Results 201 to 210 of about 4,362,198 (352)
Recent advancements in wearable healthcare have brought accessible continuous glucose monitoring systems (CGMs) for diabetes management. To address the limitations of CGMs, closed‐loop systems utilizing monitored glucose levels for insulin dosing are being developed.
Wei Huang+5 more
wiley +1 more source
Innovating to amplify the voices of young people from marginalized ethnic migrant backgrounds
Abstract The meaningful participation of young people from marginalized ethnic backgrounds in civic processes is central to the social cohesion of increasingly diverse liberal democracies, but their participation is compromised by a range of barriers resulting in decision‐making that is disconnected from their lives.
Kelsey L. Deane+7 more
wiley +1 more source
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements
Marco Casassa Mont+4 more
openalex +1 more source
Information quality, privacy policies, and data safety practices in online social networks for health: A longitudinal analysis [PDF]
Kaitlin Light Costello
openalex +1 more source
GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications
Xiaoyin Wang+5 more
semanticscholar +1 more source
“Who's breaking the law … not us, them!”: Inside immigration detention in Portugal
Abstract In this paper, we examine immigration detention in Portugal, a system whose daily operations and inherent violence are overlooked in both public and academic discourses. Even within community psychology, discussions on immigration detention have largely remained on the fringes of scholarly debates. Guided by a justice‐centered ecological lens,
Francesca Esposito+3 more
wiley +1 more source
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models
Justin Cranshaw+2 more
openalex +2 more sources
Abstract Immigrants and refugees in the United States often face significant barriers in accessing social services, including mental health support, legal assistance, ESL or related education, housing, vocational training, workforce resources, transportation, and citizenship support. This article explores the strengths and challenges of community‐based
Rooshey Hasnain+7 more
wiley +1 more source
CP-ABE scheme supporting partially hidden access policy
Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem ...
LIU Xia+6 more
doaj
Automatic Summarization of Privacy Policies using Ensemble Learning [PDF]
Noriko Tomuro+2 more
openalex +1 more source