Results 91 to 100 of about 11,028,780 (364)
PRIVED: a Privacy Model for Heterogeneous Mobile Networks [PDF]
We propose a network-oriented privacy model (PRIVED) composed by a well defined information model, using events, information sets and relationships to define the conceptual privacy relationships that can occur in the network.
Aguiar, Rui+2 more
core +1 more source
Phenotyping Healthcare Use 2–3 Decades Before the First Multiple Sclerosis Demyelinating Event
ABSTRACT Objective Phenotype hospital, physician, and emergency department (ED) visits by diagnoses and specialty up to 29 years pre‐multiple sclerosis (MS) onset versus a matched population without MS. Methods We identified people with MS (PwMS) using population‐based administrative data from Ontario, Canada (1991–2020).
Helen Tremlett+8 more
wiley +1 more source
ABSTRACT Objective To compare the effectiveness of high‐efficacy treatments (HET) and low‐efficacy treatments (LET) in NMOSD patients with anti‐aquaporin‐4 antibodies (AQP4‐ab). Methods In this multi‐center study, we analyzed 183 AQP4‐ab seropositive NMOSD patients who received immunosuppressive treatments (IST).
Xiang Li+10 more
wiley +1 more source
As the development of the Internet and social media has led to pervasive data collection and usage practices, consumers’ privacy concerns have increasingly grown stronger.
Jasmin Mahmoodi+6 more
doaj +1 more source
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information ...
F. Bélanger, Robert E. Crossler
semanticscholar +1 more source
ABSTRACT Objective Spinal muscular atrophy (SMA) significantly impacts motor function. This study aimed to assess the persistent burden and unmet needs among currently treated patients with SMA and their caregivers. Methods Two complementary web‐based surveys were distributed in August 2024 among patients with SMA and their caregivers.
Julie A. Parsons+8 more
wiley +1 more source
Comparing Threshold Selection Methods for Network Anomaly Detection
The use of unsupervised machine learning models for anomaly detection is a common thing nowadays. While many research papers focus on improving and testing these models, there is a lack of those that deal with threshold selection, which is an important ...
Adrian Komadina+3 more
doaj +1 more source
Information Privacy Awareness (IPA): A Review of the Use, Definition and Measurement of IPA
Despite the acknowledged importance of awareness in the information privacy (IP) literature, we lack a consistent and thorough understanding of information privacy awareness (IPA).
John Correia, Deborah R. Compeau
semanticscholar +1 more source
Differential Privacy versus Quantitative Information Flow [PDF]
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities of two different ...
Alvim, Mário S.+3 more
core +3 more sources
Association of the ICH Score With Withdrawal of Life‐Sustaining Treatment Over a 10‐Year Period
ABSTRACT Objective The intracerebral hemorrhage (ICH) score was developed to enhance provider communication and facilitate early severity assessment. We examined the association of the ICH score with mortality and withdrawal of life‐sustaining treatment (WLST) in a large, multicenter stroke registry, and evaluated temporal trends in these associations.
Nina Massad+15 more
wiley +1 more source