نتایج جستجو برای: managerial compliance policies
تعداد نتایج: 198216 فیلتر نتایج به سال:
INTRODUCTION Most developing countries are adopting antibiotic policies to contain the acute problem of drug resistance; however, several obstacles prevent their fulfillment. This study was undertaken to prospectively determine the compliance with the antibiotic policy in the intensive care unit (ICU) of a tertiary care hospital and possible reasons for non-compliance. METHODOLOGY Compliance ...
MISQ 2010 Puhakainen and Siponen Email (implementation of IS security policy) Training The training program must provide necessary information to the educators, so the educators know the theory of how the training program helps people learn. In the case of IS security training, the underlying theories should not only explain how people learn, but also what learning principles are expected to ch...
The literature agrees that the major threat to IS security is constituted by careless employees. Therefore, effective IS security requires that users are not only aware of, but also comply with organizations’ IS security policies and procedures. To address this important concern, different IS security awareness, education and enforcement approaches have been proposed. Prior research on IS secur...
Abstract Introduction: Nurses' compliance with standard precautions is a viable tool for decreasing health hazards in health centers. Objective: This study aimed to identify factors affecting compliance with standard precautions (SPs) of infection control based on the health belief model (HBM) among emergency department nurses employed in the educational-therapeutic centers affiliated with G...
This paper examines why firms selectively adopt ‘beyond-compliance’ environmental policies. It argues that existing explanations based on factors external to firms are under-specified and a focus on internal dynamics is also required. It draws insights from institutional theory, corporate social performance perspective, and stakeholder theory and relates them to internal processes. Beyond-compl...
As more and applications relying on the use processing of personal data grow, privacy protection is becoming increasingly important. With enforcement GDPR, such must guarantee compliance with obligations set forth. Integrating a checking mechanism AI methods helpful to fulfill this requirement. Toward end, we investigate GDPR automatic using planning system including an agent actions that proce...
Received: 21 February 2008 Revised: 15 August 2008 2nd Revision: 31 January 2009 Accepted: 23 February 2009 Abstract Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is...
Web services are distributed software components, that are decoupled from each other using interfaces with specified functional behaviors. However, such behavioral specifications are insufficient to demonstrate compliance with certain temporal non-functional policies. An example is demonstrating that a patient’s health-related query sent to a health care service is answered only by a doctor (an...
C. M. Johnson T. W. A. Grandison Governments worldwide are enacting data protection laws that restrict the disclosure and processing of personal information. These laws impose administrative and financial burdens on companies that manage personal information and may hinder the legitimate and valuable sharing and analysis of this information. In this paper we describe an integrated set of techno...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید