-
1by Hwang, JeeHyun“...<p> Systems such as web applications, database systems, and cloud services regulate users&rsquo...”
Published 2014
Get full text
-
2by Zambotti, Michael J.“...<p> The purpose of this research project was to analyze the current state of data security...”
Published 2017
Get full text
-
3by Chowdhury, Omar Haider“... are required to manage and share such information in a manner that conforms to specific privacy regulations (<i...”
Published 2013
Get full text
-
4by Azhar, Mahmood Javed“... stable on-chip clock generation circuits, on-chip voltage regulation circuits, and Physical unclonable...”
Published 2019
Get full text
-
5by Merchant, Erin K.“...’s ability to effectively regulate their emotions and connect with others. Adoptive parents may...”
Published 2018
Get full text
-
6by Liberty, Arthur A.“... the EPCRA. In the post-9/11 homeland security environment, knowing of the existence of a hazard plan &ndash...”
Published 2015
Get full text
-
7by Shirke, Parth P.“...<p>VPN (Virtual Private Network) is a method of providing a secure connection between a source...”
Published 2016
Get full text
-
8by Harper, Dana C.“...:</i> information sharing, regulations, penalties, safety, security, Professor Paul Pantani.</p>...”
Published 2017
Get full text
-
9by Ladendorff, Marlene Z.“...<p> Compliance with regulations may not automatically produce a secure infrastructure...”
Published 2014
Get full text
-
10by Jarek, Holly Elaine“... the rules, regulations, and protocols that are currently geriatric focused, develop pediatric long-term care...”
Published 2016
Get full text
-
11by Hulsey, Amber Lee“... uses the theoretical lens of Human Security as a unique approach in that it is people-centered...”
Published 2018
Get full text
-
12by Bristol-Faulhammer, Michaela“... within the institutional environment (e.g., tax and social security regulations), lack of human capital...”
Published 2017
Get full text
-
13by Pelletier, Justin M.“... are decreasingly effective. Some information security economists also suggested that further regulation...”
Published 2017
Get full text
-
14by Aho, Kelsey B.“... able to manage transboundary challenges to food security. Two case studies, the <i>Polar Bear Agreement...”
Published 2016
Get full text
-
15by Keck, Andrew G.“...<p> Cyber incidents continue to increase across the entire globe. The increase in security threats...”
Published 2016
Get full text
-
16by Alpert, Carrie“... secure attachment relationships, cultivating pre-academic skills, and acquiring social-emotional...”
Published 2015
Get full text
-
17by Kim, Eun“... youth secure and retain successful employment can include the interpersonal skills of better...”
Published 2015
Get full text
-
18by Javed, Yousra“...<p> Computer security dialogs communicate important information to users. One avenue where...”
Published 2017
Get full text
-
19by Susral, Bradley“... and is perceived as a great threat to world security, and financial institutions are bound by law to exercise...”
Published 2017
Get full text
-
20by Blum, Petra S.“..., and objectification served as the primary manner of regulating the women’s sexuality within their religious...”
Published 2016
Get full text