Results 91 to 100 of about 2,693,777 (322)
Implementation of information security management system in the small healthcare organization
The contribution describes the scope and main subject designed within DIGI-Q project. The paper contains results from subprojects of information security management system (ISMS) implementation, managed by students of DIGI-Q course.
Jirí Tupa, Frantisek Steiner
doaj +1 more source
Implementing Information Security Management Systems [PDF]
This paper presents the findings of an empirical study of certification auditors’ and information security consultants’ experiences and insights concerning the implementation and certification of information security management systems. Using an action research strategy and a grounded theory research method, the study describes these particular ...
openaire +1 more source
Financial Distress and Its Determinants in Rheumatoid Arthritis
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent prolonged use of expensive disease‐modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or noninflammatory musculoskeletal disease (NIMSKD) completing the ...
Amber Brown Keebler +5 more
wiley +1 more source
Design and realization of a network security model [PDF]
The security of information is a key problem in the development of network technology. The basic requirements of security of information clearly include confidentiality, integrity, authentication and non-repudiation.
HAN Fangxi +4 more
core +1 more source
Objective We aimed to validate the Pediatric Arthritis Ultrasound Scoring System (PAUSS) for upper extremity joints in children with juvenile idiopathic arthritis (JIA). Methods Children with JIA were evaluated for elbow, wrist, or finger arthritis by clinical examination (CE) and musculoskeletal ultrasound (MSUS) with images scored according to the ...
Patricia Vega‐Fernandez +12 more
wiley +1 more source
Objective Knee osteoarthritis (OA) commonly affects individuals with Type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King +10 more
wiley +1 more source
Review of Information Security Processes’ Maturity Models
The most commonly used maturity model as applied in the field of information security (IS) and information technologies (IT) are described. The results of a comparative analysis of selected models are given.
Natalia Georgievna Miloslavskaya +1 more
doaj
Advanced Information Security Management Evaluation System
Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis.
Heasuk Jo, Seungjoo Kim, Dongho Won
openaire +1 more source
Understanding the U.S. Generic Advertising System and Its Role in Information Management Among Commodities and Food Systems [PDF]
Understanding the U.S. Generic Advertising System and Its Role in Information Management Among Commodities and Food SystemsGeneric promotions, checkoff, demand, Agribusiness, Agricultural and Food Policy, Food Consumption/Nutrition/Food Safety, Food ...
Ward, Ronald W.
core +1 more source
Practical Guidelines and Major Issues in Information Security Management Systems Implementations [PDF]
Information is a major asset for any organization, to public or private. Threatsto information and information handling resources are getting more sophisticatedcontinuously.
Lami KAYA
core

