Results 51 to 60 of about 10,997 (203)

Public Health Nurses' Time Allocation in Local Government Nursing Settings: A Self‐Reported Prospective Time Study

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aim To clarify how public health nurses allocate their time across various tasks and compare time‐use patterns between prefectural and municipal public health nurses in Japan, where distinct administrative mandates define their roles. Design A self‐reported, prospective time study.
Kyoko Yoshioka‐Maeda   +10 more
wiley   +1 more source

Information Security Risk Analysis Using ISO 31000:2018 and ISO 27001:2022

open access: yesBrilliance: Research of Artificial Intelligence
Information system risk audits are an important step in ensuring the security, effectiveness, and efficiency of the systems used by organizations. However, the fast advancement of information and communication technologies has made information?security threats more intricate, arising not only from internal sources like employee carelessness but also ...
Athiyatul Ulya   +4 more
openaire   +1 more source

Hepatic Adenoma Subtypes on Hepatobiliary Phase of Gadoxetic Acid-Enhanced MRI: Systematic Review and Meta-Analysis.

open access: yesAJR. American journal of roentgenology, 2022
Background: Accumulating evidence indicates that hepatocellular adenoma (HCA) may have a higher frequency of hepatobiliary phase (HBP) iso- or hyperintensity than previously reported. Objective: To evaluate the proportion of HCA that demonstrates iso- or
Tae-Hyung Kim   +5 more
semanticscholar   +1 more source

The Role of Technology Standards in Strategic Hedging

open access: yesAsian Politics &Policy, Volume 18, Issue 2, April 2026.
ABSTRACT This article argues that technology standards provide Southeast Asian states with a distinct mechanism for hedging amid intensifying US–China technological rivalry. Traditional hedging strategies emphasizing economic engagement without political alignment are increasingly constrained by the weaponization of technological interdependence ...
Darren J. Lim, Anthea Roberts
wiley   +1 more source

Social Sustainability in Startups: Implementation Pathways and Their Effects on Performance

open access: yesCorporate Social Responsibility and Environmental Management, Volume 33, Issue 1, Page 1528-1544, January 2026.
ABSTRACT Social sustainability remains underexplored in the context of startups. While much attention is given to economic and environmental performance, the social dimensions are frequently overlooked. This gap is particularly significant for startups, as their early‐stage decisions can shape long‐term cultural and social impacts both within their ...
Gabriele Zangara   +2 more
wiley   +1 more source

Implementasi ISO 27001:2022 dalam Manajemen Risiko Keamanan Informasi

open access: yesJURNAL PETISI (Pendidikan Teknologi Informasi)
Abstrak: Implementasi ISO 27001:2022 merupakan langkah strategis dalam memperkuat manajemen risiko keamanan informasi di berbagai organisasi. Penelitian ini bertujuan untuk menganalisis penerapan standar ISO 27001:2022 dalam mengelola risiko keamanan informasi secara terstruktur dan efisien.
Filany Cahya Arumdiya, Christ Rudianto
openaire   +1 more source

Threshold Effects of Maternal Vitamin C in Late Pregnancy on Infant Social Competence: A Nonlinear Dose‐Response Analysis in a Birth Cohort

open access: yesFood Science &Nutrition, Volume 14, Issue 1, January 2026.
This prospective cohort study analysing 442 mother‐offspring pairs reveals a nonlinear dose‐response relationship between late‐pregnancy serum vitamin C concentration and early offspring social competence. The strongest association was observed at low concentrations (≤ 4.9 μmol/L, β = 0.654/μmol), with diminishing effects at moderate levels (4.9–49 ...
Cui Li, Ji Jiafen, Ni Juan, Li Rui xiang
wiley   +1 more source

Biohacking para la protección de los activos de información en las pymes por medio de un sistema de doble factor de autenticación [PDF]

open access: yes, 2019
Trabajo de investigaciónEste documento tiene como finalidad dar a conocer el biohacking como una técnica a utilizar en la protección de activos de información en las compañías, y la autenticación doble factor o multifactorial como una capa más de ...
Cifuentes-Díaz, Erin Fabricio   +1 more
core  

Análisis y diseño de un modelo de gestión de seguridad de la información basado en el estándar ISO 27001:2022 para la Empresa Pc Soluciones de la ciudad de Babahoyo. [PDF]

open access: yes, 2023
The PC Solutions Company, located in the city of Babahoyo, has established itself as a company that offers an excellent quality service in the sector of technological solutions and computer services.
Fuentes Pozo, Erick Alexis
core  

Service Engineering 4.0 Applicability: Results From Stakeholders′ Engagement Assessment in the Public Building Construction Projects

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
The adoption of Industry 4.0 (I4.0) in service engineering has impacted traditional sectors, including construction. In large‐scale public building construction projects (PBCPs), Service Engineering 4.0 (SE4.0) incorporates robotic process automation, predictive maintenance, the Internet of Things, sensors, cloud computing, digital twins, building ...
Mussa A. Mange   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy