Results 71 to 80 of about 11,267,119 (387)

Citizens’ Information Privacy Protection Model in e-Government for Developing Countries [PDF]

open access: yesپژوهش‌های مدیریت عمومی, 2016
The most important aim of this study is to propose a model for protecting citizens’ information privacy in e-Government for developing countries. This study develops theoretical foundations and models of e-Government in  judicial-legal dimension.
Mohammad Taghi Taghavifard   +3 more
doaj   +1 more source

From the Information Bottleneck to the Privacy Funnel

open access: yes, 2014
We focus on the privacy-utility trade-off encountered by users who wish to disclose some information to an analyst, that is correlated with their private data, in the hope of receiving some utility.
Fawaz, Nadia   +3 more
core   +1 more source

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

Re-Evaluating Trust and Privacy Concerns When Purchasing a Mobile App: Re-Calibrating for the Increasing Role of Artificial Intelligence

open access: yesDigital, 2023
Mobile apps utilize the features of a mobile device to offer an ever-growing range of functionalities. This vast choice of functionalities is usually available for a small fee or for free.
Alex Zarifis, Shixuan Fu
doaj   +1 more source

Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information [PDF]

open access: yes, 2018
The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered.
Farokhi, Farhad, Sandberg, Henrik
core   +2 more sources

Information management and patient privacy [PDF]

open access: yesBMJ, 1994
EDITOR, - Alison Tonk's editorial was a useful summary of some of the key parts of the NHS Management Executive's information management and technology strategy and will assist in further disseminating the objectives of the strategy to the medical profession.1 Ensuring that the clinical professions are aware and involved is important, and we are making
G P, Winyard, R T, Rogers
openaire   +2 more sources

Gut microbiota diversity is prognostic in metastatic hormone receptor‐positive breast cancer patients receiving chemotherapy and immunotherapy

open access: yesMolecular Oncology, EarlyView.
In this exploratory study, we investigated the relationship between the gut microbiota and outcome in patients with metastatic hormone receptor‐positive breast cancer, treated in a randomized clinical trial with chemotherapy alone or chemotherapy in combination with immune checkpoint blockade.
Andreas Ullern   +7 more
wiley   +1 more source

A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan   +3 more
doaj   +1 more source

Protecting Information Privacy [PDF]

open access: yes, 2011
This report for the Equality and Human Rights Commission (the Commission) examines the threats to information privacy that have emerged in recent years, focusing on the activities of the state.
Goold, Benjamin, Raab, Charles
core   +1 more source

The Japanese sense of information privacy [PDF]

open access: yesAI & SOCIETY, 2009
We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as \citet{B46}. In this paper we distinguish between information privacy and physical privacy.
Adams, A.A., Murata, K, Orito, Y
openaire   +1 more source

Home - About - Disclaimer - Privacy