Results 71 to 80 of about 266,507 (244)

The NPFIT strategy for information security of care record service [PDF]

open access: yes, 2011
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core  

Standardization of Information Security Management in the Banking Sector using the ISO 27001:2022 Framework

open access: yesJournal La Multiapp
This research discusses evaluations related to cyber security standardization in the banking sector at Bank Victoria International Tbk using qualitative methods and data collection techniques, interviews and focus group discussions.
Kamil Ryanto, Vitri Tundjungsari
semanticscholar   +1 more source

Threshold Effects of Maternal Vitamin C in Late Pregnancy on Infant Social Competence: A Nonlinear Dose‐Response Analysis in a Birth Cohort

open access: yesFood Science &Nutrition, Volume 14, Issue 1, January 2026.
This prospective cohort study analysing 442 mother‐offspring pairs reveals a nonlinear dose‐response relationship between late‐pregnancy serum vitamin C concentration and early offspring social competence. The strongest association was observed at low concentrations (≤ 4.9 μmol/L, β = 0.654/μmol), with diminishing effects at moderate levels (4.9–49 ...
Cui Li, Ji Jiafen, Ni Juan, Li Rui xiang
wiley   +1 more source

Analisa Manajemen Resiko Keamanan Informasi pada Kantor Pelayanan Pajak Pratama XYZ

open access: yesRekayasa, 2016
Penggunaan Teknologi Informasi di lembaga-lembaga pemerintahan saat ini sangat dibutuhkan untuk mempermudah melakukan pendataan dan pengambilan keputusan yang strategis.
Iwan Santosa, Dwi Kuswanto
doaj   +1 more source

PENYUSUNAN STANDAR OPERASIONAL PROSEDUR KEAMANAN SERVER BERDASARKAN ISO 27001 : 2013 [PDF]

open access: yes, 2017
Penyusunan standar operasional prosedur keamanan server di Jurusan Teknik Informatika Universitas Pasundan disusun berdasarkan ISO/IEC 27001:2013 yang berpatokan pada klausa A.11.2.1 yaitu penempatan dan perlindungan serta A.11.2.4 tentang ...
Iwan Kurniawan, DS   +1 more
core  

The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security

open access: yes, 2009
Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement.
Hwang, Junseok, Syamsuddin, Irfan
core   +1 more source

XRFitVis: A Cloud‐Based Visualization Tool for μXRF Mapping Datasets

open access: yesX-Ray Spectrometry, Volume 55, Issue 1, Page 76-82, January/February 2026.
ABSTRACT X‐ray fluorescence (XRF) spectroscopy is a versatile tool employed in various fields like biomedicine, nanotechnology, and cultural heritage, providing comprehensive elemental maps that combine spectrographic, spatial, and morphological data.
George Kourousias   +5 more
wiley   +1 more source

Анализ событий информационной безопасности для проведения корректирующих действий по управлению безопасностью [PDF]

open access: yes, 2009
The article is devoted to the analysis of the information security events in accordance with international standard ISO/IEC 27001:2005 “Information technology. Security techniques. Information security management systems. Requirements”.
Волокита, А. Н.   +1 more
core  

Unlocking the Mediating and Moderating Role of Information Security in Information Systems: A Combined TAM, ISM, and HBM Model

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Purpose This study examines the mediating and moderating roles of information security in information systems, focusing on the integration of the Technology Acceptance Model (TAM), Interpretive Structural Model (ISM), and the Health Belief Model (HBM).
Md. Mominul Islam   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy