نتایج جستجو برای: sso social security organization

تعداد نتایج: 983212  

Journal: :iau international journal of social sciences 2013
abolghasem heidarabadi zahra najafi

the aim of this study is to investigate the role of security in social deviations among women of babol city. descriptive survey research method was used and the unit of analysis is 15-29 year old women that 284 women are selected on the basis of cochran formula and using multi-stage random cluster sampling. the results show that there is a weak significant relationship between the independent v...

ژورنال: مدیریت سلامت 2008
حقانی, حمید, هادیان, محمد, یوسف زاده, حسن,

Introduction: Social Security Organization is known as the biggest insurance organization, with coverage 28 millions of countryُ s population and 34 thousands personnel with wide spread realms of insurance, remedy, investment, … is important and key subject in economical and social structure of country therefore increasing productivity this organization include society of public benefits. Method...

Background and Aim: Knowledge management is the cycle of discovery, production, storage, distribution, and practical application of knowledge in the organization. Occurs. Work experiences, social groups, and outcomes that determine the path to progress may be limited (in the form of a profession or organization) or broad (the path to progress in society in a wide range of different professions ...

Journal: :مدیریت اطلاعات سلامت 0
بهروز پورآقا استادیار، مدیریت خدمات بهداشتی- درمانی، دانشکده ی بهداشت، دانشگاه علوم پزشکی البرز، کرج، ایران ابوالقاسم پوررضا استاد، خدمات بهداشتی- درمانی، دانشکده ی بهداشت، دانشگاه علوم پزشکی تهران، تهران، ایران علی حسن زاده چشم پزشک، رئیس هیأت مدیره ی سازمان بیمه ی سلامت ایران، سازمان بیمه ی سلامت ایران، تهران، ایران محمد مهدی صدرالهی پزشک عمومی، معاون مدیر کل درمان غیر مستقیم، سازمان تأمین اجتماعی، تهران، ایران خلیل اهوازی پزشک عمومی، مدیر کل درمان غیر مستقیم، سازمان تأمین اجتماعی، تهران، ایران

introduction: medicine is an inseparable link of health chain; a flaw in health process for high expenditures of the medicine or inappropriate access shall certainly bring higher costs in the mentioned procedure. the present study aimed to evaluate the impact of the households’ income, geographical access, patients’ direct payment, physician's visit and insured' inpatient rate on the amount of ...

Background: As a job design technique, job enrichment emphasizes intra-job motivation in job duties and responsibilities to achieve appropriate behavioral outcomes. The present study aims to design and explain a job enrichment model considering the behavioral dimension of employees in Social Security Organization. Methods: The research method was conducted based on qualitative content analysis...

ژورنال: مدیریت سلامت 2007
بیگریان, اکبر , زارع, حسین, سجادی, حمیرا, محققی کمال, سید حسین ,

 Introduction: Quality of life is considered as a component of individual's subjective well- being. This means more emphasis on social policy and on reforms in social goals aimed to make productive life for the elders. One way for improving quality of life is using a variety of social and welfare supports. The purpose of the present study was to investigate and compare pensioner quality of life...

2012
Andreas Leicher Andreas U. Schmidt Yogendra Shah

OpenID is a lightweight, easy to implement and deploy approach to Single Sign-On (SSO) and Identity Management (IdM), and has great potential for large scale user adoption especially for mobile applications. At the same time, Mobile Network Operators are increasingly interested in leveraging their existing infrastructure and assets for SSO and IdM. In this paper, we present the concept of Smart...

2012
Kun Wu Chuyan Li

The existing unified authentication schemes are based on Public Key Infrastructure (PKI)/Privilege Management Infrastructure (PMI), WS-Security, Kerberos etc. But they can't support the developing Trusted Network Connect (TNC) environment. To solve the problem, a unified authentication scheme supporting multi-authentication modes based on Identity-Based Encryption (IBE) in trusted network named...

2013
Guangdong Bai Jike Lei Guozhu Meng Sai Sathyanarayan Venkatraman Prateek Saxena Jun Sun Yang Liu Jin Song Dong

Ideally, security protocol implementations should be formally verified before they are deployed. However, this is not true in practice. Numerous high-profile vulnerabilities have been found in web authentication protocol implementations, especially in single-sign on (SSO) protocols implementations recently. Much of the prior work on authentication protocol verification has focused on theoretica...

Planned Human Resource Development is critical to educating a skilled and efficient workforce. The present study aimed at identifying the main factors of planned human resource development in Iranian Social Security Organization Hospitals. The study is done through analysis of a questionnaire designed after identification of the main variables. Iran Social Security Organisation hospitals (the m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید