Results 291 to 300 of about 1,414,948 (346)
Exploring information security compliant behaviors in healthcare Knowledge Process Outsourcing (KPOs). [PDF]
Mahipala C, Perera P.
europepmc +1 more source
Acceptability of patient-centered digital vaccine safety monitoring: A Canadian Immunization Research Network study. [PDF]
Ellis-Legault B +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Computer Networks, 2012
When using the Internet, we reveal much personal information both willingly and indadvertedly. Companies use this information for targeted advertisement and thereby to finance the services they offer to users. The mechanisms used today to protect users' personal information are lacking resulting in far too frequent privacy and security breaches that ...
openaire +2 more sources
When using the Internet, we reveal much personal information both willingly and indadvertedly. Companies use this information for targeted advertisement and thereby to finance the services they offer to users. The mechanisms used today to protect users' personal information are lacking resulting in far too frequent privacy and security breaches that ...
openaire +2 more sources
Consciousness, privacy, and information
Biosystems, 1996The challenges for a scientific study of conscious experience are discussed, as well as the importance of such research for the foundations of information science. A three pronged approach to the investigation of consciousness and its functions is suggested.
openaire +3 more sources
Privacy in the Information Age
Public Opinion Quarterly, 2006In recent years, surveillance has become an increasingly salient political issue in the United States.
Brian S. Krueger +2 more
openaire +2 more sources
2018
It seems like there is no such thing as privacy anymore. But the truth is that privacy is in danger only because we think about it in narrow, limited, and outdated ways. In this transformative work, Ari Ezra Waldman, leveraging the notion that we share information with others in contexts of trust, offers a roadmap for data privacy that will better ...
openaire +2 more sources
It seems like there is no such thing as privacy anymore. But the truth is that privacy is in danger only because we think about it in narrow, limited, and outdated ways. In this transformative work, Ari Ezra Waldman, leveraging the notion that we share information with others in contexts of trust, offers a roadmap for data privacy that will better ...
openaire +2 more sources
Privacy and Genetic Information
1973Invasion of privacy is decried on the streets and discussed in academic halls. The preservation of privacy is almost a holy cause in the United States and, indeed, it is somewhat un-American not to come to the vigorous defense of privacy. The other side of the coin, namely, the possible harmful effects of maintaining privacy, is less often displayed.
openaire +2 more sources
Freedom, Information and Privacy
Business and Professional Ethics Journal, 1993We began writing this paper assuming that there were conflicts be tween privacy and freedom of information. As the ideas developed and we spoke with other people we came to believe that the basic conflict is between personal privacy and freedom of the press. This involves understanding the news media's role of disseminating information.
Barbara Boylan, Peter Machamer
openaire +2 more sources
Unknowableness and Informational Privacy
Journal of Philosophical Research, 2007Despite their differences, the three most prominent accounts of informational privacy on the contemporary scene-the Control Theory, the Limited Access Theory, and the Narrow Ignorance Theory-all hold that an individual's informational privacy is at least partly a function of a kind of inability of others to know personal facts about her.
openaire +2 more sources

