Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,778
Downloads
9,717
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,174
Downloads
3,699
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
The Reason and Coping Measures of Employees’ Resistance to Information System
(Articles)
Chunhua Xiao
Journal of Human Resource and Sustainability Studies
Vol.5 No.1
,March 30, 2017
DOI:
10.4236/jhrss.2017.51009
7,627
Downloads
9,679
Views
Citations
Municipal Solid Waste Disposal Site Selection in Jacobabad Using RS/GIS Techniques
(Articles)
Saba Zehra
,
Sheeba Afsar
,
Yasmeen Anis
Journal of Geoscience and Environment Protection
Vol.7 No.10
,October 16, 2019
DOI:
10.4236/gep.2019.710002
951
Downloads
3,180
Views
Citations
Management Accounting Literature Review—Based on the Development of Management Accounting Research in 2015-2017
(Articles)
Darong Jiang
Modern Economy
Vol.10 No.12
,December 6, 2019
DOI:
10.4236/me.2019.1012145
5,662
Downloads
9,252
Views
Citations
Discussion on the Application of Geographic Information System in Urban Ecological Environment Management under the Background of Big Data
(Articles)
Qinfen Zheng
Open Access Library Journal
Vol.7 No.11
,November 9, 2020
DOI:
10.4236/oalib.1106904
380
Downloads
1,021
Views
Citations
Challenges Affecting Effective Implementation of Financial Management Information Systems in Local Government Authorities in Tanzania as Part of the Digital Ecosystem
(Articles)
Liliane Pasape
,
Ernest Godson
Journal of Financial Risk Management
Vol.11 No.3
,August 2, 2022
DOI:
10.4236/jfrm.2022.113025
636
Downloads
6,353
Views
Citations
Assessing the Corporate Performance via Managerial Autonomy in Oman: Mediating Role of Management Accounting Information System
(Articles)
Uvesh Husain
Open Journal of Social Sciences
Vol.11 No.2
,February 28, 2023
DOI:
10.4236/jss.2023.112030
208
Downloads
985
Views
Citations
Web-based: A data warehouse on osteoporosis data warehouse in the osteoporosis community health information management system
(Articles)
Qiang Wang
,
Yingchao Shen
Journal of Biomedical Science and Engineering
Vol.6 No.11
,November 25, 2013
DOI:
10.4236/jbise.2013.611134
4,225
Downloads
6,711
Views
Citations
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
434
Downloads
3,321
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,744
Downloads
8,312
Views
Citations
On a Generic Security Game Model
(Articles)
Vivek Shandilya
,
Sajjan Shiva
Int'l J. of Communications, Network and System Sciences
Vol.10 No.7
,July 28, 2017
DOI:
10.4236/ijcns.2017.107008
914
Downloads
1,908
Views
Citations
Integrated Big Data Audit with Internal Control Audit to Dig up the “Swindlers” behind Social Security Funds Misappropriation
(Articles)
Benxiang Jiang
Journal of Financial Risk Management
Vol.10 No.4
,December 29, 2021
DOI:
10.4236/jfrm.2021.104028
539
Downloads
1,340
Views
Citations
Analysis of Secured Cloud Data Storage Model for Information
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Udo Chukwuebuka Chigozie
,
Duroha Austin Ekekwe
,
Georgina Chekwube Nwankwo
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175017
123
Downloads
548
Views
Citations
The Effectiveness of Blackboard System, Uses and Limitations in Information Management
(Articles)
Jamilah A. Alokluk
Intelligent Information Management
Vol.10 No.6
,November 30, 2018
DOI:
10.4236/iim.2018.106012
5,385
Downloads
40,650
Views
Citations
Effectiveness of Logistics Management Information System (LMIS) in Improving the Availability of Essential Medicines and Medical Supplies in Public Hospitals in Zambia: A Cross-Sectional Study
(Articles)
Aubrey Kanyika
,
Steward Mudenda
,
Victor Daka
,
Nayuda Kaonga
,
Chitundu Mbao
,
Diana K. Mwaba
,
Scott Kaba Matafwali
Pharmacology & Pharmacy
Vol.16 No.2
,February 26, 2025
DOI:
10.4236/pp.2025.162005
67
Downloads
738
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,594
Downloads
10,271
Views
Citations
Intelligent Information Management in Aquaponics to Increase Mutual Benefits
(Articles)
Divas Karimanzira
,
Cai Na
,
Mu Hong
,
Yaoguang Wei
Intelligent Information Management
Vol.13 No.1
,January 26, 2021
DOI:
10.4236/iim.2021.131003
1,152
Downloads
3,778
Views
Citations
Advanced Transition/Cluster Key Management Scheme for End-System Multicast Protocol
(Articles)
Ayman El-Sayed
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55038
6,643
Downloads
9,343
Views
Citations
Quantitative Security Evaluation for Software System from Vulnerability Database
(Articles)
Hiroyuki Okamura
,
Masataka Tokuzane
,
Tadashi Dohi
Journal of Software Engineering and Applications
Vol.6 No.4A
,April 23, 2013
DOI:
10.4236/jsea.2013.64A003
4,520
Downloads
7,110
Views
Citations
This article belongs to the Special Issue on
Software Dependability
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top