Статті в журналах з теми "Emergency nursing Saudi Arabia Case studies"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-20 статей у журналах для дослідження на тему "Emergency nursing Saudi Arabia Case studies".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Almegewly, Wafa Hamad, Sanna Hawamdah, Fatchima Laouali Moussa, Wireen Leila Tanggawohn Dator, Anwar Alonezi, and Majid Al-Eissa. "Measuring Nurses’ and Physicians’ Attitudes and Perceptions of the Appropriate Interventions towards Intimate Partner Violence in Saudi Arabia." Healthcare 10, no. 8 (July 30, 2022): 1430. http://dx.doi.org/10.3390/healthcare10081430.
Повний текст джерелаArbour, Richard, Hanan Mesfer Saad AlGhamdi, and Linda Peters. "Islam, Brain Death, and Transplantation." AACN Advanced Critical Care 23, no. 4 (October 1, 2012): 381–94. http://dx.doi.org/10.4037/nci.0b013e3182683b1e.
Повний текст джерелаSultan, Mohammed Ali Salem, Amir Khorram-Manesh, Eric Carlström, Jarle Løwe Sørensen, Hadi Jaber Al Sulayyim, and Fabian Taube. "Nurses’ Readiness for Emergencies and Public Health Challenges—The Case of Saudi Arabia." Sustainability 12, no. 19 (September 23, 2020): 7874. http://dx.doi.org/10.3390/su12197874.
Повний текст джерелаTarek M. Esmael, Sami Fawzy, Hany Hosny, Omar Al Rashed, Anas Alnasser, Tariq Al Anazi, and Arulanantham Zechariah Jebakumar. "Work related injuries sustained by emergency medical technicians and paramedics in Saudi Arabia." International Journal of Pharmacometrics and Integrated Biosciences 6, no. 1 (March 27, 2021): 14–20. http://dx.doi.org/10.26452/ijpib.v6i1.1408.
Повний текст джерелаAl-Haj Ali, Sanaa N. Al-Haj, Ra’fat I. Farah, and Serene Alhariqi. "Knowledge and Attitudes of Saudi Medical Students about Emergency Management of Traumatic Dental Injuries." International Journal of Environmental Research and Public Health 19, no. 21 (October 31, 2022): 14249. http://dx.doi.org/10.3390/ijerph192114249.
Повний текст джерелаAboalshamat, Khalid, Dalia Aljrary, Reem Damanhuri, Aohoud Alnafisah, Shaima Alghuraybi, Shahad Aljifry, Hiba Turkustani, and Khalil Mohamed. "Preferred Obstetrician-gynaecologist Gender among Female Residents in Jeddah, Saudi Arabia." Journal of Umm Al-Qura University for Medical Sciences 6, no. 1 (June 1, 2020): 21–25. http://dx.doi.org/10.54940/ms31138609.
Повний текст джерелаAlshammari, Bushra, Albandry AlEnazy, Farhan Alshammari, Norah Madkhali, and Mahmoud Al-Masaeed. "Investigation of the Level and Factors Influencing Emergency Department Nurses Fatigue: A Case Study of the Saudi Arabian Context." Healthcare 10, no. 7 (July 13, 2022): 1294. http://dx.doi.org/10.3390/healthcare10071294.
Повний текст джерелаAlruwaili, Majed M., Fuad H. Abuadas, Phillip Maude, and Alistair Ross. "Experiences, Perceptions, and Coping Patterns of Emergency Department Nurses with Occupational Stressors in Saudi Arabian Hospitals: Mixed-Method Study." Healthcare 10, no. 8 (August 10, 2022): 1504. http://dx.doi.org/10.3390/healthcare10081504.
Повний текст джерелаAlmohaya, Abdulellah, Abdulwahab Aldrees, Layan Akkielah, Alshaima Talal Hashim, Fahad Almajid, Turki Binmoammar, and Mazin A. Barry. "Latent tuberculosis infection among health-care workers using Quantiferon-TB Gold-Plus in a country with a low burden for tuberculosis: prevalence and risk factors." Annals of Saudi Medicine 40, no. 3 (May 2020): 191–99. http://dx.doi.org/10.5144/0256-4947.2020.191.
Повний текст джерелаAbed, Akram H., Sergey E. Shcheklein, and Valery M. Pakhaluev. "Heat transfer intensification in emergency cooling heat exchanger and dry cooling towers on nuclear power plant using air-water mist flow." Nuclear Energy and Technology 5, no. 4 (December 10, 2019): 281–87. http://dx.doi.org/10.3897/nucet.5.47972.
Повний текст джерелаIqbal, Shahid, Syed Ziauddin A. Zaidi, Ibraheem H. Motabi, Nawal Faiez Alshehry, Mubarak S. AlGhamdi, Samer Mudaibigh, Atta Munawar Gill, et al. "Analysis of Clinical Features, Laboratory Characteristics and Therapeutic Outcome in Patients with Thrombotic Thrombocytopenic Purpura Treated at King Fahad Medical City, Riyadh, Saudi Arabia." Blood 128, no. 22 (December 2, 2016): 4915. http://dx.doi.org/10.1182/blood.v128.22.4915.4915.
Повний текст джерелаSpencer-Goodsir, Heulwen, Judith Anderson, and Clare Sutton. "The nature of paramedic practice in rural and remote locations: A scoping review." Australasian Journal of Paramedicine 19 (July 4, 2022). http://dx.doi.org/10.33151/ajp.19.978.
Повний текст джерелаSaleh, Abdullah Khlofh, Majed Mohammed Al Saleh, Osama Abdulaziz Albaqar, Hanan Ali Mohmmed Khoziee, Abdullah Hassan Algarni, Adnan Saleh Alghamdi, and Nasser Khalil Albaqqar. "Acute Hemolytic Anemia Following Semaglutide Injection: A Case Report." World Family Medicine Journal /Middle East Journal of Family Medicine 20, no. 12 (2022). http://dx.doi.org/10.5742/mewfm.2022.95251483.
Повний текст джерелаBashawri, Abdulrahman. "Developing Emergency Response Shelter in Place Guidelines for Pilgrim upon Natural Hazard Occurrence in the sacred sites in Makah." Studies of Applied Economics 39, no. 4 (May 4, 2021). http://dx.doi.org/10.25115/eea.v39i4.4583.
Повний текст джерелаKishan, Kishan. "How effective were the COVID-19 relief measures? A comparative analysis of the seven largest economies of the world." International journal of health sciences, June 18, 2022, 2791–809. http://dx.doi.org/10.53730/ijhs.v6ns5.9247.
Повний текст джерелаAlgahtani, Hussein, Bader Shirah, Randa Khafaji, and Sarah Algahtani. "Novel Heterozygous Variants in the HLA-DRB1 Gene in a Saudi Family with Early-Onset Familial Multiple Sclerosis: Therapeutic Failure and Success." International Journal of MS Care, October 5, 2021. http://dx.doi.org/10.7224/1537-2073.2020-125.
Повний текст джерелаAlgahtani, Hussein, Bader Shirah, Randa Khafaji, and Sarah Algahtani. "Novel Heterozygous Variants in the HLA-DRB1 Gene in a Saudi Family with Early-Onset Familial Multiple Sclerosis: Therapeutic Failure and Success." International Journal of MS Care, October 5, 2021. http://dx.doi.org/10.7224/1537-2073.2020-125.
Повний текст джерелаFairaq, Arwa. "Population Awareness and Attitude towards First Aid in Burn in Makkah Al-Mukarramah, Saudi Arabia – A Cross Sectional Study." Journal of Pharmaceutical Research International, April 17, 2021, 22–29. http://dx.doi.org/10.9734/jpri/2021/v33i24b31438.
Повний текст джерелаAlanazi, Ashwaq, Bayan Ahmad Hasan Almusailhi, Gheed K. Bamousa, Nabaa H. Alhawashim, Nourah M. Alotaibi, Sumiyah AlShamekh, Basavaraja Channabasappa Hunasemarada, Reem Y. Al Jindan, and Ayman A. El-Badry. "A decade of travel-associated malaria at King Fahad Hospital of the University in the Eastern Province of Saudi Arabia." Scientific Reports 12, no. 1 (January 19, 2022). http://dx.doi.org/10.1038/s41598-022-04996-4.
Повний текст джерелаAl Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.
Повний текст джерела