Results 101 to 110 of about 2,375,414 (378)

Security Policies Approached by Value Analysis Concepts [PDF]

open access: yes
This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy.
Florin Buhociu   +2 more
core  

Personal Information Privacy Settings of Online Social Networks and their Suitability for Mobile Internet Devices

open access: yes, 2013
Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users privacy.
Aldhafferi, Nahier   +2 more
core   +1 more source

Light Therapy Alleviates Addiction‐Related Symptoms and Reshapes Habenula and Midbrain Pathways

open access: yesAdvanced Science, EarlyView.
This study investigates light therapy for treating Internet Gaming Disorder (IGD). Functional MRI (fMRI) data reveal that light therapy enhances brain connectivity, particularly between the habenula and the medial orbitofrontal cortex (mOFC). These changes are associated with reduced withdrawal symptoms and addiction severity, highlighting the ...
Jinhui Li   +10 more
wiley   +1 more source

Survey on data preserving for the search of internet of things

open access: yesTongxin xuebao, 2016
With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet ...
Jia-hui WANG   +2 more
doaj   +2 more sources

Inulin‐Based Oral Chemotherapy Modulates Gut Microbiota and Immune Microenvironment through Inhibition of Neutrophil Extracellular Trap Formation for Improving Cancer Therapy

open access: yesAdvanced Science, EarlyView.
Schematic representation of ZIF‐8@OXA@inulin for cancer immunotherapy. Synthesis of ZIF‐8@OXA@inulin. Augmentation of pyroptosis, regulation of gut microbiota, and inhibition of NETs formation by ZIF‐8@OXA@inulin‐mediated comprehensive strategy for antitumor immune response. ABSTRACT Despite the potential of chemoimmunotherapy against colorectal cancer
Zhenhao Li   +8 more
wiley   +1 more source

Social networking and privacy attitudes among [PDF]

open access: yesPsychology, Society & Education, 2014
Daily use of social networking sites (SNS) such as Facebook has become routine for millions of Internet users. Facebook is currently still the most popular social media site. Social networking has been rapidly adopted by societies around the world.
Kristen A. Carruth, Harvey J. Ginsburg
doaj  

The Internet of Vehicles (IoV) — Security, Privacy, Trust, and Reputation Management for Connected Vehicles [PDF]

open access: bronze, 2023
A. T. Drobot   +5 more
openalex   +1 more source

Internet Privacy and Self-Regulation: Lessons from the Porn Wars [PDF]

open access: yes, 2001
The availability and adequacy of technical remedies ought to play a crucial role in evaluating the propriety of state action with regard to both the inhibition of Internet pornography and the promotion of Internet privacy.
Tom W. Bell
core  

Active Force Dynamics in Red Blood Cells Under Non‐Invasive Optical Tweezers

open access: yesAdvanced Science, EarlyView.
A non‐invasive method combines low‐power optical tweezers with high‐speed microscopy to simultaneously monitor local membrane forces and displacements in single human red blood cells. This dual‐channel approach reveals a mechano‐dynamic signature that correlates the cell's metabolic state with its mechanical activity. This energetic framework serves as
Arnau Dorn   +5 more
wiley   +1 more source

Factors and Predictors of Online Security and Privacy Behavior

open access: yesJournal of Information and Organizational Sciences, 2008
Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT ...
Goran Bubaš   +2 more
doaj  

Home - About - Disclaimer - Privacy