Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Kenneth D Nguyen"'
Autor:
Miguel B. Bugayong, Aileen Cha, Carly L. Hamel, Ryan R. Johnson, James Kim, Joseph J. Kim, Andrew S. Levy, Kenneth D. Nguyen, Luc H. Pham, Anusha Sapre, Aidan C. Scanlan, Brandon Ye, Christa Bancroft
Publikováno v:
Microbiology Resource Announcements. 11
Phages GlobiWarming and TaylorSipht are siphoviruses isolated on Arthrobacter globiformis B-2979 . GlobiWarming has a 42,691 bp long genome that encodes 74 genes, whereas TaylorSipht has a 39,051 bp genome that encodes 65 genes. Both phages encode fu
Autor:
Miguel B, Bugayong, Aileen, Cha, Carly L, Hamel, Ryan R, Johnson, James, Kim, Joseph J, Kim, Andrew S, Levy, Kenneth D, Nguyen, Luc H, Pham, Anusha, Sapre, Aidan C, Scanlan, Brandon, Ye, Christa, Bancroft
Publikováno v:
Microbiology resource announcements. 11(11)
Phages GlobiWarming and TaylorSipht are siphoviruses isolated on Arthrobacter globiformis
Publikováno v:
Patihis, L, Cloud, P & Nguyen, K 2018, ' Lessons for future research : two experiments failed to reproduce a relationship between achievement motivation and autobiographical memory distortion ', Journal of Cognitive Psychology, vol. 30, no. 8, pp. 778-791 . https://doi.org/10.1080/20445911.2018.1532960
Previous research (Sharman & Calacouris, 2010. Motivated imagination inflation: Implicit and explicit motives predict imagination inflation for achievement and affiliation events. Experimental Psychology, 57, 77–82) found that participants’ achie
Publikováno v:
Journal of Cybersecurity. 3:159-171
Publikováno v:
Risk Analysis. 37:2405-2419
The growing number of anti-terrorism policies has elevated public concerns about discrimination. Within the context of airport security screening, the current study examines how American travelers value the principle of equal protection by quantifyin
Publikováno v:
Computers in Human Behavior. 55:372-383
Past research indicates that people have strong concerns about their information privacy. This study applies multi-attribute utility theory to conceptualize the concern for smartphone privacy and examine how people value smartphone privacy protection
Publikováno v:
Law, Probability and Risk. 15:71-86
Publikováno v:
SSRN Electronic Journal.
Business owners employ a variety of security and surveillance techniques to keep their property safe from crime and, in some cases, the threat of terrorism. Given the many security measures available to business owners, it is beneficial to understand
Autor:
Kenneth D. Nguyen, Richard S. John
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319604404
The current research examines how American air travelers perceive various risk-based airport security screening policies that vary in terms of selection procedure and agency. Respondents were randomly assigned to one of six experimental conditions th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5cff82a50b85272d6c1704a06be12c7e
https://doi.org/10.1007/978-3-319-60441-1_3
https://doi.org/10.1007/978-3-319-60441-1_3
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319605845
AHFE (9)
AHFE (9)
In most cyber security contexts, users need to make trade-offs for information security. This research examined this issue by quantifying the relative value of information security within a value system that comprises of multiple conflicting objectiv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::10e41c2ed0c25e5c58d0631572507099
https://doi.org/10.1007/978-3-319-60585-2_15
https://doi.org/10.1007/978-3-319-60585-2_15