Zeitschriftenartikel zum Thema „Perception of security risks“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Perception of security risks" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Taylor, Richard G., Jeff Brice, Jr. und Sammie L. Robinson. „Perception deception: security risks created by optimistic perceptions“. Journal of Systems and Information Technology 18, Nr. 1 (14.03.2016): 2–17. http://dx.doi.org/10.1108/jsit-07-2015-0062.
Der volle Inhalt der QuelleVeebel, Viljar, und Illimar Ploom. „Estonian Perceptions of Security: Not Only About Russia and the Refugees“. Journal on Baltic Security 2, Nr. 2 (01.12.2016): 35–70. http://dx.doi.org/10.1515/jobs-2016-0046.
Der volle Inhalt der QuelleKrajňák, Tomáš, und Jiří Vágner. „Political security risks for tourism: The spatial perception of the Middle East by potential Czech tourists“. Geografie 123, Nr. 3 (2018): 379–405. http://dx.doi.org/10.37040/geografie2018123030379.
Der volle Inhalt der QuelleUrciuoli, Luca, und Juha Hintsa. „Differences in security risk perceptions between logistics companies and cargo owners“. International Journal of Logistics Management 27, Nr. 2 (08.08.2016): 418–37. http://dx.doi.org/10.1108/ijlm-02-2014-0034.
Der volle Inhalt der QuelleBlasek, Roman. „Perception of security risks by the population of the Czech Republic“. Journal of Slavic Military Studies 11, Nr. 3 (September 1998): 89–96. http://dx.doi.org/10.1080/13518049808430351.
Der volle Inhalt der QuelleOmelchenko, Daria A., Svetlana G. Maximova und Oksana E. Noyanzina. „PERCEPTION OF SOCIAL SECURITY IN REGIONS OF THE RUSSIAN-ASIAN BORDERLAND (ON THE EXAMPLE OF THE ALTAI REGION)“. Society and Security Insights 3, Nr. 1 (08.04.2020): 13–36. http://dx.doi.org/10.14258/ssi(2020)1-01.
Der volle Inhalt der QuelleAlmeida, Fernando, José Pinheiro und Vítor Oliveira. „Social Network Security Risks and Vulnerabilities in Corporate Environments“. International Journal of Applied Management Sciences and Engineering 6, Nr. 1 (Januar 2019): 14–28. http://dx.doi.org/10.4018/ijamse.2019010102.
Der volle Inhalt der QuellePorfiriev, Boris. „The Perception and Management of Security and Safety Risks: Implications for International Negotiations“. Risk Management 6, Nr. 4 (Oktober 2004): 9–25. http://dx.doi.org/10.1057/palgrave.rm.8240195.
Der volle Inhalt der QuelleGroen, Brenda, und Hester van Sprang. „Perceptions of Hospitality and Safety Are Two Sides of the Same Coin“. Buildings 11, Nr. 3 (12.03.2021): 113. http://dx.doi.org/10.3390/buildings11030113.
Der volle Inhalt der QuelleJulaihah, Umi. „PEMBAYARAN NON TUNAI: PERSEPSI CIVITAS AKADEMIKA FITK UIN MAULANA MALIK IBRAHIM MALANG“. J-PIPS (Jurnal Pendidikan Ilmu Pengetahuan Sosial) 2, Nr. 1 (30.12.2015): 63. http://dx.doi.org/10.18860/jpips.v2i1.6840.
Der volle Inhalt der QuelleWiśniewski, Bernard, und Barbara Kaczmarczyk. „Opportunity, Challenge, Risk and Threat — Review of Defi nitions and Relations“. Internal Security 9, Nr. 2 (09.07.2018): 23–32. http://dx.doi.org/10.5604/01.3001.0012.1699.
Der volle Inhalt der QuelleMihailović, Andreja, Julija Cerović Smolović, Ivan Radević, Neli Rašović und Nikola Martinović. „COVID-19 and Beyond: Employee Perceptions of the Efficiency of Teleworking and Its Cybersecurity Implications“. Sustainability 13, Nr. 12 (15.06.2021): 6750. http://dx.doi.org/10.3390/su13126750.
Der volle Inhalt der QuelleHamlet, Leigh C., Mark Mwiti Kamui und Jessica Kaminsky. „Infrastructure for water security: coping with risks in rural Kenya“. Journal of Water, Sanitation and Hygiene for Development 10, Nr. 3 (03.07.2020): 481–89. http://dx.doi.org/10.2166/washdev.2020.038.
Der volle Inhalt der QuelleSaini, Chand Prakash. „Difficulty in Transition“. International Journal of Online Marketing 10, Nr. 2 (April 2020): 17–29. http://dx.doi.org/10.4018/ijom.2020040102.
Der volle Inhalt der QuelleZhuang, Mei-Er, und Wen-Tsao Pan. „INFORMATION SECURITY ASSESSMENT BASED ON MACHINE LEARNING TECHNOLOGY-FUZZY-GRA-AHP“. International Journal of Research -GRANTHAALAYAH 7, Nr. 6 (30.06.2019): 230–40. http://dx.doi.org/10.29121/granthaalayah.v7.i6.2019.800.
Der volle Inhalt der QuelleBharsakle, Pragati Dnyaneshwar. „Social Networks for Threat Perception and Analysis“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. VI (30.06.2021): 5073–77. http://dx.doi.org/10.22214/ijraset.2021.35911.
Der volle Inhalt der QuelleSteenkamp, Jorinda, Elizelle Juanee Cilliers, Sarel Stephanus Cilliers und Louis Lategan. „Food for Thought: Addressing Urban Food Security Risks through Urban Agriculture“. Sustainability 13, Nr. 3 (26.01.2021): 1267. http://dx.doi.org/10.3390/su13031267.
Der volle Inhalt der QuelleGraham, Margaret E., Michael G. Tunik, Brenna M. Farmer, Carly Bendzans, Aileen M. McCrillis, Lewis S. Nelson, Ian Portelli et al. „Agent of Opportunity Risk Mitigation: People, Engineering, and Security Efficacy“. Disaster Medicine and Public Health Preparedness 4, Nr. 4 (Dezember 2010): 291–99. http://dx.doi.org/10.1001/dmp.2010.38.
Der volle Inhalt der QuelleIqbal, Muhammad Amjed, Azhar Abbas, Syed Asif Ali Naqvi, Muhammad Rizwan, Abdus Samie und Umar Ijaz Ahmed. „Drivers of Farm Households’ Perceived Risk Sources and Factors Affecting Uptake of Mitigation Strategies in Punjab Pakistan: Implications for Sustainable Agriculture“. Sustainability 12, Nr. 23 (26.11.2020): 9895. http://dx.doi.org/10.3390/su12239895.
Der volle Inhalt der QuelleCong, Li, Qiqi Wang, Geoffrey Wall und Yijing Su. „Decision-Making Behavior and Risk Perception of Chinese Female Wildlife Tourists“. Sustainability 13, Nr. 18 (15.09.2021): 10301. http://dx.doi.org/10.3390/su131810301.
Der volle Inhalt der QuelleMIYAZAKI, ANTHONY D., und ANA FERNANDEZ. „Consumer Perceptions of Privacy and Security Risks for Online Shopping“. Journal of Consumer Affairs 35, Nr. 1 (Juni 2001): 27–44. http://dx.doi.org/10.1111/j.1745-6606.2001.tb00101.x.
Der volle Inhalt der QuelleDemski, Christina, Wouter Poortinga und Nick Pidgeon. „Exploring public perceptions of energy security risks in the UK“. Energy Policy 66 (März 2014): 369–78. http://dx.doi.org/10.1016/j.enpol.2013.10.079.
Der volle Inhalt der QuelleJabbar, Awais, Qun Wu, Jianchao Peng, Ali Sher, Asma Imran und Kunpeng Wang. „Mitigating Catastrophic Risks and Food Security Threats: Effects of Land Ownership in Southern Punjab, Pakistan“. International Journal of Environmental Research and Public Health 17, Nr. 24 (11.12.2020): 9258. http://dx.doi.org/10.3390/ijerph17249258.
Der volle Inhalt der QuelleShin, Eunjung, und Eric W. Welch. „Socio-Technical Determinants of Information Security Perceptions in US Local Governments“. International Journal of Electronic Government Research 12, Nr. 3 (Juli 2016): 1–20. http://dx.doi.org/10.4018/ijegr.2016070101.
Der volle Inhalt der QuelleTøndel, Inger Anne, Martin Gilje Jaatun, Daniela Soares Cruzes und Nils Brede Moe. „Risk Centric Activities in Secure Software Development in Public Organisations“. International Journal of Secure Software Engineering 8, Nr. 4 (Oktober 2017): 1–30. http://dx.doi.org/10.4018/ijsse.2017100101.
Der volle Inhalt der QuelleElsantil, Yasmeen. „User Perceptions of the Security of Mobile Applications“. International Journal of E-Services and Mobile Applications 12, Nr. 4 (Oktober 2020): 24–41. http://dx.doi.org/10.4018/ijesma.2020100102.
Der volle Inhalt der QuelleZieliński, Tadeusz. „The perception of security threats in EU and NATO strategic documents: implications for the countries of the Eastern flank“. Rocznik Instytutu Europy Środkowo-Wschodniej 18, Nr. 1 (Dezember 2020): 25–42. http://dx.doi.org/10.36874/riesw.2020.1.2.
Der volle Inhalt der QuelleLee, Jin, Stacy A. Stoffregen und Frank B. Giordano. „Risks that are “Worthy” to take: Temporary Workers’ Risk-Benefit Perceptions“. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, Nr. 1 (September 2017): 1334–38. http://dx.doi.org/10.1177/1541931213601816.
Der volle Inhalt der QuelleFugate, Sunny, und Kimberly Ferguson-Walter. „Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception“. AI Magazine 40, Nr. 1 (28.03.2019): 49–62. http://dx.doi.org/10.1609/aimag.v40i1.2849.
Der volle Inhalt der QuelleTumkevič, Agnija. „CYBERSECURITY IN CENTRAL EASTERN EUROPE: FROM IDENTIFYING RISKS TO COUNTERING THREATS“. Baltic Journal of Political Science 5, Nr. 5 (17.01.2017): 73. http://dx.doi.org/10.15388/bjps.2016.5.10337.
Der volle Inhalt der QuelleRapan, Florian, und Ioana Raluca Gologach. „Romania’s Role in the Management of Security Organizations“. International conference KNOWLEDGE-BASED ORGANIZATION 24, Nr. 1 (01.06.2018): 192–97. http://dx.doi.org/10.1515/kbo-2018-0028.
Der volle Inhalt der QuelleSorgho, Raissa, Maximilian Jungmann, Aurélia Souares, Ina Danquah und Rainer Sauerborn. „Climate Change, Health Risks, and Vulnerabilities in Burkina Faso: A Qualitative Study on the Perceptions of National Policymakers“. International Journal of Environmental Research and Public Health 18, Nr. 9 (07.05.2021): 4972. http://dx.doi.org/10.3390/ijerph18094972.
Der volle Inhalt der QuelleGandit, Marc, Dungo Rémi Kouabenan und Sandrine Caroly. „Comparative Optimism, Perceived Control, Knowledge of Security Devices and the Behavior in Case of Road Tunnel Fire“. Psihologia Resurselor Umane 5, Nr. 2 (21.01.2020): 58–71. http://dx.doi.org/10.24837/pru.v5i2.328.
Der volle Inhalt der QuelleMehrnezhad, Maryam, und Ehsan Toreini. „What Is This Sensor and Does This App Need Access to It?“ Informatics 6, Nr. 1 (24.01.2019): 7. http://dx.doi.org/10.3390/informatics6010007.
Der volle Inhalt der QuelleLengyel, Henrietta, Viktor Remeli und Zsolt Szalay. „A collection of easily deployable adversarial traffic sign stickers“. at - Automatisierungstechnik 69, Nr. 6 (27.05.2021): 511–23. http://dx.doi.org/10.1515/auto-2020-0115.
Der volle Inhalt der QuelleZaki, Waqas, Areej Tayyab und Aeman Hassan. „Factors Affecting Customer Experience of E-Commerce in Pakistan“. Journal of Educational Paradigms 1, Nr. 2 (15.12.2019): 76–79. http://dx.doi.org/10.47609/0102052019.
Der volle Inhalt der QuelleKovaříková, Miroslava. „Prevention of Armed Attacks at Schools as a Part of Emergency Situations Didactics“. Lifelong Learning 5, Nr. 3 (2015): 95–112. http://dx.doi.org/10.11118/lifele2015050395.
Der volle Inhalt der QuelleHassan, Wajid, Te-Shun Chou, Xiaoming Li, Patrick Appiah-Kubi und Omar Tamer. „Latest trends, challenges and Solutions in Security in the era of Cloud Computing and Software Defined Networks“. International Journal of Informatics and Communication Technology (IJ-ICT) 8, Nr. 3 (13.11.2019): 162. http://dx.doi.org/10.11591/ijict.v8i3.pp162-183.
Der volle Inhalt der QuelleSylejmani, Rrahman, und Elda Maloku. „Illegal migration as a factor of security threat in Kosovo“. Technium Social Sciences Journal 16 (10.02.2021): 147–57. http://dx.doi.org/10.47577/tssj.v16i1.2418.
Der volle Inhalt der QuelleHossain, Md Alamgir. „Security perception in the adoption of mobile payment and the moderating effect of gender“. PSU Research Review 3, Nr. 3 (09.12.2019): 179–90. http://dx.doi.org/10.1108/prr-03-2019-0006.
Der volle Inhalt der QuelleBharathi, S. Vijayakumar. „Forewarned is forearmed“. Benchmarking: An International Journal 26, Nr. 8 (07.10.2019): 2443–67. http://dx.doi.org/10.1108/bij-08-2018-0264.
Der volle Inhalt der QuelleFranklin A, Benjamin, und Sasilatha T. „Changing the Electrical Safety Culture“. Indonesian Journal of Electrical Engineering and Computer Science 9, Nr. 1 (01.01.2018): 93. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp93-96.
Der volle Inhalt der QuellePramod, Dhanya, und S. Vijayakumar Bharathi. „Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets“. Journal of Cases on Information Technology 20, Nr. 3 (Juli 2018): 48–69. http://dx.doi.org/10.4018/jcit.2018070104.
Der volle Inhalt der QuelleTRAORE, Kalifa, Daouda SIDIBE und Harouna COULIBALY. „Climate Smart Agriculture as Final Goal: Use of Improved Cereals Varieties in Cinzana, Mali.“ Journal of Agricultural Studies 5, Nr. 1 (10.01.2017): 50. http://dx.doi.org/10.5296/jas.v5i1.10582.
Der volle Inhalt der QuelleHANDRIKOVÁ, Jana, und Darina STACHOVÁ. „PERCEPTION OF THE INCREASED RISK OF PHISHING ATTACKS DURING THE COVID-19 CRISIS“. Acta Electrotechnica et Informatica 21, Nr. 1 (09.06.2021): 19–24. http://dx.doi.org/10.15546/aeei-2021-0003.
Der volle Inhalt der QuelleSilic, Mario, und Andrea Back. „The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption“. International Journal of Information Technology & Decision Making 15, Nr. 01 (Januar 2016): 151–85. http://dx.doi.org/10.1142/s0219622015500364.
Der volle Inhalt der QuelleMiao, Ji. „Expectations and Realities: Managing the Risks of the "Belt and Road" Initiative“. China Quarterly of International Strategic Studies 01, Nr. 03 (Oktober 2015): 497–522. http://dx.doi.org/10.1142/s2377740015500244.
Der volle Inhalt der QuelleGlowka, Gundula, und Anita Zehrer. „Tourism Family-Business Owners’ Risk Perception: Its Impact on Destination Development“. Sustainability 11, Nr. 24 (07.12.2019): 6992. http://dx.doi.org/10.3390/su11246992.
Der volle Inhalt der QuelleChen, Aiguo, Guoming Lu, Hanwen Xing, Yuan Xie und Shunwei Yuan. „Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments“. International Journal of Distributed Sensor Networks 16, Nr. 5 (Mai 2020): 155014772092177. http://dx.doi.org/10.1177/1550147720921778.
Der volle Inhalt der QuelleMouli, K. Chandra, und U. Seshadri. „Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, Nr. 4 (15.08.2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.
Der volle Inhalt der Quelle