Results 241 to 250 of about 652,105 (293)
A location privacy protection method based on blockchain and threshold cryptography. [PDF]
Hu Z, Jin R, Quan H, Ni S, He P.
europepmc +1 more source
Evaluating Peer Online Forums to Support Health: Ethical and Practical Challenges.
Lobban F +15 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Anonymity and Alcoholics Anonymous
JAMA: The Journal of the American Medical Association, 1983To the Editor.— The recent letter by David—, MD, of New York in the Nov 12, 1982, issue ofThe Journal(1982;248:2237) stating that "in accordance with AA [Alcoholics Anonymous] tradition, I can only sign my first name" is not correct. There is certainly the tradition that in meetings persons only give their first names, but there is absolutely no ...
openaire +2 more sources
Bioethics, 2014
AbstractIn ‘New Threats to Academic Freedom’ Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on‐line publication of ‘ After‐birth abortion: why should the
openaire +2 more sources
AbstractIn ‘New Threats to Academic Freedom’ Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on‐line publication of ‘ After‐birth abortion: why should the
openaire +2 more sources
2007
To protect respondents’ identity when releasing microdata, data holders often remove or encrypt explicit identifiers, such as names and social security numbers. De-identifying data, however, provide no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex, and ZIP code, that can be linked to publicly ...
V. Ciriani +3 more
openaire +2 more sources
To protect respondents’ identity when releasing microdata, data holders often remove or encrypt explicit identifiers, such as names and social security numbers. De-identifying data, however, provide no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex, and ZIP code, that can be linked to publicly ...
V. Ciriani +3 more
openaire +2 more sources
Interpretations of Online Anonymity in Alcoholics Anonymous and Narcotics Anonymous
Proceedings of the ACM on Human-Computer Interaction, 2017How do individuals in twelve-step fellowships like Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) interpret and enact "anonymity?" In this paper, we answer this question through a mixed-methods investigation. Through secondary analysis of interview data from 26 participants and an online questionnaire (N=285) we found three major ...
Sabirat Rubya, Svetlana Yarosh
openaire +1 more source

