Results 11 to 20 of about 94,819 (182)
Healthcare workers’ perceptions of an organizational quality assurance program implemented in a resource-limited setting: a qualitative study [PDF]
Background:There is increasing awareness of the need to implement quality assurance programs in developing countries. Healthcare staff are the primary drivers of improving the quality of care,but little is known about how they perceive quality assurance ...
Hiroko Henker+5 more
doaj +1 more source
Labour/data justice: a new framework for labour/regulatory datafication
Abstract Labour datafication – the accelerating quantification of working life, encompassing data use that extracts additional value from workers – is increasingly recognized as a dimension of the future of work. This article proposes a notion of ‘labour/data justice’ to capture both the deterioration of working life at the labour/data nexus and ...
DEIRDRE MCCANN, ARELY CRUZ‐SANTIAGO
wiley +1 more source
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo+2 more
doaj +1 more source
ПОТЕНЦІЙНІ ВІДВОЛІКАЮЧІ АТАКИ НА ОПЕРАЦІЙНІ ЦЕНТРИ БЕЗПЕКИ ТА SIEM СИСТЕМИ
В даній статі розглянуто деякі потенційні вектори атак, що можуть бути здійснені на системи моніторингу операційних центрів безпеки (SOC), зокрема системи SIEM.
Roman Drahuntsov, Dmytro Rabchun
doaj +1 more source
Water stress: Opportunities for supply chain research
Abstract Driven by climate change and overuse, water stress is a worsening sustainability concern that threatens businesses and communities across the globe. Leading global organizations such as the United Nations have expressed an urgent need for sustainable water management strategies across nations and economies.
Dustin Cole+4 more
wiley +1 more source
Abstract Morphology has been a leading taxonomic guiding light to systematists for the last couple of hundred years. However, the genetic and – more recently – genomic revolution have produced numerous demonstrations of erroneous classifications that were based on labile morphological traits.
Elize Y. X. Ng+14 more
wiley +1 more source
SecureCyber: An SDN-Enabled SIEM for Enhanced Cybersecurity in the Industrial Internet of Things [PDF]
The proliferation of smart technologies has undeniably brought forth numerous advantages. However, it has also introduced critical security issues and vulnerabilities that need to be addressed. In response, the development of appropriate and continuously
Panagiotis Radoglou-Grammatikis
core +1 more source
Study of the applicability of the hierarchy analysis method for choosing a SIEM system
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya+2 more
doaj +1 more source
МОДЕЛЬ ІДЕНТИФІКАЦІЇ КІБЕРІНЦИДЕНТІВ SIEM-СИСТЕМОЮ ДЛЯ ЗАХИСТУ ІНФОРМАЦІЙНО-КОМУНІКАЦІЙНИХ СИСТЕМ
У статті представлено модель ідентифікації кіберінцидентів SIEM-системою, які відбуваються в ході функціонування інформаційно-комунікаційних систем (ІКС).
Ігор Субач+1 more
doaj +1 more source
Objectives Neonatal mortality remains persistently high in low-income and middle-income countries. In Cambodia, there is a paucity of data on the perception of neonatal health and care-seeking behaviours at the community level.
Manila Prak+6 more
doaj +1 more source