Results 61 to 70 of about 1,768,773 (316)

Digital Privacy [PDF]

open access: yesManagement Science, 2019
We study the incentives of a digital business to collect and protect users’ data. The users’ data the business collects improve the service it provides to consumers, but they may also be accessed, at a cost, by strategic third parties in a way that harms users, imposing endogenous users’ privacy costs.
Itay P. Fainmesser   +2 more
openaire   +1 more source

Evaluation of KRAS and NRAS mutations in metastatic colorectal cancer: an 8‐year study of 10 754 patients in Turkey

open access: yesMolecular Oncology, EarlyView.
This nationwide study evaluated KRAS and NRAS mutations in 10 754 Turkish patients with metastatic colorectal cancer. The results revealed a mutation frequency of 51.1%, with 46.6% having KRAS mutations, 4.5% having NRAS mutations, and 48.5% being wild‐type for both.
Gozde Kavgaci   +6 more
wiley   +1 more source

Is Privacy Controllable?

open access: yes, 2019
One of the major views of privacy associates privacy with the control over information. This gives rise to the question how controllable privacy actually is. In this paper, we adapt certain formal methods of control theory and investigate the implications of a control theoretic analysis of privacy.
Yefim Shulman, Joachim Meyer
openaire   +3 more sources

Unraveling LINE‐1 retrotransposition in head and neck squamous cell carcinoma

open access: yesMolecular Oncology, EarlyView.
The novel RetroTest method allows the detection of L1 activation in clinical samples with low DNA input, providing global L1 activity and the identification of the L1 source element. We applied RetroTest to a real‐world cohort of HNSCC patients where we reported an early L1 activation, with more than 60% of T1 patients showing L1 activity.
Jenifer Brea‐Iglesias   +12 more
wiley   +1 more source

Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives

open access: yesIEEE Access, 2020
The fifth generation (5G) technology offers a set of security services in order to provide secure communication to a large number of various devices. 5G Authentication and Key Agreement (5G-AKA) authentication service acts as the first step of securing ...
Lili Jiang   +5 more
doaj   +1 more source

Improved Ciphertext-Only Attack on GMR-1

open access: yesIEEE Access, 2022
The GEO-Mobile Radio Interface-1 (GMR-1) is a satellite communication standard used in Thuraya, a United Arab Emirates-based regional mobile satellite service provider.
Dongjae Lee   +4 more
doaj   +1 more source

Endoglin mediates the tumor‐ and metastasis‐promoting traits of stromal myofibroblasts in human breast carcinomas

open access: yesMolecular Oncology, EarlyView.
Carcinoma‐associated fibroblasts (CAFs) in tumors influence cancer progression. We identified endoglin (ENG) as a key factor in TGF‐β signaling in myofibroblastic CAFs (myCAFs), linked to poor breast cancer outcomes. Inhibiting ENG on myCAFs suppressed the TGF‐β‐Smad2/3 pathway, reducing primary tumor growth and metastasis.
Shoki Okubo   +11 more
wiley   +1 more source

Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021

open access: yesJournal of Cybersecurity and Privacy, 2022
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj   +1 more source

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

A Multi-Component Analysis of CPTED in the Cyberspace Domain

open access: yesSensors, 2020
The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. Our study
Jemin Justin Lee   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy