نتایج جستجو برای: information security management system

تعداد نتایج: 3724607  

Journal: :Information Security Technical Report 2008

2004
Ding Zhang Jingwen An Zhongqing Cheng

This management platform has been applied in e-business of the dealer. Based on coordinated center, and it is realized by intranet, extranet and Internet. The structure of the management platform has five parts: information center of management platform, customer relationship management system, purchasing management system, logistics management system and financial management system. With netwo...

2007
Nicolas Mayer Patrick Heymans Raimundas Matulevicius

Nowadays, security has become one of the most demanded characteristics of information systems. However, the ways to address information systems security still lack consensus and integration. On the one hand, researchers have extended various modelling languages and methods with security-oriented constructs in order to take security concerns into account throughout the development lifecycle. On ...

ژورنال: حیات 2015
دهقان‌نیری, ناهید, سیلانی, خاطره, محمدی فیروزه, منا,

  Background & Aim: With regard to the i ncreasing trends of information and complexities of health organizations , using of a dvanced tools and computers is necessary . Hospital staff is key members to develop health information systems, because they play not only a major role in the management of system, but also in the development, implementation and evaluation of the system. Since the evalu...

Journal: :journal of research in health sciences 0
alireza zohoor farkhondeh asadi

background: in addition of the socio-economics costs, trauma is the 4th cause of death at all age groups, in 2000, trauma was caused more than 6 million deaths in the world. despite promising trend in improving many aspects of health care and treatment in the last decade in our country, little attention has been paid to the subject of registering trauma on an international standard. effective p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده علوم انسانی 1392

چکیده : این پژوهش با هدف شناسایی تاثیر عوامل انسانی بر موفقیت سیستم های اطلاعات مدیریت در سازمان مرکزی بانک سپه انجام شد. روش پژوهش توصیفی و پیمایشی است که برای گردآوری اطلاعات از پرسشنامه محقق ساخته استفاده شده است .به منظور تعیین روایی ابزار گردآوری داده های میدانی ، پرسشنامه در اختیار چند تن از استادان قرار گرفت و ابهامات آن برطرف گردید . برای تعیین پایایی پرسشنامه از روش آلفای کرونباخ استف...

2004
Maria Papadaki

Addressing security vulnerabilities and system intrusions can represent asignificant administrative overhead in current computer systems. Althoughtechnologies exist for both vulnerability scanning and for intrusion detection,the problems typically require some form of human intervention before theycan be rectified. Evidence suggests that, in many cases, this can lead too...

2017
Jean-Louis Huynen Gabriele Lenzini

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodolog...

2002
Bhavani M. Thuraisingham

This presentation will first discuss characteristics of multimedia data and information management systems and discuss research directions for incorporating security into such systems. It will review various security mechanisms and access control policies and discuss the applicability of these mechanisms and policies for multimedia data. It will discuss specific security challenges for text, im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید