Results 71 to 80 of about 1,461,713 (335)
Privacy CURE: Consent Comprehension Made Easy [PDF]
Although the General Data Protection Regulation (GDPR) defines several potential legal bases for personal data processing, in many cases data controllers, even when they are located outside the European Union (EU), will need to obtain consent from EU ...
Drozd, Olha, Kirrane, Sabrina
core
Even though the Metaverse from science fiction is not a reality yet, it is possible to take a glimpse into how it might look like. However, the current vision of the Metaverse does not only encompass software.
Natalia Menéndez González, Efe Bozkir
semanticscholar +1 more source
Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley +1 more source
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
Digital Biomarkers in Psychiatric Research: Data Protection Qualifications in a Complex Ecosystem
Psychiatric research traditionally relies on subjective observation, which is time-consuming and labor-intensive. The widespread use of digital devices, such as smartphones and wearables, enables the collection and use of vast amounts of user-generated ...
Andrea Parziale, Deborah Mascalzoni
doaj +1 more source
Mobile Privacy and Business-to-Platform Dependencies: An Analysis of SEC Disclosures [PDF]
This Article systematically examines the dependence of mobile apps on mobile platforms for the collection and use of personal information through an analysis of Securities and Exchange Commission (SEC) filings of mobile app companies.
Fathaigh, Ronan Ó +2 more
core +1 more source
EyeSpot: leveraging gaze to protect private text content on mobile devices from shoulder surfing [PDF]
As mobile devices allow access to an increasing amount of private data, using them in public can potentially leak sensitive information through shoulder surfing.
Eiband, Malin +3 more
core +1 more source
Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva +10 more
wiley +1 more source
Personal information management systems: a user-centric privacy utopia?
Personal information management systems (PIMS) aka personal data stores (PDSs) represent an emerging class of technology that seeks to empower individuals regarding their data.
Heleen Janssen +2 more
doaj +1 more source
Der Schutz personenbezogener Daten hat in der Türkei keine so lange Tradition im Vergleich zur Europäischen Union mit ihren allgemeinen1 und sektorspezifischen2 oder der USA mit ihren hauptsächlich sektorspezifischen und in letzter Zeit allgemeinen ...
Mesut Serdar Çekin
doaj +1 more source

