Filters








35 Hits in 4.0 sec

Towards a More Systematic Approach to Secure Systems Design and Analysis

Simon Miller, Susan Appleby, Jonathan M. Garibaldi, Uwe Aickelin
2013 International Journal of Secure Software Engineering  
International Journal of Secure Software Engineering, 4(1), 11-30, January-March 2013Copyright © 2013, IGI Global.  ...  International Journal of Secure Software Engineering, 4(1), 11-30, January-March 2013Copyright © 2013, IGI Global.  ...  miSSioN: The mission of the International Journal of Secure Software Engineering (IJSSE) is to provide a forum for software engineers and security experts to exchange innovative ideas in security-aware  ... 
doi:10.4018/jsse.2013010102 fatcat:xr7inkcrpnd2dkeopse4tcie6a

Migration Goals and Risk Management in Cloud Computing

Shareeful Islam, Stefan Fenz, Edgar Weippl, Christos Kalloniatis
2016 International Journal of Secure Software Engineering  
After reviewing title and abstract, we observed that most of the works consider security and privacy risks and very few on the business risks in cloud.  ...  We use search engines from the following five sites: Google Scholar, Elsevier, IEEE Xplore, ACM Digital Library and Science Direct to extract the literature.  ...  He has served as a program committee member in several International Conferences and as a reviewer in many International Journals. He is a member of Greek Computer Society.  ... 
doi:10.4018/ijsse.2016070103 fatcat:gerqit7vdjcplkc5wci5a3bbba

ANALYSIS OF LECTURERS' EXPERIENCE IN THE IMPLEMENTATIONOF ICT IN TEACHING ECONOMICS TO UNDERGRADUATES

Kabora Floria
2016 IJSS   unpublished
Third, the impacts of ICT use on teaching are the increase of the competence and the confidence of the lecturers to transfer knowledge.  ...  impact of ICT use on teaching.  ...  issues of national and international interest.Technological solutions are becoming more common.  ... 
fatcat:esvqjlezafgxhaa4vd3hpfhuoe

Towards a More Systematic Approach to Secure Systems Design and Analysis

Simon Miller, Susan Appleby, Uwe Aickelin
2013 Social Science Research Network  
Uwe (2013) Towards a more systematic approach to secure systems design and analysis. International Journal of Secure Software Engineering, 4 (1).  ...  International Journal of Secure Software Engineering, 4(1), 11-30, January-March 2013Copyright © 2013, IGI Global.  ...  International Journal of Secure Software Engineering, 4(1), 11-30, January-March 2013Copyright © 2013, IGI Global.  ... 
doi:10.2139/ssrn.2823280 fatcat:z6mc6sfkpne3bgclvpif5a3chm

List of predatory journals and publishers

Jiban Shrestha
2020 Zenodo  
List of predatory journals and publishers.Retrieved from http://eprints.rclis.org/40643/  ...  ) • International Journal of Computer Science and Network Security (IJCSNS) • International Journal of Computer Science and Network (IJCSN) • International Journal of Computer Science and Software Engineering  ...  Journal of Social Science and Humanity (IJSSH) • International Journal of Social Sciences and Education (IJSSE) • International Journal of Social Sciences and Entrepreneurship (IJSSE) • International  ... 
doi:10.5281/zenodo.4660019 fatcat:7r4kmclknrhhzk5uh3fojco4fm

List of predatory journals and publishers

Jiban Shrestha
2020 Zenodo  
List of predatory journals and publishers.Retrieved from http://eprints.rclis.org/40643/  ...  Communications Security (IJCNCS) • International Journal of Computer Science & Communication Security (IJCSCS) • International Journal of Computer Science and Business Informatics • International Journal  ...  • International Journal of Society, Culture & Language (IJSCL) • International Journal of Soft Computing and EngineeringInternational Journal of Sport Studies (IJSS) • International Journal of Teacher  ... 
doi:10.5281/zenodo.4659864 fatcat:vddzpxj7kzaepjww4dhmfn7f3i

List of predatory journals and publishers

Jiban Shrestha
2020 Zenodo  
The researchers should be aware of the quality of journals while publishing their research results (Shrestha et al., 2020). There is an international initiative called "Think. Check. Submit."  ...  Authors should look at the journal website some of the articles published in the journals to assess their quality; this quick review may be all that is needed to identify predatory journals (Forero et  ...  Journal of Computer Networks and Applications (IJCNA) • International Journal of Computer Networks and Communications Security (IJCNCS) • International Journal of Computer Science & Communication Security  ... 
doi:10.5281/zenodo.4280623 fatcat:rm7436kefzftnh6r6awzsei4su

DESIGN OF A PROTOTYPE MONITORING SYSTEM FOR SCHOOL LIBRARY VISITORS USING RFID AND NODEMCU BASED ON THE INTERNET OF

Sofyan, Muh Imam Quraisy, Mardewi, Siti Nur Asia
2021 International Journal of Social Science  
Monitoring the identity of library visitors is a very important part.  ...  The design of this system consists of a library card, RFID, Nodemcu, 2 x 16 LCD, and a web as an application used to process visitor identities or as a place to display information in real time.  ...  International Journal of Social Science (IJSS) Vol.1 Issue.4 December 2021, pp: 333-340 ISSN: 2798-3463 (Printed) | 2798-4079 (Online) DOI: https://doi.org/10.53625/ijss.v1i4.711 337 ………………………………………………  ... 
doi:10.53625/ijss.v1i4.711 fatcat:vvwqn44q7vcwxn7lytf465os6e

List of predatory journals and publishers

Jiban Shrestha
2020 Zenodo  
The researchers should be aware of the quality of journals while publishing their research results (Shrestha et al., 2020). There is an international initiative called "Think. Check. Submit."  ...  Authors should look at the journal website some of the articles published in the journals to assess their quality; this quick review may be all that is needed to identify predatory journals (Forero et  ...  • International Journal of Society, Culture & Language (IJSCL) • International Journal of Soft Computing and EngineeringInternational Journal of Sport Studies (IJSS) • International Journal of Teacher  ... 
doi:10.5281/zenodo.4280714 fatcat:4swg2eb3qjhetkb4xzxydkai4q

List of predatory journals and publishers

Jiban Shrestha
2020 Zenodo  
List of predatory journals and publishers.Retrieved from http://eprints.rclis.org/40643/  ...  (IJSSH)  International Journal of Social Sciences and Education (IJSSE)  International Journal of Social Sciences and Entrepreneurship (IJSSE)  International Journal of Social Sciences and Information  ...  Journal of Computer Networks and Communications Security (IJCNCS)  International Journal of Computer Science & Communication Security (IJCSCS)  International Journal of Computer Science and Business  ... 
doi:10.5281/zenodo.4660827 fatcat:lnkgb446z5bxnhiu3bz4zhtnae

List of predatory journals and publishers

Jiban Shrestha
2020 Zenodo  
List of predatory journals and publishers.Retrieved from http://eprints.rclis.org/40643/  ...  (IJSSH)  International Journal of Social Sciences and Education (IJSSE)  International Journal of Social Sciences and Entrepreneurship (IJSSE)  International Journal of Social Sciences and Information  ...  Journal of Computer Networks and Communications Security (IJCNCS)  International Journal of Computer Science & Communication Security (IJCSCS)  International Journal of Computer Science and Business  ... 
doi:10.5281/zenodo.4660828 fatcat:gklwh3c7bndmfcp3nvavzqfgge

Documentation of Assumptions and System Vulnerability Monitoring: the Case of System Theoretic Process Analysis (STPA)

Nektarios Karanikas
2018 International Journal of Safety Science  
Also, it is proposed to examine the incorporation of respective fields in the software packages supporting the application of STPA [e.g., [43] [44] [45] .  ...  Moreover, the current work might complement hazard analysis guidelines and can be incorporated in software applications that support such analyses. 92 application guidelines.  ...  Acknowledgments The author wants to express his appreciation to Dr Maria Mikela Chatzimichailidou, Mr Martin Rejzek and Mr Anastasios Plioutsias for their comments on a preliminary version of this work  ... 
doi:10.24900/ijss/02018493.2018.0301 fatcat:qansacafd5d6bpitbwe2326ba4

Missing no Interaction—Using STPA for Identifying Hazardous Interactions of Automated Driving Systems

Asim Abdulkhaleq, Markus Baumeister, Hagen Böhmert, Stefan Wagner
2018 International Journal of Safety Science  
Hence, new analysing approaches may be required to identify safe system engineering solutions. One of the possible analysis approaches is STPA (System-Theoretic Process Analysis).  ...  This leads to an increase of complexity of the automated driving systems.  ...  SiU Exists but outside Lane Change topic HIM International Journal of Safety Science Vol. 02, No. 01, (2018), pp. 115 -124 DOI: 10.24900/ijss/0201115124.2018.0301  ... 
doi:10.24900/ijss/0201115124.2018.0301 fatcat:xrw2f3eef5agvkjcgonvd5vdf4

Effects of a hybrid digital cognitive–behavioural therapy for insomnia and emotion regulation in the workplace (SLEEP): study protocol for a randomised waitlist control trial

Talar Rita Moukhtarian, Krishane Patel, Carla Toro, Sean Russel, Guy Daly, Lukasz Walasek, Nicole K Y Tang, Caroline Meyer
2022 BMJ Open  
A process evaluation will examine the fidelity of delivery and experiences of the intervention.  ...  University of Warwick Biomedical and Research Ethics Committee (BSREC 45/20-21).  ...  We thank the patient and public advisory committee of the study for their invaluable feedback in the different stages of the study.  ... 
doi:10.1136/bmjopen-2021-058062 pmid:35840305 fatcat:pr2zrgg335exnehmnlyk64hmly

Strategies for Improving the Performance of Higher Learning Institutions in Tanzania

2020 International Journal of Social Sciences & Educational Studies  
Strategies which are essential for HLIs performance includes, observance of ethics by management and staff in HLIs, uses of competent lecturers, production of best graduates, development of sound learning  ...  This study explored strategies which can improve the performance of HLIs using 39 respondents who were purposively selected.  ...  QDA Miner Lite software.  ... 
doi:10.23918/ijsses.v7i1p27 fatcat:zaom4ykszjgu3auje5atmbcd4y
« Previous Showing results 1 — 15 out of 35 results