Results 71 to 80 of about 290,825 (260)
ABSTRACT Aim To clarify how public health nurses allocate their time across various tasks and compare time‐use patterns between prefectural and municipal public health nurses in Japan, where distinct administrative mandates define their roles. Design A self‐reported, prospective time study.
Kyoko Yoshioka‐Maeda +10 more
wiley +1 more source
Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management, and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate ...
openaire +1 more source
Som Based Assurance Assessment for Information Security Management System in Organization [PDF]
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core
Cyber insurance of information systems: Security and privacy cyber insurance contracts for ICT and helathcare organizations [PDF]
Nowadays, more-and-more aspects of our daily activities are digitalized. Data and assets in the cyber-space, both for individuals and organizations, must be safeguarded.
Antoniou, M. +9 more
core +3 more sources
En los últimos años, con la popularización tan acelerada del eCommerce (comercio electrónico), que facilita mucho la vida de las personas que, solo dando un clic, tiene la posibilidad de adquirir innumerables productos prescindiendo de la infraestructura
Gerson Roberth De La Cruz Rodríguez +2 more
semanticscholar +1 more source
The Role of Technology Standards in Strategic Hedging
ABSTRACT This article argues that technology standards provide Southeast Asian states with a distinct mechanism for hedging amid intensifying US–China technological rivalry. Traditional hedging strategies emphasizing economic engagement without political alignment are increasingly constrained by the weaponization of technological interdependence ...
Darren J. Lim, Anthea Roberts
wiley +1 more source
СИСТЕМА УПРАВЛІННЯ ІНФОРМАЦІЙНОЮ БЕЗПЕКОЮ [PDF]
У даній статті розглядається система управління інформаційною безпекою за стандартом ISO 27001. Стандарт містить вимоги в галузі інформаційної безпеки для створення, розвитку і підтримки системи менеджменту інформаційної ...
Горяна, Ольга Гарривна
core
ABSTRACT Aims Investigate if UK healthcare professionals have the resources and knowledge to provide cardiovascular prevention and rehabilitation to people with ischaemic non‐obstructive coronary artery disease (INOCA), and explore what type of care healthcare professionals believe patients should receive. Design Electronic cross‐sectional survey of UK
Simon Nichols +5 more
wiley +1 more source
Evaluation of Off‐Label Postoperative Inhaled Steroid Use in Tracheal and Cricotracheal Resection
Abstract Objective Tracheal resection (TR) and cricotracheal resection (CTR) are associated with anastomotic complications. Off‐label use of inhaled corticosteroids has gained popularity for reducing tracheal granulation tissue, though adoption remains limited due to unclear safety and efficacy.
Jason Shin Chwa +3 more
wiley +1 more source

