Results 271 to 280 of about 796,593 (318)
Some of the next articles are maybe not open access.

Confidentiality, anonymity and power relations in elite interviewing: conducting qualitative policy research in a politicised domain

, 2017
While the methods used to study ‘elites’ are of particular relevance in policy research, to date there has been little examination of the particular challenges associated with ‘elite’ interviewing in this field.
K. Lancaster
semanticscholar   +1 more source

DataShield: Configurable Data Confidentiality and Integrity

ACM Asia Conference on Computer and Communications Security, 2017
Applications written in C/C++ are prone to memory corruption, which allows attackers to extract secrets or gain control of the system. With the rise of strong control-flow hijacking defenses, non-control data attacks have become the dominant threat.
Scott A. Carr, Mathias Payer
semanticscholar   +1 more source

Nursing Students’ Perceptions of Confidentiality, Accountability, and E-Professionalism in Relation to Facebook

Nurse Educator, 2018
This study examined nursing students’ perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients’ names and pictures of patients constituted a confidentiality breach.
Alexia Barnable   +2 more
semanticscholar   +1 more source

Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints

Proceedings of the IEEE, 2015
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type communication (MTC) devices.
A. Mukherjee
semanticscholar   +1 more source

Children’s confidentiality [PDF]

open access: possibleArchives of Disease in Childhood, 2021
Consent makes lawful either the otherwise unwanted touch or the otherwise unwanted disclosure of private information. In medical practice, the unwanted touch is easily characterised by the various potentially harmful physical interventions we employ on a daily basis; administration of medicines, invasive investigations or surgery are elementary ...
openaire   +2 more sources

On the Inattention to Digital Confidentiality in Operations and Supply Chain Research

, 2018
Digital assets are growing in scale, scope, and importance, amplifying the necessity to maintain their confidentiality. Yet, digital confidentiality has received vastly less research attention from operations and supply chain management (OSCM) scholars ...
Brett Massimino   +2 more
semanticscholar   +1 more source

Safeguarding Confidentiality in Electronic Health Records

Cambridge Quarterly of Healthcare Ethics, 2017
: Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality ...
A. Shenoy, J. Appel
semanticscholar   +1 more source

Confidentiality in participatory research

Nursing Ethics, 2016
Aim: This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. Background: With the
E. Petrova   +2 more
semanticscholar   +1 more source

Confidentiality and the courts

Medical Journal of Australia, 1999
There is a general belief that, once in the witness box, doctors are compelled to reveal confidential information about their patients if asked by counsel. Where no issue of public interest is involved, a medical witness should ask the court to rule in its inherent discretion that the information sought is confidential and privileged.
openaire   +3 more sources

Confidentiality

Medicine, 2000
Abstract There are two basic principles that underlie, or ought to underlie, the law of confidentiality. The first is that private individuals are entitled to protection against the disclosure without consent of confidential information about themselves and their activities unless there is a sufficient public interest reason why the ...
openaire   +3 more sources

Home - About - Disclaimer - Privacy