Results 71 to 80 of about 796,593 (318)

Physicians' attitudes towards eprescribing: a comparative web survey in Austria and Sweden

open access: yesJournal of Innovation in Health Informatics, 2009
Background The eHealth Action Plan required the member states of the European Union (EU) to provide online services such as eprescribing of pharmaceuticals by the end of 2008.
Thomas Steinschaden   +2 more
doaj   +1 more source

Hybrid EMT Phenotype and Cell Membrane Tension Promote Colorectal Cancer Resistance to Ferroptosis

open access: yesAdvanced Science, EarlyView.
Colorectal cancer cells (CRCs) cultured in 3D soft fibrin exhibit hybrid epithelial–mesenchymal transition (EMT) mediated ferroptosis resistance via WNT/β‐catenin signaling. Unlike 2D cells, 3D CRCs exhibit reduced E‐cadherin, knockout of which further enhances the defense against ferroptosis via adhesion‐mediated tension.
Xiaowei Wei   +12 more
wiley   +1 more source

HIV/AIDS, TO DISCLOSE OR NOT TO DISCLOSE: THAT IS THE QUESTION

open access: yesPotchefstroom Electronic Law Journal, 2013
The systemic consequences of the HIV/AIDS pandemic in South Africa are evident not only in demographic, economic and social trends, but also on a micro- and personal level, where they are devastating.
Andra le Roux-Kemp
doaj   +1 more source

A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases

open access: yesIET Communications, 2023
Data encryption‐based and secret sharing‐based data outsourcing schemes protect the confidentiality of sensitive attributes but not their secrecy. Ciphertexts/shares generated by a data encryption/secret sharing scheme can attract the attention of ...
Peyman Rahmani   +2 more
doaj   +1 more source

Substance Use Disorder Treatment Confidentiality Boot Camp [PDF]

open access: yes, 2017
[Excerpt]: INTRODUCTION: The Health Law and Policy Programs at UNH School of Law, Institute for Health Policy and Practice, and the NH Citizens Health Initiative have contracted with several of the New Hampshire Building Capacity for Transformation ...
Cameron, Stephanie   +4 more
core   +1 more source

Confidential Review--or Not? [PDF]

open access: yesScience, 2008
At Science, We editors love our reviewers and know that our editorial colleagues elsewhere do too. After all, the process of scientific publication depends on the volunteer services of thousands of experts all over the world who willingly provide, without compensation, confidential and candid evaluations of the work of others.
openaire   +3 more sources

Rotation‐Based Snap‐Fit Mechanical Metamaterials

open access: yesAdvanced Science, EarlyView.
This article introduces a rotational snap‐fit structure composed of a circular cantilever beam snap‐fit and a circular groove. It demonstrates multistability during the rotation process. This innovative design has potential applications in various fields, such as mechanical metamaterials, shape deformation, and robotic grippers, showcasing its ...
Rui Xu   +6 more
wiley   +1 more source

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2019
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity ...
Olayemi Olaniyi   +3 more
doaj  

Confidentiality breaches in clinical practice: what happens in hospitals?

open access: yesBMC Medical Ethics, 2016
BackgroundRespect for confidentiality is important to safeguard the well-being of patients and ensure the confidence of society in the doctor-patient relationship.
C. M. Beltran-Aroca   +4 more
semanticscholar   +1 more source

Wireless Technologies for Wearable Electronics: A Review

open access: yesAdvanced Electronic Materials, EarlyView.
This review discusses recent advancements in wireless wearable electronics, focusing on communication technologies and power solutions. It covers key design considerations, explores wireless protocols from short‐ to long‐range networks, and examines powering methods such as integrated sources and energy harvesting.
Choong Yeon Kim   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy