Search results
From LIMSWiki
Jump to navigationJump to search
Page title matches
- {{wikipedia::Healthcare Information Technology Standards Panel}} ...s_Panel the Wikipedia article] and therefore may not meet the same editing standards as LIMSwiki.529 bytes (63 words) - 22:54, 24 August 2016
Page text matches
- ...e_full = Understanding cybersecurity frameworks and information security standards: A review and comprehensive overview ...the industry helps organizations to adopt the most relevant cybersecurity standards and frameworks.94 KB (12,503 words) - 17:15, 16 March 2023
- '''Title''': ''Laboratory Technology Planning and Management: The Practice of Laboratory Systems Engineering'' ...systems, etc.) to meet those demands. However, without effective planning, technology management, and education, those technologies will only get labs part of th218 KB (34,907 words) - 16:00, 29 March 2024
- '''Title''': ''Elements of Laboratory Technology Management'' ...ion. If they don't do that, you’ve wasted your money. Additionally, if the technology in question hasn’t been deployed according to a deliberate plan, your fun105 KB (16,264 words) - 18:49, 19 June 2024
- ...database is based on a data warehouse schema, which is used to integrate [[information]] from different sources. POS stores clinical data, [[Genomics|genomic]] da ...Based on this concrete requirements model, a service-oriented information technology architecture is derived and also described in this paper. ('''[[Journal:Req84 KB (12,104 words) - 18:55, 12 April 2024
- ...fore populating the lab with systems and processes that produce knowledge, information, and data (K/I/D). ...f its key points is the development of industry-wide guidelines to solving technology management and planning issues, improving personnel development, and more e121 KB (18,783 words) - 01:40, 28 March 2024
- |affiliations = Vellore Institute of Technology ...mation]] to scale operations and predict the future view of treatments via information systems communication. Now, around the world, massive amounts of data are b90 KB (12,672 words) - 21:11, 16 May 2022
- |journal = ''Information'' |affiliations = National Institute of Technology Delhi, University of Aizu85 KB (11,884 words) - 16:05, 26 July 2022
- |affiliations = Australian Nuclear Science and Technology Organisation ...lex ontological constructs or toolsets to synthesize multiple pre-existing standards, potentially including a variety of file formats, into a single overarching85 KB (12,243 words) - 18:56, 10 November 2016
- ...ions, China's Cybersecurity Law, together with its Civil Code and Personal Information Protection Law, demonstrates China's great willingness towards a stronger d ...iduals’ rights and responsibilities vary from nationality, residence, or [[information]] collection region. It is, however, contrary to the original purpose of pr68 KB (9,682 words) - 19:21, 31 July 2021
- |title_full = Interoperability challenges in the cybersecurity information sharing ecosystem ...e aim of this research is to help organizations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepar75 KB (9,816 words) - 19:15, 27 October 2020
- |title_full = Emerging and established trends to support secure health information exchange |affiliations = Foundation for Research and Technology, Sapienza Università di Roma, Fondazione Policlinico Universitario Agostin68 KB (9,790 words) - 21:42, 8 June 2021
- ...eal efforts for [[data exchange]], will allow us to achieve the analytical information environment that patients need. ...cation (e.g., paper and fax) which do not provide rapid access to needed [[information]].52 KB (7,252 words) - 23:55, 28 November 2022
- ...ut by using ASP.NET. XPath and JSPath technologies filtered out specific [[information]] tags. The converted data structure was verified through an HL7 [[applicat ...ation through which individuals can access, manage, and share their health information, and that of others for whom they are authorized, in a private, secure, and60 KB (8,652 words) - 18:40, 15 March 2021
- ...lant science, the paper identifies and discusses eight key challenges in [[Information management|data management]] that must be addressed to further unlock the p ...le concerns the development and implementation of effective and reliable [[Information management|data management]] strategies. Developing reliable and reproducib148 KB (20,856 words) - 16:28, 29 April 2024
- ...maceutical industry, and the requirements defined for them in the relevant standards and regulations. For digitalizing the calibration-related data exchange, a ...url=http://link.springer.com/10.1007/978-3-030-71846-6_8 |work=Information Technology for Management: Towards Business Excellence |language=en |publisher=Springe101 KB (14,131 words) - 21:01, 1 March 2023
- ...re them? Where does a user requirements specification (USR), [[request for information]] (RFI), request for proposal (RFP), or request for quotation (RFQ) come in ...the past vendors have refrained from providing public pricing, a more open information process may have its merits (particularly for potential buyers), though als61 KB (9,151 words) - 01:10, 28 March 2024
- ...althcare Apps for Android Tablets.jpg|thumb|430px|right|Health information technology varies in implementation, from the hospital or physician's office to the ho ...format=PDF |title=Evidence on the Costs and Benefits of Health Information Technology |author=Hagen, Stuart; Richmond, Peter; Mazade, Leah (ed.) |publisher=Congr27 KB (3,655 words) - 15:28, 20 September 2022
- ...nts evidences a widespread fear among researchers that providing extensive information about their experimental set-up will affect the perceived quality of their ...arch data |journal=Journal for the Association for Information Science and Technology |author=Borgman, C.L. |volume=63 |issue=6 |pages=1059–1078 |year=2012 |do55 KB (8,029 words) - 18:11, 27 June 2017
- |title_full = Strengthening public health surveillance through blockchain technology ...ively. Despite its limitations, research, and practice based on blockchain technology have shown promises to strengthen health systems around the world, with a p28 KB (3,711 words) - 17:36, 12 May 2020
- ...ssential activity. This paper uses the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) to assess the cybersecurity posture of ...y if such expertise are not present internally. Given the rapidly changing technology and threat landscape, assessing the cybersecurity posture of an organizatio53 KB (7,071 words) - 18:38, 6 October 2021