Results 71 to 80 of about 2,116,286 (342)

Calculation of risks of information security of telecommunication enterprise

open access: yesОткрытое образование (Москва), 2018
The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to ...
L. M. Il’chenko   +3 more
doaj   +1 more source

The Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, Accepted Article.
Objective The aim of this systematic review was to synthesise the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

Secure and Prepared Newsletter, February 11, 2010, Vol. 6, no. 4, revision 1 [PDF]

open access: yes, 2010
A bi-weekly newsletter for those involved in the fields of homeland security and/or emergency management.

core  

Virtual or in‐person: does it matter? Comparing pain, function, quality of life, self‐efficacy and physical function outcomes of virtual, hybrid and in‐person GLA:D Canada participants

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme   +7 more
wiley   +1 more source

Readiness of Hospitals with Quality Management Systems Based on Joint Commission on Accreditation Standards

open access: yesمدیریت اطلاعات سلامت, 2012
Introduction: Recently, the accreditation program has been used increasingly by an emphasis on patient safety. In Iran, efforts have been made to establish the accreditation program.
Shirin Abbasi   +2 more
doaj  

Information Security Management (ISM) [PDF]

open access: yesResearch Papers Faculty of Materials Science and Technology Slovak University of Technology, 2012
Abstract Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision.
Jarmila Šalgovičová, Vanessa Prajová
openaire   +2 more sources

Security Information and Event Management -järjestelmät [PDF]

open access: yes, 2015
Opinnäytetyö tehtiin Itä-Suomen yliopistolle, jolla on tarve keskitettyyn lokienhallintaan ja tietoturvan monitorointiin. Työn päätavoitteena on toimia apuvälineenä Security Information and Event Management -järjestelmiin perehtymiseen. Tästä aiheesta on
Ryynänen, Perttu, Tuupanen, Markus
core  

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, Accepted Article.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health. Methods We conducted a search for keywords which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the list of
Joy Buie   +11 more
wiley   +1 more source

ARCSIM Newsletter, February 2024 [PDF]

open access: yes
ARCSIM approaches fives years and expands services to entire UMS research community. The research enterprise at UMaine has experienced rapid growth in recent years, and with that growth comes accompanying computing, data security, and operational needs ...
Advanced Research Computing, Security & Information Management
core   +1 more source

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Home - About - Disclaimer - Privacy