Search results

From LIMSWiki
Jump to navigationJump to search
  • ...losure risks review, and training. In the future, restricted data managing organizations may need to proactively take into consideration reducing inequalities in ac ...data confidentiality. Despite successful implementation of the Five Safes, organizations encounter unintended challenges. In this paper, we review the current pract
    32 KB (4,547 words) - 22:37, 29 April 2024
  • ...[[data integrity]]. The POC is based on two industrial use cases involving organizations with different roles in the metrology infrastructure. From testing this POC ...roles of the organizations and regulatory frameworks in the QI, there are organizations and regulatory bodies covering the different parts of the QI on national or
    101 KB (14,131 words) - 21:01, 1 March 2023
  • ...retation and practice in the implementation of new digital technologies in organizations. '''Keywords''': enterprise social media, sharing, public organizations, Norway
    83 KB (12,159 words) - 23:03, 29 April 2019
  • ...background-color:white; padding-left:10px; padding-right:10px;"|Frontline: organizations ...d-color:white; padding-left:10px; padding-right:10px;"|Frontline: workers, organizations
    203 KB (22,991 words) - 20:08, 2 November 2020
  • ...that share cybersecurity information. The aim of this research is to help organizations improve their cyber threat information exchange capabilities, to enhance th ...ntly by Ponemon Institute and Accenture, the average cost of cybercrime to organizations in 2018 rose to $13 million.<ref name="AccentureTheCost19">{{cite web |url=
    75 KB (9,816 words) - 19:15, 27 October 2020
  • ...round''': As the number of large-scale research studies involving multiple organizations producing data has steadily increased, an integrated system for a common in ...-19-related research has been conducted with the participation of multiple organizations. Among such studies, animal models of monkeys, cats, ferrets, hamsters, and
    53 KB (7,021 words) - 22:48, 1 April 2024
  • '''Methods''': To better understand existing capacity and help organizations plan for the strategic and expanded uses of data, a project was initiated t ...While this analysis was conducted exclusively with community health center organizations, its conclusions and recommendations may be more broadly applicable.
    44 KB (6,296 words) - 23:52, 4 January 2017
  • ...me="Camarinha-MatosCollab09">{{cite journal |title=Collaborative networked organizations – Concepts and practice in manufacturing enterprises |journal=Computers & ...on, actors may as well include individuals, firms, and many other types of organizations.<ref name="vonHippelDemoc06">{{cite book |title=Democratizing Innovation |a
    105 KB (14,517 words) - 18:47, 6 October 2021
  • ...addressing “morals and values explicitly as a central feature of managing organizations.”<ref>{{Cite journal |last=Phillips |first=Robert |last2=Freeman |first2= ...(iii) not all stakeholders might be regarded as legitimate stakeholders by organizations—in this regard, stakeholder theory is closely related to legitimacy and i
    287 KB (32,917 words) - 17:02, 11 September 2022
  • ...present a guideline for [[quality management system]]s (QMS) for academic organizations incorporating the essential components, while confining the requirements to ...issn=1946-6234}}</ref> In the last decade, universities and other research organizations supported and encouraged by public funding agencies have allocated tremendo
    52 KB (7,400 words) - 18:25, 6 October 2021
  • ...urished through the development of international networks and professional organizations, reviews and inquiries into best practices, and the standardization of test ...12-06 |title=Risk, Reward, and Redemption: Root Cause Analysis in Forensic Organizations |url=https://www.tandfonline.com/doi/full/10.1080/19409044.2016.1224278 |jo
    64 KB (9,046 words) - 19:38, 17 October 2023
  • ...and [[Information privacy|privacy]] risks has never been more critical for organizations. While a number of [[risk assessment]] methodologies and software tools are ...nd infrastructures to be protected. For instance, financial and healthcare organizations have [[Regulatory compliance|regulatory requirements]] to satisfy, while th
    136 KB (18,556 words) - 18:40, 6 October 2021
  • ...ommittee as authors due to the contributions of many individuals from both organizations to the work described in this paper. The named authors are the individuals ...uals and organizations who manage data collections, and b) individuals and organizations who want to help to reduce the risks associated with data preservation and
    93 KB (12,315 words) - 20:39, 19 September 2021
  • ...ibuted nature of IoT systems, using such standards will enable the various organizations to be aligned to the same foundations, and in the end, to work in a seamles ...cuted across different networks belonging to different departments or even organizations. From our point of view, this is a critical aspect for IoT that must be cov
    90 KB (13,287 words) - 18:28, 25 November 2019
  • ...a lake]]—act as platforms to accumulate the big data generated and used by organizations. Although seemingly similar, both of them differ in terms of their characte ...omer preferences, they can gain competitive advantages over others. Hence, organizations invest tremendously in [[artificial intelligence]] (AI) and big data techno
    130 KB (18,351 words) - 16:15, 3 May 2023
  • ...he national and cross-border transfer of data between different healthcare organizations; technologies to support the secure interconnectivity and trust between inf * the healthcare organizations (HCOs) (healthcare providers) as represented by their board of directors, w
    68 KB (9,790 words) - 21:42, 8 June 2021
  • ...nsing fees and reduce expenditures on specific computer hardware. However, organizations need to welcome and train specialized collaborators in the adoption of open ...plications developed based on open-source tools, implemented in healthcare organizations, such as:
    78 KB (10,664 words) - 21:57, 4 January 2017
  • ...e to evolve, making combatting these attacks more difficult for healthcare organizations, requiring a change in strategies, tactics, and culture around cybersecurit ...Recent years have seen an increase in phishing occurrences from “trusted” organizations or services that are being abused. Phishing e-mails will often dangle a fin
    27 KB (3,684 words) - 19:48, 22 February 2022
  • ...ments for enhancing the [[information management]] processes of healthcare organizations, thus contributing to the improvement and evolution of health systems. On t '''Keywords''': big data, health system, healthcare organizations, health information systems, epidemiological surveillance, strategic planni
    54 KB (7,477 words) - 23:11, 20 March 2018
  • ...and [[Regulatory compliance|regulatory pressures]]. Therefore, healthcare organizations of all types looking to grow and achieve their financial, quality, service, ...the third millennium; it affects the information and technology assets of organizations. Sardi ''et al.'' define cybersecurity risk as “operational risks to info
    100 KB (13,544 words) - 18:31, 6 October 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)