Results 11 to 20 of about 1,065,019 (294)

Confidentiality and Cost

open access: yesVoices in Bioethics, 2014
In late September, the American Academy of Pediatrics published an article updating their 2007 recommendations regarding adolescent contraception. The article calls on pediatricians to educate adolescents who choose to engage in sexual activity on a wide
Kaitlynd Hiller
doaj   +1 more source

Confidentiality: Medico-legal Aspects

open access: yesSouth African Family Practice, 1988
No abstract available.
Dennis Davis
doaj   +1 more source

A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases

open access: yesIET Communications, 2023
Data encryption‐based and secret sharing‐based data outsourcing schemes protect the confidentiality of sensitive attributes but not their secrecy. Ciphertexts/shares generated by a data encryption/secret sharing scheme can attract the attention of ...
Peyman Rahmani   +2 more
doaj   +1 more source

THE DILEMMAS OF DIGITAL METHODOLOGIES: LEARNING FROM WORK ON "YOUNG DIGITAL"

open access: yesInternational Journal of Child, Youth & Family Studies, 2014
This article explores common dilemmas facing researchers and practitioners who wish to use digital media in research with children and young people. The article explores both cultural-social-economic and material approaches to digital media.
Susan Elsley   +2 more
doaj   +1 more source

Patients with severe mental illness and the ethical challenges related to confidentiality during family involvement: A scoping review

open access: yesFrontiers in Public Health, 2023
BackgroundDespite evidence on the significant potential value of family involvement during the treatment of patients with severe mental illness, research has shown that family involvement is largely underused.
Marit Helene Hem   +6 more
doaj   +1 more source

Exploring the Perceptions of Applying Blockchain Technology in the Higher Education Institutes in the UAE

open access: yesProceedings, 2019
Based on the increasing demand for having a reliable method to verify student records in the education sector in the UAE, this research will attempt to get the perception of the managerial unit of higher education organizations in the UAE about the ...
Abdullah El Nokiti   +1 more
doaj   +1 more source

Removing the Trusted Third Party in a Confidential Multiparty Registered eDelivery Protocol Using Blockchain

open access: yesIEEE Access, 2020
Recently several proposals of blockchain-based solutions for traditional e-commerce applications have been presented, taking advantage of the fact that blockchain is a technology that offers an immutable registry of data.
Macia Mut-Puigserver   +2 more
doaj   +1 more source

Launching the Society for Privacy and Confidentiality Research to Own the Journal of Privacy and Confidentiality

open access: yesThe Journal of Privacy and Confidentiality
We describe the launching of the Society for Privacy and Confidentiality Research (SPCR). SPCR is the new owner of the Journal of Privacy and Confidentiality, with the goal of ensuring a sustainable future for the Journal, and continuing to publish the ...
John M. Abowd   +6 more
doaj   +1 more source

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Data Confidentiality in Mobile Ad hoc Networks [PDF]

open access: yes, 2012
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy