761. Application of Data Mining Technology-Based Nursing Risk Management in Emergency Department Care Download
762. Financial Risk Management of Listed Companies Based on Mobile Edge Computing Download
763. Enterprise Financial andTaxRiskManagementMethods under the Background of Big Data Download
764. Analysis and Design of the Project Risk Management System Based on the Fuzzy Clustering Algorithm Download
765. Mathematical Model of Quantitative Evaluation of Financial Investment Risk Management System Download
766. Disease Information Dissemination Prevention and Risk Management Methods in the Blockchain Environment Download
767. Discussing the Construction of a Budget Management System Combining Multimedia Technology and Financial Risk Management Download
768. 5G Smart Sensor Network-Based e-Commerce Investment Risk Management System for SMEs Download
769. Alternative External Resource Allocation Method to Information Security in Smart Cities Download
770. Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme Download
771. End-users Compliance to the Information Security Policy: A Comparison of Motivational Factors Download
772. CPS Information Security Risk Evaluation Based on Blockchain and Big Data Download
773. Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology Download
774. Development of an E-Healthcare Information Security Risk Assesment Method Download
775. The Chief Information Security Officer: An Exploratory Study Download
776. Incorporating Global Information Security and Assurance in I.S. Education Download
777. An Undergraduate Information Security Program: More than a Curriculum Download
778. A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data Download
779. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation Download
780. Neural correlates of decision making related to information security: Self-control and moral potency Download