Results 71 to 80 of about 2,116,286 (342)
Calculation of risks of information security of telecommunication enterprise
The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to ...
L. M. Il’chenko +3 more
doaj +1 more source
Objective The aim of this systematic review was to synthesise the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye +6 more
wiley +1 more source
Secure and Prepared Newsletter, February 11, 2010, Vol. 6, no. 4, revision 1 [PDF]
A bi-weekly newsletter for those involved in the fields of homeland security and/or emergency management.
core
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme +7 more
wiley +1 more source
Introduction: Recently, the accreditation program has been used increasingly by an emphasis on patient safety. In Iran, efforts have been made to establish the accreditation program.
Shirin Abbasi +2 more
doaj
Information Security Management (ISM) [PDF]
Abstract Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision.
Jarmila Šalgovičová, Vanessa Prajová
openaire +2 more sources
Security Information and Event Management -järjestelmät [PDF]
Opinnäytetyö tehtiin Itä-Suomen yliopistolle, jolla on tarve keskitettyyn lokienhallintaan ja tietoturvan monitorointiin. Työn päätavoitteena on toimia apuvälineenä Security Information and Event Management -järjestelmiin perehtymiseen. Tästä aiheesta on
Ryynänen, Perttu, Tuupanen, Markus
core
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health. Methods We conducted a search for keywords which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the list of
Joy Buie +11 more
wiley +1 more source
ARCSIM Newsletter, February 2024 [PDF]
ARCSIM approaches fives years and expands services to entire UMS research community. The research enterprise at UMaine has experienced rapid growth in recent years, and with that growth comes accompanying computing, data security, and operational needs ...
Advanced Research Computing, Security & Information Management
core +1 more source
Estimating ToE Risk Level using CVSS [PDF]
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources

