نتایج جستجو برای: incident
تعداد نتایج: 47330 فیلتر نتایج به سال:
Most small to medium health care organizations do not have the capability to address cyber incidents within the organization. Those that do are poorly trained and ill equipped. These health care organizations are subject to various laws that address privacy concerns, proper handling of financial information, and Personally Identifiable Information. Currently an IT staff handles responses to the...
A series of national roadside breath test surveys designed to determine the number of drinking drivers on the roads in the US have been conducted over the last 25 years. The first o f these surveys was conducted in 1973 and a second in 1986. This paper reports on the third national survey conducted in the fall o f 1996 and its relation to trends in crashes involving drivers with high blood alco...
Research on constructing alternate forms of assessment center exercises is very scarce. This study examines the effectiveness of a cloning procedure (incident isomorphic approach) for developing alternate forms of a computerized in-basket. In this approach, original and alternate items are essentially similar (they are based on the same critical incident), while being superficially different (t...
Evaluation of the adverse impacts of traffic incidents on a highway network is a critical issue for an incident management program. In this paper, we present a delay estimation method to estimate delays caused by traffic incidents using a recently developed queueing based approach. We validate this method by comparing its results with a simulation model.
The need for the South African (SA) National Research and Education Network (NREN) to establish a Computer Security Incident Response Team (CSIRT) was identified. CSIRTs offer a subset of all possible security services based on the environment and needs of the customers. Selecting this subset has its challenges as the view of the customer may differ from the provider and knowing which services ...
This study investigates how security practitioners perform diagnostic work during the identification of security incidents. Based on empirical data from 16 interviews with security practitioners, we identify the tasks, skills, strategies and tools that security practitioners use to diagnose security incidents. Our analysis shows that diagnosis is a highly collaborative activity, which may invol...
Virtual enterprise (VE) relies on resource sharing and collaboration across geographically dispersed and dynamically allied businesses in order to better respond to market opportunities. It is generally considered that effective data integration and management is crucial to realise the value of VE. This paper describes a cloud-based data integration framework that can be used for supporting VE ...
background: psychologically traumatic workplace events (known as critical incidents), which occur globally, are increasing in prevalence within the usa. assisting employers in their response is a growing practice area for occupational medicine, occupational social work, industrial psychology and other occupational health professions. traumatic workplace events vary greatly in their level of org...
Objectives: In this study, the relation of late-life body mass index (BMI) and waist circumference with incident dementia risk was investigatedin a group of iranian elderly peopel. Methods & Materials: In cross-sectional present study 107 elderly residents of the Kahrizak Charity Foundation aged 80 and older were participated. Dementia was assessed using Mini-Mental State Examination questio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید