Results 51 to 60 of about 217,163 (333)
The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information [PDF]
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity
Marcus, Daniel J.
core +1 more source
This study aims to provide actionable recommendations for leveraging digital innovation for the achievement of scalable, equitable, and transparent Net Zero Energy Transition by offering actionable recommendations. As a result of this comprehensive analysis, the review highlights the critical interplay between digital technologies and GF as vital ...
Furkan Ahmad+3 more
wiley +1 more source
A systematic literature review of blockchain cyber security
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems.
Paul J. Taylor+4 more
doaj +1 more source
Artificial Intelligences: A Bridge Toward Diverse Intelligence and Humanity's Future
Many discussions of artificial intelligence fail to address deeper questions being raised by advances in developmental biology, neuroscience, bioengineering, and philosophy of mind. Novel beings, including technologically and biologically augmented humans, engineered life forms, hybrots, and others, require tools of the emerging field of diverse ...
Michael Levin
wiley +1 more source
A growing number of individuals who are not professional scientists are working with professional scientists to contribute to scientific research through a broad spectrum of volunteer activities and roles.
Caren Cooper+3 more
doaj +1 more source
Abstract While the relationship between community violence exposure and maladaptive outcomes has been established, the dynamic between violence exposure and resilience factors in youth is not well understood. The current study utilizes a community‐based participatory research (CBPR) framework and employs a novel mixed‐methods approach integrating ...
Kyle C. Deane+6 more
wiley +1 more source
Abstract Black women face a myriad of challenges that heighten their susceptibility to sexually transmitted infections (STIs), resulting in a disproportionate impact of STIs among this population. Yet, there is a lack of research that explores how women navigate these diagnoses with resilience.
Jaleah D. Rutledge+3 more
wiley +1 more source
Improving Inter-Agency Data Sharing Through Linkage Spine Interoperability
Introduction Linkage of Federal Government data in Australia is conducted primarily through Accredited Integrating Authorities (AIAs). These agencies hold different dataset from Commonwealth and state/territory government agencies.
Nick von Sanden
doaj +1 more source
Managing Personal Identifiable Information in Data Lakes
Privacy is a fundamental human right according to the Universal Declaration of Human Rights of the United Nations. Adoption of the General Data Protection Regulation (GDPR) in European Union in 2018 was turning point in management of personal data, specifically personal identifiable information (PII).
Dražen Oreščanin+2 more
openaire +3 more sources
ABSTRACT Non‐syndromic Retinitis Pigmentosa (NsRP) was well known as one of the causes of visual impairment already in the 19th century. Giuseppe Albertotti, Professor of Ophthalmology at the University of Modena (Italy) in 1893, described a high prevalence of NsRP in a geographic isolate, the small village of Colloro, in northwestern Italy.
Andrea Guala+8 more
wiley +1 more source