Results 111 to 120 of about 703,137 (389)
Privacy Threat Model for Data Portability in Social Network Applications [PDF]
The advent of the participatory Web and social network applications has changed our communication behavior and the way we express ourselves on the Web.
Weiss, Stefan
core +1 more source
Location Privacy in the Wake of the GDPR
The General Data Protection Regulation (GDPR) protects the personal data of natural persons and at the same time allows the free movement of such data within the European Union (EU).
Yola Georgiadou+2 more
doaj +1 more source
Folktales - La Llorona - Heard story from - Aunt - Female (1980-1999) [PDF]
Folktales collected by anthropology students from 1980–1999. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1001/thumbnail ...
core +1 more source
Applying data protection part of ISO 27001 to patient and user data produced by medical devices – Case: disease specific quality registers [PDF]
Data protection may be considered a subset of information security, consisting of the rules that define who may have access to what data and under what conditions.
Torkkeli, Aapo
core
Gamifying anatomy outreach: An underexplored opportunity
Abstract This article explores the underutilized potential of incorporating gamified approaches into anatomy outreach initiatives. While gamification and game‐based learning approaches have been widely adopted in formal educational settings, there is a surprising lack of research on their application for community‐based public engagement with anatomy ...
Mikaela L. Stiver+3 more
wiley +1 more source
Informational privacy, confidentiality and data security in research involving human subjects
Confidentiality represents the duty to protect the privacy rights of individuals and groups. Confidentiality allows for an authorized person to disclose information in certain contexts, while the information remains protected, and its uses remain limited
Horaţiu A COLOSI+2 more
doaj
P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks
BackgroundUsers of peer-to-peer (P2P) file-sharing networks risk the inadvertent disclosure of personal health information (PHI). In addition to potentially causing harm to the affected individuals, this can heighten the risk of data breaches for health ...
Sokolova, Marina+5 more
doaj +1 more source
Folktales - Witches, Lechuzas, 1999, 2002 [PDF]
Folktales collected by anthropology students in 1999 and 2002. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1018/thumbnail ...
core +1 more source
Data Ethics and Privacy for Researchers [PDF]
This workshop addresses specific data privacy and anonymization standards and techniques for researchers that are collecting personally identifiable information as well as sensitive information.
Rowan, Kelley F.
core +1 more source
Abstract Reflection exercises have been used within anatomy education to evaluate empathy, humanism, and professionalism. A typical reflection exercise consists of directed prompts to guide the student's reflection as it relates to the experience and/or research question.
John Arthur+4 more
wiley +1 more source