نتایج جستجو برای: information security management system
تعداد نتایج: 3724607 فیلتر نتایج به سال:
This management platform has been applied in e-business of the dealer. Based on coordinated center, and it is realized by intranet, extranet and Internet. The structure of the management platform has five parts: information center of management platform, customer relationship management system, purchasing management system, logistics management system and financial management system. With netwo...
Nowadays, security has become one of the most demanded characteristics of information systems. However, the ways to address information systems security still lack consensus and integration. On the one hand, researchers have extended various modelling languages and methods with security-oriented constructs in order to take security concerns into account throughout the development lifecycle. On ...
Background & Aim: With regard to the i ncreasing trends of information and complexities of health organizations , using of a dvanced tools and computers is necessary . Hospital staff is key members to develop health information systems, because they play not only a major role in the management of system, but also in the development, implementation and evaluation of the system. Since the evalu...
background: in addition of the socio-economics costs, trauma is the 4th cause of death at all age groups, in 2000, trauma was caused more than 6 million deaths in the world. despite promising trend in improving many aspects of health care and treatment in the last decade in our country, little attention has been paid to the subject of registering trauma on an international standard. effective p...
چکیده : این پژوهش با هدف شناسایی تاثیر عوامل انسانی بر موفقیت سیستم های اطلاعات مدیریت در سازمان مرکزی بانک سپه انجام شد. روش پژوهش توصیفی و پیمایشی است که برای گردآوری اطلاعات از پرسشنامه محقق ساخته استفاده شده است .به منظور تعیین روایی ابزار گردآوری داده های میدانی ، پرسشنامه در اختیار چند تن از استادان قرار گرفت و ابهامات آن برطرف گردید . برای تعیین پایایی پرسشنامه از روش آلفای کرونباخ استف...
Addressing security vulnerabilities and system intrusions can represent asignificant administrative overhead in current computer systems. Althoughtechnologies exist for both vulnerability scanning and for intrusion detection,the problems typically require some form of human intervention before theycan be rectified. Evidence suggests that, in many cases, this can lead too...
Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodolog...
This presentation will first discuss characteristics of multimedia data and information management systems and discuss research directions for incorporating security into such systems. It will review various security mechanisms and access control policies and discuss the applicability of these mechanisms and policies for multimedia data. It will discuss specific security challenges for text, im...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید