Academic literature on the topic 'Operating system security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Operating system security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Operating system security"

1

Jaeger, Trent. "Operating System Security." Synthesis Lectures on Information Security, Privacy, and Trust 1, no. 1 (2008): 1–218. http://dx.doi.org/10.2200/s00126ed1v01y200808spt001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Post, Gerald V. "Improving operating system security." Computers & Security 6, no. 5 (1987): 417–25. http://dx.doi.org/10.1016/0167-4048(87)90014-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Ming Xin. "Research on Operating System Security Technology." Applied Mechanics and Materials 703 (December 2014): 294–97. http://dx.doi.org/10.4028/www.scientific.net/amm.703.294.

Full text
Abstract:
This paper study three mainstream operating system,their kernel module on-demand loading mechanism, their safety and reliability measures, points out the weaknesses these operating systems have in the kernel module security control. Along with the study of two new operating system -- dynamic extensible operating system and virtual address space based on file operation system, make a prospects on the operating system architecture development
APA, Harvard, Vancouver, ISO, and other styles
4

Malikovich, Karimov Madjit. "Random Number Generation in Operating Systems." American Journal of Applied Science and Technology 5, no. 5 (2025): 74–81. https://doi.org/10.37547/ajast/volume05issue05-17.

Full text
Abstract:
Random number generation (RNG) plays a foundational role in security, cryptography, and system design. Operating systems today implement complex mechanisms for generating random numbers securely. This survey paper presents an overview of RNG techniques used in major operating systems, including Microsoft Windows, Linux, and macOS. We examine entropy sources, deterministic random bit generators (DRBGs), system APIs, and quality testing mechanisms. The survey highlights key differences between OS-level RNG designs and emphasizes best practices, challenges, and potential vulnerabilities. This wor
APA, Harvard, Vancouver, ISO, and other styles
5

Finzel, Tobie. "Trends in Operating System Security." Information Systems Security 1, no. 1 (1992): 50–57. http://dx.doi.org/10.1080/19393559208551317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Röpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (2015): 6–24. http://dx.doi.org/10.1002/nem.1918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Piyushi, Gulati, Kumari Rana Kamini, Raghuvanshi Surabhi, and Anupama Pankaj Dr. "Android Operating System and its Security Issues." Journal of Android and IOS Applications and Testing 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2605874.

Full text
Abstract:
<em>Android is a Mobile and Tablet Operating System </em><em>premised on </em><em>the Linux kernel owned by Google. The ultimate innovative feature of Android Operating System is open source due to this anyone can publish their applications freely on the Android market. This openness introduces the broad number of developers which utilize this platform, but it comes with the hazard that user may download malicious software which is written by network hackers and harm to its privacy. This requires the study of the Security Mechanisms for Android and to make it easy and user-friendly to make the
APA, Harvard, Vancouver, ISO, and other styles
8

DiLuoffo, Vincenzo, William R. Michalson, and Berk Sunar. "Robot Operating System 2." International Journal of Advanced Robotic Systems 15, no. 3 (2018): 172988141877001. http://dx.doi.org/10.1177/1729881418770011.

Full text
Abstract:
It is no secret that robotic systems are expanding into many human roles or are augmenting human roles. The Robot Operating System is an open-source standard for the robotic industry that enables locomotion, manipulation, navigation, and recognition tasks by integrating sensors, motors, and controllers into reusable modules over a distributed messaging architecture. As reliance on robotic systems increases, these systems become high value targets, for example, in autonomous vehicles where human life is at risk. As Robot Operating System has become a de facto standard for many robotic systems,
APA, Harvard, Vancouver, ISO, and other styles
9

Jo, Hyeonseong, Jaehyun Nam, and Seungwon Shin. "NOSArmor: Building a Secure Network Operating System." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9178425.

Full text
Abstract:
Software-Defined Networking (SDN), controlling underlying network devices (i.e., data plane) in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS), also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importa
APA, Harvard, Vancouver, ISO, and other styles
10

Sai Asritha, G. "Security for files in Operating System." International Journal of Security Technology for Smart Device 3, no. 2 (2016): 1–6. http://dx.doi.org/10.21742/ijstsd.2016.3.2.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Operating system security"

1

Watson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Stevenson, Martijn. "Asbestos : operating system security for mobile devices." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37101.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.<br>Includes bibliographical references (p. 75-78).<br>This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital assistants. These mobile, wireless-enabled devices are at risk for data attacks because they store private data but often roam in public networks. The Asbestos operating system is designed to prevent disclosure
APA, Harvard, Vancouver, ISO, and other styles
4

Nemouchi, Yakoub. "Model-based Testing of Operating System-Level Security Mechanisms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS061/document.

Full text
Abstract:
Le test à base de modèle, en particulier test basé sur des assistants à la preuve, réduit de façon transparente l'écart entre la théorie, le modèle formel, et l’implémentation d'un système informatique. Actuellement, les techniques de tests offrent une possibilité d'interagir directement avec de "vrais" systèmes : via différentes propriétés formelles, les tests peuvent être dérivés et exécutés sur le système sous test. Convenablement, l'ensemble du processus peut être entièrement automatisé. Le but de cette thèse est de créer un environnement de test de séquence à base de modèle pour les progr
APA, Harvard, Vancouver, ISO, and other styles
5

Öberg, Jonas. "Comparative study of operating system security using SELinux and Systrace." Thesis, University of Kalmar, School of Communication and Design, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-2015.

Full text
Abstract:
<p>This thesis makes a comparative study of the security systemsSystrace (used primarily with OpenBSD) and SELinux (usedexclusively with Linux), trying to answer the question as to whichtype of security is offered by each respective system, and wheneach should be used. The key difference between SELinux andSystrace seems to be their mode of operation, where SELinux,built around the LSM framework in the Linux kernel, works withtype enforcement on files, sockets and other objects, whereasSystrace works on a strict system call basis. The two systems areseen to serve two different purposes which s
APA, Harvard, Vancouver, ISO, and other styles
6

VanDeBogart, Steven Vincent. "Modernizing operating system interfaces to improve application security and performance." Diss., Restricted to subscribing institutions, 2009. http://proquest.umi.com/pqdweb?did=1973051411&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weisblat, Jakob H. "Improving security at the system-call boundary in a type-safe operating system." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121686.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 44-50).<br>Historically, most approaches to operating sytems security aim to either protect the kernel (e.g., the MMU) or protect user applications (e.g., W [symbol] X). However, little study has been done into protecting the
APA, Harvard, Vancouver, ISO, and other styles
8

Kauer, Bernhard. "Improving System Security Through TCB Reduction." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-162177.

Full text
Abstract:
The OS (operating system) is the primary target of todays attacks. A single exploitable defect can be sufficient to break the security of the system and give fully control over all the software on the machine. Because current operating systems are too large to be defect free, the best approach to improve the system security is to reduce their code to more manageable levels. This work shows how the security-critical part of the OS, the so called TCB (Trusted Computing Base), can be reduced from millions to less than hundred thousand lines of code to achieve these security goals. Shrinking the s
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Xiaolong. "A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7589.

Full text
Abstract:
Building Automation System (BAS) is a complex distributed control system that is widely deployed in commercial, residential, industrial buildings for monitoring and controlling mechanical/electrical equipment. Through increasing industrial and technological advances, the control components of BAS are becoming increasingly interconnected. Along with potential benefits, integration also introduces new attack vectors, which tremendous increases safety and security risks in the control system. Historically, BAS lacks security design and relies on physical isolation and "security through obscurity"
APA, Harvard, Vancouver, ISO, and other styles
10

Payne, Christian. "A cryptographically-based operating system security model that protects against privileged attackers." Thesis, Payne, Christian (2009) A cryptographically-based operating system security model that protects against privileged attackers. PhD thesis, Murdoch University, 2009. https://researchrepository.murdoch.edu.au/id/eprint/3931/.

Full text
Abstract:
It has long been recognized that widely used contemporary systems have relatively weak security and stronger operating system security models are required. In particular, the design of widely-used security models is such that the highest level of privileges available on the system are often highly exposed. If an attack is successful and the attacker attains a high level of privilege, all of the security mechanisms on the system may typically be bypassed. Despite such limitations, weak models remain ubiquitous as more secure alternatives are complex and therefore harder to configure and audi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Operating system security"

1

Jaeger, Trent. Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zahid, Muhammad. Operating system and web security. University of East London, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scott, Mann. Linux system security: An administrator's guide to open source security tools. 2nd ed. Prentice Hall PTR, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1956-, Gong Guang, ed. Communication system security. Taylor & Francis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hsiao, Aron. Sams Teach Yourself Linux Security Basics in 24 Hours. Pearson Education, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1956-, Enck John, ed. Windows NT magazine administrator's survival guide: System management and security. Duke Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bryant, R. Bringle. UNIX security for the organization. Sams Pub., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rutstein, Charles B. Windows NT security: A practical guide to securing Windows NT servers and workstations. McGraw-Hill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Institute, IT Governance, ed. OS/390-z/OS security, audit and control features. IT Governance Institute, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Operating system security"

1

Stallings, William. "Operating System Security." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Romá, Llorenç, and Bernard Tellenbach. "Secure Operating System." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_21.

Full text
Abstract:
AbstractThe operating system is the backbone of every modern computer system, managing the system’s resources and executing applications. Therefore, it is essential to improve operating system security to ensure data integrity, confidentiality, and availability. When discussing secure operating systems, we generally refer to security-focused operating systems and security-evaluated operating systems. In critical environments, such as governments and military systems, that typically have higher security restrictions, security-evaluated operating systems are a convenient option used in other cou
APA, Harvard, Vancouver, ISO, and other styles
3

Jaeger, Trent. "Security Kernels." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jaeger, Trent. "System Assurance." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jaeger, Trent. "Verifiable Security Goals." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cherry, Denny. "Computer Operating System Security." In Enterprise-Grade IT Security for Small and Medium Businesses. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8628-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jaeger, Trent. "Securing Commercial Operating Systems." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jaeger, Trent. "Secure Capability Systems." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jaeger, Trent. "Case Study: Building a Secure Operating System for Linux." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jaeger, Trent. "Access Control Fundamentals." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Operating system security"

1

Zhu, Wenzheng, and Changhoon Lee. "Design for Security Operating System." In 2009 Third Asia International Conference on Modelling & Simulation. IEEE, 2009. http://dx.doi.org/10.1109/ams.2009.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brookes, Scott, and Stephen Taylor. "Rethinking operating system design." In NSPW '16: New Security Paradigms Workshop 2016. ACM, 2016. http://dx.doi.org/10.1145/3011883.3011886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zovkic, Mario, and Tedo Vrbanec. "Computer classroom operating system security (Windows)." In 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2014. http://dx.doi.org/10.1109/mipro.2014.6859696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qing, Sihan. "Some issues regarding operating system security." In 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS). IEEE, 2014. http://dx.doi.org/10.1109/icis.2014.6912096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Yanhao, Xin He, Congyang Wang, and Junyang Yu. "SELinux-based operating system security research." In 2023 2nd International Conference on Applied Statistics, Computational Mathematics and Software Engineering (ASCMSE 2023), edited by Paulo Batista and Yudong Zhang. SPIE, 2023. http://dx.doi.org/10.1117/12.2691828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cajic, Miroslav, Bogdan Brkic, and Mladen Veinovic. "System of assessment security for Android operating system." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hussain, Khaled, Sampada Sapre, and Poonam Hajgude. "Identifying criminal activities at the operating system level." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2005. http://dx.doi.org/10.1117/12.603044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Song, Jihong, Guiying Hu, and QuanSheng Xu. "Operating System Security and Host Vulnerability Evaluation." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5302077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jadhav, Namitha D., and Vanishree K. "Survey on Security Parameters of Operating System." In 2020 IEEE International Conference for Innovation in Technology (INOCON). IEEE, 2020. http://dx.doi.org/10.1109/inocon50539.2020.9298300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pouraghily, Arman, Tilman Wolf, and Russell Tessier. "Hardware support for embedded operating system security." In 2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP). IEEE, 2017. http://dx.doi.org/10.1109/asap.2017.7995260.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Operating system security"

1

Hollingworth, Dennis, Timothy Redmond, and Robert Rice. Extensible Operating System Security. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Motamed, Ramin, David McCallen, and Swasti Saxena. An International Workshop on Large-Scale Shake Table Testing for the Assessment of Soil-Foundation-Structure System Response for Seismic Safety of DOE Nuclear Facilities, A Virtual Workshop – 17-18 May 2021. Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, 2024. http://dx.doi.org/10.55461/jjvo9762.

Full text
Abstract:
Aging infrastructure within the US Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) nuclear facilities poses a major challenge to their resiliency against natural phenomenon hazards. Examples of mission-critical facilities located in regions of high seismicity can be found at a number of NNSA sites including Lawrence Livermore National Laboratory, Los Alamos National Laboratory, and the Nevada National Security Site. Most of the nation’s currently operating nuclear facilities have already reached their operating lifetime, and most currently operating nuclear p
APA, Harvard, Vancouver, ISO, and other styles
3

Perdigão, Rui A. P. Neuro-Quantum Cyber-Physical Intelligence (NQCPI). Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/241024.

Full text
Abstract:
Neuro-Quantum Cyber-Physical Intelligence (NQCPI) is hereby introduced, entailing a novel framework for nonlinear natural-based neural post-quantum information physics, along with novel advances in far-from-equilibrium thermodynamics and evolutionary cognition in post-quantum neurobiochemistry for next-generation information physical systems intelligence. NQCPI harnesses and operates with the higher-order nonlinear nature of previously elusive quantum behaviour, including in open chaotic dissipative systems in thermodynamically and magneto-electrodynamically disruptive conditions, such as in n
APA, Harvard, Vancouver, ISO, and other styles
4

Ragozin, Konstantin. High-tech ecosystem in construction. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3187.

Full text
Abstract:
The issues of ensuring the stability and safety of energy generating equipment, including through various innovative aspects of cyber security, are currently extremely relevant; Energy equipment when used within the framework of construction projects is quite autonomous and issues of operational management and online control can be fully resolved within the capacity of their internal processors and controllers. In many cases, issues of computer modeling of the operating cycle parameters of such equipment, with the correct and economical formulation of the problem, can also be solved using the
APA, Harvard, Vancouver, ISO, and other styles
5

Nagle, Frank, James Dana, Jennifer Hoffman, Steven Randazzo, and Yanuo Zhou. Census II of Free and Open Source Software — Application Libraries. The Linux Foundation, 2022. https://doi.org/10.70828/kheh5209.

Full text
Abstract:
Produced in partnership with Harvard Laboratory for Innovation Science (LISH) and the Open Source Security Foundation (OpenSSF), Census II is the second investigation into the widespread use of Free and Open Source Software (FOSS). The Census II effort utilizes data from partner Software Composition Analysis (SCA) companies including Snyk, the Synopsys Cybersecurity Research Center (CyRC), and FOSSA. The aggregated data includes over half a million observations of FOSS libraries used in production applications at thousands of companies, aiming to shed light on the most commonly used FOSS packa
APA, Harvard, Vancouver, ISO, and other styles
6

Graham, Gordon. Why The World Needs an Open Source Digital Wallet Right Now. The Linux Foundation, 2023. https://doi.org/10.70828/zehc9956.

Full text
Abstract:
Our physical wallets are quickly becoming digitized to support the transfer of digital assets, from currency to concert tickets. Creating hundreds of different digital wallets causes a vendor lock-in which leads to a lack of interoperability and functionality amongst services. Meanwhile, the fragmentation of their design and development means that the security of these wallets is not always as strong as it could be. The Open Wallet Foundation (OWF) was formed to support the development of wallets that are portable, secure, and that anyone can use on any device, with any operating system, for a
APA, Harvard, Vancouver, ISO, and other styles
7

Stoneburner, Gary. COTS security protection profile-operating systems (CSPP-OS) :. National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.6985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Humpage, Sarah D. Benefits and Costs of Electronic Medical Records: The Experience of Mexico's Social Security Institute. Inter-American Development Bank, 2010. http://dx.doi.org/10.18235/0008829.

Full text
Abstract:
Electronic medical record (EMR) systems are increasingly used in developing countries to improve quality of care while increasing efficiency. There is little systematic evidence, however, regarding EMRs' benefits and costs. This case study documents the implementation and use of an EMR system at the Mexican Social Security Institute (IMSS). Three EMR systems are now in operation for primary care, outpatient and inpatient hospital care. The evidence suggests that the primary care system has improved efficiency of care delivery and human resources management, and may have decreased incidence of
APA, Harvard, Vancouver, ISO, and other styles
9

Perdigão, Rui A. P. Triadic Flight Technologies. Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/240307.

Full text
Abstract:
A novel triadic suite of flight technologies is introduced by developing, articulating and integrating ground-effect, free amphibian flight and orbital flight capabilities into a triadic system-of-systems able to seamlessly operate across all three mobility paradigms. The triad is then implemented onto our new purpose-designed hydro-aerospace vehicle, propelled by latest-generation micro-reactors for industry-leading aerospace thrust, whilst providing long-range carbon-free flight mobility and autonomy. The vehicle structure and materials are further optimized for a seamless switch between sta
APA, Harvard, Vancouver, ISO, and other styles
10

Tinta, Jule Kaïni, Mouhamed Zerbo, Fabrizio Santoro, Awa Diouf, and Kèrabouro Pale. Electronic Services and Tax Compliance: Evidence from Medium and Small Businesses in Burkina Faso. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ictd.2024.099.

Full text
Abstract:
African governments are increasingly digitalising their tax systems, with the hope of raising more revenue through digitalisation. This paper investigates the adoption and impact of electronic services on tax outcomes, focusing on small and medium enterprises (SMEs) in Burkina Faso. We focus on three indicators of e-service adoption by taxpayers – namely registering for the eSINTAX platform, using it for e-filing (called eSINTAX filing), and paying taxes digitally (called tax epayment). We rely on survey data from 1,090 SMEs and tax administrative data of about 17,000 SMEs on eSINTAX, tax retu
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!