Results 81 to 90 of about 266,507 (244)

Information Security Management System (ISMS) at BPJS Kesehatan Tondano: Implementation of ISO 27001:2022 Standard

open access: yesJurnal Jaminan Kesehatan Nasional
Information security is crucial for organizations managing sensitive data in the digital era. This is especially true for institutions like the Social Security Administrative Body for Health (BPJS Kesehatan), which organizes social health security for ...
Randa Matthew Iroth
doaj   +1 more source

Audit Keamanan Informasi: Studi Kasus PT Xyz [PDF]

open access: yes, 2013
PT XYZ is a provider of document management services, in cooperation with local/foreign banks. Documents containing customer information, so that information security should be set to provide services that meet information security criteria.
Aviandi, I. (Ivano)   +3 more
core  

Service Engineering 4.0 Applicability: Results From Stakeholders′ Engagement Assessment in the Public Building Construction Projects

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
The adoption of Industry 4.0 (I4.0) in service engineering has impacted traditional sectors, including construction. In large‐scale public building construction projects (PBCPs), Service Engineering 4.0 (SE4.0) incorporates robotic process automation, predictive maintenance, the Internet of Things, sensors, cloud computing, digital twins, building ...
Mussa A. Mange   +2 more
wiley   +1 more source

Yönetim Sistemi Standartlarının İşletmelerde Uygulanması: Düzce Sanayi İşletmelerinde Bir Araştırma

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi
Bu araştırmanın temel amacı, Düzce’de faaliyet gösteren işletmelerin yönetim sistemi standartlarına sahip olma durumlarının ve öneminin ortaya konmasıdır.
Buşra Kesici, Mehmet Selami Yıldız
doaj   +1 more source

PERANCANGAN KEAMANAN INFORMASI PADA DOKUMEN FISIK DAN DIGITAL (Studi Kasus : Dompet Dhuafa Jawa Barat) [PDF]

open access: yes, 2018
Keamanan Informasi adalah suatu upaya untuk mengamankan aset informasi terhadap ancaman yang mungkin timbul. Sehingga Keamanan Informasi secara tidak langsung dapat menjamin kontinuisi bisnis, mengurangi risiko-risiko yang terjadi, mengoptimalkan ...
Ghina Khairunnisa, 13.304.0149
core  

Voluntary Restriction or Freedom to Flourish? Self‐Regulation of Commercial Tutoring Providers for Managing Shadow Education

open access: yesEuropean Journal of Education, Volume 60, Issue 4, December 2025.
ABSTRACT Private tutoring, also called private supplementary education or shadow education, has experienced rapid growth in the past two decades. As the phenomenon has expanded globally, so too has the academic literature calling for understanding and effective governance of the sector.
Mohan Dhall
wiley   +1 more source

Информационная безопасность в машиностроении - проблемы реализации требований международного стандарта ISO 27001 [PDF]

open access: yes, 2014
Для предприятий машиностроительной отрасли является актуальным решение научно-практической проблемы по разработке и внедрению систем управления информационной безопасностью, соответствующих требованиям МС ISO 27001.
Ivchenko, Oleksandr Volodymyrovych   +3 more
core  

Artificial Intelligence in Veterinary Clinical Pathology—An Introduction and Review

open access: yesVeterinary Clinical Pathology, Volume 54, Issue S2, Page S13-S29, December 2025.
ABSTRACT Artificial intelligence (AI), particularly through machine learning and deep learning, presents opportunities for the enhancement of the workflow of the veterinary clinical pathologist. This review introduces basic concepts in AI in a nontechnical manner and explores the qualification and integration of AI in veterinary clinical pathology. The
Samuel V. Neal   +2 more
wiley   +1 more source

Key Predictors of Adherence to a Mobile Health App for Managing Chronic Spontaneous Urticaria

open access: yesClinical and Translational Allergy, Volume 15, Issue 11, November 2025.
ABSTRACT Background Mobile health technologies may improve the management of chronic diseases, such as chronic spontaneous urticaria. However, effectiveness of mHealth tools largely depends on patient adherence, which can be influenced by various demographic, clinical, behavioural, psychosocial factors, and apps characteristics (appealing and ...
Hugo Viegas   +58 more
wiley   +1 more source

Ontology-Based Evaluation of ISO 27001 [PDF]

open access: yes, 2010
Information security risks threaten the ability of organizations of reaching their operational and strategic goals. Increasing diversification of the information security landscapes makes addressing all risks a challenging task. Information security standards have positioned themselves as generic solutions to tackle a broad range of risks and try to ...
Milicevic, Danijel, Goeken, Matthias
openaire   +2 more sources

Home - About - Disclaimer - Privacy