Results 231 to 240 of about 9,826,920 (308)
An ideal implant should mimic native tissues such that it can integrate, sense, heal, and continue to function, i.e., be autonomous. Although early, there are good steps taken in this way, e.g., the development of stimuli‐responsive, self‐powering, self‐actuating, self‐healing, self‐regenerating, and self‐aware implants.
Jagan Mohan Dodda +5 more
wiley +1 more source
Unique Impacts of Scandium Doping on Electrode Performance of P’2‐ and P2‐type Na2/3MnO2
The structural stability during electrochemical cycling for P’2‐Na2/3MnO2 as a positive electrode for of Na‐ion battery is investigated by modulating the materials via metal substitution and varying the degree of Jahn‐Teller distortion. The cycle stability is maximized when combining Sc doping and the lattice distortion, demonstrating > 300 cycles in ...
Kodai Moriya +6 more
wiley +1 more source
Engineering Aging: Approaches to Model and Deconstruct Biological Complexity
The macro‐experiences of aging are the result of an accumulation of micro‐changes that occur over time. Abstract The disparity between the global increase in life expectancy and the steady decline in health outcomes with age has been a major driver for developing new ways to research aging.
Habib Joukhdar +7 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Privacy as Trust: Information Privacy for an Information Age
, 2018It seems like there is no such thing as privacy anymore. But the truth is that privacy is in danger only because we think about it in narrow, limited, and outdated ways. In this transformative work, Ari Ezra Waldman, leveraging the notion that we share information with others in contexts of trust, offers a roadmap for data privacy that will better ...
A. Waldman
semanticscholar +3 more sources
Encyclopedia of Cryptography, Security and Privacy, 2021
A. Tsohou, Aikaterini Soumelidou
semanticscholar +2 more sources
A. Tsohou, Aikaterini Soumelidou
semanticscholar +2 more sources
Information Privacy Assimilation
International Journal of Digital Strategy, Governance, and Business Transformation, 2022This paper proposes a framework to understand organizations' perspectives while safeguarding customers' information privacy. Following a detailed literature review, a broad conceptual model was developed to build a theory based on a multi-site, multi ...
Suhasish Halder +2 more
semanticscholar +1 more source
A Theory of Multilevel Information Privacy Management for the Digital Era
Information systems research, 2020In the digital era, it is increasingly important to understand how privacy decisions are made because information is frequently perceived as a commodity that is mismanaged.
F. Bélanger, Tabitha L. James
semanticscholar +1 more source
The effect of information privacy concern on users' social shopping intention
Online information review (Print), 2020PurposeThe purpose of this research is to examine the effect of information privacy concern on users' social shopping intention.Design/methodology/approachBased on the 340 valid responses collected from a survey, structural equation modeling (SEM) was ...
Tao Zhou
semanticscholar +1 more source
Mobile users' information privacy concerns instrument and IoT
Information and Computer Security, 2020Purpose Internet of Things (IoT) presents new privacy dilemmas. While IoT is becoming more common, a model to understand privacy concerns has not been established.
C. Foltz, Laura Foltz
semanticscholar +1 more source
Computer Networks, 2012
When using the Internet, we reveal much personal information both willingly and indadvertedly. Companies use this information for targeted advertisement and thereby to finance the services they offer to users. The mechanisms used today to protect users' personal information are lacking resulting in far too frequent privacy and security breaches that ...
openaire +2 more sources
When using the Internet, we reveal much personal information both willingly and indadvertedly. Companies use this information for targeted advertisement and thereby to finance the services they offer to users. The mechanisms used today to protect users' personal information are lacking resulting in far too frequent privacy and security breaches that ...
openaire +2 more sources

