Results 91 to 100 of about 3,727,125 (329)

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

​Did a Non‐Medical Biosimilar Switching Policy Cause an Increase in Non‐Biologic/Biosimilar Health Care Resource Utilization or Cost in Patients With Inflammatory Arthritis?

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to evaluate the impact of a series of policies that mandated switching patients with inflammatory arthritis (IA) from an originator biologic to a biosimilar in British Columbia, Canada, on health care resource use and cost.
HaoHung Dang   +4 more
wiley   +1 more source

Calculation of risks of information security of telecommunication enterprise

open access: yesОткрытое образование (Москва), 2018
The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to ...
L. M. Il’chenko   +3 more
doaj   +1 more source

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Information Security Incident Management Practical Aspects

open access: yesБезопасность информационных технологий, 2010
The information security incident management process model (ISIMP) is developed; the role of this process in the information security management system is established. Input and output data of the process are determined. Key practical aspects of incident
A. B. Kostina
doaj  

Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective The aim of this systematic review was to synthesize the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

Enhancing Business-Specific Phishing Chat Detection via Few-Shot Learning LLM Augmentation

open access: yesIEEE Access
Phishing through one-on-one chat messages with customers poses significant threats to businesses, yet current detections are hindered by a lack of realistic, context-specific datasets.
Saran Hansakul, Nawaporn Wisitpongphan
doaj   +1 more source

Knowledgehubs - meeting the water sector needs of the Asia-Pacific Region [PDF]

open access: yes
Information exchange, Information transfer, Capacity building, Research institutes, Stakeholders, Water resource management, Irrigation management, Food security, Asia, Pacific Islands ...
Manthrithilake, Herath
core  

An Empirical Study of Information Security Management Success Factors

open access: yes, 2016
Information security management (ISM) is a continuous, structured and systematic security approach to manage and protect the organisation’s information from being compromised by irresponsible parties.
Mazlina Zammani, R. Razali
semanticscholar   +1 more source

Virtual or In‐Person: Does It Matter? Comparing Pain, Function, Quality of Life, Self‐Efficacy, and Physical Function Outcomes of Virtual, Hybrid, and In‐Person Education and Exercise Program Participants

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy