Results 41 to 50 of about 72,925 (303)

A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers

open access: yesFrontiers in Big Data, 2021
The entire scientific and academic community has been mobilized to gain a better understanding of the COVID-19 disease and its impact on humanity. Most research related to COVID-19 needs to analyze large amounts of data in very little time.
Lavanya Elluri   +4 more
doaj   +1 more source

Raising the visibility of protected data: A pilot data catalog project [PDF]

open access: yes, 2020
Sharing research data that is protected for legal, regulatory, or contractual reasons can be challenging and current mechanisms for doing so may act as barriers to researchers and discourage data sharing.
Coates, Heather L., Foster, Erin D.
core  

William H. Sorrell, Attorney General of Vermont, et al. v. IMS Health Inc., et al. - Amicus Brief in Support of Petitioners [PDF]

open access: yes, 2011
On April 26, 2011, the US Supreme Court will hear oral arguments in the Vermont data mining case, Sorrell v. IMS Health Inc. Respondents claim this is the most important commercial speech case in a decade. Petitioner (the State of Vermont) argues this is
Orentlicher, David   +3 more
core   +2 more sources

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations

open access: yesJournal of King Saud University: Computer and Information Sciences, 2014
The Health Insurance Portability and Accountability Act (HIPAA) passed by the US Congress establishes a number of privacy/security regulations for e-healthcare systems.
Sangram Ray, G.P. Biswas
doaj   +1 more source

Going Rogue: Mobile Research Applications and the Right to Privacy [PDF]

open access: yes, 2019
This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced.
Tovino, Stacey A.
core   +2 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

open access: yesInternational Journal of Telerehabilitation, 2012
Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients.
Valerie R. Watzlaf, Briana Ondich
doaj   +1 more source

Epidemiology of Cancer‐Associated Venous Thromboembolism Across the United States

open access: yesAmerican Journal of Hematology, EarlyView.
ABSTRACT Prior epidemiological studies on cancer‐associated venous thromboembolism (VTE) were limited by homogenous patient populations. We leverage Cosmos, a collaborative dataset of Epic electronic health record systems, to conduct an updated evaluation of cancer‐associated VTE in the United States (US).
Barbara D. Lam   +7 more
wiley   +1 more source

Developing remote patient monitoring infrastructure using commercially available cloud platforms

open access: yesFrontiers in Digital Health
Wearable sensor devices for continuous patient monitoring produce a large volume of data, necessitating scalable infrastructures for efficient data processing, management and security, especially concerning Patient Health Information (PHI).
Minh Cao   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy