Journal articles on the topic 'Confidentialité des clients'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Confidentialité des clients.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Brasel, Kelsey R., and Brian E. Daugherty. "Cook and Thomas, LLC: Balancing Auditor Liability, Client Confidentiality, and the Public Interest." Issues in Accounting Education 32, no. 1 (October 1, 2015): 17–32. http://dx.doi.org/10.2308/iace-51318.
Full textP., Usha Rani S., Rashmi Kundapur, Anusha Rashmi, and Harsha Acharya. "Client Satisfaction among the clients attending tertiary care centers in Mangalore, South India." Journal of Health and Allied Sciences NU 07, no. 03 (September 2017): 003–6. http://dx.doi.org/10.1055/s-0040-1708716.
Full textEzhova, E. V. "SOME PROBLEMS OF ENSURING THE PROTECTION OF ATTORNEY-CLIENT PRIVILEGE IN THE CRIMINAL PROCESS OF RUSSIA AND BELARUS." Juvenis scientia, no. 9 (September 30, 2018): 41–43. http://dx.doi.org/10.32415/jscientia.2018.09.08.
Full textUys, Leana R. "Confidentiality and HIV/AIDS in South Africa." Nursing Ethics 7, no. 2 (March 2000): 158–66. http://dx.doi.org/10.1177/096973300000700209.
Full textBingulac, Nenad, and Dragan Miljenović. "Lawyer confidentiality." Pravo - teorija i praksa 38, no. 3 (2021): 42–52. http://dx.doi.org/10.5937/ptp2103042b.
Full textGrimley-Baker, Kathy. "Ethical Implications of Mandatory Reporting of Intimate Partner Violence." Creative Nursing 20, no. 4 (2014): 254–57. http://dx.doi.org/10.1891/1078-4535.20.4.254.
Full textHamon, Jessie K., Jenna Hoyt, Shari Krishnaratne, Ariko Angela Barbra, Job Morukileng, Nathaly Spilotros, Miriam Mbembe, Seth Marcus, and Jayne Webster. "Perceptions of quality and the integrated delivery of family planning with childhood immunisation services in Kenya and Uganda." PLOS ONE 17, no. 6 (June 6, 2022): e0269690. http://dx.doi.org/10.1371/journal.pone.0269690.
Full textZaidi, Syeda Masooma. "Innovative Commercial and Private Genetic Testing Raises Privacy and Confidentiality Concerns." Sciential - McMaster Undergraduate Science Journal, no. 1 (November 25, 2018): 31–33. http://dx.doi.org/10.15173/sciential.v1i1.1902.
Full textOrdway, Ann M., and Arielle F. Casasnovas. "A Subpoena: The Other Exception to Confidentiality." Family Journal 27, no. 4 (August 21, 2019): 352–58. http://dx.doi.org/10.1177/1066480719868701.
Full textNishkala, H. M., S. H. Anu, D. A. Bindushree, and S. L. Manoj. "Data Partitioning and Reduplication for Providing Integrity to Data in the Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4070–74. http://dx.doi.org/10.1166/jctn.2020.9021.
Full textNord, Catharina. "Confidentiality in Architectural Space: A Study of HIV Healthcare Facilities in Uganda." Open House International 33, no. 4 (December 1, 2008): 53–62. http://dx.doi.org/10.1108/ohi-04-2008-b0007.
Full textSnyder, Herbert, and Reed McKnight. "Client Confidentiality and Fraud." Business and Professional Ethics Journal 23, no. 1 (2004): 245–57. http://dx.doi.org/10.5840/bpej2004231/231.
Full textPizzimenti, Lee A. "Informing Clients About Limits to Confidentiality." Business and Professional Ethics Journal 9, no. 1 (1990): 207–22. http://dx.doi.org/10.5840/bpej199091/24.
Full textFouque, Pierre-Alain, Cristina Onete, and Benjamin Richard. "Achieving Better Privacy for the 3GPP AKA Protocol." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (October 1, 2016): 255–75. http://dx.doi.org/10.1515/popets-2016-0039.
Full textIkerionwu, Charles, David Edgar, and Edwin Gray. "The development of service provider’s BPO-IT framework." Business Process Management Journal 23, no. 5 (September 4, 2017): 897–917. http://dx.doi.org/10.1108/bpmj-10-2015-0146.
Full textSafdar, Muhammad Asif, Waqas Rafiq, and Farhana Aziz Rana. "Legal Ethics and Privilege Communication." Journal of Law & Social Studies 4, no. 3 (September 30, 2022): 449–57. http://dx.doi.org/10.52279/jlss.04.03.449457.
Full textLemons-Lyn, Ansley, William Reidy, Wah Wah Myint, Khin N. Chan, Elaine Abrams, Zaw Zaw Aung, Irene Benech, et al. "Optimizing HIV Services for Key Populations in Public-Sector Clinics in Myanmar." Journal of the International Association of Providers of AIDS Care (JIAPAC) 20 (January 2021): 232595822110559. http://dx.doi.org/10.1177/23259582211055933.
Full textBlackwell, Terry L., Jan C. Case, Mary Barros-Bailey, and Ashley K. Waldmann. "Special Issues in Rehabilitation Counselor Ethics in Disasters." Journal of Applied Rehabilitation Counseling 40, no. 1 (March 1, 2009): 14–26. http://dx.doi.org/10.1891/0047-2220.40.1.14.
Full textPatronek, Gary J. "Issues for Veterinarians in Recognizing and Reporting Animal Neglect and Abuse." Society & Animals 5, no. 3 (1997): 267–80. http://dx.doi.org/10.1163/156853097x00178.
Full textWoodall, Jean. "Adventure Training and Client Confidentiality." Advances in Developing Human Resources 3, no. 1 (February 2001): 21–25. http://dx.doi.org/10.1177/15234220122238210.
Full textSim, Julius. "Client Confidentiality: Ethical Issues in Occupational Therapy." British Journal of Occupational Therapy 59, no. 2 (February 1996): 56–61. http://dx.doi.org/10.1177/030802269605900204.
Full textNaudé, Alida, and Juan Bornman. "Using Nominal Group Technique to Identify Key Ethical Concerns Regarding Hearing Aids With Machine Learning." Perspectives of the ASHA Special Interest Groups 6, no. 6 (December 17, 2021): 1800–1808. http://dx.doi.org/10.1044/2021_persp-21-00126.
Full textRyder, Nathan, and Anna M. McNulty. "Confidentiality and access to sexual health services." Sexual Health 6, no. 2 (2009): 153. http://dx.doi.org/10.1071/sh08078.
Full textKatz, Anna J., Ana Maria Ramirez, Chiara Bercu, Sofia Filippa, Osasuyi Dirisu, Ijeoma Egwuatu, Sybil Nmezi, Lucky Palmer, and Sarah E. Baum. "“I just have to hope that this abortion should go well”: Perceptions, fears, and experiences of abortion clients in Nigeria." PLOS ONE 17, no. 2 (February 7, 2022): e0263072. http://dx.doi.org/10.1371/journal.pone.0263072.
Full textSaud Al Alawi, Saad Rashid, Muhammad Muqeet Ullah, Ahmed Yar Mohammed Dawood Al Balushi, Rajeev Kashyap, and Vandita Kailas Patil. "Rapid HIV Testing in Al Buraimi Governorate Sultanate of Oman: A Cross Sectional Study." Global Journal of Health Science 10, no. 11 (October 24, 2018): 153. http://dx.doi.org/10.5539/gjhs.v10n11p153.
Full textHunter, Richard J., and John H. Shannon. "Assessing Confidentiality in the Lawyer-Client Relationship: A Client Perspective." Advances in Social Sciences Research Journal 9, no. 10 (October 28, 2022): 418–30. http://dx.doi.org/10.14738/assrj.910.13320.
Full textAnonymous. "Confidentiality-Protecting Yourself and Your Client." Journal of Psychosocial Nursing and Mental Health Services 26, no. 6 (June 1988): 34. http://dx.doi.org/10.3928/0279-3695-19880601-11.
Full textRubanowitz, Daniel E. "Public attitudes toward psychotherapist-client confidentiality." Professional Psychology: Research and Practice 18, no. 6 (December 1987): 613–18. http://dx.doi.org/10.1037/0735-7028.18.6.613.
Full text6, Perri, Christine Bellamy, Charles Raab, and Adam Warren. "Partnership and Privacy – Tension or Settlement? The Case of Adult Mental Health Services." Social Policy and Society 5, no. 2 (April 2006): 237–48. http://dx.doi.org/10.1017/s1474746405002927.
Full textZipursky, Benjamin C. "Loyalty and Disclosure in Legal Ethics." American Journal of Jurisprudence 65, no. 1 (June 1, 2020): 83–107. http://dx.doi.org/10.1093/ajj/auaa005.
Full textAllison, Althea, and Ann Ewens. "Tensions in Sharing Client Confidences While Respecting Autonomy: implications for interprofessional practice." Nursing Ethics 5, no. 5 (September 1998): 441–50. http://dx.doi.org/10.1177/096973309800500507.
Full textPerlson, Jacob, Blake Kruger, Sravanthi Padullaparti, Elizabeth Eccles, and Tim Lahey. "1290. A Model for “At-Distance” PrEP Navigation: Acceptability and Early Insights." Open Forum Infectious Diseases 5, suppl_1 (November 2018): S394. http://dx.doi.org/10.1093/ofid/ofy210.1123.
Full textCain, Paul. "The Limits of Confidentiality." Nursing Ethics 5, no. 2 (March 1998): 158–65. http://dx.doi.org/10.1177/096973309800500207.
Full textPark, Cheolhee, Hyunil Kim, Dowon Hong, and Changho Seo. "A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments." Security and Communication Networks 2018 (November 1, 2018): 1–16. http://dx.doi.org/10.1155/2018/2193897.
Full textOccupational Therapists, World Federation Of. "World Federation of Occupational Therapists' Position Statement on Telehealth." International Journal of Telerehabilitation 6, no. 1 (September 3, 2014): 37–40. http://dx.doi.org/10.5195/ijt.2014.6153.
Full textTam, Ekman P. C. "Ethical Issues in Counseling with Gay and Lesbian Clients: Conversion Therapy and Confidentiality Limits." Journal of Pastoral Care 51, no. 1 (March 1997): 13–24. http://dx.doi.org/10.1177/002234099705100103.
Full textFaustman, William O., and David J. Miller. "Considerations in Prewarning Clients of the Limitations of Confidentiality." Psychological Reports 60, no. 1 (February 1987): 195–98. http://dx.doi.org/10.2466/pr0.1987.60.1.195.
Full textGustafson, Kathryn E., and J. Regis McNamara. "Confidentiality with minor clients: Issues and guidelines for therapists." Professional Psychology: Research and Practice 18, no. 5 (1987): 503–8. http://dx.doi.org/10.1037/0735-7028.18.5.503.
Full textGRAY, LIZBETH A., and ANNA K. HARDING. "Confidentiality Limits with Clients Who Have the AIDS Virus." Journal of Counseling & Development 66, no. 5 (January 1988): 219–23. http://dx.doi.org/10.1002/j.1556-6676.1988.tb00851.x.
Full textIssad, M., N. Anane, A. M. Bellemou, and B. Boudraa. "Secure Hybrid Crypto-system AES/RSA on FPGA for Data Communication." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (June 30, 2020): 14–23. http://dx.doi.org/10.37231/myjcam.2020.3.1.38.
Full textCurtis, Patrick Almond, and Anita M. Lutkus. "Client Confidentiality in Police Social Work Settings." Social Work 30, no. 4 (July 1, 1985): 355–60. http://dx.doi.org/10.1093/sw/30.4.355.
Full textGlen, Sally. "Confidentiality: a critique of the traditional view." Nursing Ethics 4, no. 5 (September 1997): 403–6. http://dx.doi.org/10.1177/096973309700400506.
Full textChristofferson, Sarah M. Beggs. "Is Preventive Treatment for Individuals With Sexual Interest in Children Viable in a Discretionary Reporting Context?" Journal of Interpersonal Violence 34, no. 20 (September 5, 2019): 4254–80. http://dx.doi.org/10.1177/0886260519869236.
Full textRUIZ, ROCIO. "PRINCIPIO DE ÉTICA; CONFIDENCIALIDAD EN LA PROFESIÓN CONTABLE." Pensamiento Republicano 13 (January 31, 2021): 89–99. http://dx.doi.org/10.21017/pen.repub.2021.n13.a77.
Full textVukosavljevic-Gvozden, Tatjana. "Confidentiality in psychotherapy: Some of actual dilemmas." Psihologija 37, no. 1 (2004): 33–50. http://dx.doi.org/10.2298/psi0401033v.
Full textCeolta-Smith, Jenny, and Christine Kenney. "Healthcare professionals' roles within UK welfare-to-work provision: a multiple case study exploration." International Journal of Therapy and Rehabilitation 28, no. 7 (July 2, 2021): 1–24. http://dx.doi.org/10.12968/ijtr.2019.0115.
Full textVandeCreek, Leon, Samuel Knapp, and Cindy Herzog. "Privileged Communications for Social Workers." Social Casework 69, no. 1 (January 1988): 28–34. http://dx.doi.org/10.1177/104438948806900105.
Full textJoe, Jennifer, Arnold Wright, and, and Sally Wright. "The Impact of Client and Misstatement Characteristics on the Disposition of Proposed Audit Adjustments." AUDITING: A Journal of Practice & Theory 30, no. 2 (May 1, 2011): 103–24. http://dx.doi.org/10.2308/ajpt-50007.
Full textMittal, Sonam, Shagun Sharma, and K. R. Ramkumar. "A Matrix-Based Homomorphic Encryption for Preserving Privacy in Clouds." ECS Transactions 107, no. 1 (April 24, 2022): 5441–48. http://dx.doi.org/10.1149/10701.5441ecst.
Full textSun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu, and Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.
Full text