Results 171 to 180 of about 10,997 (203)

Protocol for an eDelphi study to identify consensus on policy metrics which should be included in future assessments of the England Rare Diseases Action Plans

open access: yes
Wark PA   +11 more
europepmc   +1 more source

Time trends in new diagnoses of 19 long-term conditions: a population-level cohort study in England using OpenSAFELY

open access: yes
Russell MD   +23 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Risk and Security Measurement Based on ISO 27001 Using FMEA Methodology Case Study: National Government Agency

2022 1st International Conference on Software Engineering and Information Technology (ICoSEIT), 2022
XYZ government agency utilizes information technology in its operations. The utilization of Information Technology (IT) assets cannot be separated from the risk of information security.
Alfan Cahyo Wicaksono   +2 more
semanticscholar   +1 more source

Analisis Maturity Level Dan PDCA Dalam Penerapan Audit Sistem Manajemen Keamanan Informasi Pada PT Indonesia Game Menggunakan ISO 27001:2013

Informatics for educators and professional, 2022
Sudah menjadi kebutuhan saat ini di setiap perusahan mengenai penerapan tata kelola di bidang TIK dalam upaya peningkatan kualitas layanan.Untuk itu maka perlu dilakukan penerapan dan sekaligus melakukan proses audit berkala SMKI pada perusahaan ...
Eri Riana   +2 more
semanticscholar   +1 more source

ISO 27001 Framework for Securing Election Infrastructure and Machine Voting

International Conference on Information Technology, 2022
This paper examines the case of an ISO 27001 framework tailored to the needs of one or more government entities tasked with securing e-voting (machine voting) infrastructure.
Veselin Monev
semanticscholar   +1 more source

Model for Implementing a IoMT Architecture with ISO/IEC 27001 Security Controls for Remote Patient Monitoring

Conference of the Open Innovations Association, 2022
Due to the recent pandemic, the healthcare sector has been forced to incorporate new technologies into its systems, such as IoT and Fog Computing. However, being new technologies, they are prone to security breaches.
Brandon Alegría   +2 more
semanticscholar   +1 more source

An Online Gap Analysis on Cyber Security Principles for Thailand Organizations Based on ISO/IEC 27001:2013 Standard

International Conference on Information Technology, 2022
The cybersecurity act enforcement in Thailand has been promulgated since 2019. Especially the Personal Data Protection Act (PDPA) forces all organizations to comply. However, there is no security standard relying on PDPA.
Narong Chaiwut, Worasak Rueangsirarak
semanticscholar   +1 more source

Optimizing Cyber Risk Governance Using Global Frameworks: ISO, NIST, and COBIT Alignment

Journal of Frontiers in Multidisciplinary Research, 2022
The escalating frequency, sophistication, and impact of cyber threats have intensified the need for robust, standardized governance approaches to managing cyber risk across diverse industries and jurisdictions.
Iboro Akpan Essien   +6 more
semanticscholar   +1 more source

REVIZIJA STANDARDA ISO/IEC 27001:2022 ZA BEZBEDNOST INFORMACIJA

Fleksibilnost elektroenergetskog sistema, 2023
Information security represents very important segment in corporate networks as electric power one. Any form of endanger of basic propreties of information trasmitted and/or kept in these systems - confidentiality, integrity and availability - can have unforeseeable consequences for system, equipment or people security.
openaire   +1 more source

Home - About - Disclaimer - Privacy