Results 61 to 70 of about 2,116,286 (342)
A Risk Management Process for Consumers [PDF]
Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, the only remedy is to develop a risk management process for consumers, similar to the ...
Cleeff, André van
core +2 more sources
ABSTRACT Background Managing long COVID in people with multiple sclerosis and related disorders (pwMSRD) is complex due to overlapping symptoms. To address evidence gaps, we evaluated long COVID susceptibility in pwMSRD versus controls and its associations with multi‐domain function and disability.
Chen Hu +15 more
wiley +1 more source
Information Security Intelligence as a Basis for Modern Information Security Management
There is a transfer from the simple Log Management Systems and SIEM systems to those supporting Information Security Intelligence (ISI). ISIe as Business Intelligence enables companies to make more informed business decisions through more effective ...
Natalia Georgievna Miloslavskaya +1 more
doaj
Strengthening Data Security: an Holistic Approach [PDF]
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source
The nutritional content required to design an educational application for infertile women
Background Infertility has been considered as a critical health problem for couples and society. Given the worldwide exponential rise of infertility, mobile phone-based applications are drastic ways to deliver nutrition educational content to women with ...
Mostafa Langarizadeh +3 more
doaj +1 more source
Som Based Assurance Assessment for Information Security Management System in Organization [PDF]
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core
Objective This study aimed to evaluate the impact of a series of policies that mandated switching patients with inflammatory arthritis (IA) from an originator biologic to a biosimilar in British Columbia, Canada, on health care resource use and cost.
HaoHung Dang +4 more
wiley +1 more source
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli +8 more
wiley +1 more source
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe +4 more
doaj

