Results 261 to 270 of about 796,593 (318)
Some of the next articles are maybe not open access.
IEEE Transactions on Industrial Informatics, 2019
Position-based services (PBSs) that deliver networked amenities based on roaming user's positions have become progressively popular with the propagation of smart mobile devices. Position is one of the important circumstances in PBSs.
A. K. Sangaiah+4 more
semanticscholar +1 more source
Position-based services (PBSs) that deliver networked amenities based on roaming user's positions have become progressively popular with the propagation of smart mobile devices. Position is one of the important circumstances in PBSs.
A. K. Sangaiah+4 more
semanticscholar +1 more source
SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams
IEEE Transactions on Big Data, 2019Resource constrained sensing devices are being used widely to build and deploy self-organizing wireless sensor networks for a variety of critical applications such as smart cities, smart health, precision agriculture and industrial control systems.
Deepak Puthal+4 more
semanticscholar +1 more source
Medical Journal of Australia, 2001
Issues of confidentiality are complicated by the relationships we have to patients and others who have valid interests in the confidential information. There are no straightforward answers to problems which involve complex relationships and sensitive information. The best we can do is to think thoroughly and carefully about the issues in each case, and
L, Gillam, J M, Little
openaire +2 more sources
Issues of confidentiality are complicated by the relationships we have to patients and others who have valid interests in the confidential information. There are no straightforward answers to problems which involve complex relationships and sensitive information. The best we can do is to think thoroughly and carefully about the issues in each case, and
L, Gillam, J M, Little
openaire +2 more sources
Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things
IEEE Internet of Things Journal, 2018Internet of Multimedia Things (IoMT) faces the challenge of how to realize low-cost data acquisition while still preserve data confidentiality. In this paper, we present a low-cost and confidentiality-preserving data acquisition framework for IoMT. First,
Yushu Zhang+6 more
semanticscholar +1 more source
Current Opinion in Hematology, 1999
AbstractCollaboration is easily hampered by real or perceived differences in confidentiality that prevent two critical providers from communicating openly. However, increased communication can be a two‐edged sword. Sensitive and confidential information can reach individuals who may not be directly involved in patient care.
openaire +4 more sources
AbstractCollaboration is easily hampered by real or perceived differences in confidentiality that prevent two critical providers from communicating openly. However, increased communication can be a two‐edged sword. Sensitive and confidential information can reach individuals who may not be directly involved in patient care.
openaire +4 more sources
Confidentiality and Consent in the Care of the Adolescent Patient
Pediatrics in review, 20191. Sofya Maslyanskaya, MD* 2. Elizabeth M. Alderman, MD* 1. *Division of Adolescent Medicine, Children's Hospital at Montefiore, and Department of Pediatrics, Albert Einstein College of Medicine, Bronx, NY * Abbreviations: CDC: : Centers for ...
Sofya Maslyanskaya, E. Alderman
semanticscholar +1 more source
How Confidential Is Confidential?
Orthopaedic Nursing, 2008Violations of patient confidentiality occur all too frequently. Conversations about patients and their care can be heard throughout hospitals. Although these conversations are necessary to manage the care of patients, the breach of confidentiality is of concern because of where the discussions occur and what is being communicated in public places ...
openaire +3 more sources
InnovAiT: Education and inspiration for general practice, 2018
A commitment to safeguarding confidentiality is essential in ensuring patients’ trust. With increasingly complex models of healthcare, changing uses of personal patient data, and sharing of patient information between services, confidentiality can be ...
Selena Knight, Andrew Papanikitas
semanticscholar +1 more source
A commitment to safeguarding confidentiality is essential in ensuring patients’ trust. With increasingly complex models of healthcare, changing uses of personal patient data, and sharing of patient information between services, confidentiality can be ...
Selena Knight, Andrew Papanikitas
semanticscholar +1 more source
Confidentiality in Qualitative Research Involving Vulnerable Participants: Researchers' Perspectives
, 2018In this article, I analyze the ways researchers manage the issue of confidentiality in studies with vulnerable research participants in the Polish context, which is characterized by a relatively low degree of ethics and data protection legislation in the
Adrianna Surmiak
semanticscholar +1 more source
The Confidentiality of “Confidential” Lost Letters
The Journal of Social Psychology, 1977Summary In a variant of the lost-letter technique, 400 unsealed envelopes containing important or unimportant messages were distributed in Ottawa, Ontario. Half of the envelopes had the word “CONFIDENTIAL” stamped on them while half had no such warning. Important messages were more likely to be returned; confidentiality had no effect on return rate per
Lloyd H. Strickland, John C. Barefoot
openaire +2 more sources