Results 91 to 100 of about 2,067,027 (330)

Practical Methods for Information Security Risk Management [PDF]

open access: yesInformatică economică, 2011
The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing ...
Cristian AMANCEI
doaj  

Effective Measurement Requirements for Network Security Management [PDF]

open access: yesInternational Journal of Computer Science and Information Security (IJCSIS) , Vol. 12, No. 4, April 2014, 2014
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and incompetence of the ...
arxiv  

Stable, Easy‐to‐Handle, Fully Autologous Electrospun Polymer‐Peptide Skin Equivalent for Severe Burn Injuries

open access: yesAdvanced Functional Materials, EarlyView.
A bioengineered skin equivalent composed of electrospun poly(ε‐caprolactone) (PCL) and the bioactive peptide Fmoc‐FRGD is developed for severe burn treatment. This scaffold promotes full‐thickness skin regeneration by supporting cellular adhesion and integration. In‐vitro and in‐vivo studies show enhanced mechanical stability, accelerated wound closure,
Dana Cohen‐Gerassi   +11 more
wiley   +1 more source

Convergence of Corporate and Information Security [PDF]

open access: yesInternational Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 63-68, January 2010, USA, 2010
As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the ...
arxiv  

Engineering the Future of Restorative Clinical Peripheral Nerve Surgery

open access: yesAdvanced Healthcare Materials, EarlyView.
What if damaged nerves could regenerate more effectively? This review unveils cutting‐edge strategies to restore nerve function, from biomaterial scaffolds and bioactive molecules to living engineered tissues. By accelerating axonal regrowth, preserving Schwann cells, and enhancing connectivity, these approaches are reshaping nerve repair—offering new ...
Justin C. Burrell   +5 more
wiley   +1 more source

In Vivo‐Like Scaffold‐Free 3D In Vitro Models of Muscular Dystrophies: The Case for Anchored Cell Sheet Engineering in Personalized Medicine

open access: yesAdvanced Healthcare Materials, EarlyView.
The scaffold‐free Anchored Cell Sheet Engineering platform is used to create three‐dimensional (3D) in vitro models of skeletal muscle tissue that replicate key features of Duchenne and Myotonic dystrophies. These personalized tissue models, validated by histological, immunostaining, and proteomics analyses, accurately mimic disease phenotypes and ...
Alireza Shahin‐Shamsabadi   +1 more
wiley   +1 more source

Information security risk management for computerized health information systems in hospitals: a case study of Iran

open access: yesRisk Management and Healthcare Policy, 2016
Javad Zarei,1 Farahnaz Sadoughi2 1Health Information Management, Health Management and Economics Research Center, School of Health Management and Information Science, Iran University of Medical Sciences, Tehran, Islamic Republic of Iran, 2Health ...
Zarei J, Sadoughi F
doaj  

Knowledge Management [PDF]

open access: yesarXiv, 2010
This paper discusses the important process of knowledge and its management, and differences between tacit and explicit knowledge and understanding the culture as a key issue for the successful implementation of knowledge management, in addition to, this paper is concerned with the four-stage model for the evolution of information technology (IT ...
arxiv  

Home - About - Disclaimer - Privacy