Results 121 to 130 of about 115,293 (296)

Anatomy as embodied resistance in an age of digital abstraction

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Amid the accelerating integration of digital technologies in the health professional education, anatomy education with an emphasis on engagement with real human bodies can provide a crucial counterweight to digital abstraction. Rapid advances in artificial intelligence and algorithm‐driven medicine may lead to the intrinsic value of embodied ...
Claudia Krebs, Sabine Hildebrandt
wiley   +1 more source

Exploring the relationship between entertainment and education in anatomy public engagement: A qualitative examination of anatomists' perspectives

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Entertainment is deeply rooted in education, from wise‐cracking teachers to health documentaries. In the context of anatomy, this already complex relationship is entwined with deeply significant ethical considerations, often related to the field's reliance on human tissue, yet it remains unexplored.
Lucas D. Wilmshurst   +4 more
wiley   +1 more source

Data, not documents: Moving beyond theories of information‐seeking behavior to advance data discovery

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 4, Page 649-664, April 2025.
Abstract Many theories of human information behavior (HIB) assume that information objects are in text document format. This paper argues four important HIB theories are insufficient for describing users' search strategies for data because of assumptions about the attributes of objects that users seek.
Anthony J. Million   +3 more
wiley   +1 more source

Research and implementation of data security for mobile terminal based on TEE

open access: yesDianxin kexue, 2017
The three kinds of data security scheme for mobile terminal were analyzed and compared. The framework of data security for mobile terminal based on TEE was proposed, and the typical mobile payment scheme based on TEE was discussed.
Shuzhen CHEN, Minwei YANG, Yao HE
doaj   +2 more sources

Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain

open access: gold, 2020
Jieren Cheng   +5 more
openalex   +1 more source

Essential work, invisible workers: The role of digital curation in COVID‐19 Open Science

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 4, Page 703-717, April 2025.
Abstract In this paper, we examine the role digital curation practices and practitioners played in facilitating open science (OS) initiatives amid the COVID‐19 pandemic. In Summer 2023, we conducted a content analysis of available information regarding 50 OS initiatives that emerged—or substantially shifted their focus—between 2020 and 2022 to address ...
Irene V. Pasquetto   +2 more
wiley   +1 more source

Envisaging Data Nirvana: A Delphi study of ideal data culture

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract In recent decades, the proliferation of data and advances in information technology have led organizations to value data more highly and aim to build a data culture that is suitable for promoting and sustaining data‐related strategic outcomes. However, what a “good” data culture comprises is often expressed abstractly and there is no consensus
Jocelyn Cranefield   +3 more
wiley   +1 more source

Usage of the term provenance in LIS literature: An Annual Review of Information Science and Technology (ARIST) paper

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract Provenance is the story of how something has come to be. In this paper, we provide a systematic literature review to categorize the various notions of provenance in Information Sciences. The goal of this review is to paint a broader picture of the multiple uses of provenance at play and to enhance our understanding of the importance of ...
Rhiannon Bettivia   +2 more
wiley   +1 more source

BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution Environment

open access: green, 2020
Guoxiong Su   +5 more
openalex   +2 more sources

The issues caused by misinformation—How workers and organizations deal with it: A systematic literature review

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy