Sort by
Refine Your Search
-
teaching are especially encouraged to apply. Applications should include a cover letter, curriculum vitae, research statement, law school or other graduate degree program transcripts, copies of any published
-
with all relevant cybersecurity laws, regulations, and policies. Provides specific technical information security expertise for development of centralized cybersecurity program. Supports development
-
needs and providing proper patient instructions. Notifies patients of upcoming appointments in a timely manner. Demonstrates accuracy and thoroughness in entering information into computer systems (Cerner
-
; etc.) Improvement opportunities; information through chain of command; unusual events; Other duties as assigned. Minimum Education: Graduation from Registered Nurse Program BSN desired (if not upon hire
-
. Req Proficient computer skills in Microsoft Office as well as Internet access and utilization. Preferred Qualifications: Pref Master’s degree Nursing Master’s Degree in Nursing or in progress, strongly
-
environment. Must be comfortable with computers. Must be willing to travel throughout the Keck Medicine of USC Community (on campus, satellite practices) to cover practice integrations, vacations, illnesses
-
. Responsible for understanding and participating in the organization-wide Performance Improvement Program through orientation, education, departmental and interdepartmental quality control, performance
-
from inpatient, ER, OPS, and bed patients. Accurate data is entered in the computer and on the Conditions of Admission Responsible for speaking with the patient in regard to their financial
-
• Minimum of 1 years of relevant experience in biostatistics, statistics, computational biology, computer science or related disciplines • Strong statistical analysis skills; fluency in R is required
-
emerge from the course understanding the difficulty of regulating computer crime(s) on the internet and how these crimes affect society as a whole. Topics throughout the semester include how lawmakers and