Results 71 to 80 of about 11,028,780 (364)

An information privacy culture instrument to measure consumer privacy expectations and confidence

open access: yesInformation and Computer Security, 2018
Purpose This paper aims to propose an information privacy culture index framework (IPCIF) with a validated information privacy culture index instrument (IPCII) to measure information privacy culture across nations.
A. D. Veiga
semanticscholar   +1 more source

Unraveling LINE‐1 retrotransposition in head and neck squamous cell carcinoma

open access: yesMolecular Oncology, EarlyView.
The novel RetroTest method allows the detection of L1 activation in clinical samples with low DNA input, providing global L1 activity and the identification of the L1 source element. We applied RetroTest to a real‐world cohort of HNSCC patients where we reported an early L1 activation, with more than 60% of T1 patients showing L1 activity.
Jenifer Brea‐Iglesias   +12 more
wiley   +1 more source

Privacy as an Asset [PDF]

open access: yes, 2017
Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the
Gryz, Jarek
core  

Endoglin mediates the tumor‐ and metastasis‐promoting traits of stromal myofibroblasts in human breast carcinomas

open access: yesMolecular Oncology, EarlyView.
Carcinoma‐associated fibroblasts (CAFs) in tumors influence cancer progression. We identified endoglin (ENG) as a key factor in TGF‐β signaling in myofibroblastic CAFs (myCAFs), linked to poor breast cancer outcomes. Inhibiting ENG on myCAFs suppressed the TGF‐β‐Smad2/3 pathway, reducing primary tumor growth and metastasis.
Shoki Okubo   +11 more
wiley   +1 more source

Juxtaposing the persuasion knowledge model and privacy paradox: An experimental look at advertising personalization, public policy and public understanding

open access: yesCyberpsychology: Journal of Psychosocial Research on Cyberpspace, 2016
Recent studies suggest the expanding collection and use of big data by advertisers to target messages to consumers based on their location, demographics and online behaviors is escalating information privacy concerns and negatively impacting campaign ...
Nancy Howell Brinson, Matthew S. Eastin
doaj   +1 more source

Perception of Information Sensitivity for Internet Users in Saudi Arabia

open access: yesActa Informatica Pragensia, 2020
The rapid evolution of Internet use has led to the collection of big data about users, which has raised users' privacy concerns about their personal information.
Khaled Almotairi, Bilal Bataineh
doaj   +1 more source

Protecting farmers' data privacy and confidentiality: Recommendations and considerations

open access: yesFrontiers in Sustainable Food Systems, 2022
With the increasing use of precision agriculture and technological development, the agricultural sector has been majorly transformed. Precision agriculture uses technological innovations such as sensors, drones, and data analysis tools to improve the ...
Jasmin Kaur   +4 more
doaj   +1 more source

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation

open access: yesIEEE Access, 2022
The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected infrastructures.
Fawaz Kserawi   +2 more
doaj   +1 more source

From the Information Bottleneck to the Privacy Funnel

open access: yes, 2014
We focus on the privacy-utility trade-off encountered by users who wish to disclose some information to an analyst, that is correlated with their private data, in the hope of receiving some utility.
Fawaz, Nadia   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy