Results 51 to 60 of about 266,507 (244)
Information security, is the practice of protecting information by mitigating the risk of cyber-attack, and typically includes preventing or reducing the possibility of unauthorized/inappropriate access to data, unlawful use, disclosure, disruption. This
Amar Y. El-Bably
doaj +1 more source
Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update
The risk of data theft has increased significantly over the past years. As a consequence, overwhelming damage is caused to institutions and private persons, respectively.
M. Mundt, Harald Baier
semanticscholar +1 more source
ABSTRACT Aims Investigate if UK healthcare professionals have the resources and knowledge to provide cardiovascular prevention and rehabilitation to people with ischaemic non‐obstructive coronary artery disease (INOCA), and explore what type of care healthcare professionals believe patients should receive. Design Electronic cross‐sectional survey of UK
Simon Nichols +5 more
wiley +1 more source
The Italian Tier1 center is mainly focused on LHC and physics experiments in general. Recently we tried to widen our area of activity and established a collaboration with the University of Bologna to set-up an area inside our computing center for hosting
Chierici Andrea +9 more
doaj +1 more source
KAMI index as an evaluation of academic information system security at XYZ university
XYZ University is one of the universities that has used information technology to create quality service for students and the entire academic community.
Andi Sofyan Anas +3 more
doaj +1 more source
ANALISIS SISTEM KEAMANAN INFORMASI BERDASARKAN PENDEKATAN ISO/IEC 27001:2013 (Studi Kasus : Laboratorium Teknik Informatika Universitas Pasundan Bandung) [PDF]
Informasi merupakan hal yang sangat penting bagi organisasi. Pengelolaan yang baik diperlukan karena informasi merupakan aset yang sangat bernilai. Jika hal tersebut diakses oleh pihak yang tidak berhak maka dapat berpengaruh terhadap keberlangsungan ...
Rizka Tri Anugrah, 13.304.0219
core
In this era of cyber crimes, data security is an important aspect that needs special attention from an organization. This is reinforced by the ratification of Law Number 27 of 2022 on personal data security.
Mustafa Kamal +6 more
semanticscholar +1 more source
ABSTRACT Aim To clarify how public health nurses allocate their time across various tasks and compare time‐use patterns between prefectural and municipal public health nurses in Japan, where distinct administrative mandates define their roles. Design A self‐reported, prospective time study.
Kyoko Yoshioka‐Maeda +10 more
wiley +1 more source
A segurança da informação destaca-se como uma das principais preocupações em diversas organizações. Para garantir que as informações e os sistemas de informações estejam protegidos contra ameaças de todos os tipos é necessário definir processos ...
Ricardo Ribeiro Mendes +3 more
doaj +1 more source
Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management, and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate ...
openaire +1 more source

