نتایج جستجو برای: sso social security organization
تعداد نتایج: 983212 فیلتر نتایج به سال:
Social media provides both opportunities and risks for any organization. Secure integration of social media platforms in organizational ICT infrastructures tends to be focused mainly on technical aspects. Social media security management usually ignores the human dimension, but protection can only be achieved through a holistic approach. Social media security culture must be part of the overall...
BACKGROUND There is a growing body of evidence that where you live is important to your health. Despite numerous previous studies investigating the relationship between neighbourhood deprivation (and structure) and residents' health, the precise nature of this relationship remains unclear. Relatively few investigations have relied on direct observation of neighbourhoods, while those that have w...
Background and Aim: Human resources in any organization are its main capital. They are the only unique asset that are not liable to depreciation over time, but they even create more added value. The Social Security Organization (SCO) as a social insurer organization needs urgent assessment of its human resource management. In this regard, it appears that such an essential assessment can be done...
International financial institutions have played an increasing role in the formation of social policy in Latin American countries over the last two decades, particularly in health and pension programs. World Bank loans and their attached policy conditions have promoted several social security reforms within a neoliberal framework that privileges the role of the market in the provision of health...
OpenID Connect is the OAuth 2.0-based replacement for OpenID 2.0 (OpenID) and one of the most important Single Sign-On (SSO) protocols used for delegated authentication. It is used by companies like Amazon, Google, Microsoft, and PayPal. In this paper, we systematically analyze wellknown attacks on SSO protocols and adapt these on OpenID Connect. We additionally introduce two novel attacks on O...
among others internal, regional, international, political, economic, technical, social and cultural factors are reasons that theorists introduce for beginning of integration at a region. by looking at the functions of the shanghai cooperation organization and the association of southeast asian nations (asean), we understand that there are two basic pragmatic factors, the support of the great po...
To address information security threats, an organization defines security policies that state how to deal with sensitive information. These policies are high-level policies that apply for the whole organization and span the three security domains: physical, digital and social. One example of a high-level policy is: ”The sales data should never leave the organization.” The high-level policies ar...
Background and purpose: Today, with the advent of electronic medical record system (EMRS) the security and confidentiality of information ought to be reasonably considered. The purpose of this study was to assess the privacy and security requirements for implementation of EMRS in all hospitals in Isfahan in 2014. Materials and methods: An analysis framework was used in an applied study perform...
the research discussed in this article consists of the process ended to propos a structure for social welfare and security which took more than 11 months in social security research institute. the main topics discussed are as follows: 1- the importance of social security and its relationship to economic growth, social justice, human generosity and national honor. 2- the basis and opportunities ...
Empirical evidence from U.S. studies suggests that, on average, female physicians earn less than their male counterparts. This gap in earnings does not disappear when individual and market characteristics are controlled for. This paper investigates whether a gender earnings difference can also be observed in a health care system predominantly financed by public insurance companies. Using a uniq...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید