Search Results - "Weakest Link"
-
1
The effect of baroque music on the PassPoints graphical password
Published 2010“…The crux of the problem is users’ memory limitations. Users are the weakest link in password authentication mechanism. It shows that baroque music has positive effects on human memorizing and learning. …”
Get full text
-
2
Line following robot using MC68HC11
Published 2009“…Unreliability and inefficiency in this part of the assembly line formed the weakest link. The project is to automate this sector, using carts to follow a line instead of laying railway tracks which are both costly and an inconvenience. …”
Get full text
Get full text
-
3
Deciphering the physicochemical and microscopical changes in Ganoderma boninense-infected oil palm woodblocks under the influence of phenolic compounds
Published 2021“…The threat of Ganoderma boninense, the causal agent of basal stem rot disease, in the oil palm industry warrants finding an effective control for it. The weakest link in the disease management strategy is the unattended stumps/debris in the plantations. …”
Get full text
-
4
Digital empathy and supply chain cybersecurity challenges: concept, framework and solutions for small-medium enterprises
Published 2022“…Despite contributing significantly to the world’s economy and being the most targeted by cybercriminals for being the weakest link in the supply chain, small-medium enterprises (SMEs) lag behind cybersecurity implementation. …”
Get full text
Get full text
-
5
Rapport management in air traffic control in Malaysian aviation discourse.
Published 2011“…Oral communication is documented as the weakest link in air traffic control interactions and one of the primary causes of aviation accidents and incidents. …”
Get full text
-
6
Tuning a Kalman filter carrier tracking algorithm in the presence of ionospheric scintillation
Published 2016“…In order to mitigate scintillation effects at receiver level, the robustness of the carrier tracking loop, the receiver weakest link under scintillation, must be enhanced. Kalman Filter (KF) based tracking algorithms are particularly suitable to cope with the variable working conditions imposed by scintillation. …”
Get full text
-
7
7P's marketing strategy affecting customer's purchase intentions towards Global Market Operation of Deutsche Bank, Kuala Lumpur / Mohd Khairi Mohd Hanafiah
Published 2008“…The result indicates that the staffs / personnel factor explained the highest proportion of customer's purchase intentions towards GM OPS of Deutsche Bank Malaysia Berhad. The weakest link in the 7P's marketing strategy would be the promotional activities and process of banking transaction that are not aggressively and accurately performed in order to create customer awareness and enhance customer's satisfactions. …”
Get full text
-
8
Analyzing the shear performance of dapped wet vertical wall-to-wall connection
Published 2024“…One critical aspect of precast construction is the connection between wall panels, where it is one of the proven to be the weakest link in the system. Rigidity of the connection between panels was also a point of concern. …”
Get full text
Get full text
-
9
Cyber–information security compliance and violation behaviour in organisations: A systematic review
Published 2022“…Humans are regarded as the weakest link in cybersecurity systems as development in digital technology advances. …”
Get full text
Get full text
-
10
Fatigue strength of mortise and tenon furniture joints made from oil palm lumber and some Malaysian timbers.
Published 2010“…The fact that furniture joints are the weakest link in the furniture structure, it is necessary to establish its strength performance especially under repeated loading as experienced by the chair in service. …”
Get full text
Get full text
-
11
Automatic diabetic retinopathy detection and classification system
Published 2017“…However, the manual screening process is the weakest link as it is a complicated and time-consuming process. …”
Get full text
Get full text
-
12
Modeling of dynamic response of desktop computer’s motherboard due to drop impact
Published 2010“…These connections are the weakest link in the system so realibility of the entire system depends on them. …”
Get full text
Get full text
-
13
Improved receiver tracking models for scintillation monitoring
Published 2017“…In order to mitigate scintillation effects at receiver level, the robustness of the carrier tracking loop, the receiver’s weakest link under scintillation, must be enhanced. Thanks to their adaptive nature, Kalman Filter (KF) based tracking algorithms are particularly suitable to cope with the variable working conditions imposed by scintillation. …”
Get full text
-
14
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
Published 2019“…Being the possible insider threats to Information Security, employees are often coined as the weakest link. Both employees and organizations should be aware of this raising challenge. …”
Get full text
Get full text
Get full text
-
15
Investigation of Security Awareness on e-Learning System Among Lecturers and Students in Higher Education Institution
Published 2015“…Human is identified as the weakest link in information security and lack of security awareness such as password sharing will compromise the security of e-learning system. …”
Get full text
Get full text
Get full text
-
16
Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife
Published 2020“… Humans are majorly identified as the weakest link in cybersecurity. Tertiary institution student’s face lot of cybersecurity issues due to their increased Internet exposure, however cybersecurity behavioural studies focusing on tertiary students is limited. …”
Get full text
Get full text
Get full text
-
17
Effectiveness of a trauma triage educational programme on knowledge and skill of emergency nurses in public hospitals in the West Bank, Palestine
Published 2023“…Phase One – Trauma triage care is the weakest link in developing-country hospitals. Low levels of knowledge and skill will harm the trauma triage system and increase medical errors in hospitals. …”
Get full text
Get full text
-
18
Towards designing effective security messages: Persuasive password guidelines
Published 2013“…In many cases human factors were attributed as the cause of the problem.Humans are well known as the weakest link in the security chain.Commonly, end-users will depend on security messages when confronted with security-related decision making. …”
Get full text
-
19
Recent challenges for the enforcement of wildlife laws in East Malaysia
Published 2018“…Law enforcement is one of the weakest links in wildlife conservation. This paper analyses the main challenges facing wildlife law enforcement in East Malaysia and identifies the enforcement strategy used by wildlife officers in the region. …”
Get full text
Get full text
-
20
Awareness of social engineering among IIUM students
Published 2011“…The concept of social engineering is essentially to manipulate the users of a system, that are considered to be the weakest links on the chain, in order to get said information. …”
Get full text
Get full text