Zeitschriftenartikel zum Thema „Primary User Privacy“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Primary User Privacy" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Clark, Matthew, und Konstantinos Psounis. „Optimizing Primary User Privacy in Spectrum Sharing Systems“. IEEE/ACM Transactions on Networking 28, Nr. 2 (April 2020): 533–46. http://dx.doi.org/10.1109/tnet.2020.2967776.
Der volle Inhalt der QuelleJagwani, Priti, und Saroj Kaushik. „Entropy-Based Quantification of Privacy Attained Through User Profile Similarity“. International Journal of Information Security and Privacy 15, Nr. 3 (Juli 2021): 19–32. http://dx.doi.org/10.4018/ijisp.2021070102.
Der volle Inhalt der QuelleUllah, Mohib, Muhammad Arshad Islam, Rafiullah Khan, Muhammad Aleem und Muhammad Azhar Iqbal. „ObSecure Logging (OSLo): A Framework to Protect and Evaluate the Web Search Privacy in Health Care Domain“. Journal of Medical Imaging and Health Informatics 9, Nr. 6 (01.08.2019): 1181–90. http://dx.doi.org/10.1166/jmihi.2019.2708.
Der volle Inhalt der QuelleJaiswal, Mimansa, und Emily Mower Provost. „Privacy Enhanced Multimodal Neural Representations for Emotion Recognition“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 05 (03.04.2020): 7985–93. http://dx.doi.org/10.1609/aaai.v34i05.6307.
Der volle Inhalt der QuelleAlMarzooqi, Fatima Mohamed, Immanuel Azaad Moonesar und Raeda AlQutob. „Healthcare Professional and User Perceptions of eHealth Data and Record Privacy in Dubai“. Information 11, Nr. 9 (28.08.2020): 415. http://dx.doi.org/10.3390/info11090415.
Der volle Inhalt der QuelleS. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund und Gholamreza Anbarjafari. „Privacy-Constrained Biometric System for Non-Cooperative Users“. Entropy 21, Nr. 11 (24.10.2019): 1033. http://dx.doi.org/10.3390/e21111033.
Der volle Inhalt der QuelleGhosh, Isha, und Vivek Singh. „Phones, privacy, and predictions“. Online Information Review 44, Nr. 2 (23.10.2018): 483–502. http://dx.doi.org/10.1108/oir-03-2018-0112.
Der volle Inhalt der QuelleDeni Ardiansyah und Lies Handrijaningsih. „The Impact Of E-Service Quality To Wards Customre Satisfaction On The User Of Internet Banking In PT. Bank Rakyat Indonesia Tbk (Persero)“. International Journal of Science, Technology & Management 2, Nr. 4 (25.07.2021): 1415–22. http://dx.doi.org/10.46729/ijstm.v2i4.254.
Der volle Inhalt der QuelleCohn, Ellen R., und Jana Cason. „Editors' Note“. International Journal of Telerehabilitation 9, Nr. 1 (29.06.2017): 1–2. http://dx.doi.org/10.5195/ijt.2017.6221.
Der volle Inhalt der QuelleSharma, Dhruti P., und Devesh C. Jinwala. „Aggregate Searchable Encryption With Result Privacy“. International Journal of Information Security and Privacy 14, Nr. 2 (April 2020): 62–82. http://dx.doi.org/10.4018/ijisp.2020040104.
Der volle Inhalt der QuelleBrandtzaeg, Petter Bae, Antoine Pultier und Gro Mette Moen. „Losing Control to Data-Hungry Apps: A Mixed-Methods Approach to Mobile App Privacy“. Social Science Computer Review 37, Nr. 4 (31.05.2018): 466–88. http://dx.doi.org/10.1177/0894439318777706.
Der volle Inhalt der QuelleChiasson, Sonia, Heather Crawford, Serge Egelman und Pourang Irani. „Reflections on U-PriSM 2“. International Journal of Mobile Human Computer Interaction 6, Nr. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.
Der volle Inhalt der QuelleEt. al., Sarita Motghare,. „IMPLEMENTATION OF PRIVACY PRESERVING AND DYNAMIC SEARCHING MECHANISM WITH BIOMETRIC AUTHENTICATION IN CLOUD STORAGE“. INFORMATION TECHNOLOGY IN INDUSTRY 9, Nr. 2 (10.04.2021): 894–912. http://dx.doi.org/10.17762/itii.v9i2.427.
Der volle Inhalt der QuelleWest, Sarah Myers. „Data Capitalism: Redefining the Logics of Surveillance and Privacy“. Business & Society 58, Nr. 1 (05.07.2017): 20–41. http://dx.doi.org/10.1177/0007650317718185.
Der volle Inhalt der QuelleHailemeskal, Meklit Berhan, Yuliia Sereda, Alisher Latypov, Tetiana Kiriazova und Nata Avaliani. „Perceived quality of HIV care and client satisfaction across different service providers in Ukraine“. European Journal of Public Health 30, Nr. 1 (03.07.2019): 23–30. http://dx.doi.org/10.1093/eurpub/ckz124.
Der volle Inhalt der QuelleHernández-Ramírez, Rodrigo. „On False Augmented Agency and What Surveillance Capitalism and User-Centered Design Have to Do With It“. Journal of Science and Technology of the Arts 11, Nr. 2 (29.12.2019): 18–27. http://dx.doi.org/10.7559/citarj.v11i2.667.
Der volle Inhalt der QuelleCaplan, Susan, Angelina Sosa Lovera, Esther Veloz Comas und Jonas Attilus. „A Mobile App to Prevent Depression Among Low-Income Primary Care Patients in the Dominican Republic: Sociocultural Adaptations“. Journal of Transcultural Nursing 31, Nr. 4 (19.03.2020): 413–24. http://dx.doi.org/10.1177/1043659620912315.
Der volle Inhalt der QuellePraveen Kumar, K., und M. Anitha. „A survey on privacy preserving and content protecting location based queries“. International Journal of Engineering & Technology 7, Nr. 1.5 (31.12.2017): 185. http://dx.doi.org/10.14419/ijet.v7i1.5.9144.
Der volle Inhalt der QuelleCheishvili, Sophio. „The Development of and the Effect of Electronic Speaking Portfolios on Learners’ Academic Performance in English as a Foreign Language Classes in Primary School“. Journal of Education in Black Sea Region 4, Nr. 1 (09.12.2018): 53–66. http://dx.doi.org/10.31578/jebs.v4i1.154.
Der volle Inhalt der QuelleHoang, Nguyen Phong, Arian Akhavan Niaki, Phillipa Gill und Michalis Polychronakis. „Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting“. Proceedings on Privacy Enhancing Technologies 2021, Nr. 4 (23.07.2021): 420–40. http://dx.doi.org/10.2478/popets-2021-0078.
Der volle Inhalt der QuelleMirshekari, Abbas, Ramin Ghasemi und Alireza Fattahi. „DIGITAL ACCOUNTS AFTER DEATH: A CASE STUDY IN IRAN LAW“. UUM Journal of Legal Studies 11 (31.07.2020): 153–82. http://dx.doi.org/10.32890/uumjls.11.2.2020.7505.
Der volle Inhalt der QuelleShrestha, Ajay K., Julita Vassileva, Sandhya Joshi und Jennifer Just. „Augmenting the technology acceptance model with trust model for the initial adoption of a blockchain-based system“. PeerJ Computer Science 7 (21.05.2021): e502. http://dx.doi.org/10.7717/peerj-cs.502.
Der volle Inhalt der QuelleDenham, Megan E., Yousef Bushehri und Lisa Lim. „Through the Eyes of the User: Evaluating Neonatal Intensive Care Unit Design“. HERD: Health Environments Research & Design Journal 11, Nr. 3 (04.03.2018): 49–65. http://dx.doi.org/10.1177/1937586718761017.
Der volle Inhalt der QuelleDurresi, Arjan, Mimoza Durresi und Leonard Barolli. „Secure Authentication in Heterogeneous Wireless Networks“. Mobile Information Systems 4, Nr. 2 (2008): 119–30. http://dx.doi.org/10.1155/2008/135848.
Der volle Inhalt der QuelleRossmaier, Leon. „Commercial Mhealth Apps and Exploitative Value Trade-Offs“. Studia Universitatis Babeş-Bolyai Bioethica 66, Special Issue (09.09.2021): 148. http://dx.doi.org/10.24193/subbbioethica.2021.spiss.98.
Der volle Inhalt der QuelleChandel, Sonali, Geng Yang und Sumit Chakravarty. „RSA-CP-IDABE: A Secure Framework for Multi-User and Multi-Owner Cloud Environment“. Information 11, Nr. 8 (29.07.2020): 382. http://dx.doi.org/10.3390/info11080382.
Der volle Inhalt der QuelleParakh, Santosh, Prakash Ukhalkar und Leena Sanu. „Digital Wallet and Mobile Banking Adoption Among Rural Bank Customer“. International Research Journal of Business Studies 13, Nr. 3 (20.12.2020): 215–26. http://dx.doi.org/10.21632/irjbs.13.3.215-226.
Der volle Inhalt der Quellevan Hoof, J., E. J. M. Wouters, H. R. Marston, B. Vanrumste und R. A. Overdiep. „Ambient Assisted Living and Care in The Netherlands“. International Journal of Ambient Computing and Intelligence 3, Nr. 4 (Oktober 2011): 25–40. http://dx.doi.org/10.4018/jaci.2011100103.
Der volle Inhalt der QuellePoss-Doering, Regina, Aline Kunz, Sabrina Pohlmann, Helene Hofmann, Marion Kiel, Eva C. Winkler, Dominik Ose und Joachim Szecsenyi. „Utilizing a Prototype Patient-Controlled Electronic Health Record in Germany: Qualitative Analysis of User-Reported Perceptions and Perspectives“. JMIR Formative Research 2, Nr. 2 (03.08.2018): e10411. http://dx.doi.org/10.2196/10411.
Der volle Inhalt der QuelleAngeletti, Fabio, Ioannis Chatzigiannakis und Andrea Vitaletti. „Towards an Architecture to Guarantee Both Data Privacy and Utility in the First Phases of Digital Clinical Trials“. Sensors 18, Nr. 12 (28.11.2018): 4175. http://dx.doi.org/10.3390/s18124175.
Der volle Inhalt der QuelleFadrique, Laura X., Dia Rahman, Hélène Vaillancourt, Paul Boissonneault, Tania Donovska und Plinio P. Morita. „Overview of Policies, Guidelines, and Standards for Active Assisted Living Data Exchange: Thematic Analysis“. JMIR mHealth and uHealth 8, Nr. 6 (22.06.2020): e15923. http://dx.doi.org/10.2196/15923.
Der volle Inhalt der QuelleHelm, Jim E. „Distributed Internet voting architecture: A thin client approach to Internet voting“. Journal of Information Technology 36, Nr. 2 (15.02.2021): 128–53. http://dx.doi.org/10.1177/0268396220978983.
Der volle Inhalt der QuelleNadhamuni, Sunita, Oommen John, Mallari Kulkarni, Eshan Nanda, Sethuraman Venkatraman, Devesh Varma, Satchit Balsari et al. „Driving digital transformation of comprehensive primary health services at scale in India: an enterprise architecture framework“. BMJ Global Health 6, Suppl 5 (Juli 2021): e005242. http://dx.doi.org/10.1136/bmjgh-2021-005242.
Der volle Inhalt der QuelleWitzel, T. Charles, Andy Guise, Will Nutland und Adam Bourne. „It Starts With Me: Privacy concerns and stigma in the evaluation of a Facebook health promotion intervention“. Sexual Health 13, Nr. 3 (2016): 228. http://dx.doi.org/10.1071/sh15231.
Der volle Inhalt der QuelleKocaballi, Ahmet Baki, Shlomo Berkovsky, Juan C. Quiroz, Liliana Laranjo, Huong Ly Tong, Dana Rezazadegan, Agustina Briatore und Enrico Coiera. „The Personalization of Conversational Agents in Health Care: Systematic Review“. Journal of Medical Internet Research 21, Nr. 11 (07.11.2019): e15360. http://dx.doi.org/10.2196/15360.
Der volle Inhalt der QuelleRizkyantha, Okky. „The Roles of Archive Institution on Indonesia Public Information Disclosure In Digital Era“. Pustabiblia: Journal of Library and Information Science 1, Nr. 2 (27.02.2018): 139. http://dx.doi.org/10.18326/pustabiblia.v1i2.139-154.
Der volle Inhalt der QuelleRizkyantha, Okky. „The Roles of Archive Institution on Indonesia Public Information Disclosure In Digital Era“. Pustabiblia: Journal of Library and Information Science 1, Nr. 2 (16.12.2017): 19. http://dx.doi.org/10.18326/pustabiblia.v1i2.19-34.
Der volle Inhalt der QuellePanchal, Marcus, Sukhpreet Singh und Esther Rodriguez-Villegas. „Analysis of the factors affecting the adoption and compliance of the NHS COVID-19 mobile application: a national cross-sectional survey in England“. BMJ Open 11, Nr. 8 (August 2021): e053395. http://dx.doi.org/10.1136/bmjopen-2021-053395.
Der volle Inhalt der QuelleKim, Ho Heon, Bora Kim, Segyeong Joo, Soo-Yong Shin, Hyo Soung Cha und Yu Rang Park. „Why Do Data Users Say Health Care Data Are Difficult to Use? A Cross-Sectional Survey Study“. Journal of Medical Internet Research 21, Nr. 8 (06.08.2019): e14126. http://dx.doi.org/10.2196/14126.
Der volle Inhalt der QuelleResnick, Marc, William Albert und Yunzhi Huang. „The Attention Grabbing Salience of Viscerally Engaging Images“. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, Nr. 1 (September 2016): 745–49. http://dx.doi.org/10.1177/1541931213601171.
Der volle Inhalt der QuelleWalonoski, Jason, Mark Kramer, Joseph Nichols, Andre Quina, Chris Moesel, Dylan Hall, Carlton Duffett, Kudakwashe Dube, Thomas Gallagher und Scott McLachlan. „Synthea: An approach, method, and software mechanism for generating synthetic patients and the synthetic electronic health care record“. Journal of the American Medical Informatics Association 25, Nr. 3 (30.08.2017): 230–38. http://dx.doi.org/10.1093/jamia/ocx079.
Der volle Inhalt der QuelleDexheimer, Judith W., Mary V. Greiner, Sarah J. Beal, Darius Johnson, Andrea Kachelmeyer und Lisa M. Vaughn. „Sharing personal health record data elements in protective custody: youth and stakeholder perspectives“. Journal of the American Medical Informatics Association 26, Nr. 8-9 (31.07.2019): 714–21. http://dx.doi.org/10.1093/jamia/ocz067.
Der volle Inhalt der QuelleLazarou, Ioulietta, Thanos G. Stavropoulos, Lampros Mpaltadoros, Spiros Nikolopoulos, George Koumanakos, Magda Tsolaki und Ioannis (Yiannis) Kompatsiaris. „Human Factors and Requirements of People with Cognitive Impairment, Their Caregivers, and Healthcare Professionals for mHealth Apps Including Reminders, Games, and Geolocation Tracking: A Survey-Questionnaire Study“. Journal of Alzheimer's Disease Reports 5, Nr. 1 (11.06.2021): 497–513. http://dx.doi.org/10.3233/adr-201001.
Der volle Inhalt der QuelleH.L., Meghana, Asish Oommen Mathew und Lewlyn L. R. Rodrigues. „Prioritizing the factors affecting cloud ERP adoption – an analytic hierarchy process approach“. International Journal of Emerging Markets 13, Nr. 6 (29.11.2018): 1559–77. http://dx.doi.org/10.1108/ijoem-10-2017-0404.
Der volle Inhalt der QuelleWang, Jingyi, Sai Mounika Errapotu, Yanmin Gong, Lijun Qian, Riku Jantti, Miao Pan und Zhu Han. „Data-Driven Optimization Based Primary Users’ Operational Privacy Preservation“. IEEE Transactions on Cognitive Communications and Networking 4, Nr. 2 (Juni 2018): 357–67. http://dx.doi.org/10.1109/tccn.2018.2837876.
Der volle Inhalt der QuelleJess, Mia, Helle Timm und Karin B. Dieperink. „Video consultations in palliative care: A systematic integrative review“. Palliative Medicine 33, Nr. 8 (12.06.2019): 942–58. http://dx.doi.org/10.1177/0269216319854938.
Der volle Inhalt der QuelleAldholay, Adnan, Zaini Abdullah, Osama Isaac und Ahmed M. Mutahar. „Perspective of Yemeni students on use of online learning“. Information Technology & People 33, Nr. 1 (30.04.2019): 106–28. http://dx.doi.org/10.1108/itp-02-2018-0095.
Der volle Inhalt der QuelleCarini, Elettra, Leonardo Villani, Angelo Maria Pezzullo, Andrea Gentili, Andrea Barbara, Walter Ricciardi und Stefania Boccia. „The Impact of Digital Patient Portals on Health Outcomes, System Efficiency, and Patient Attitudes: Updated Systematic Literature Review“. Journal of Medical Internet Research 23, Nr. 9 (08.09.2021): e26189. http://dx.doi.org/10.2196/26189.
Der volle Inhalt der QuelleMcDonnell, Karen Kane, Otis L. Owens, Jenay M. Beer, Kasey Smith, Taylor Kennedy, Dane Acena und David Gallerani. „Empowering lung cancer survivors and family members to “breathe easier”: Adaptation and evaluation of a m-health intervention.“ Journal of Clinical Oncology 37, Nr. 15_suppl (20.05.2019): e23046-e23046. http://dx.doi.org/10.1200/jco.2019.37.15_suppl.e23046.
Der volle Inhalt der QuelleShepley, Andrew, Greg Falzon, Christopher Lawson, Paul Meek und Paul Kwan. „U-Infuse: Democratization of Customizable Deep Learning for Object Detection“. Sensors 21, Nr. 8 (08.04.2021): 2611. http://dx.doi.org/10.3390/s21082611.
Der volle Inhalt der Quelle