نتایج جستجو برای: managerial compliance policies
تعداد نتایج: 198216 فیلتر نتایج به سال:
Emergency surgeon: “ last of the mohicans” 2014-2016 editorial policy WSESWJES: position papers, guidelines, courses, books and original research; from WJES impact factor to WSES congress impact factor Fausto Catena, Frederick Moore, Luca Ansaloni, Ari Leppäniemi, Massimo Sartelli, Andrew B Peitzmann, Walt Biffl, Federico Coccolini, Salomone Di Saverio, Belinda De Simone, Michele Pisano and Ern...
Gender mainstreaming, as a consequence of the gender concept, means that there is no such a thing as gender-neutral policies. Gender politics cannot be restricted to special domains such as family politics, and the challenge to overcome gender barriers cannot be managed by isolated measures such as establishing women‘s representatives in organizations [Metz-Göckel/Kamphans 2005]. According to t...
We present a novel technological approach, based on Textual Rulelog, to automated decision support for financial regulatory/policy compliance, via a case study on banking Regulation W from the US Federal Reserve. Legal regulations and related bank operational policies in English documents are encoded relatively inexpensively by authors into Rulelog, a highly expressive logical knowledge represe...
This paper explores how self-set security goal orientations and self-regulation theory can provide potential venues to motivate end-user sustained IS security compliance. Organisations have found that it is essential to motivate end-users to comply with information security measures and policies on a regular basis. The research aims to obtain an understanding of the relationship between individ...
In this paper we develop an economic order quantity model to investigate the optimal replenishment policies for instantaneous deteriorating items under inflation and trade credit. Demand rate is a linear function of selling price and decreases negative exponentially with time over a finite planning horizon. Shortages are allowed and partially backlogged. Under these conditions, we model the ret...
An audit begins with a notification letter requesting evidence of a covered entity’s HIPAA privacy and security compliance efforts. Thirty to 90 days following receipt of the requested information, KPMG will conduct an on-site visit. The on-site visit will include interviews with the entity’s leadership, examination of the physical space and operations, review of consistency of the entity’s pra...
Introduction: Job satisfaction of midwives, as key members of healthcare system, has special importance in the quality of midwifery care to the vulnerable groups of the society i.e. mothers and children. Materials and Methods: This is a survey and cross sectional study. Sampling size was 251 midwives, which were chosen through cluster sampling. Data were gathered by questionnaire in one stage a...
Product Lifecycle Management (PLM) systems are widely used in the manufacturing industry. A core feature of such systems is providing support for versioning of product data. As workflow functionality is increasingly used in PLM systems the possibility emerges that versioning policies as encapsulated in process models are inconsistent with respect to their actual lifecycles. In this paper we def...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید