Results 271 to 280 of about 796,593 (318)
Some of the next articles are maybe not open access.
, 2017
While the methods used to study ‘elites’ are of particular relevance in policy research, to date there has been little examination of the particular challenges associated with ‘elite’ interviewing in this field.
K. Lancaster
semanticscholar +1 more source
While the methods used to study ‘elites’ are of particular relevance in policy research, to date there has been little examination of the particular challenges associated with ‘elite’ interviewing in this field.
K. Lancaster
semanticscholar +1 more source
DataShield: Configurable Data Confidentiality and Integrity
ACM Asia Conference on Computer and Communications Security, 2017Applications written in C/C++ are prone to memory corruption, which allows attackers to extract secrets or gain control of the system. With the rise of strong control-flow hijacking defenses, non-control data attacks have become the dominant threat.
Scott A. Carr, Mathias Payer
semanticscholar +1 more source
Nurse Educator, 2018
This study examined nursing students’ perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients’ names and pictures of patients constituted a confidentiality breach.
Alexia Barnable+2 more
semanticscholar +1 more source
This study examined nursing students’ perceptions of confidentiality, accountability, and e-professionalism in relation to Facebook. All of the students were aware that posting patients’ names and pictures of patients constituted a confidentiality breach.
Alexia Barnable+2 more
semanticscholar +1 more source
Proceedings of the IEEE, 2015
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type communication (MTC) devices.
A. Mukherjee
semanticscholar +1 more source
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type communication (MTC) devices.
A. Mukherjee
semanticscholar +1 more source
Children’s confidentiality [PDF]
Consent makes lawful either the otherwise unwanted touch or the otherwise unwanted disclosure of private information. In medical practice, the unwanted touch is easily characterised by the various potentially harmful physical interventions we employ on a daily basis; administration of medicines, invasive investigations or surgery are elementary ...
openaire +2 more sources
On the Inattention to Digital Confidentiality in Operations and Supply Chain Research
, 2018Digital assets are growing in scale, scope, and importance, amplifying the necessity to maintain their confidentiality. Yet, digital confidentiality has received vastly less research attention from operations and supply chain management (OSCM) scholars ...
Brett Massimino+2 more
semanticscholar +1 more source
Safeguarding Confidentiality in Electronic Health Records
Cambridge Quarterly of Healthcare Ethics, 2017: Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality ...
A. Shenoy, J. Appel
semanticscholar +1 more source
Confidentiality in participatory research
Nursing Ethics, 2016Aim: This article presents key ethical challenges that were encountered when conducting a participatory qualitative research project with a very specific, small group of nurses, in this case with practice development nurses in Malta. Background: With the
E. Petrova+2 more
semanticscholar +1 more source
Confidentiality and the courts
Medical Journal of Australia, 1999There is a general belief that, once in the witness box, doctors are compelled to reveal confidential information about their patients if asked by counsel. Where no issue of public interest is involved, a medical witness should ask the court to rule in its inherent discretion that the information sought is confidential and privileged.
openaire +3 more sources
Medicine, 2000
Abstract There are two basic principles that underlie, or ought to underlie, the law of confidentiality. The first is that private individuals are entitled to protection against the disclosure without consent of confidential information about themselves and their activities unless there is a sufficient public interest reason why the ...
openaire +3 more sources
Abstract There are two basic principles that underlie, or ought to underlie, the law of confidentiality. The first is that private individuals are entitled to protection against the disclosure without consent of confidential information about themselves and their activities unless there is a sufficient public interest reason why the ...
openaire +3 more sources