نتایج جستجو برای: managerial compliance policies
تعداد نتایج: 198216 فیلتر نتایج به سال:
Surgical operations provide opportunities for the transmission of infection between patients and healthcare workers (HCWs) and between patients. This risk may increase in under-developed and developing countries by low compliance with infection control (IC) policies and precautions. This study investigated HCWs attitude and compliance with infection control practices in the operating department...
Note. This original form of this rebuttal was submitted to Science on 3 March 2017 (limited to 300 words as per Science editorial policy) but rejected on 13 March 2017. Herein, we elaborate on our original Science submission in order to more fully address the issue without the length limitations. This rebuttal is followed by the list of the signatories who supported our original submission.
Data retrieval systems process data from many sources, each subject to its own data use policy. Ensuring compliance with these policies despite bugs, misconfiguration, or operator error in a large, complex, and fast evolving system is a major challenge. Thoth provides an efficient, kernel-level compliance layer for data use policies. Declarative policies are attached to the systems’ input and o...
We present an approach to monitoring system policies. As a specification language, we use an expressive fragment of a temporal logic, which can be effectively monitored. We report on case studies in security and compliance monitoring and use these to show the adequacy of our specification language for naturally expressing complex, realistic policies and the practical feasibility of monitoring t...
We describe and implement a policy language. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are accountable for their actions, and m...
We describe a policy language and implement its associated proof checking system. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are...
Most recent information security incidents have been caused by employees’ poor managements rather than technology defects. Accordingly, organizations try to improve their information security by demanding that employees conform to information security policies. Previous studies examined the effect of organization’s enforcement-based systems, using penalties and rewards, on employees’ comply wit...
We propose a method for planning motion for robots with actuation uncertainty that incorporates contact with the environment and the compliance of the robot to reliably perform manipulation tasks. Our approach consists of two stages: (1) Generating partial policies using a sampling-based motion planner that uses particle-based models of uncertainty and simulation of contact and compliance; and ...
As a solution to the problem of information leaks, I propose a policy-agnostic programming paradigm that enforces security and privacy policies by construction. I present the implementation of this paradigm in a new language, Jeeves, that automatically enforces information flow policies describing how sensitive values may flow through computations. In Jeeves, the programmer specifies expressive...
banks play important roles in promoting national development. in order to provide efficient services and to perform their statutory roles effectively, banks are required to comply with established standards. in nigeria, the statement of accounting standards (sas), companies and allied matters act (cama) and the central bank of nigeria’s directives and regulations provide guidelines to banks in ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید