Results 111 to 120 of about 2,252,336 (338)
User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy
Recommender systems have become an integral part of many social networks and extract knowledge from a user's personal and sensitive data both explicitly, with the user's knowledge, and implicitly.
Aghasian, Erfan +2 more
core +1 more source
ABSTRACT Objective Super‐Refractory Status Epilepticus (SRSE) is a rare, life‐threatening neurological emergency with unclear etiology in many cases. Mitochondrial dysfunction, often due to disease‐causing genetic variants, is increasingly recognized as a cause, with each gene producing distinct pathophysiological mechanisms.
Pouria Mohammadi +2 more
wiley +1 more source
The post-Snowden debates have often referred to an alleged trade-off between human rights and security that digital citizens need to negotiate, and to a balance that needs to be struck by policy makers. In this brief commentary, Gus Hosein problematizes
Gus Hosein
doaj +2 more sources
Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes it inside the enterprise and shares it with partner ...
Dekker, M.A.C. +2 more
openaire +1 more source
Neuropsychiatric Symptoms Mimicking Dementia in a Patient Treated With Imatinib
ABSTRACT Tyrosine kinase inhibitors are the cornerstone of chronic myeloid leukemia treatment. Newer agents have more potency and a broader spectrum of action, but also a higher potential for neuropsychiatric side effects. We present a case of a patient on imatinib who developed progressive cognitive, mood, and behavioral alterations.
Ashley Jones +3 more
wiley +1 more source
Personal Privacy and Common Goods: A Framework for Balancing Under the National Health Information Privacy Rule [PDF]
In this Article, we discuss how these principles for balancing apply in a number of important contexts where individually identifiable health data are shared. In Part I, we analyze the modern view favoring autonomy and privacy.
Gostin, Lawrence O. +1 more
core +2 more sources
Predicting Loss of Ambulation in Limb Girdle Muscular Dystrophy R9
ABSTRACT Background Limb girdle muscular dystrophy type R9 (LGMDR9) results from biallelic variants in FKRP. There is limited data to predict loss of ambulation (LOA) among those with LGMDR9. Methods Participants in an ongoing dystroglycanopathy natural history study (NCT00313677) with FKRP variants who had achieved ambulation and were more than 3 ...
Chandra L. Miller +6 more
wiley +1 more source
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source
A Feeling of Unease About Privacy Law [PDF]
This essay responds to Daniel Solove\u27s recent article, A Taxonomy of Privacy. I have read many of Daniel Solove\u27s privacy-related writings, and he has made many important scholarly contributions to the field.
Bartow, Ann
core +2 more sources
Law often blocks sensitive personal information to prevent discrimination. It does so, however, without a theory or framework to determine when doing so is warranted. As a result, these measures produce mixed results. This article offers a theoretical framework for determining, with a view of preventing discrimination, when personal information should ...
openaire +3 more sources

