761. |
Application of Data Mining Technology-Based Nursing Risk Management in Emergency Department Care |
Download |
762. |
Financial Risk Management of Listed Companies Based on Mobile Edge Computing |
Download |
763. |
Enterprise Financial andTaxRiskManagementMethods under the Background of Big Data |
Download |
764. |
Analysis and Design of the Project Risk Management System Based on the Fuzzy Clustering Algorithm |
Download |
765. |
Mathematical Model of Quantitative Evaluation of Financial Investment Risk Management System |
Download |
766. |
Disease Information Dissemination Prevention and Risk Management Methods in the Blockchain Environment |
Download |
767. |
Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management |
Download |
768. |
5G Smart Sensor Network-Based e-Commerce Investment Risk Management System for SMEs |
Download |
769. |
Alternative External Resource Allocation Method to Information Security in Smart Cities |
Download |
770. |
Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme |
Download |
771. |
End-users Compliance to the Information Security Policy: A Comparison of Motivational Factors |
Download |
772. |
CPS Information Security Risk Evaluation Based on Blockchain and Big Data |
Download |
773. |
Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology |
Download |
774. |
Development of an E-Healthcare Information Security Risk Assesment Method |
Download |
775. |
The Chief Information Security Officer: An Exploratory Study |
Download |
776. |
Incorporating Global Information Security and Assurance in I.S. Education |
Download |
777. |
An Undergraduate Information Security Program: More than a Curriculum |
Download |
778. |
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data |
Download |
779. |
Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation |
Download |
780. |
Neural correlates of decision making related to information security: Self-control and moral potency |
Download |