Results 231 to 240 of about 9,826,920 (308)

Autonomous Implants

open access: yesAdvanced Materials, EarlyView.
An ideal implant should mimic native tissues such that it can integrate, sense, heal, and continue to function, i.e., be autonomous. Although early, there are good steps taken in this way, e.g., the development of stimuli‐responsive, self‐powering, self‐actuating, self‐healing, self‐regenerating, and self‐aware implants.
Jagan Mohan Dodda   +5 more
wiley   +1 more source

Unique Impacts of Scandium Doping on Electrode Performance of P’2‐ and P2‐type Na2/3MnO2

open access: yesAdvanced Materials, EarlyView.
The structural stability during electrochemical cycling for P’2‐Na2/3MnO2 as a positive electrode for of Na‐ion battery is investigated by modulating the materials via metal substitution and varying the degree of Jahn‐Teller distortion. The cycle stability is maximized when combining Sc doping and the lattice distortion, demonstrating > 300 cycles in ...
Kodai Moriya   +6 more
wiley   +1 more source

Engineering Aging: Approaches to Model and Deconstruct Biological Complexity

open access: yesAdvanced Materials, EarlyView.
The macro‐experiences of aging are the result of an accumulation of micro‐changes that occur over time. Abstract The disparity between the global increase in life expectancy and the steady decline in health outcomes with age has been a major driver for developing new ways to research aging.
Habib Joukhdar   +7 more
wiley   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Privacy as Trust: Information Privacy for an Information Age

, 2018
It seems like there is no such thing as privacy anymore. But the truth is that privacy is in danger only because we think about it in narrow, limited, and outdated ways. In this transformative work, Ari Ezra Waldman, leveraging the notion that we share information with others in contexts of trust, offers a roadmap for data privacy that will better ...
A. Waldman
semanticscholar   +3 more sources

Information Privacy Awareness

Encyclopedia of Cryptography, Security and Privacy, 2021
A. Tsohou, Aikaterini Soumelidou
semanticscholar   +2 more sources

Information Privacy Assimilation

International Journal of Digital Strategy, Governance, and Business Transformation, 2022
This paper proposes a framework to understand organizations' perspectives while safeguarding customers' information privacy. Following a detailed literature review, a broad conceptual model was developed to build a theory based on a multi-site, multi ...
Suhasish Halder   +2 more
semanticscholar   +1 more source

A Theory of Multilevel Information Privacy Management for the Digital Era

Information systems research, 2020
In the digital era, it is increasingly important to understand how privacy decisions are made because information is frequently perceived as a commodity that is mismanaged.
F. Bélanger, Tabitha L. James
semanticscholar   +1 more source

The effect of information privacy concern on users' social shopping intention

Online information review (Print), 2020
PurposeThe purpose of this research is to examine the effect of information privacy concern on users' social shopping intention.Design/methodology/approachBased on the 340 valid responses collected from a survey, structural equation modeling (SEM) was ...
Tao Zhou
semanticscholar   +1 more source

Mobile users' information privacy concerns instrument and IoT

Information and Computer Security, 2020
Purpose Internet of Things (IoT) presents new privacy dilemmas. While IoT is becoming more common, a model to understand privacy concerns has not been established.
C. Foltz, Laura Foltz
semanticscholar   +1 more source

Information privacy?!

Computer Networks, 2012
When using the Internet, we reveal much personal information both willingly and indadvertedly. Companies use this information for targeted advertisement and thereby to finance the services they offer to users. The mechanisms used today to protect users' personal information are lacking resulting in far too frequent privacy and security breaches that ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy