Results 11 to 20 of about 922,831 (255)

Treatment planning with a 2.5 MV photon beam for radiation therapy

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose The shallow depth of maximum dose and higher dose fall‐off gradient of a 2.5 MV beam along the central axis that is available for imaging on linear accelerators is investigated for treatment of shallow tumors and sparing the organs at risk (OARs) beyond it.
Navid Khaledi   +5 more
wiley   +1 more source

The management of information security: A South African case study

open access: yesSouth African Journal of Business Management, 2003
The growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management,
L. C.H. Fourie
doaj   +1 more source

Integrating security and usability into the requirements and design process [PDF]

open access: yes, 2006
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core   +2 more sources

A framework for security requirements engineering [PDF]

open access: yes, 2006
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B.   +3 more
core   +1 more source

Evaluation of Information Management Systems in Isfahan University of Medical Science by ISO/IEC 27001 Standard

open access: yesمدیریت اطلاعات سلامت, 2015
Introduction: considering the information threats and the need to procedures for develop and improve security and confidentiality, international standard organization (ISO) established information security standard ISO/IEC 27001.
Rouhollah Sheikh Abumasoudi   +3 more
doaj   +1 more source

Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services [PDF]

open access: yes, 2006
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources ...
Bolzoni, D., Eck, P.A.T., Su, X.
core   +3 more sources

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj  

Dynamic cyber-incident response [PDF]

open access: yes, 2014
Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the ...
Clewley, N   +3 more
core   +1 more source

A One-Factor Conditionally Linear Commodity Pricing Model under Partial Information [PDF]

open access: yesAsia-Pacific Financial Markets, May 2014, Volume 21, Issue 2, pp 151-174, 2014
A one-factor asset pricing model with an Ornstein--Uhlenbeck process as its state variable is studied under partial information: the mean-reverting level and the mean-reverting speed parameters are modeled as hidden/unobservable stochastic variables.
arxiv   +1 more source

Run-time risk management in adaptive ICT systems [PDF]

open access: yes, 2013
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy