Results 51 to 60 of about 796,593 (318)

Fred Zacharias’s Skeptical Moralism [PDF]

open access: yes, 2011
Fred Zacharias\u27s articles, Rethinking Confidentiality, published in two parts, were a sensational start to an illustrious career. Fred conducted the first and one of the best empirical studies of confidentiality in years, surveying lawyers and clients
Luban, David
core   +1 more source

Methods for working with problem residents in medical physics residency education

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Medical physics residency training programs may occasionally encounter residents requiring additional intervention beyond normal training efforts. In the literature, these residents are referred to as “problem” residents. While the physician literature on the subject is valuable, this paper specifically focuses on dealing with a problem ...
Christopher J. Watchman, Dandan Zheng
wiley   +1 more source

Measuring Confidentiality Risks in Census Data [PDF]

open access: yes, 1997
Two trends have been on a collision course over the recent past. The first is the increasing demand by researchers for greater detail and flexibility in outputs from the decennial Census of Population. The second is the need felt by the Census Offices to
Openshaw, S.   +2 more
core   +1 more source

Distributed Function Computation with Confidentiality

open access: yes, 2013
A set of terminals observe correlated data and seek to compute functions of the data using interactive public communication. At the same time, it is required that the value of a private function of the data remains concealed from an eavesdropper ...
Tyagi, Himanshu
core   +1 more source

IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System

open access: yesSensors, 2023
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality.
Urooj Akram   +8 more
doaj   +1 more source

Composing security protocols: from confidentiality to privacy [PDF]

open access: yes, 2014
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular ...
Arapinis, Myrto   +2 more
core   +3 more sources

Patient Perceptions of Medication Therapy for Prevention of Posttraumatic Osteoarthritis Following Anterior Cruciate Ligament Injury: A Qualitative Content Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell   +10 more
wiley   +1 more source

Confidentiality Issues and Use of Sexually Transmitted Disease Services Among Sexually Experienced Persons Aged 15–25 Years — United States, 2013–2015

open access: yesMMWR. Morbidity and mortality weekly report, 2017
National-level data are limited regarding confidentiality-related issues and the use of sexually transmitted disease (STD) services for adolescents and young adults. Changes in the U.S.
J. Leichliter, C. Copen, P. Dittus
semanticscholar   +1 more source

Article IV: Confidentiality Provisions [PDF]

open access: yes, 2000
Ye
Pearson, Graham S., Sims, N.A.
core  

Concepts for a Semantically Accessible Materials Data Space: Overview over Specific Implementations in Materials Science

open access: yesAdvanced Engineering Materials, EarlyView.
This manuscript presents advances in digital transformation within materials science and engineering, emphasizing the role of the MaterialDigital Initiative. By testing and applying concepts such as ontologies, knowledge graphs, and integrated workflows, it promotes semantic interoperability and data‐driven innovation. The article reviews collaborative
Bernd Bayerlein   +44 more
wiley   +1 more source

Home - About - Disclaimer - Privacy