Results 81 to 90 of about 796,593 (318)

Dyad pedagogy in practical anatomy: A description of the implementation and student perceptions of an adaptive approach to cadaveric teaching

open access: yesAnatomical Sciences Education, Volume 16, Issue 1, Page 99-115, January/February 2023., 2023
Abstract Prior to the challenges imposed by the Covid‐19 pandemic, anatomy practical sessions at Trinity College Dublin involved eight to 10 students per donor station, rotating between digital learning, anatomical models/osteology, and dissection activities for three hours weekly.
Dearbhla P. Cullinane, Denis S. Barry
wiley   +1 more source

Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]

open access: yesTechnology Innovation Management Review, 2013
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to ...
Jeff Hughes, George Cybenko
doaj  

Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality

open access: yesEvidence Based Library and Information Practice, 2008
A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007): 455-70 ...
Stephanie Walker
doaj   +1 more source

Maintaining Confidentiality in Qualitative Publications

open access: yesQualitative Health Research, 2015
Protecting the privacy of study participants is a core tenet of research ethics. It is usual practice to change the names of study participants when publishing qualitative research, but for a number of years, Qualitative Health Research (QHR) has ...
J. Morse, J. Coulehan
semanticscholar   +1 more source

Simple proof of confidentiality for private quantum channels in noisy environments

open access: yes, 2019
Complete security proofs for quantum communication protocols can be notoriously involved, which convolutes their verification, and obfuscates the key physical insights the security finally relies on.
Briegel, H. J.   +4 more
core   +1 more source

Multi‐country perspectives on best practices and barriers to preference elicitation lab‐in‐the‐field experiments with farmers

open access: yesApplied Economic Perspectives and Policy, EarlyView.
Abstract In this study, we define, categorize, and systematically describe best practices and barriers to implementing preference elicitation lab‐in‐the‐field experiments with farmers based on qualitative, in‐depth interviews with researchers from the Research Network on Economic Experiments for the Common Agricultural Policy (REECAP).
Marieke Cornelia Baaken   +16 more
wiley   +1 more source

The Future of the Journal of Privacy and Confidentiality

open access: yesThe Journal of Privacy and Confidentiality, 2018
The Journal of Privacy and Confidentiality (JPC) is the only journal to actively solicit contributions from the multi-faceted community of researchers and practitioners for whom privacy is a primary intellectual or operational concern, for dissemination ...
Cynthia Dwork
doaj   +1 more source

Physicians’ Attitudes toward Adolescent Confidentiality Services: Scale Development and Validation

open access: yesSlovenian Journal of Public Health, 2020
Confidentiality is one of the oldest ethical principles in healthcare. However, confidentiality in adolescent healthcare is not a universally-accepted doctrine among scholars.
Jeremić Stojković Vida   +2 more
doaj   +1 more source

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

open access: yesSecur. Commun. Networks, 2017
Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD).
C. Vorakulpipat   +3 more
semanticscholar   +1 more source

Towards security monitoring patterns [PDF]

open access: yes, 2007
Runtime monitoring is performed during system execution to detect whether the system’s behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be ...
Androutsopoulos, K.   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy