Results 211 to 220 of about 130,608 (266)

Applications, attitudes and ethical considerations of Generative Artificial Intelligence (Gen AI) in nursing education: a scoping review. [PDF]

open access: yesBMC Nurs
Hardie P   +8 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Tools for information security assurance arguments

Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2002
To design a system that can be trusted or assess security properties in a system, the related assurance arguments need to be developed and described effectively in an understandable way. To meet this pressing need, we have developed a prototype tool, VNRM (Visual Network Rating Methodology), to help users develop a map to assurance arguments and ...
J.S. Park, B. Montrose, J.N. Froscher
openaire   +1 more source

A Tool for Information Security Management

Information Management & Computer Security, 1993
Top management is responsible for the wellbeing of the organization. Most organizations nowadays are dependent totally on the availability and effectiveness of their information service resources. For this reason it is imperative that top management gets involved and stays involved in the protection of the information service assets of the organization.
H. van de Haar, R. von Solms
openaire   +1 more source

Information risk insurance as a modern Information security Management tool

Экономика и предпринимательство, 2021
В статье обосновывается актуальность страхования информационных рисков как современного инструмента управления информационной безопасностью. Вопросы страхования позиционируются как часть вопросов защиты информации, решение которых позволяет частично компенсировать потери от воздействия информационных рисков.
openaire   +1 more source

Information Tools for Security Protection

2002
Abstract : This report describes the three tools built for the Information Security Tools project. Each of these tools provides a way of helping a user uncover potential security problems arising from the composition of parts of a system. The intent of this work was to provide tools usable by trained, but not necessarily expert, security personnel. The
Cheryl Barbasch   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy