Results 171 to 180 of about 224,799 (276)
A Two-Phase Embedding Approach for Secure Distributed Steganography. [PDF]
Woźniak K, Ogiela MR, Ogiela L.
europepmc +1 more source
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz +2 more
wiley +1 more source
Design of a multi-layered privacy-preserving architecture for secure medical data exchange in cloud environments. [PDF]
Muthuvel S, Priya S, Sampath Kumar K.
europepmc +1 more source
This article introduces the concept of excluded participation to examine how inclusion and exclusion are negotiated in real time within a Danish fifth‐grade classroom. Using a micro‐sociological framework, particularly the work of Erving Goffman, the study focuses on the case of Anders, a student whose participation is symbolically recognized yet ...
Jørn Bjerre
wiley +1 more source
Reversible data hiding for electronic patient information security for telemedicine applications. [PDF]
Muhudin A +3 more
europepmc +1 more source
This study describes the work at an emergency and critical care center, focusing on the collaboration of multiple nurses when moving patients from the outpatient department to the ward. This study is an ethnomethodological ethnography based on fieldwork at a hospital and analysis of video data. The patient transport process is temporally organized into
Hiroki Maeda, Yumi Nishimura
wiley +1 more source
Hybrid Vigenere and elliptic curve cryptography technique over the finite field [Formula: see text]. [PDF]
El Bourakkadi H +5 more
europepmc +1 more source
Accomplishing Ethics‐Work as a Generic Social Process
Existing systems of university research ethics are often criticized by those in the qualitative research tradition. A common thread is that ethics cannot be fully anticipated before the research begins, as is expected by most institutional review boards.
Deana Simonetto, Antony Puddephatt
wiley +1 more source

