Results 81 to 90 of about 796,593 (318)
Abstract Prior to the challenges imposed by the Covid‐19 pandemic, anatomy practical sessions at Trinity College Dublin involved eight to 10 students per donor station, rotating between digital learning, anatomical models/osteology, and dissection activities for three hours weekly.
Dearbhla P. Cullinane, Denis S. Barry
wiley +1 more source
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to ...
Jeff Hughes, George Cybenko
doaj
A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007): 455-70 ...
Stephanie Walker
doaj +1 more source
Maintaining Confidentiality in Qualitative Publications
Protecting the privacy of study participants is a core tenet of research ethics. It is usual practice to change the names of study participants when publishing qualitative research, but for a number of years, Qualitative Health Research (QHR) has ...
J. Morse, J. Coulehan
semanticscholar +1 more source
Simple proof of confidentiality for private quantum channels in noisy environments
Complete security proofs for quantum communication protocols can be notoriously involved, which convolutes their verification, and obfuscates the key physical insights the security finally relies on.
Briegel, H. J.+4 more
core +1 more source
Abstract In this study, we define, categorize, and systematically describe best practices and barriers to implementing preference elicitation lab‐in‐the‐field experiments with farmers based on qualitative, in‐depth interviews with researchers from the Research Network on Economic Experiments for the Common Agricultural Policy (REECAP).
Marieke Cornelia Baaken+16 more
wiley +1 more source
The Future of the Journal of Privacy and Confidentiality
The Journal of Privacy and Confidentiality (JPC) is the only journal to actively solicit contributions from the multi-faceted community of researchers and practitioners for whom privacy is a primary intellectual or operational concern, for dissemination ...
Cynthia Dwork
doaj +1 more source
Physicians’ Attitudes toward Adolescent Confidentiality Services: Scale Development and Validation
Confidentiality is one of the oldest ethical principles in healthcare. However, confidentiality in adolescent healthcare is not a universally-accepted doctrine among scholars.
Jeremić Stojković Vida+2 more
doaj +1 more source
Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD).
C. Vorakulpipat+3 more
semanticscholar +1 more source
Towards security monitoring patterns [PDF]
Runtime monitoring is performed during system execution to detect whether the system’s behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be ...
Androutsopoulos, K.+2 more
core +2 more sources