Journal articles on the topic 'Perception of security risks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Perception of security risks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Taylor, Richard G., Jeff Brice, Jr., and Sammie L. Robinson. "Perception deception: security risks created by optimistic perceptions." Journal of Systems and Information Technology 18, no. 1 (March 14, 2016): 2–17. http://dx.doi.org/10.1108/jsit-07-2015-0062.
Full textVeebel, Viljar, and Illimar Ploom. "Estonian Perceptions of Security: Not Only About Russia and the Refugees." Journal on Baltic Security 2, no. 2 (December 1, 2016): 35–70. http://dx.doi.org/10.1515/jobs-2016-0046.
Full textKrajňák, Tomáš, and Jiří Vágner. "Political security risks for tourism: The spatial perception of the Middle East by potential Czech tourists." Geografie 123, no. 3 (2018): 379–405. http://dx.doi.org/10.37040/geografie2018123030379.
Full textUrciuoli, Luca, and Juha Hintsa. "Differences in security risk perceptions between logistics companies and cargo owners." International Journal of Logistics Management 27, no. 2 (August 8, 2016): 418–37. http://dx.doi.org/10.1108/ijlm-02-2014-0034.
Full textBlasek, Roman. "Perception of security risks by the population of the Czech Republic." Journal of Slavic Military Studies 11, no. 3 (September 1998): 89–96. http://dx.doi.org/10.1080/13518049808430351.
Full textOmelchenko, Daria A., Svetlana G. Maximova, and Oksana E. Noyanzina. "PERCEPTION OF SOCIAL SECURITY IN REGIONS OF THE RUSSIAN-ASIAN BORDERLAND (ON THE EXAMPLE OF THE ALTAI REGION)." Society and Security Insights 3, no. 1 (April 8, 2020): 13–36. http://dx.doi.org/10.14258/ssi(2020)1-01.
Full textAlmeida, Fernando, José Pinheiro, and Vítor Oliveira. "Social Network Security Risks and Vulnerabilities in Corporate Environments." International Journal of Applied Management Sciences and Engineering 6, no. 1 (January 2019): 14–28. http://dx.doi.org/10.4018/ijamse.2019010102.
Full textPorfiriev, Boris. "The Perception and Management of Security and Safety Risks: Implications for International Negotiations." Risk Management 6, no. 4 (October 2004): 9–25. http://dx.doi.org/10.1057/palgrave.rm.8240195.
Full textGroen, Brenda, and Hester van Sprang. "Perceptions of Hospitality and Safety Are Two Sides of the Same Coin." Buildings 11, no. 3 (March 12, 2021): 113. http://dx.doi.org/10.3390/buildings11030113.
Full textJulaihah, Umi. "PEMBAYARAN NON TUNAI: PERSEPSI CIVITAS AKADEMIKA FITK UIN MAULANA MALIK IBRAHIM MALANG." J-PIPS (Jurnal Pendidikan Ilmu Pengetahuan Sosial) 2, no. 1 (December 30, 2015): 63. http://dx.doi.org/10.18860/jpips.v2i1.6840.
Full textWiśniewski, Bernard, and Barbara Kaczmarczyk. "Opportunity, Challenge, Risk and Threat — Review of Defi nitions and Relations." Internal Security 9, no. 2 (July 9, 2018): 23–32. http://dx.doi.org/10.5604/01.3001.0012.1699.
Full textMihailović, Andreja, Julija Cerović Smolović, Ivan Radević, Neli Rašović, and Nikola Martinović. "COVID-19 and Beyond: Employee Perceptions of the Efficiency of Teleworking and Its Cybersecurity Implications." Sustainability 13, no. 12 (June 15, 2021): 6750. http://dx.doi.org/10.3390/su13126750.
Full textHamlet, Leigh C., Mark Mwiti Kamui, and Jessica Kaminsky. "Infrastructure for water security: coping with risks in rural Kenya." Journal of Water, Sanitation and Hygiene for Development 10, no. 3 (July 3, 2020): 481–89. http://dx.doi.org/10.2166/washdev.2020.038.
Full textSaini, Chand Prakash. "Difficulty in Transition." International Journal of Online Marketing 10, no. 2 (April 2020): 17–29. http://dx.doi.org/10.4018/ijom.2020040102.
Full textZhuang, Mei-Er, and Wen-Tsao Pan. "INFORMATION SECURITY ASSESSMENT BASED ON MACHINE LEARNING TECHNOLOGY-FUZZY-GRA-AHP." International Journal of Research -GRANTHAALAYAH 7, no. 6 (June 30, 2019): 230–40. http://dx.doi.org/10.29121/granthaalayah.v7.i6.2019.800.
Full textBharsakle, Pragati Dnyaneshwar. "Social Networks for Threat Perception and Analysis." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 5073–77. http://dx.doi.org/10.22214/ijraset.2021.35911.
Full textSteenkamp, Jorinda, Elizelle Juanee Cilliers, Sarel Stephanus Cilliers, and Louis Lategan. "Food for Thought: Addressing Urban Food Security Risks through Urban Agriculture." Sustainability 13, no. 3 (January 26, 2021): 1267. http://dx.doi.org/10.3390/su13031267.
Full textGraham, Margaret E., Michael G. Tunik, Brenna M. Farmer, Carly Bendzans, Aileen M. McCrillis, Lewis S. Nelson, Ian Portelli, et al. "Agent of Opportunity Risk Mitigation: People, Engineering, and Security Efficacy." Disaster Medicine and Public Health Preparedness 4, no. 4 (December 2010): 291–99. http://dx.doi.org/10.1001/dmp.2010.38.
Full textIqbal, Muhammad Amjed, Azhar Abbas, Syed Asif Ali Naqvi, Muhammad Rizwan, Abdus Samie, and Umar Ijaz Ahmed. "Drivers of Farm Households’ Perceived Risk Sources and Factors Affecting Uptake of Mitigation Strategies in Punjab Pakistan: Implications for Sustainable Agriculture." Sustainability 12, no. 23 (November 26, 2020): 9895. http://dx.doi.org/10.3390/su12239895.
Full textCong, Li, Qiqi Wang, Geoffrey Wall, and Yijing Su. "Decision-Making Behavior and Risk Perception of Chinese Female Wildlife Tourists." Sustainability 13, no. 18 (September 15, 2021): 10301. http://dx.doi.org/10.3390/su131810301.
Full textMIYAZAKI, ANTHONY D., and ANA FERNANDEZ. "Consumer Perceptions of Privacy and Security Risks for Online Shopping." Journal of Consumer Affairs 35, no. 1 (June 2001): 27–44. http://dx.doi.org/10.1111/j.1745-6606.2001.tb00101.x.
Full textDemski, Christina, Wouter Poortinga, and Nick Pidgeon. "Exploring public perceptions of energy security risks in the UK." Energy Policy 66 (March 2014): 369–78. http://dx.doi.org/10.1016/j.enpol.2013.10.079.
Full textJabbar, Awais, Qun Wu, Jianchao Peng, Ali Sher, Asma Imran, and Kunpeng Wang. "Mitigating Catastrophic Risks and Food Security Threats: Effects of Land Ownership in Southern Punjab, Pakistan." International Journal of Environmental Research and Public Health 17, no. 24 (December 11, 2020): 9258. http://dx.doi.org/10.3390/ijerph17249258.
Full textShin, Eunjung, and Eric W. Welch. "Socio-Technical Determinants of Information Security Perceptions in US Local Governments." International Journal of Electronic Government Research 12, no. 3 (July 2016): 1–20. http://dx.doi.org/10.4018/ijegr.2016070101.
Full textTøndel, Inger Anne, Martin Gilje Jaatun, Daniela Soares Cruzes, and Nils Brede Moe. "Risk Centric Activities in Secure Software Development in Public Organisations." International Journal of Secure Software Engineering 8, no. 4 (October 2017): 1–30. http://dx.doi.org/10.4018/ijsse.2017100101.
Full textElsantil, Yasmeen. "User Perceptions of the Security of Mobile Applications." International Journal of E-Services and Mobile Applications 12, no. 4 (October 2020): 24–41. http://dx.doi.org/10.4018/ijesma.2020100102.
Full textZieliński, Tadeusz. "The perception of security threats in EU and NATO strategic documents: implications for the countries of the Eastern flank." Rocznik Instytutu Europy Środkowo-Wschodniej 18, no. 1 (December 2020): 25–42. http://dx.doi.org/10.36874/riesw.2020.1.2.
Full textLee, Jin, Stacy A. Stoffregen, and Frank B. Giordano. "Risks that are “Worthy” to take: Temporary Workers’ Risk-Benefit Perceptions." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 1334–38. http://dx.doi.org/10.1177/1541931213601816.
Full textFugate, Sunny, and Kimberly Ferguson-Walter. "Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception." AI Magazine 40, no. 1 (March 28, 2019): 49–62. http://dx.doi.org/10.1609/aimag.v40i1.2849.
Full textTumkevič, Agnija. "CYBERSECURITY IN CENTRAL EASTERN EUROPE: FROM IDENTIFYING RISKS TO COUNTERING THREATS." Baltic Journal of Political Science 5, no. 5 (January 17, 2017): 73. http://dx.doi.org/10.15388/bjps.2016.5.10337.
Full textRapan, Florian, and Ioana Raluca Gologach. "Romania’s Role in the Management of Security Organizations." International conference KNOWLEDGE-BASED ORGANIZATION 24, no. 1 (June 1, 2018): 192–97. http://dx.doi.org/10.1515/kbo-2018-0028.
Full textSorgho, Raissa, Maximilian Jungmann, Aurélia Souares, Ina Danquah, and Rainer Sauerborn. "Climate Change, Health Risks, and Vulnerabilities in Burkina Faso: A Qualitative Study on the Perceptions of National Policymakers." International Journal of Environmental Research and Public Health 18, no. 9 (May 7, 2021): 4972. http://dx.doi.org/10.3390/ijerph18094972.
Full textGandit, Marc, Dungo Rémi Kouabenan, and Sandrine Caroly. "Comparative Optimism, Perceived Control, Knowledge of Security Devices and the Behavior in Case of Road Tunnel Fire." Psihologia Resurselor Umane 5, no. 2 (January 21, 2020): 58–71. http://dx.doi.org/10.24837/pru.v5i2.328.
Full textMehrnezhad, Maryam, and Ehsan Toreini. "What Is This Sensor and Does This App Need Access to It?" Informatics 6, no. 1 (January 24, 2019): 7. http://dx.doi.org/10.3390/informatics6010007.
Full textLengyel, Henrietta, Viktor Remeli, and Zsolt Szalay. "A collection of easily deployable adversarial traffic sign stickers." at - Automatisierungstechnik 69, no. 6 (May 27, 2021): 511–23. http://dx.doi.org/10.1515/auto-2020-0115.
Full textZaki, Waqas, Areej Tayyab, and Aeman Hassan. "Factors Affecting Customer Experience of E-Commerce in Pakistan." Journal of Educational Paradigms 1, no. 2 (December 15, 2019): 76–79. http://dx.doi.org/10.47609/0102052019.
Full textKovaříková, Miroslava. "Prevention of Armed Attacks at Schools as a Part of Emergency Situations Didactics." Lifelong Learning 5, no. 3 (2015): 95–112. http://dx.doi.org/10.11118/lifele2015050395.
Full textHassan, Wajid, Te-Shun Chou, Xiaoming Li, Patrick Appiah-Kubi, and Omar Tamer. "Latest trends, challenges and Solutions in Security in the era of Cloud Computing and Software Defined Networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 3 (November 13, 2019): 162. http://dx.doi.org/10.11591/ijict.v8i3.pp162-183.
Full textSylejmani, Rrahman, and Elda Maloku. "Illegal migration as a factor of security threat in Kosovo." Technium Social Sciences Journal 16 (February 10, 2021): 147–57. http://dx.doi.org/10.47577/tssj.v16i1.2418.
Full textHossain, Md Alamgir. "Security perception in the adoption of mobile payment and the moderating effect of gender." PSU Research Review 3, no. 3 (December 9, 2019): 179–90. http://dx.doi.org/10.1108/prr-03-2019-0006.
Full textBharathi, S. Vijayakumar. "Forewarned is forearmed." Benchmarking: An International Journal 26, no. 8 (October 7, 2019): 2443–67. http://dx.doi.org/10.1108/bij-08-2018-0264.
Full textFranklin A, Benjamin, and Sasilatha T. "Changing the Electrical Safety Culture." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (January 1, 2018): 93. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp93-96.
Full textPramod, Dhanya, and S. Vijayakumar Bharathi. "Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets." Journal of Cases on Information Technology 20, no. 3 (July 2018): 48–69. http://dx.doi.org/10.4018/jcit.2018070104.
Full textTRAORE, Kalifa, Daouda SIDIBE, and Harouna COULIBALY. "Climate Smart Agriculture as Final Goal: Use of Improved Cereals Varieties in Cinzana, Mali." Journal of Agricultural Studies 5, no. 1 (January 10, 2017): 50. http://dx.doi.org/10.5296/jas.v5i1.10582.
Full textHANDRIKOVÁ, Jana, and Darina STACHOVÁ. "PERCEPTION OF THE INCREASED RISK OF PHISHING ATTACKS DURING THE COVID-19 CRISIS." Acta Electrotechnica et Informatica 21, no. 1 (June 9, 2021): 19–24. http://dx.doi.org/10.15546/aeei-2021-0003.
Full textSilic, Mario, and Andrea Back. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption." International Journal of Information Technology & Decision Making 15, no. 01 (January 2016): 151–85. http://dx.doi.org/10.1142/s0219622015500364.
Full textMiao, Ji. "Expectations and Realities: Managing the Risks of the "Belt and Road" Initiative." China Quarterly of International Strategic Studies 01, no. 03 (October 2015): 497–522. http://dx.doi.org/10.1142/s2377740015500244.
Full textGlowka, Gundula, and Anita Zehrer. "Tourism Family-Business Owners’ Risk Perception: Its Impact on Destination Development." Sustainability 11, no. 24 (December 7, 2019): 6992. http://dx.doi.org/10.3390/su11246992.
Full textChen, Aiguo, Guoming Lu, Hanwen Xing, Yuan Xie, and Shunwei Yuan. "Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092177. http://dx.doi.org/10.1177/1550147720921778.
Full textMouli, K. Chandra, and U. Seshadri. "Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (August 15, 2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.
Full text