نتایج جستجو برای: managerial compliance policies

تعداد نتایج: 198216  

2012
David McGaw Ingrid Tennant Hyacinth E Harding Shamir O Cawich Ivor W Crandon CA Walters

Surgical operations provide opportunities for the transmission of infection between patients and healthcare workers (HCWs) and between patients. This risk may increase in under-developed and developing countries by low compliance with infection control (IC) policies and precautions. This study investigated HCWs attitude and compliance with infection control practices in the operating department...

Journal: :Zootaxa 2017
D Christopher Rogers Shane T Ahyong Christopher B Boyko Cédric D'Udekem D'Acoz

Note. This original form of this rebuttal was submitted to Science on 3 March 2017 (limited to 300 words as per Science editorial policy) but rejected on 13 March 2017. Herein, we elaborate on our original Science submission in order to more fully address the issue without the length limitations. This rebuttal is followed by the list of the signatories who supported our original submission.

2016
Eslam Elnikety Aastha Mehta Anjo Vahldiek-Oberwagner Deepak Garg Peter Druschel

Data retrieval systems process data from many sources, each subject to its own data use policy. Ensuring compliance with these policies despite bugs, misconfiguration, or operator error in a large, complex, and fast evolving system is a major challenge. Thoth provides an efficient, kernel-level compliance layer for data use policies. Declarative policies are attached to the systems’ input and o...

2010
David A. Basin Felix Klaedtke Samuel Müller

We present an approach to monitoring system policies. As a specification language, we use an expressive fragment of a temporal logic, which can be effectively monitored. We report on case studies in security and compliance monitoring and use these to show the adequacy of our specification language for naturally expressing complex, realistic policies and the practical feasibility of monitoring t...

2005
J. G. Cederquist R. Corin M. A. C. Dekker S. Etalle J. I. den Hartog

We describe and implement a policy language. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are accountable for their actions, and m...

2005
J. G. Cederquist R. Corin M. A. C. Dekker S. Etalle J. I. den Hartog

We describe a policy language and implement its associated proof checking system. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are...

2017
Minjung Park

Most recent information security incidents have been caused by employees’ poor managements rather than technology defects. Accordingly, organizations try to improve their information security by demanding that employees conform to information security policies. Previous studies examined the effect of organization’s enforcement-based systems, using penalties and rewards, on employees’ comply wit...

Journal: :CoRR 2016
Calder Phillips-Grafflin Dmitry Berenson

We propose a method for planning motion for robots with actuation uncertainty that incorporates contact with the environment and the compliance of the robot to reliably perform manipulation tasks. Our approach consists of two stages: (1) Generating partial policies using a sampling-based motion planner that uses particle-based models of uncertainty and simulation of contact and compliance; and ...

2015
Jean Yang

As a solution to the problem of information leaks, I propose a policy-agnostic programming paradigm that enforces security and privacy policies by construction. I present the implementation of this paradigm in a new language, Jeeves, that automatically enforces information flow policies describing how sensitive values may flow through computations. In Jeeves, the programmer specifies expressive...

Journal: :international journal of finance, accounting and economics studies 0

banks play important roles in promoting national development. in order to provide efficient services and to perform their statutory roles effectively, banks are required to comply with established standards. in nigeria, the statement of accounting standards (sas), companies and allied matters act (cama) and the central bank of nigeria’s directives and regulations provide guidelines to banks in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید