Journal articles on the topic 'Computer security Taiwan'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 22 journal articles for your research on the topic 'Computer security Taiwan.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chin-Chen Chang and Wei-Bin Lee. "Taiwan: Focus on the information security market." IT Professional 5, no. 5 (September 2003): 26–29. http://dx.doi.org/10.1109/mitp.2003.1235606.
Full textHsiao, Kuo-Lun, Kuan-Yu Lin, Yi-Ting Wang, Chun-Hsiung Lee, and Zhe-Ming Zhang. "Continued use intention of lifestyle mobile applications: the Starbucks app in Taiwan." Electronic Library 37, no. 5 (October 7, 2019): 893–913. http://dx.doi.org/10.1108/el-03-2019-0085.
Full textChen, Tser-yieth, and Ji-jenn Chiou. "Forecasting the development of internet security technology in Taiwan via scenario analysis." International Journal of Services Technology and Management 5, no. 2 (2004): 170. http://dx.doi.org/10.1504/ijstm.2004.004057.
Full textChen, Yu-Tsang, Wen-Ling Shih, Chun-Hsiung Lee, Pai-Lu Wu, and Chun-Yen Tsai. "Relationships among undergraduates' problematic information security behavior, compulsive internet use, and mindful awareness in Taiwan." Computers & Education 164 (April 2021): 104131. http://dx.doi.org/10.1016/j.compedu.2021.104131.
Full textWang, Hsin-Wei, Szu-Yu Kuo, and Liang-Bi Chen. "Exploring the Relationship between Internal Information Security, Response Cost, and Security Intention in Container Shipping." Applied Sciences 11, no. 6 (March 15, 2021): 2609. http://dx.doi.org/10.3390/app11062609.
Full textShih-Hsiung Lee, Shih-Hsiung Lee, and Po-Hsiang Shih Shih-Hsiung Lee. "An Improved Gated System that Combines the Techniques of the Internet of Things for Community Security." 網際網路技術學刊 23, no. 2 (March 2022): 345–62. http://dx.doi.org/10.53106/160792642022032302014.
Full textChang, I.-Chiu, Hsin-Ginn Hwang, David C. Yen, and Hen-Yi Huang. "An empirical study of the factors affecting Internet security for the financial industry in Taiwan." Telematics and Informatics 23, no. 4 (November 2006): 343–64. http://dx.doi.org/10.1016/j.tele.2005.11.001.
Full textHo, Li-Hsing, Ming-Tsai Hsu, and Tieh-Min Yen. "Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL." Information & Computer Security 23, no. 2 (June 8, 2015): 161–77. http://dx.doi.org/10.1108/ics-04-2014-0026.
Full textChen, Yun-Ju, Sheng Ming Hsu, Shu-Yi Liao, Tsung-Chi Chen, and Wei-Chun Tseng. "Natural Gas or Algal Reef: Survey-Based Valuations of Pro-Gas and Pro-Reef Groups Specifically for Policy Advising." Energies 12, no. 24 (December 9, 2019): 4682. http://dx.doi.org/10.3390/en12244682.
Full textOzdemir, Serkan, Martin Wynn, and Bilgin Metin. "Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity." Sustainability 15, no. 1 (December 21, 2022): 87. http://dx.doi.org/10.3390/su15010087.
Full textTian Chai, Tian Chai, Han Xue Tian Chai, Xia-Teng Zhou Han Xue, Jian-Zhou Liu Xia-Teng Zhou, and Wen-Yi Wang Jian-Zhou Liu. "Recognition Model and Simulation of Busy Waters in Fishing Area Based on Density Clustering." 電腦學刊 33, no. 4 (August 2022): 169–80. http://dx.doi.org/10.53106/199115992022083304014.
Full textTsai, Wen-Hsun, Yi-Syuan Wu, Chia-Shiang Cheng, Ming-Hao Kuo, Yu-Tien Chang, Fu-Kang Hu, Chien-An Sun, et al. "A Technology Acceptance Model for Deploying Masks to Combat the COVID-19 Pandemic in Taiwan (My Health Bank): Web-Based Cross-sectional Survey Study." Journal of Medical Internet Research 23, no. 4 (April 21, 2021): e27069. http://dx.doi.org/10.2196/27069.
Full textTaran, Makar. "US strategy of China’s engagement: key conceptualized regional implications." American History & Politics Scientific edition, no. 10 (2020): 70–79. http://dx.doi.org/10.17721/2521-1706.2020.10.7.
Full textSidorov, Denis, Fang Liu, and Yonghui Sun. "Machine Learning for Energy Systems." Energies 13, no. 18 (September 10, 2020): 4708. http://dx.doi.org/10.3390/en13184708.
Full textWu, S. M., and Y. C. Wu. "DEVELOPMENT OF SMART CITIES IN TAIWAN FROM THE PERSPECTIVE OF CLOUD COMPUTING SECURITY." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4/W16 (October 1, 2019): 667–70. http://dx.doi.org/10.5194/isprs-archives-xlii-4-w16-667-2019.
Full textChang, Chun-Yang, Chun-Ai Tu, and Wei-Luen Huang. "Developing a Recommendation Model for the Smart Factory System." Applied Sciences 11, no. 18 (September 16, 2021): 8606. http://dx.doi.org/10.3390/app11188606.
Full textFang, Yin-Ying, Chi-Fang Chen, and Sheng-Ju Wu. "Feature identification using acoustic signature of Ocean Researcher III (ORIII) of Taiwan." ANZIAM Journal 59 (July 25, 2019): C318—C357. http://dx.doi.org/10.21914/anziamj.v59i0.12655.
Full textEyadat, Mohammad, and Rawan Sharyoufi. "STUDENTS AWARENESS TOWARD MOBILE WIRELESS TECHNOLOGIES SECURITY ISSUES AT COLLEGE OF COMPUTER SCIENCE AND COMPUTER ENGINEERING � TAIBAH UNIVERSITY." Journal of International Management Studies 14, no. 3 (October 1, 2014): 35–42. http://dx.doi.org/10.18374/jims-14-3.4.
Full textCarrero, Justin, Anna Krzeminska, and Charmine E. J. Härtel. "The DXC technology work experience program: disability-inclusive recruitment and selection in action." Journal of Management & Organization 25, no. 04 (July 2019): 535–42. http://dx.doi.org/10.1017/jmo.2019.23.
Full textKao, Yu-Cheng, Kao-Yi Shen, San-Ting Lee, and Joseph C. P. Shieh. "Selecting the Fintech Strategy for Supply Chain Finance: A Hybrid Decision Approach for Banks." Mathematics 10, no. 14 (July 7, 2022): 2393. http://dx.doi.org/10.3390/math10142393.
Full textLin, Fandel, and Hsun-Ping Hsieh. "Traveling Transporter Problem: Arranging a New Circular Route in a Public Transportation System Based on Heterogeneous Non-Monotonic Urban Data." ACM Transactions on Intelligent Systems and Technology 13, no. 3 (June 30, 2022): 1–25. http://dx.doi.org/10.1145/3510034.
Full textYasin Kubilay, Murat, Mehmet Sabir Kiraz, and Haci Ali Mantar. "KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures." Computer Journal, August 12, 2020. http://dx.doi.org/10.1093/comjnl/bxaa081.
Full text