Exclude:

OPAC

E-Resources

Federated Resources

Premium Resources

Showing all Resources, Excluding Opac and Electronic and Premium resources

The Use of Digital Video Annotation in Teacher Training: The Teachers’ Perspectives

Author:GIOVANNI BONAIUTI, A. Calvani, P. Picci
Publisher:Elsevier BV
Abstract: The use of digital video offers interesting opportunities in teacher training, particularly the pos…

ELECTORAL CONTRIBUTIONS AND THE COST OF UNPOPULARITY

Author:Thomas Bassetti, Filippo Pavesi
Publisher:Wiley
Abstract: When considering electoral campaigns, candidates receiving contributions from relatively unpopular …

Motivating cybersecurity behaviors: a beyond reasoned action conceptualization

Author:Verlin B. Hinsz
Publisher:Organizational Cybersecurity Journal: Practice, Process and People,
Abstract: Purpose A critical issue in organizations concerned with cybersecurity is how to motivate personn…

Voluntary cybersecurity risk disclosures and firms’ characteristics: the moderating role of the knowledge-intensive industry

Author:Harmandeep Singh
Publisher:Asian Journal of Accounting Research,
Abstract: Purpose This study examines voluntary cybersecurity risk disclosures (VCRD) by listed Indian comp…

Automatic annotation of tennis games: An integration of audio, vision, and learning

Author:Fei Yan, Josef Kittler, David Windridge, William Christmas, Krystian Mikolajczyk, Stephen Cox, Qiang Huang, Kijak, Kolonias, Huang, Yu, Ekinci, Zhu, Yan, Christmas, Yan, Kijak, Coldefy, Zhu, Lai, Hartley, Kittler, Huang, Tsochantaridis, Joachims, Altun, Taskar, Ng
Publisher:Elsevier BV
Abstract: Fully automatic annotation of tennis game using broadcast video is a task with a great potential bu…

Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things

Author:Julia Slupska and Leonie Maria Tanczer
Publisher:The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Abstract: Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emergin…

Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research

Author:Tripti Singh, Allen C. Johnston, John D'Arcy and Peter D. Harms
Publisher:Organizational Cybersecurity Journal: Practice, Process and People,
Abstract: Purpose The impact of stress on personal and work-related outcomes has been studied in the inform…

A systematic literature review of how cybersecurity-related behavior has been assessed

Author:Kristian Kannelønning and Sokratis K. Katsikas
Publisher:Information & Computer Security,
Abstract: Purpose Cybersecurity attacks on critical infrastructures, businesses and nations are rising and …

Cybersecurity in health – disentangling value tensions

Author:Michele Loi, Markus Christen, Nadine Kleine and Karsten Weber
Publisher:Journal of Information, Communication and Ethics in Society,
Abstract: Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various ma…

A service lens on cybersecurity continuity and management for organizations’ subsistence and growth

Author:Godwin Thomas and Mary-Jane Sule
Publisher:Organizational Cybersecurity Journal: Practice, Process and People,
Abstract: Purpose This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a s…
Powered by: