Results 61 to 70 of about 3,727,125 (329)

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2016
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
doaj   +2 more sources

Information Security Management

open access: yes, 2022
From the definition of words based on the rule NBR ISO/IEC 17799:2001, and a company case study, this report searches to help the Information Security understanding, and also to get the conscience of the importance one should give to it, especially these days.
openaire   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Integralus informacijos saugumo valdymo modelis

open access: yesInformacijos Mokslai, 2012
Saugumo sąvoka yra daugialypė ir nevienareikšmiškai apibrėžiama, saugumas gali būti suprantamas kaip būsena, kuri gali reikšti ir apsisaugojimą nuo pavojaus (objektyvus saugumas), ir saugumo jausmą (subjektyvus saugumas). Siekiant sumažinti neapibrėžtumą,
Saulius Jastiuginas
doaj   +1 more source

Developing a Taxonomic Framework of Security Methods for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2020
People who are concerned with security (such as security professionals) are naturally interested in methods of achieving security. This paper proposes an approach to creating a taxonomic framework of security methods. The taxonomic framework is developed
Yejun Wu
doaj   +1 more source

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Information Security Incident Management

open access: yesБезопасность информационных технологий, 2010
The present report highlights the points of information security incident management in an enterprise. Some aspects of the incident and event classification are given.
D. I. Persanov
doaj  

Impact of a senior research thesis on students' perceptions of scientific inquiry in distinct student populations

open access: yesFEBS Open Bio, EarlyView.
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart   +4 more
wiley   +1 more source

Enhancing the Conventional Information Security Management Maturity Model (ISM3) in Resolving Human Factors in Organization Information Sharing [PDF]

open access: yes, 2013
Information sharing in organization has been considered as an important approach in increasing organizational efficiency, performance and decision making.
Ithnin, Norafida Binti   +1 more
core   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy