Results 101 to 110 of about 2,375,414 (378)
Security Policies Approached by Value Analysis Concepts [PDF]
This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy.
Florin Buhociu +2 more
core
Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users privacy.
Aldhafferi, Nahier +2 more
core +1 more source
Light Therapy Alleviates Addiction‐Related Symptoms and Reshapes Habenula and Midbrain Pathways
This study investigates light therapy for treating Internet Gaming Disorder (IGD). Functional MRI (fMRI) data reveal that light therapy enhances brain connectivity, particularly between the habenula and the medial orbitofrontal cortex (mOFC). These changes are associated with reduced withdrawal symptoms and addiction severity, highlighting the ...
Jinhui Li +10 more
wiley +1 more source
Survey on data preserving for the search of internet of things
With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet ...
Jia-hui WANG +2 more
doaj +2 more sources
Schematic representation of ZIF‐8@OXA@inulin for cancer immunotherapy. Synthesis of ZIF‐8@OXA@inulin. Augmentation of pyroptosis, regulation of gut microbiota, and inhibition of NETs formation by ZIF‐8@OXA@inulin‐mediated comprehensive strategy for antitumor immune response. ABSTRACT Despite the potential of chemoimmunotherapy against colorectal cancer
Zhenhao Li +8 more
wiley +1 more source
Social networking and privacy attitudes among [PDF]
Daily use of social networking sites (SNS) such as Facebook has become routine for millions of Internet users. Facebook is currently still the most popular social media site. Social networking has been rapidly adopted by societies around the world.
Kristen A. Carruth, Harvey J. Ginsburg
doaj
The Internet of Vehicles (IoV) — Security, Privacy, Trust, and Reputation Management for Connected Vehicles [PDF]
A. T. Drobot +5 more
openalex +1 more source
Internet Privacy and Self-Regulation: Lessons from the Porn Wars [PDF]
The availability and adequacy of technical remedies ought to play a crucial role in evaluating the propriety of state action with regard to both the inhibition of Internet pornography and the promotion of Internet privacy.
Tom W. Bell
core
Active Force Dynamics in Red Blood Cells Under Non‐Invasive Optical Tweezers
A non‐invasive method combines low‐power optical tweezers with high‐speed microscopy to simultaneously monitor local membrane forces and displacements in single human red blood cells. This dual‐channel approach reveals a mechano‐dynamic signature that correlates the cell's metabolic state with its mechanical activity. This energetic framework serves as
Arnau Dorn +5 more
wiley +1 more source
Factors and Predictors of Online Security and Privacy Behavior
Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT ...
Goran Bubaš +2 more
doaj

