Results 41 to 50 of about 470,699 (271)
Parent‐to‐Child Information Disclosure in Pediatric Oncology
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor +12 more
wiley +1 more source
Background Healthcare and administrative staff working with asylum seekers are at risk of burnout, compassion fatigue and vicarious traumatization. Moreover, they face a series of crises, with the refugee crisis in 2015–2016, the Covid-19 pandemic, the ...
Léa Grosjean +7 more
doaj +1 more source
Protocol of a longitudinal study on the specific needs of Syrian refugee families in Switzerland
Background The ongoing Syrian civil war has led to massive population displacements, leading to the reorganization of the asylum policies of several countries.
Nahema El Ghaziri +7 more
doaj +1 more source
Security is a significant priority for cloud-native systems, regardless of the system size and complexity. Therefore, one must utilize a set of defensive mechanisms or controls to protect the system from exploitation by potential adversaries. There is an
Md Shahidur Rahaman +3 more
doaj +1 more source
Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack +12 more
wiley +1 more source
Ranking occupations by their proximity to workers’ profiles
Information friction makes it difficult for job seekers to find new employment opportunities. We propose a method for providing individual-specific occupation recommendations by ranking occupations based on their proximity to the worker’s profile.
Mirjam Bächli +7 more
doaj +1 more source
New Threats and Innovative Protection Methods in Wireless Transmission Systems
Many improvements in the field of wireless communication can be observed nowadays. Some developments are gradual, others are revolutionary. It is obvious that each innovation in the area may lead to new security threats and vulnerabilities.
Tomasz Bilski
doaj +1 more source
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher than the respective average case for particular user-controlled inputs.
Betts A. +5 more
core +1 more source
DeepSQLi: Deep Semantic Learning for Testing SQL Injection
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi +15 more
core +1 more source
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn +4 more
wiley +1 more source

