Author of the publication

Information Security Fatigue Countermeasures Using Cognitive Strategy Scale Based on Web Questionnaires.

, , , and . Int. J. Netw. Comput., 11 (2): 412-425 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era., , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 737-749. Springer, (2017)Risk Assessment Quantification for Remote Learning Based on Lecture Type., , , , and . IIAI-AAI, page 561-567. IEEE, (2022)Authentication method against shoulder-surfing attacks using secondary channel., and . ICCE, page 430-431. IEEE, (2015)Risk assessment of BYOD: Bring your own device., , , , , and . GCCE, page 1-4. IEEE, (2016)A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud., , , and . COMPSAC Workshops, page 212-217. IEEE Computer Society, (2013)A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint., , , and . GCCE, page 240-242. IEEE, (2019)Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation., , , and . AINA (3), volume 451 of Lecture Notes in Networks and Systems, page 324-333. Springer, (2022)A Visualization Model for Silent Cyber Risks Contained in Emerging Risks., , , , and . GCCE, page 498-499. IEEE, (2021)Dynamic Analysis for Malware Detection Using API Calls and Memory Usage With Machine Learning Approach., , and . GCCE, page 475-477. IEEE, (2023)Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service., , , , , and . IIAI-AAI, page 1126-1131. IEEE Computer Society, (2016)