Results 51 to 60 of about 2,067,027 (330)
Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds [PDF]
ObjectivesThe information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on ...
Woo-Sung Park+8 more
doaj +1 more source
Multicriteria Evaluation and Sensitivity Analysis on Information Security [PDF]
Information security plays a significant role in recent information society. Increasing number and impact of cyber attacks on information assets have resulted the increasing awareness among managers that attack on information is actually attack on organization itself.
arxiv +1 more source
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher+7 more
wiley +1 more source
Federated Identity Management (FIdM) Systems Limitation And Solutions [PDF]
Efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. FIdM allows users to distribute their identity information across security domains which increase the portability of their digital identities.
arxiv
Home‐Based Tele‐tDCS in Amyotrophic Lateral Sclerosis: Feasibility, Safety, and Preliminary Efficacy
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is a progressive neurodegenerative disease with limited treatment options. Transcranial direct current stimulation (tDCS) shows promise as a neuromodulatory intervention in various neurological disorders, but its application in ALS, particularly in a remote, home‐based format, remains underexplored.
Sangeetha Madhavan+6 more
wiley +1 more source
Information Security Incident Management
The present report highlights the points of information security incident management in an enterprise. Some aspects of the incident and event classification are given.
D. I. Persanov
doaj
Que Bian: An Electronic Medical Record Management System on Blockchain [PDF]
Medical Record Management System is an important information management system in healthcare centers and hospitals. Information kept in such systems need to be clean, correct and tamper-proof. In this paper, we take advantage of blockchains' tamper-proof and decentralization properties to develop a robust and secure electronic medical record management
arxiv
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho+8 more
wiley +1 more source
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell+10 more
wiley +1 more source
an intelligent security centered resource-efficient resource management model for cloud computing environments [PDF]
This paper proposes a conceptual model for a secure and performance-efficient workload management model in cloud environments. In this model, a resource management unit is employed for energy and performance proficient allocation of virtual machines while ensuring the secure processing of users' applications by defending against data breaches due to ...
arxiv