Growing Science » Tags cloud » Security
Authors: Liubov Lelyk, Volodymyr Olikhovskyi, Nataliia Mahas, Marta Olikhovska
Keywords: Security, Stability, Risks-management, Threats, Assessment methods, Complex analysis, Sustainable Business
Journal: DSL | Year: 2022 | Volume: 11 | Issue: 3 | Views: 999 | Reviews: 0
Authors: Gede Adi Yuniarta, I Gusti Ayu Purnamawati
Keywords: Value, Hedonic, Promotion, Security, Mobile, Payment
Journal: MSL | Year: 2021 | Volume: 11 | Issue: 2 | Views: 2256 | Reviews: 0
Authors: S.P. Marsofiyati, Nuryetty Zain, Henry Eryanto, Osly Usman
DOI: 10.5267/j.msl.2019.11.033
Keywords: Behavioral Intention, Effort Expectancy, Grip Work Journey, Performance Expectancy, Security, Social Influence
Journal: MSL | Year: 2020 | Volume: 10 | Issue: 6 | Views: 1058 | Reviews: 0
Authors: Dmaithan Almajali, Amjed A lfityani, Hakam Maali, Haya Almajali
DOI: 10.5267/j.uscm.2022.5.008
Keywords: Security, Access to information, Training, e-CRM
Journal: USCM | Year: 2022 | Volume: 10 | Issue: 3 | Views: 2577 | Reviews: 0
Authors: Maha Helal
DOI: 10.5267/j.ijdns.2024.9.008
Keywords: Internet of Things, Wireless networks, Advanced technologies, Privacy, Security, Protocols
Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 1 | Views: 36 | Reviews: 0
Authors: Raed Masadeh, Dmaithan Almajali, Nida AL-Sous, Haya Almajali, Ramayah Thurasamy
DOI: 10.5267/j.ijdns.2024.3.021
Keywords: Ease of Use, E-government services, Reliability, Security, Website design
Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 3 | Views: 369 | Reviews: 0
Authors: Elizabeth Emperatriz García-Salirrosas, Rafael Fernando Rondon-Eusebio, Dany Yudet Millones-Liza
DOI: 10.5267/j.ijdns.2024.3.003
Keywords: Web design, Usefulness, Enjoyment, Customer satisfaction, Retail, e-commerce, Risk perception, Security, Electronic customer service, E-WOM
Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 3 | Views: 342 | Reviews: 0
Authors: Ali Alshahrani
DOI: 10.5267/j.ijdns.2023.8.023
Keywords: Explosive Detection, Screening, Pattern Recognition, Artificial Intelligence, Security
Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 1 | Views: 1235 | Reviews: 0
Authors: Issam AlHadid, Evon M. Abu-Taieh, Mohammad Al Rawajbeh, Rami S. Alkhawaldeh, Sufian Khwaldeh, Suha Afaneh, AlaAldin Alrowwad, Dima Farhan Alrwashdeh
DOI: 10.5267/j.ijdns.2023.8.015
Keywords: Trust, Privacy, Security, Awareness, Information Sharing, Social Networks
Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 4 | Views: 780 | Reviews: 0
Authors: Mua’ad Abu-Faraj, Abeer Al-Hyari, Ismail Altaharwa, Zaid Alqadi, Basel J. A. Ali
DOI: 10.5267/j.ijdns.2023.1.008
Keywords: Cryptography, Image key, Chaotic logistic key, Quality, Sensitivity, Security, MSE, CC, Throughput
Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 2 | Views: 1167 | Reviews: 0
® 2010-2024 GrowingScience.Com