No. | DAFTAR JUDUL E-JOURNAL STIKI MALANG | Link |
---|---|---|
761. | Application of Data Mining Technology-Based Nursing Risk Management in Emergency Department Care | Download |
762. | Financial Risk Management of Listed Companies Based on Mobile Edge Computing | Download |
763. | Enterprise Financial andTaxRiskManagementMethods under the Background of Big Data | Download |
764. | Analysis and Design of the Project Risk Management System Based on the Fuzzy Clustering Algorithm | Download |
765. | Mathematical Model of Quantitative Evaluation of Financial Investment Risk Management System | Download |
766. | Disease Information Dissemination Prevention and Risk Management Methods in the Blockchain Environment | Download |
767. | Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management | Download |
768. | 5G Smart Sensor Network-Based e-Commerce Investment Risk Management System for SMEs | Download |
769. | Alternative External Resource Allocation Method to Information Security in Smart Cities | Download |
770. | Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme | Download |
771. | End-users Compliance to the Information Security Policy: A Comparison of Motivational Factors | Download |
772. | CPS Information Security Risk Evaluation Based on Blockchain and Big Data | Download |
773. | Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology | Download |
774. | Development of an E-Healthcare Information Security Risk Assesment Method | Download |
775. | The Chief Information Security Officer: An Exploratory Study | Download |
776. | Incorporating Global Information Security and Assurance in I.S. Education | Download |
777. | An Undergraduate Information Security Program: More than a Curriculum | Download |
778. | A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data | Download |
779. | Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation | Download |
780. | Neural correlates of decision making related to information security: Self-control and moral potency | Download |