Results 61 to 70 of about 10,997 (203)
Del derecho electrónico en Colombia: interpretación normativa, producción y valoración probatoria de la firma digital y/o electrónica [PDF]
Artículo de reflexiónEl siglo XX se ha caracterizado por una revolución científica y técnica, acercando a la humanidad a los avances en las tecnologías de la información y comunicación, a través de las cuales se ha permitido modernizar muchos de los ...
Muñoz-Caro, Luisa Fernanda
core
ABSTRACT Private tutoring, also called private supplementary education or shadow education, has experienced rapid growth in the past two decades. As the phenomenon has expanded globally, so too has the academic literature calling for understanding and effective governance of the sector.
Mohan Dhall
wiley +1 more source
Penelitian ini membahas mengenai pengelolaan dan perlindungan terhadap aset teknologi informasi organisasi terutama untuk operasi keamanan siber dari ancaman siber yang semakin meningkat. Operasi keamanan siber terdiri dari enam kategori kegiatan yang melibatkan perencanaan, pengelolaan, dan pengaturan terhadap aset teknologi informasi.
Hafizh Ghozie Afiansyah +1 more
openaire +1 more source
Key Predictors of Adherence to a Mobile Health App for Managing Chronic Spontaneous Urticaria
ABSTRACT Background Mobile health technologies may improve the management of chronic diseases, such as chronic spontaneous urticaria. However, effectiveness of mHealth tools largely depends on patient adherence, which can be influenced by various demographic, clinical, behavioural, psychosocial factors, and apps characteristics (appealing and ...
Hugo Viegas +58 more
wiley +1 more source
Analysis of Risk Management Information System Applications Using Iso/Iec 27001:2022
The rapid development of information technology can make it easier for anyone to obtain, process, and disseminate various information systems. Information system security is an important aspect in maintaining information confidentiality. One way to maintain the security of information systems is by conducting risk management.
Kanka Wiemas N. G., Jarot S. Suroso
openaire +1 more source
Integrating ISO 27001 and Indonesia's Personal Data Protection Law for Data Protection Requirement Model [PDF]
This research explores the integration of ISO/IEC 27001:2022 with Indonesia's Personal Data Protection (PDP) Law to establish a robust framework for data protection and information security within organizations operating in Indonesia.
Arya Adhi Nugraha, Asyahri Hadi Nasyuha
core +2 more sources
Determinants of Social Impact Through Safety Culture in Technical Organizations
ABSTRACT The aim of the article is to show the results of research on whether safety culture is the social impact of technical organizations. It is important to fix determinants of social impact through safety culture in technical organizations. Positive safety culture is the result of consistent management actions aimed at both the inner workings of ...
Christian Schachtner +2 more
wiley +1 more source
Certification Government Procurement of Goods/Services has applied since 2008 and switched to certification-based computers in 2015. However, technology information has raised problems with the security of necessary information fixed, like illegal access and practice jockeying through access remotely against application exam-based computers.
Ade Wahyu Kurniawan, Muhammad Salman
openaire +1 more source
This review explores the potential of smart textile systems for monitoring loneliness in older adults. It presents key behavioral and physiological indicators of loneliness and evaluates recent sensing and design innovations in smart textile technology. The study identifies challenges and outlines opportunities for developing user‐centered, comfortable
Yi Zhou +12 more
wiley +1 more source
BPRDCo SME Digital Transformation by Designing Information Security Using ISO 27001:2022
In the digital era of the Industrial Revolution 4.0, organizations such as BPRDCo must undergo Digital Transformation (DT) to remain competitive. A significant obstacle in this process is often the inadequacy of information security controls, which can lead to DT failure.
Ignatius Christ Surya +2 more
openaire +1 more source

