Results 251 to 260 of about 796,593 (318)
Behavioral health training for integrated behavioral health: A Delphi study
Abstract Using a classical Delphi design, the authors used an interdisciplinary panel of behavioral health experts in integrated behavioral health (IBH) to identify foundational skills and knowledge counselor educators need to teach clinical mental health counselors for IBH practice. Eighty‐eight statements were identified.
Nicholas Schmoyer+3 more
wiley +1 more source
Psychological capital and individual performance via social capital
Abstract This study analyzes survey data from front‐line employees across three shopping malls in Myanmar to investigate the mediating role of social capital in the relationship between psychological capital (PsyCap) and individual performance. Social capital was measured using the in‐degree centrality of two types of social networks: expressive (i.e.,
Jaeyun Jeong
wiley +1 more source
ABSTRACT The paper aims to examine the impact of innovation job requirements on expected positive performance outcomes through job crafting behaviours. It also examines how the level of technophilia moderates this relationship. The study uses survey data from 424 professional accountants in Canada.
Dima Mohanna+2 more
wiley +1 more source
Experimental methods in chemical engineering–Validation of steady‐state simulation
Abstract Steady‐state simulation (Aspen, PRO/II, WinGEMS, CADSIM Plus) guides equipment selection, operating conditions, and optimization to design chemical processes like Kraft pulping, specialty chemicals, and petrochemical complexes. Ensuring that the simulation characterizes the yields, heat transfer loads, purity, utilities demand, and ...
Caroline Brucel+3 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Privacy, confidentiality, security and patient safety concerns about electronic health records.
International Nursing Review, 2020AIMS This study explored concerns among nurses working in the United Arab Emirates associated with the use of electronic health records, including privacy, confidentiality, security and patient safety.
W. Bani Issa+6 more
semanticscholar +1 more source
Confidentiality Support over Financial Grade Consortium Blockchain
SIGMOD Conference, 2020Confidentiality is an indispensable requirement in financial applications of blockchain technology, and supporting it along with high performance and friendly programmability is technically challenging.
Ying Yan+10 more
semanticscholar +1 more source
Physical Layer Security: Authentication, Integrity and Confidentiality
Physical Layer Security, 2020The goal of physical layer security (PLS) is to make use of the properties of the physical layer—including the wireless communication medium and/or the transceiver hardware—to enable critical aspects of secure communications.
Mahdi Shakiba-Herfeh, A. Chorti, H. Poor
semanticscholar +1 more source
IEEE Communications Surveys and Tutorials, 2019
Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems.
Jehad M. Hamamreh+2 more
semanticscholar +1 more source
Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems.
Jehad M. Hamamreh+2 more
semanticscholar +1 more source
Epidemic gossip has proven a reliable and efficient technique for sharing information in a distributed network. Much of the reliability and efficiency derives from processes collaborating, sharing the work of distributing information. As a result of this collaboration, processes may receive information that was not originally intended for them.
Georgiou, Chryssis+5 more
openaire +3 more sources
CryptDB: protecting confidentiality with encrypted query processing
Symposium on Operating Systems Principles, 2011Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data.
Raluca A. Popa+3 more
semanticscholar +1 more source