Journal articles on the topic 'Confidentiality of sources'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Confidentiality of sources.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Emslie, J. A., and P. Christie. "Confidentiality for doctors with AIDS. Official sources maintained confidentiality." BMJ 307, no. 6903 (August 28, 1993): 566. http://dx.doi.org/10.1136/bmj.307.6903.566-a.
Full textHarala, Riitta, and Anna-Leena Reinikainen. "Confidentiality in the use of administrative data sources." Statistical Journal of the United Nations Economic Commission for Europe 13, no. 4 (December 1, 1996): 361–68. http://dx.doi.org/10.3233/sju-1996-13404.
Full textAlexander, Laurence B. "Civil Liability for Journalists Who Violate Agreements of Confidentiality with Sources." Newspaper Research Journal 14, no. 3-4 (June 1993): 45–59. http://dx.doi.org/10.1177/073953299301400306.
Full textWOLANIUK, Leszek. "SELECTED PROBLEMS OF SECURITY OF INFORMATION CONFIDENTIALITY IN CYBERSPACE." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (October 2, 2017): 194–207. http://dx.doi.org/10.5604/01.3001.0010.7228.
Full textGassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, no. 3 (March 1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.
Full textMcHone-Chase, Sarah. "Sources: Privacy and Confidentiality Issues: A Guide for Libraries and Their Lawyers." Reference & User Services Quarterly 49, no. 1 (September 1, 2009): 104. http://dx.doi.org/10.5860/rusq.49n1.104.
Full textFernandez, Joseph M. "Pass the Source—Journalism’s Confidentiality Bane in the Face of Legislative Onslaughts." Asia Pacific Media Educator 27, no. 2 (October 25, 2017): 202–18. http://dx.doi.org/10.1177/1326365x17728822.
Full textAinsworth, Frank, and Patricia Hansen. "Confidentiality in child protection cases Who benefits?" Children Australia 35, no. 3 (2010): 11–17. http://dx.doi.org/10.1017/s1035077200001127.
Full textSHAHBAZYAN, K. "Contractual and legal regulation of preservation of results of scientific research in confidentiality and use of such information in case of research and development: practices of EU and countries of the world." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 202–13. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249362.
Full textBiałkowska, Paula Maria. "Legal and Ethical Grounds of Professional Secrecy of a Lawyer in Selected European Union Countries and in the United States of America." Review of European and Comparative Law 45, no. 2 (June 16, 2021): 77–103. http://dx.doi.org/10.31743/recl.11456.
Full textZaidi, Syeda Masooma. "Innovative Commercial and Private Genetic Testing Raises Privacy and Confidentiality Concerns." Sciential - McMaster Undergraduate Science Journal, no. 1 (November 25, 2018): 31–33. http://dx.doi.org/10.15173/sciential.v1i1.1902.
Full textSufriadi, Sufriadi, Neneng Patri Yuni, Jamaluddin Jamaluddin, and Maya Kasmita. "The Effectiveness of Communication Ethics in Achieving Learning Objectives at State Vocational High School 4 Makassar." Jurnal Office 5, no. 1 (July 30, 2019): 63. http://dx.doi.org/10.26858/jo.v4i2.9804.
Full textRamafi, Pelonomi, Ignitia Motjolopane, and Koga Gorejena. "Ethical Framework for Multi-Source Big Data Analytics Disease Surveillance in Public Healthcare." International Conference on Artificial Intelligence and its Applications 2023 (November 9, 2023): 65–73. http://dx.doi.org/10.59200/icarti.2023.009.
Full textMadkour, Aubrey Spriggs, Alison Swiatlo, Allison Talan, Kendra LeSar, Marsha Broussard, Carl Kendall, and David Seal. "Sources of Help for Dating Violence Victims: A Qualitative Inquiry Into the Perceptions of African American Teens." Journal of Interpersonal Violence 34, no. 21-22 (October 24, 2016): 4404–20. http://dx.doi.org/10.1177/0886260516675467.
Full textSlattery, P. D., and K. Stammer. "MANAGING CONFIDENTIALITY AND CONFLICTS OF INTEREST IN A COMPETITIVE ENERGY MARKET." APPEA Journal 36, no. 1 (1996): 594. http://dx.doi.org/10.1071/aj95038.
Full textKumar, Rajeev, Renu Popli, Vikas Khullar, Isha Kansal, and Ashutosh Sharma. "Confidentiality Preserved Federated Learning for Indoor Localization Using Wi-Fi Fingerprinting." Buildings 13, no. 8 (August 10, 2023): 2048. http://dx.doi.org/10.3390/buildings13082048.
Full textBirky, Ian, Bruce S. Sharkin, Joe Marin, and Andrew Scappaticci. "Confidentiality after referral: A study of how restrictions on disclosure affect relationships between therapists and referral sources." Professional Psychology: Research and Practice 29, no. 2 (April 1998): 179–82. http://dx.doi.org/10.1037/0735-7028.29.2.179.
Full textSalman Alhidamkara, Ivana Lucia Kharisma, and Kamdan. "Optimize Website Security Implementation of a Comprehensive Website Security Assessment on the Surade 1 Public High School Site." Jurnal CoSciTech (Computer Science and Information Technology) 4, no. 3 (January 1, 2024): 743–53. http://dx.doi.org/10.37859/coscitech.v4i3.6399.
Full textLitzenberg, Kerry K. "Agribusiness And The Agricultural Economics Profession: Research Agendas In Agribusiness." Journal of Agricultural and Applied Economics 24, no. 1 (July 1992): 31–35. http://dx.doi.org/10.1017/s0081305200025905.
Full textZaini, Zulfi Diane, Yulia Hesti, and Rivo Raihanza Passa. "Legal Aspects of Implementing Confidentiality Protection of Customer Fund Deposits at BUMD Bank Lampung." AURELIA: Jurnal Penelitian dan Pengabdian Masyarakat Indonesia 2, no. 1 (January 24, 2023): 195–200. http://dx.doi.org/10.57235/aurelia.v2i1.273.
Full textYu, Jinhu, Yue Han, Kai Zhang, Siyuan Chen, and Jinguo Li. "Blockchain-Based Privacy-Preserving Sensor Data Sharing with Fine-Grained Authorization in Microgrid." Security and Communication Networks 2023 (May 11, 2023): 1–11. http://dx.doi.org/10.1155/2023/9621839.
Full textHolmes, J. H., J. Sun, and N. Peek. "Technical Challenges for Big Data in Biomedicine and Health: Data Sources, Infrastructure, and Analytics." Yearbook of Medical Informatics 23, no. 01 (August 2014): 42–47. http://dx.doi.org/10.15265/iy-2014-0018.
Full textAlbaar, Abdullah, M. Yusuf, and Ragwan Albaar. "The Principle of Confidentiality in Islamic Guidance and Counseling: A Review of Hadith." Jurnal Bimbingan dan Konseling Islam 12, no. 2 (December 31, 2022): 184–207. http://dx.doi.org/10.29080/jbki.2022.12.2.184-207.
Full textErnawati, Endang. "Manajemen Literatur Kelabu sebagai Pendukung Penelitian dan Penulisan Karya Ilmiah." Winners 7, no. 2 (September 30, 2006): 150. http://dx.doi.org/10.21512/tw.v7i2.619.
Full textManmeet, Singh, Ahmed Suhaib, and Sharma Sparsh. "Blockchain-Based Smart Electricity Measurement and Monitoring System: A Survey." i-manager’s Journal on Embedded Systems 11, no. 1 (2022): 12. http://dx.doi.org/10.26634/jes.11.1.19084.
Full textVozár, Ondřej, and Luboš Marek. "Multicriteria Evaluation of Randomized Response Techniques for Population Mean." Statistika: Statistics and Economy Journal 103, no. 4 (December 15, 2023): 492–503. http://dx.doi.org/10.54694/stat.2023.32.
Full textSimanjuntak, Dwi Amanda, and Irwan Padli Nasution. "Perlindungan Platform Halodoc Dalam Menjaga Kerahasiaan Data Pengguna." Jurnal Sains dan Teknologi (JSIT) 3, no. 2 (June 23, 2023): 211–15. http://dx.doi.org/10.47233/jsit.v3i2.884.
Full textVázquez, Adrián. "Protection of Confidential Information in the Mexican Trade Remedy System." Global Trade and Customs Journal 9, Issue 7/8 (July 1, 2014): 298–306. http://dx.doi.org/10.54648/gtcj2014036.
Full textArif Hernawan, Muhammad, Cecep Pahrudin, Muhammad Rifa Affiat, and Siti Nurhayati. "OVERVIEW OF FINANCIAL TECHNOLOGY (FINTECH) IN LOGISTICS: LITERATURE STUDY." Journal of Economics, Management, Entrepreneurship, and Business (JEMEB) 1, no. 1 (May 4, 2021): 72–78. http://dx.doi.org/10.52909/jemeb.v1i1.20.
Full textPrzybysz, Artur, Krystian Grzesiak, and Ireneusz Kubiak. "Electromagnetic Safety of Remote Communication Devices—Videoconference." Symmetry 13, no. 2 (February 16, 2021): 323. http://dx.doi.org/10.3390/sym13020323.
Full textJeon, Hyunsik, Seongmin Lee, and U. Kang. "Unsupervised multi-source domain adaptation with no observable source data." PLOS ONE 16, no. 7 (July 9, 2021): e0253415. http://dx.doi.org/10.1371/journal.pone.0253415.
Full textGalinec, Davor, Jadranka Vuglar, and Dario Cvrtila. "Residential property price index in Croatia: from experimental to official statistics." Croatian Review of Economic, Business and Social Statistics 5, no. 1 (May 1, 2019): 33–42. http://dx.doi.org/10.2478/crebss-2019-0004.
Full textCampbell, Ellsworth M., Anthony Boyles, Anupama Shankar, Jay Kim, Sergey Knyazev, Roxana Cintron, and William M. Switzer. "MicrobeTrace: Retooling molecular epidemiology for rapid public health response." PLOS Computational Biology 17, no. 9 (September 7, 2021): e1009300. http://dx.doi.org/10.1371/journal.pcbi.1009300.
Full textGeraldi, Aldo Rico. "PENYELESAIAN SENGKETA INVESTASI MELALUI INTERNATIONAL CENTRE FOR SETTLEMENT OF INVESTMENT DISPUTE (Studi Kasus Pemerintah Indonesia vs Churchill Mining)." TANJUNGPURA LAW JOURNAL 1, no. 2 (July 28, 2017): 89. http://dx.doi.org/10.26418/tlj.v1i2.24252.
Full textRuiz de la Fuente, Consuelo. "El acceso a las fuentes de prueba en los procesos de daños por actos anticoncurrenciales." Anales de Derecho 41, no. 1 (January 31, 2024): 1–39. http://dx.doi.org/10.6018/analesderecho.558711.
Full textRangan, Febigrace, Aaron Simanjuntak, and Yohanes Seralurin. "Pengaruh Persepsi Kegunaan, Persepsi Kemudahan, Kesiapan Teknologi Informasi, Keamanan Dan Kerahasiaan Terhadap Minat Perilaku Penggunaan E-Filing (Studi Empiris Pada Kantor Pelayanan Pajak Pratama Jayapura)." JURNAL AKUNTANSI DAN KEUANGAN DAERAH 15, no. 2 (November 30, 2020): 111–25. http://dx.doi.org/10.52062/jakd.v15i2.1629.
Full textConte, Raffaele, Francesco Sansone, Alessandro Tonacci, and Anna Paola Pala. "Privacy-by-Design and Minimization within a Small Electronic Health Record: The Health360 Case Study." Applied Sciences 12, no. 17 (August 24, 2022): 8441. http://dx.doi.org/10.3390/app12178441.
Full textWali, Kaka, Bnar Karim Darwish, and Shadan Jabbar Abdulfattah. "Security and confidentiality of information under the application of cloud accounting compared to traditional accounting." Journal of Economics and Administrative Sciences 28, no. 134 (December 31, 2022): 186–204. http://dx.doi.org/10.33095/jeas.v28i134.2430.
Full textFernandez, Joseph, and Mark Pearson. "Shield laws in Australia: Legal and ethical implications for journalists and their confidential sources." Pacific Journalism Review 21, no. 1 (May 1, 2015): 61. http://dx.doi.org/10.24135/pjr.v21i1.148.
Full textPutra, Tegar Islami, Akbar Jihadul Islam, and Abdullah Mufti Abdul Rahman. "Integrating Islamic Laws into Indonesian Data Protection Laws: An Analysis of Regulatory Landscape and Ethical Considerations." Contemporary Issues on Interfaith Law and Society 3, no. 1 (January 31, 2024): 85–118. http://dx.doi.org/10.15294/ciils.v3i1.78690.
Full textNikitkov, Alexei N., Dan N. Stone, and Timothy C. Miller. "Internal Controls, Routine Activity Theory (RAT), and Sustained Online Auction Deception: A Longitudinal Analysis." Journal of Information Systems 28, no. 1 (January 1, 2014): 311–37. http://dx.doi.org/10.2308/isys-50708.
Full textWeinberg, Daniel H., John M. Abowd, Robert F. Belli, Noel Cressie, David C. Folch, Scott H. Holan, Margaret C. Levenstein, et al. "Effects of a Government-Academic Partnership: Has the NSF-CENSUS Bureau Research Network Helped Improve the US Statistical System?" Journal of Survey Statistics and Methodology 7, no. 4 (December 20, 2018): 589–619. http://dx.doi.org/10.1093/jssam/smy023.
Full textIng-udomnoogoon, Kitcha. "Essays on Pharmaceutical Marketing with A Case Study Company." ABC Research Alert 6, no. 3 (December 31, 2018): Thailand. http://dx.doi.org/10.18034/ra.v6i3.336.
Full textAhmed, Omar Saad, Fay Fadhil, Laith H. Jasim Alzubaidi, and Riyadh Al Al-Obaidi. "Fusion Processing Techniques and Bio-inspired Algorithm for E-Communication and Knowledge Transfer." Fusion: Practice and Applications 10, no. 1 (2023): 143–55. http://dx.doi.org/10.54216/fpa.100109.
Full textWardana, I. Wayan Dody Putra, Ni Ketut Supasti Dharmawan, and Ni Luh Gede Astariyani. "Legality for Electronic Signatures in Implementing Electronic Medical Records." JMMR (Jurnal Medicoeticolegal dan Manajemen Rumah Sakit) 12, no. 3 (December 7, 2023): 366–78. http://dx.doi.org/10.18196/jmmr.v12i3.96.
Full textGalea, Patrick. "Legal professional privilege—what do we make of it in jurisdiction Malta? Part 1." Trusts & Trustees 28, no. 2 (December 23, 2021): 104–24. http://dx.doi.org/10.1093/tandt/ttab104.
Full textJannah, Raudatul, and H. K. Marjo. "Etika Profesi Konselor dalam Layanan Bimbingan Konseling Virtual." Jurnal Paedagogy 9, no. 1 (January 7, 2022): 55. http://dx.doi.org/10.33394/jp.v9i1.4556.
Full textSternberg, Kevan M., Stacy L. Loeb, David Canes, Laura Donnelly, and Mitchell H. Tsai. "The use of Twitter to facilitate sharing of clinical expertise in urology." Journal of the American Medical Informatics Association 25, no. 2 (June 7, 2017): 183–86. http://dx.doi.org/10.1093/jamia/ocx055.
Full textAxelrod, Robert Michael. "Criminality and suspicious activity reports." Journal of Financial Crime 24, no. 3 (July 3, 2017): 461–71. http://dx.doi.org/10.1108/jfc-03-2017-0019.
Full textBenrhouma, Oussama, Ahmad B. Alkhodre, Ali AlZahrani, Abdallah Namoun, and Wasim A. Bhat. "Using Singular Value Decomposition and Chaotic Maps for Selective Encryption of Video Feeds in Smart Traffic Management." Applied Sciences 12, no. 8 (April 13, 2022): 3917. http://dx.doi.org/10.3390/app12083917.
Full text