechsler
Intelligent Information Management
Vol.7 No.4
,July 10, 2015
DOI:
10.4236/iim.2015.74016
7,067
Downloads
8,669
Views
Citations
New Aeroion Model of a Dangerous Natural Phenomenon—Ball Lightning
(Articles)
Simakov Andrey
Open Journal of Philosophy
Vol.14 No.2
,May 10, 2024
DOI:
10.4236/ojpp.2024.142024
135
Downloads
628
Views
Citations
Research on the Contents and Indexes of Reservoir Operational Security
(Articles)
Jingchun Feng
,
Zhongnan Duan
Journal of Water Resource and Protection
Vol.2 No.11
,November 29, 2010
DOI:
10.4236/jwarp.2010.211115
6,177
Downloads
9,559
Views
Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,807
Downloads
2,897
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,801
Downloads
9,790
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,625
Downloads
10,425
Views
Citations
Association between the Performance of the University Security Officers and Their Physical Fitness: A Case Study
(Articles)
A. M. Razmy
,
A. Jabeer
Open Access Library Journal
Vol.4 No.6
,June 12, 2017
DOI:
10.4236/oalib.1103239
1,134
Downloads
2,165
Views
Citations
Towards Maintaining Peacefulness of the Sea: Legal Regime Governing Maritime Safety and Security in Nigeria
(Articles)
Ekundayo Oluwaremilekun Babatunde
,
Mutiat Mobolanle Abdulsalam
Beijing Law Review
Vol.12 No.2
,June 1, 2021
DOI:
10.4236/blr.2021.122029
554
Downloads
3,885
Views
Citations
Security Cooperation between China and Indonesia to Address Maritime Security Threats
(Articles)
Yuliannova Lestari
,
Georges Olemanu Lohalo
,
Nicole Kajir Diur
,
Betao Ngoma Mushinda
,
Vital Mbumba Mbumba
,
Scheel Mutombo Kianga
,
Peter Ngolo Minga
Open Journal of Political Science
Vol.12 No.4
,September 9, 2022
DOI:
10.4236/ojps.2022.124030
508
Downloads
3,085
Views
Citations
Metaphor Analysis of Security Discourse in
Xi Jinping
:
The Governance of China
(
Volume IV
) and Its English Translation Strategies
(Articles)
Rui Chen
Open Journal of Modern Linguistics
Vol.14 No.5
,October 15, 2024
DOI:
10.4236/ojml.2024.145050
97
Downloads
522
Views
Citations
Leadership Responsibilities and Characteristics in Security Work
(Articles)
Abdullah Ahmed Al-Subaie
Open Journal of Leadership
Vol.14 No.2
,April 22, 2025
DOI:
10.4236/ojl.2025.142009
37
Downloads
223
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top