Results 71 to 80 of about 11,267,119 (387)
Citizens’ Information Privacy Protection Model in e-Government for Developing Countries [PDF]
The most important aim of this study is to propose a model for protecting citizens’ information privacy in e-Government for developing countries. This study develops theoretical foundations and models of e-Government in judicial-legal dimension.
Mohammad Taghi Taghavifard +3 more
doaj +1 more source
From the Information Bottleneck to the Privacy Funnel
We focus on the privacy-utility trade-off encountered by users who wish to disclose some information to an analyst, that is correlated with their private data, in the hope of receiving some utility.
Fawaz, Nadia +3 more
core +1 more source
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira +14 more
wiley +1 more source
Mobile apps utilize the features of a mobile device to offer an ever-growing range of functionalities. This vast choice of functionalities is usually available for a small fee or for free.
Alex Zarifis, Shixuan Fu
doaj +1 more source
Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information [PDF]
The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered.
Farokhi, Farhad, Sandberg, Henrik
core +2 more sources
Information management and patient privacy [PDF]
EDITOR, - Alison Tonk's editorial was a useful summary of some of the key parts of the NHS Management Executive's information management and technology strategy and will assist in further disseminating the objectives of the strategy to the medical profession.1 Ensuring that the clinical professions are aware and involved is important, and we are making
G P, Winyard, R T, Rogers
openaire +2 more sources
In this exploratory study, we investigated the relationship between the gut microbiota and outcome in patients with metastatic hormone receptor‐positive breast cancer, treated in a randomized clinical trial with chemotherapy alone or chemotherapy in combination with immune checkpoint blockade.
Andreas Ullern +7 more
wiley +1 more source
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan +3 more
doaj +1 more source
Protecting Information Privacy [PDF]
This report for the Equality and Human Rights Commission (the Commission) examines the threats to information privacy that have emerged in recent years, focusing on the activities of the state.
Goold, Benjamin, Raab, Charles
core +1 more source
The Japanese sense of information privacy [PDF]
We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as \citet{B46}. In this paper we distinguish between information privacy and physical privacy.
Adams, A.A., Murata, K, Orito, Y
openaire +1 more source

