Results 101 to 110 of about 26,049,904 (376)

Security and Privacy of Customer Data as an Element Creating the Image of the Company [PDF]

open access: gold, 2022
Justyna Żywiołek   +3 more
openalex   +1 more source

Going Rogue: Mobile Research Applications and the Right to Privacy [PDF]

open access: yes, 2019
This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced.
Tovino, Stacey A.
core   +2 more sources

Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues

open access: yesIEEE Access, 2018
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a bottleneck due to the bandwidth limitation and resources constraint.
Jiale Zhang   +4 more
semanticscholar   +1 more source

Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz   +3 more
wiley   +1 more source

​Did a Non‐Medical Biosimilar Switching Policy Cause an Increase in Non‐Biologic/Biosimilar Health Care Resource Utilization or Cost in Patients With Inflammatory Arthritis?

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to evaluate the impact of a series of policies that mandated switching patients with inflammatory arthritis (IA) from an originator biologic to a biosimilar in British Columbia, Canada, on health care resource use and cost.
HaoHung Dang   +4 more
wiley   +1 more source

ERP systems and data security

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
Enterprise Resource Planning (ERP) integrates all business processes in the organization. Therefore, data security is the main point of security in ERP systems. Most of the biggest ERP developers have already implemented specialized hardware and software
Radoslav Hrischev
semanticscholar   +1 more source

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

An improved face attributes editing method based on DDIM

open access: yesScientific Reports
The main advantage of DDIM is that it guarantees the quality of the generated images while increasing the efficiency of the generation by modifying the sampling strategy in the diffusion process.
Libo He   +6 more
doaj   +1 more source

Analysis of AES, SKINNY, and Others with Constraint Programming

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems.
Siwei Sun   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy