학술논문


EBSCO Discovery Service
발행년
-
(예 : 2010-2015)
전자자료 공정이용 안내

우리 대학 도서관에서 구독·제공하는 모든 전자자료(데이터베이스, 전자저널, 전자책 등)는 국내외 저작권법과 출판사와의 라이선스 계약에 따라 엄격하게 보호를 받고 있습니다.
전자자료의 비정상적 이용은 출판사로부터의 경고, 서비스 차단, 손해배상 청구 등 학교 전체에 심각한 불이익을 초래할 수 있으므로, 아래의 공정이용 지침을 반드시 준수해 주시기 바랍니다.

공정이용 지침
  • 전자자료는 개인의 학습·교육·연구 목적의 비영리적 사용에 한하여 이용할 수 있습니다.
  • 합리적인 수준의 다운로드 및 출력만 허용됩니다. (일반적으로 동일 PC에서 동일 출판사의 논문을 1일 30건 이하 다운로드할 것을 권장하며, 출판사별 기준에 따라 다를 수 있습니다.)
  • 출판사에서 제공한 논문의 URL을 수업 관련 웹사이트에 게재할 수 있으나, 출판사 원문 파일 자체를 복제·배포해서는 안 됩니다.
  • 본인의 ID/PW를 타인에게 제공하지 말고, 도용되지 않도록 철저히 관리해 주시기 바랍니다.
불공정 이용 사례
  • 전자적·기계적 수단(다운로딩 프로그램, 웹 크롤러, 로봇, 매크로, RPA 등)을 이용한 대량 다운로드
  • 동일 컴퓨터 또는 동일 IP에서 단시간 내 다수의 원문을 집중적으로 다운로드하거나, 전권(whole issue) 다운로드
  • 저장·출력한 자료를 타인에게 배포하거나 개인 블로그·웹하드 등에 업로드
  • 상업적·영리적 목적으로 자료를 전송·복제·활용
  • ID/PW를 타인에게 양도하거나 타인 계정을 도용하여 이용
  • EndNote, Mendeley 등 서지관리 프로그램의 Find Full Text 기능을 이용한 대량 다운로드
  • 출판사 콘텐츠를 생성형 AI 시스템에서 활용하는 행위(업로드, 개발, 학습, 프로그래밍, 개선 또는 강화 등)
위반 시 제재
  • 출판사에 의한 해당 IP 또는 기관 전체 접속 차단
  • 출판사 배상 요구 시 위반자 개인이 배상 책임 부담
'학술논문' 에서 검색결과 4,667건 | 목록 1~20
News
Pakistan Law Reporter. March 10, 2025
News
Pakistan Law Reporter. March 10, 2025
Conference
2025 International Conference on Computer, Electrical & Communication Engineering (ICCECE) Computer, Electrical & Communication Engineering (ICCECE), 2025 International Conference on. :1-6 Feb, 2025
Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80
Academic Journal
Basic and Applied Sciences - Scientific Journal of King Faisal University. 22
Conference
2024 IEEE/PES Transmission and Distribution Conference and Exposition (T&D) Transmission and Distribution Conference and Exposition (T&D), 2024 IEEE/PES. :1-5 May, 2024
News
Pakistan Law Reporter. July 24, 2024
Academic Journal
Journal of Applied Pharmaceutical Research, Vol 13, Iss 6, Pp 120-131 (2025)
Conference
2023 IEEE Microwaves, Antennas, and Propagation Conference (MAPCON) Microwaves, Antennas, and Propagation Conference (MAPCON), 2023 IEEE. :1-6 Dec, 2023
Conference
2023 IEEE Microwaves, Antennas, and Propagation Conference (MAPCON) Microwaves, Antennas, and Propagation Conference (MAPCON), 2023 IEEE. :1-5 Dec, 2023
News
Pakistan Law Reporter. April 6, 2024
검색 결과 제한하기
제한된 항목
[검색어] BHUIYA, A.
발행연도 제한
-
학술DB(Database Provider)
저널명(출판물, Title)
출판사(Publisher)
자료유형(Source Type)
주제어
언어