Results 51 to 60 of about 2,693,777 (322)

Glycosylated LGALS3BP is highly secreted by bladder cancer cells and represents a novel urinary disease biomarker

open access: yesMolecular Oncology, EarlyView.
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece   +18 more
wiley   +1 more source

ISO 27001 Information Security Survey of Medical Service Organizations

open access: yesEngineering Proceedings, 2023
The differences between medical institutions in the security management of information systems were investigated by comparing the differences and the means used by personnel in different units in public and private hospitals.
Hung-Hsiou Hsu, Jyun-Rong Shih
doaj   +1 more source

Analisis Tingkat Kesiapan Pengamanan Sistem Informasi [PDF]

open access: yes, 2019
The University has a number of data relating to Academic and Higher Education Governance. The large amount of data that requires security, especially in terms of readiness to secure information systems.
Hananto, B. (Bayu)   +2 more
core  

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

MODEL FOR FORMING AN INFORMATION SYSTEM OF PROJECT TEAMS IN A SECURITY-ORIENTED SYSTEM

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2020
The subject of the study is the personnel management information system. Infrastructure design processes of the framework model of complex socio-technical systems for project management and human resource management programs, formation of a database of ...
Oleh Zachko   +3 more
doaj   +1 more source

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]

open access: yes, 2014
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario   +4 more
core   +1 more source

Impact of a senior research thesis on students' perceptions of scientific inquiry in distinct student populations

open access: yesFEBS Open Bio, EarlyView.
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart   +4 more
wiley   +1 more source

TECHNIQUE OF OPTIMAL AUDIT PLANNING FOR INFORMATION SECURITY MANAGEMENT SYSTEM [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2014
Complication of information security management systems leads to the necessity of improving the scientific and methodological apparatus for these systems auditing.
F. N. Shago, I. A. Zikratov
doaj  

The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework

open access: yesInformation, 2021
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy