Results 31 to 40 of about 2,194 (257)
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this
Valerie J.M. Watzlaf +3 more
doaj +1 more source
Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research
Information privacy has attracted considerable attention in the information system research field. However, little effort has been made to review its latest developments from a marketing perspective.
Sheng Shu, Yi Liu
doaj +1 more source
Computer-Aided Identification and Validation of Intervenability Requirements
Privacy as a software quality is becoming more important these days and should not be underestimated during the development of software that processes personal data.
Rene Meis, Maritta Heisel
doaj +1 more source
Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services
As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it tends to disclose personal information due to collaborative computing and transparent interactions among software as a service (SaaS ...
Changbo Ke, Zhiqiu Huang, Xiaohui Cheng
doaj +1 more source
ObjectiveTo study emotional reactions to and behavior intentions about sufferers′ privacy leakage among internet users in China during public health emergencies (PHE) and to provide references for improving government supervision capability and risk ...
Zhi-xin LIU, Jun-ping LIU, Ming-lei SUN
doaj +1 more source
Background and objectivesPneumonia portrays a critical health concern in geriatrics. Geriatric pneumonia can lead to changes on other complications, in which hypoalbuminemia is a common complication.
Ziqi Liu +17 more
doaj +1 more source
Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems
Crowdsourcing activities, carrying out large-scale tasks via wisdoms of crowds, are widely used in practice. However, it is hard for users to find tasks that are suitable for them.
Zhiwei Guo +6 more
doaj +1 more source
Automated Cyber and Privacy Risk Management Toolkit
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo +8 more
doaj +1 more source
Preoperative Cytopenia in Patients Affected by High‐Risk Neuroblastoma: Just a Matter of Platelets?
ABSTRACT Background and Aims In patients affected by high‐risk neuroblastoma (HR‐NB), complete macroscopic resection (CMR) is associated with better outcomes. These patients are often cytopenic due to intensive induction regimens. The aim of the present study is to assess the impact of preoperative cytopenia on surgical outcome in patients with HR‐NB ...
Giorgio Persano +13 more
wiley +1 more source
ABSTRACT We present two pediatric cases of pediatric low‐grade gliomas (PLGG) with BRAF V600E mutations diagnosed and monitored using cerebrospinal fluid (CSF) liquid biopsy analyzed via digital droplet PCR (ddPCR), without tissue biopsy. Both patients were treated with dabrafenib and trametinib and monitored through clinical assessments, magnetic ...
Hannah Sultan +5 more
wiley +1 more source

