enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Impact factor - Wikipedia

    en.wikipedia.org/wiki/Impact_factor

    The impact factor relates to a specific time period; it is possible to calculate it for any desired period. For example, the JCR also includes a five-year impact factor, which is calculated by dividing the number of citations to the journal in a given year by the number of articles published in that journal in the previous five years. [14] [15]

  3. Journal Citation Reports - Wikipedia

    en.wikipedia.org/wiki/Journal_Citation_Reports

    Journal Citation Reports (JCR) is an annual publication by Clarivate. [1] It has been integrated with the Web of Science and is accessed from the Web of Science Core Collection. It provides information about academic journals in the natural and social sciences, including impact factors. JCR was originally published as a part of the Science ...

  4. Citation impact - Wikipedia

    en.wikipedia.org/wiki/Citation_impact

    The simplest journal-level metric is the journal impact factor, the average number of citations that articles published by a journal in the previous two years have received in the current year, as calculated by Clarivate. Other companies report similar metrics, such as the CiteScore, based on Scopus.

  5. IT risk - Wikipedia

    en.wikipedia.org/wiki/IT_risk

    Many NIST publications define risk in IT context in different publications: FISMApedia [9] term [10] provide a list. Between them: According to NIST SP 800-30: [11] Risk is a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.

  6. Data breach - Wikipedia

    en.wikipedia.org/wiki/Data_breach

    The first reported data breach occurred on 5 April 2002 [8] when 250,000 social security numbers collected by the State of California were stolen from a data center. [9] Before the widespread adoption of data breach notification laws around 2005, the prevalence of data breaches is difficult to determine.

  7. Threat (computer security) - Wikipedia

    en.wikipedia.org/wiki/Threat_(computer_security)

    In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.. A threat can be either a negative "intentional" event (i.e. hacking: an individual cracker or a criminal organization) or an "accidental" negative event (e.g. the possibility of a computer malfunctioning, or the possibility ...

  8. Insider threat - Wikipedia

    en.wikipedia.org/wiki/Insider_threat

    Insider threat is an active area of research in academia and government. The CERT Coordination Center at Carnegie-Mellon University maintains the CERT Insider Threat Center, which includes a database of more than 850 cases of insider threats, including instances of fraud, theft and sabotage; the database is used for research and analysis. [2]

  9. Malware - Wikipedia

    en.wikipedia.org/wiki/Malware

    Utilizing bibliometric analysis, the study of malware research trends from 2005 to 2015, considering criteria such as impact journals, highly cited articles, research areas, number of publications, keyword frequency, institutions, and authors, revealed an annual growth rate of 34.1%. North America led in research output, followed by Asia and ...