Results 61 to 70 of about 2,116,286 (342)

A Risk Management Process for Consumers [PDF]

open access: yes, 2010
Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, the only remedy is to develop a risk management process for consumers, similar to the ...
Cleeff, André van
core   +2 more sources

Long COVID in People With Multiple Sclerosis and Related Disorders: A Multicenter Cross‐Sectional Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Managing long COVID in people with multiple sclerosis and related disorders (pwMSRD) is complex due to overlapping symptoms. To address evidence gaps, we evaluated long COVID susceptibility in pwMSRD versus controls and its associations with multi‐domain function and disability.
Chen Hu   +15 more
wiley   +1 more source

Information Security Intelligence as a Basis for Modern Information Security Management

open access: yesБезопасность информационных технологий, 2013
There is a transfer from the simple Log Management Systems and SIEM systems to those supporting Information Security Intelligence (ISI). ISIe as Business Intelligence enables companies to make more informed business decisions through more effective ...
Natalia Georgievna Miloslavskaya   +1 more
doaj  

Strengthening Data Security: an Holistic Approach [PDF]

open access: yes, 2008
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core  

The Impact of Tilburg Frailty on Poststroke Fatigue in First‐Ever Stroke Patients: A Cross‐Sectional Study With Unified Measurement Tools and Improved Statistics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen   +6 more
wiley   +1 more source

The nutritional content required to design an educational application for infertile women

open access: yesBMC Women's Health, 2023
Background Infertility has been considered as a critical health problem for couples and society. Given the worldwide exponential rise of infertility, mobile phone-based applications are drastic ways to deliver nutrition educational content to women with ...
Mostafa Langarizadeh   +3 more
doaj   +1 more source

Som Based Assurance Assessment for Information Security Management System in Organization [PDF]

open access: yes, 2010
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core  

​Did a Non‐Medical Biosimilar Switching Policy Cause an Increase in Non‐Biologic/Biosimilar Health Care Resource Utilization or Cost in Patients With Inflammatory Arthritis?

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to evaluate the impact of a series of policies that mandated switching patients with inflammatory arthritis (IA) from an originator biologic to a biosimilar in British Columbia, Canada, on health care resource use and cost.
HaoHung Dang   +4 more
wiley   +1 more source

Lived and care experiences of chronic musculoskeletal shoulder pain in Australian adults: A qualitative study

open access: yesArthritis Care &Research, Accepted Article.
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2022
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
doaj  

Home - About - Disclaimer - Privacy