Results 71 to 80 of about 974,570 (322)
The Future of the Journal of Privacy and Confidentiality
The Journal of Privacy and Confidentiality (JPC) is the only journal to actively solicit contributions from the multi-faceted community of researchers and practitioners for whom privacy is a primary intellectual or operational concern, for dissemination ...
Cynthia Dwork
doaj +1 more source
Physicians’ Attitudes toward Adolescent Confidentiality Services: Scale Development and Validation
Confidentiality is one of the oldest ethical principles in healthcare. However, confidentiality in adolescent healthcare is not a universally-accepted doctrine among scholars.
Jeremić Stojković Vida+2 more
doaj +1 more source
Confidentiality in Patent Dispute Resolution: Antitrust implications [PDF]
nformation is crucial to the functioning of the patent system, as it is for other markets. Nevertheless, patent licensing terms are often subject to confidentiality agreements.
Patterson, Mark R.
core +1 more source
CONFIDENTIALITY AND INTRUSION: BUILDING STORM DEFENCES RATHER THAN TRYING TO HOLD BACK THE TIDE [PDF]
THE image of King Canute trying to hold back the tide is a popular one used to critique attempts by national courts to restrain the publication of private information in the face of a global and online media.
core +2 more sources
Confidential Review--or Not? [PDF]
At Science, We editors love our reviewers and know that our editorial colleagues elsewhere do too. After all, the process of scientific publication depends on the volunteer services of thousands of experts all over the world who willingly provide, without compensation, confidential and candid evaluations of the work of others.
openaire +3 more sources
Acidosis Forces Fatty Acid Uptake and Metabolism in Cancer Cells Regardless of Genotype
This study demonstrates that biological acidosis, commonly observed in tumors and ischemic conditions, actively promotes the protonation of fatty acids, thereby facilitating the uptake of their neutral forms. Consequently, the preference for lipid metabolism in acid‐exposed cells does not arise from genetic reprogramming that prioritizes lipids as the ...
Sébastien Ibanez+20 more
wiley +1 more source
Central Questions of Anonymization: A Case Study of Secondary Use of Qualitative Data
Anonymization—the removal of identifying information from data—is one way of preparing data for secondary use. This process has not received much attention from scholars, but close examination shows that it is full of methodological, ethical and ...
Denise Thomson+4 more
doaj
Incidental findings (IFs) are well known in medical research and clinical practice as unexpected findings having potential health or reproductive importance for an individual.
Luciana Caenazzo+2 more
doaj +1 more source
Relapsed and refractory multiple myeloma remains a major clinical challenge. This study shows that FOXM1 contributes to resistance against BH3 mimetics in multiple myeloma cells. The FOXM1 inhibitor NB73 enhances the effectiveness of BH3 mimetics by reducing FOXM1 expression and suppressing the MYC pathway.
Zhi Wen+16 more
wiley +1 more source
The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub—more correctly referred to ...
Morné Pretorius, Hombakazi Ngejane
doaj +1 more source