Video calls from lay bystanders to dispatch centers - risk assessment of information security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Video calls from lay bystanders to dispatch centers - risk assessment of information security

BACKGROUND Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. METHODS Information security was assessed for risk, based on the inform...

متن کامل

Annual Report of Recorded Phone Calls to Iran's Drug and Poison Information Centers (2014-2015)

Background: The annual statistics of Drug and Poison Information Centers (DPICs) have critical role in public health planning. The objective of this study was to provide annual epidemiologic profile of drug inquiry and poisoning-related phone calls to Iran’s DPICs during 2014-2015. Methods: This was a descriptive retrospective study by reviewing reported phone calls of Iranian DPICs to central...

متن کامل

Descriptive Analysis of Recorded Phone Calls to Iran Drug and Poison Information Centers during 2011-2012

  Background: Poisoning is one of the main causes of visits to emergency departments and hospitals in Iran. Drug and Poison Information Centers (DPIC) are reliable sources to guide poisoned patients and provide information about pharmaceutical agents. This study was designed to analyze recorded phone calls to Iran DPICs during 2011-2012. Methods: This was a retrospective study on phone calls to...

متن کامل

Taxonomy of information security risk assessment (ISRA)

Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of protection for a company’s information assets and for the company as a whole. One of the best ways to address information security problems in the corpor...

متن کامل

Information Security Risk Assessment, Aggregation, and Mitigation

As part of their compliance process with the Basel 2 operational risk management requirements, banks must define how they deal with information security risk management. In this paper we describe work in progress on a new quantitative model to assess and aggregate information security risks that is currently under development for deployment. We show how to find a risk mitigation strategy that i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: BMC Health Services Research

سال: 2011

ISSN: 1472-6963

DOI: 10.1186/1472-6963-11-244