Urban heat island (UHI) intensity and magnitude estimations: A systematic literature review
The severity of urban heat islands (UHIs) is increasing due to global and urban climate
change. The damage caused by UHIs is also increasing. To establish a plan to improve the …
change. The damage caused by UHIs is also increasing. To establish a plan to improve the …
Urban heat island (UHI) variations within a city boundary: A systematic literature review
Urban heat islands (UHI) in a city tend to vary with changes in time and space. To effectively
cope with the accelerating intensity of UHI due to global warming and the resulting damage …
cope with the accelerating intensity of UHI due to global warming and the resulting damage …
Facilitating sustainability transition through serious games: A systematic literature review
Exploring aspects of how innovative methods can truly attain a sustainable society is
necessary for the future of our planet. This study focuses on serious games, and how users …
necessary for the future of our planet. This study focuses on serious games, and how users …
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Systematic mapping study on security approaches in secure software engineering
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …
integral component of human society. Such wide use of software systems consists of large …
Threat modeling intimate partner violence: Tech abuse as a cybersecurity challenge in the internet of things
J Slupska, LM Tanczer - … of technology-facilitated violence and abuse, 2021 - emerald.com
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other
emerging innovations, has a substantial impact on the nature of intimate partner violence …
emerging innovations, has a substantial impact on the nature of intimate partner violence …
Consumer preferences of attributes of mobile payment services in South Korea
The widespread diffusion of mobile devices has led to a new method of value transfer that
retains the features of mobile devices: mobile payments. Many researchers have …
retains the features of mobile devices: mobile payments. Many researchers have …
Systematic literature review on security risks and its practices in secure software development
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …
process of creating and developing software that assures the integrity, confidentiality, and …
A systematic survey of multi-factor authentication for cloud infrastructure
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …
that must be protected against. Authentication and access control are the most significant …
[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
considered as trusted until proven. The Zero-trust model emphasizes the importance of …