Results 111 to 120 of about 703,137 (389)

Privacy Threat Model for Data Portability in Social Network Applications [PDF]

open access: yes, 2008
The advent of the participatory Web and social network applications has changed our communication behavior and the way we express ourselves on the Web.
Weiss, Stefan
core   +1 more source

Location Privacy in the Wake of the GDPR

open access: yesISPRS International Journal of Geo-Information, 2019
The General Data Protection Regulation (GDPR) protects the personal data of natural persons and at the same time allows the free movement of such data within the European Union (EU).
Yola Georgiadou   +2 more
doaj   +1 more source

Folktales - La Llorona - Heard story from - Aunt - Female (1980-1999) [PDF]

open access: yes, 1980
Folktales collected by anthropology students from 1980–1999. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1001/thumbnail ...

core   +1 more source

Applying data protection part of ISO 27001 to patient and user data produced by medical devices – Case: disease specific quality registers [PDF]

open access: yes, 2020
Data protection may be considered a subset of information security, consisting of the rules that define who may have access to what data and under what conditions.
Torkkeli, Aapo
core  

Gamifying anatomy outreach: An underexplored opportunity

open access: yesAnatomical Sciences Education, EarlyView.
Abstract This article explores the underutilized potential of incorporating gamified approaches into anatomy outreach initiatives. While gamification and game‐based learning approaches have been widely adopted in formal educational settings, there is a surprising lack of research on their application for community‐based public engagement with anatomy ...
Mikaela L. Stiver   +3 more
wiley   +1 more source

Informational privacy, confidentiality and data security in research involving human subjects

open access: yesApplied Medical Informatics, 2019
Confidentiality represents the duty to protect the privacy rights of individuals and groups. Confidentiality allows for an authorized person to disclose information in certain contexts, while the information remains protected, and its uses remain limited
Horaţiu A COLOSI   +2 more
doaj  

P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks

open access: yesJournal of Medical Internet Research, 2012
BackgroundUsers of peer-to-peer (P2P) file-sharing networks risk the inadvertent disclosure of personal health information (PHI). In addition to potentially causing harm to the affected individuals, this can heighten the risk of data breaches for health ...
Sokolova, Marina   +5 more
doaj   +1 more source

Folktales - Witches, Lechuzas, 1999, 2002 [PDF]

open access: yes, 1999
Folktales collected by anthropology students in 1999 and 2002. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1018/thumbnail ...

core   +1 more source

Data Ethics and Privacy for Researchers [PDF]

open access: yes, 2023
This workshop addresses specific data privacy and anonymization standards and techniques for researchers that are collecting personally identifiable information as well as sensitive information.
Rowan, Kelley F.
core   +1 more source

Seven questions for a student's donor: Evaluation of a fictional conversation lends insight into professional identity formation in medical students

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Reflection exercises have been used within anatomy education to evaluate empathy, humanism, and professionalism. A typical reflection exercise consists of directed prompts to guide the student's reflection as it relates to the experience and/or research question.
John Arthur   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy