Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Confidentiality of sources.

Статті в журналах з теми "Confidentiality of sources"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Confidentiality of sources".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Emslie, J. A., and P. Christie. "Confidentiality for doctors with AIDS. Official sources maintained confidentiality." BMJ 307, no. 6903 (1993): 566. http://dx.doi.org/10.1136/bmj.307.6903.566-a.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Harala, Riitta, and Anna-Leena Reinikainen. "Confidentiality in the use of administrative data sources." Statistical Journal of the United Nations Economic Commission for Europe 13, no. 4 (1996): 361–68. http://dx.doi.org/10.3233/sju-1996-13404.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Alexander, Laurence B. "Civil Liability for Journalists Who Violate Agreements of Confidentiality with Sources." Newspaper Research Journal 14, no. 3-4 (1993): 45–59. http://dx.doi.org/10.1177/073953299301400306.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

WOLANIUK, Leszek. "SELECTED PROBLEMS OF SECURITY OF INFORMATION CONFIDENTIALITY IN CYBERSPACE." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (2017): 194–207. http://dx.doi.org/10.5604/01.3001.0010.7228.

Повний текст джерела
Анотація:
Information confidentiality is the one of the cornerstones of IT security, which is defined and described in ISO/IEC 27000 standard. Contemporary practices of disclosing information to unauthorized persons and systems are the reason for difficulties in this concept implementation. At every step we encounter situations where information is extracted or obtained illegally from different sources. The main purpose of this paper is to present the issue of information confidentiality protection in cyberspace, as a complex, full of contradictions problem of techno-social character. The role of inform
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, no. 3 (1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.

Повний текст джерела
Анотація:
Fifteen people who said they had acted as confidential news sources for journalists were interviewed Most said they had been providing confidential information for years as a way of letting the public know things. A majority of the sources said journalists faced with pressure to identify their sources should “ask me to reconsider an agreement” of confidentiality.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

McHone-Chase, Sarah. "Sources: Privacy and Confidentiality Issues: A Guide for Libraries and Their Lawyers." Reference & User Services Quarterly 49, no. 1 (2009): 104. http://dx.doi.org/10.5860/rusq.49n1.104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Fernandez, Joseph M. "Pass the Source—Journalism’s Confidentiality Bane in the Face of Legislative Onslaughts." Asia Pacific Media Educator 27, no. 2 (2017): 202–18. http://dx.doi.org/10.1177/1326365x17728822.

Повний текст джерела
Анотація:
‘Journalism under siege’ proclaimed the cover of The Walkley Magazine, an Australian publication dedicated to promoting journalism excellence in its March 2017 issue. This headline reflects the severe disruption journalism is experiencing globally. Facts used to be facts and news was news but now we have ‘alternative facts’ and ‘fake news’ (Media Watch, 2017). Against this backdrop, a persistent dilemma for journalism has been the impact of the law on journalists relying on confidential sources who play a critical part in providing access to information. The journalism profession’s apparent so
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ainsworth, Frank, and Patricia Hansen. "Confidentiality in child protection cases Who benefits?" Children Australia 35, no. 3 (2010): 11–17. http://dx.doi.org/10.1017/s1035077200001127.

Повний текст джерела
Анотація:
Child protection legislation in every Australian state and territory prohibits the disclosure of the identity of a person who acts as a mandatory reporter. There is also provision in most child protection legislation that prevents the naming of children and families in protection cases. It is argued that disclosure is not in the interests of the child, the family or the general public. Children's Court proceedings in most states and territories in Australia are closed to the public so that, unlike in most other jurisdictions, interested parties are not able to observe the proceedings. Child pr
Стилі APA, Harvard, Vancouver, ISO та ін.
9

SHAHBAZYAN, K. "Contractual and legal regulation of preservation of results of scientific research in confidentiality and use of such information in case of research and development: practices of EU and countries of the world." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 202–13. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249362.

Повний текст джерела
Анотація:
The article analyzes the category of agreements in the field of research and development – non-disclosure agreements (confidentiality agreements), provides examples of such agreements with different sources of funding; as well as there are being considered the wordings of confidentiality provisions in general agreements for research and development – the article compares the practice of application of these provisions in the EU and countries of the world. The requirements are considered for settling the issues of protection of intellectual property rights in the aspect of confidentiality and d
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Białkowska, Paula Maria. "Legal and Ethical Grounds of Professional Secrecy of a Lawyer in Selected European Union Countries and in the United States of America." Review of European and Comparative Law 45, no. 2 (2021): 77–103. http://dx.doi.org/10.31743/recl.11456.

Повний текст джерела
Анотація:
The subject of the article is professional secrecy in practicing the legal profession in American law, with the indication of some differences resulting from separate laws of different states, and in the European Union – taking into account a few exemplary countries. Its sources were described – both legal and ethical, as well as the definition and construction. Confidentiality has been included in the objective and subjective aspect, taking into account different views in the doctrine as to its scope. Bearing in mind the basic right from which professional secrets derive – the right to privac
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Zaidi, Syeda Masooma. "Innovative Commercial and Private Genetic Testing Raises Privacy and Confidentiality Concerns." Sciential - McMaster Undergraduate Science Journal, no. 1 (November 25, 2018): 31–33. http://dx.doi.org/10.15173/sciential.v1i1.1902.

Повний текст джерела
Анотація:
Obtaining information about your genes can be as easy as swabbing your cheek for DNA testing. Companies that offer direct-to-consumer genetic testing with saliva have the authority to collect and share personal data as well as test results from their clients. However, patients want their personal information to be protected and although these companies ask for consent before sharing information with third-party sources, companies have the right to use client data to initiate research or improve their business. Genetic testing companies need to respect their clients and understand that they are
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Sufriadi, Sufriadi, Neneng Patri Yuni, Jamaluddin Jamaluddin, and Maya Kasmita. "The Effectiveness of Communication Ethics in Achieving Learning Objectives at State Vocational High School 4 Makassar." Jurnal Office 5, no. 1 (2019): 63. http://dx.doi.org/10.26858/jo.v4i2.9804.

Повний текст джерела
Анотація:
This study aims to determine the effectiveness of communication ethics in achieving learning goals at SMK Negeri 4 Makassar. This research is descriptive qualitative with a description of the focus on honesty, mutual understanding, obligation to care (well-being), confidentiality, and consequences. The number of informants in this study were five people consisting of principals, deputy principals, subject teachers, and two female students at Makassar State Vocational High School 4. The sample technique used was purposive sampling by sampling data sources based on certain considerations. Data c
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Ramafi, Pelonomi, Ignitia Motjolopane, and Koga Gorejena. "Ethical Framework for Multi-Source Big Data Analytics Disease Surveillance in Public Healthcare." International Conference on Artificial Intelligence and its Applications 2023 (November 9, 2023): 65–73. http://dx.doi.org/10.59200/icarti.2023.009.

Повний текст джерела
Анотація:
Big data analytics can revolutionize disease surveillance by integrating multiple data sources and analyzing those diverse data sources, allowing for early monitoring, detection, and response to disease outbreaks. Since the growth in technology, together with the advent of big data, there is growing interest in exploring the potential of multiple data sources for disease surveillance. However, there are still ethical concerns when it comes to big data usage for disease surveillance. Hence, this study uses of scoping review with the assistance of socio-technical systems theory, together with so
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Madkour, Aubrey Spriggs, Alison Swiatlo, Allison Talan, et al. "Sources of Help for Dating Violence Victims: A Qualitative Inquiry Into the Perceptions of African American Teens." Journal of Interpersonal Violence 34, no. 21-22 (2016): 4404–20. http://dx.doi.org/10.1177/0886260516675467.

Повний текст джерела
Анотація:
Although teen dating violence victims’ reticence in seeking help from adults is well documented, little is known about youths’ comparative perceptions of the types of help offered by and effectiveness of various sources. This qualitative study solicited teens’ perceptions of sources of help for victims using in-depth interviews with African American youth (ages 13-18) in two public high schools in New Orleans ( N = 38). Participants were recruited purposively by researchers during lunchtime and via referral by school personnel. Interviews were transcribed verbatim and coded independently by tw
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Slattery, P. D., and K. Stammer. "MANAGING CONFIDENTIALITY AND CONFLICTS OF INTEREST IN A COMPETITIVE ENERGY MARKET." APPEA Journal 36, no. 1 (1996): 594. http://dx.doi.org/10.1071/aj95038.

Повний текст джерела
Анотація:
Producers and other participants in the petroleum industry are in the midst of an increasingly competitive energy market. It is now the case that throughout Australia producers of natural gas are competing not just with substitute sources of energy but with one another. No longer do producers only compete for prospective tenements, rather their competitive activity extends from acreage acquisition through to the burner tip. The emergence of deregulation in the gas industry and the opportunities for competitive activity have been discussed at recent APEA conferences.1The aim of this paper is to
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Kumar, Rajeev, Renu Popli, Vikas Khullar, Isha Kansal, and Ashutosh Sharma. "Confidentiality Preserved Federated Learning for Indoor Localization Using Wi-Fi Fingerprinting." Buildings 13, no. 8 (2023): 2048. http://dx.doi.org/10.3390/buildings13082048.

Повний текст джерела
Анотація:
For the establishment of future ubiquitous location-aware applications, a scalable indoor localization technique is essential technology. Numerous classification techniques for indoor localization exist, but none have proven to be as quick, secure, and dependable as what is now needed. This research proposes an effective and privacy-protective federated architecture-based framework for location classification via Wi-Fi fingerprinting. The federated indoor localization classification (f-ILC) system that was suggested had distributed client–server architecture with data privacy for any and all r
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Birky, Ian, Bruce S. Sharkin, Joe Marin, and Andrew Scappaticci. "Confidentiality after referral: A study of how restrictions on disclosure affect relationships between therapists and referral sources." Professional Psychology: Research and Practice 29, no. 2 (1998): 179–82. http://dx.doi.org/10.1037/0735-7028.29.2.179.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Salman Alhidamkara, Ivana Lucia Kharisma, and Kamdan. "Optimize Website Security Implementation of a Comprehensive Website Security Assessment on the Surade 1 Public High School Site." Jurnal CoSciTech (Computer Science and Information Technology) 4, no. 3 (2024): 743–53. http://dx.doi.org/10.37859/coscitech.v4i3.6399.

Повний текст джерела
Анотація:
In the era of rapid development in media information, the utilization of websites as sources of information has gained widespread significance across various sectors. However, with the increasing use of websites, attention to security aspects has become crucial. The urgency to analyze its vulnerabilities has proven essential in efforts to detect potential threats in the future and ensure the continuity of confidentiality, consistency, accuracy, data validity, and information availability—known as the CIA Principles (Confidentiality, Integrity, Availability)—forming the fundamental basis for sa
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Litzenberg, Kerry K. "Agribusiness And The Agricultural Economics Profession: Research Agendas In Agribusiness." Journal of Agricultural and Applied Economics 24, no. 1 (1992): 31–35. http://dx.doi.org/10.1017/s0081305200025905.

Повний текст джерела
Анотація:
AbstractThis paper presents a summary of work by various groups on the potential for agribusiness research by agricultural economists over the past decade. Methodology to establish research priorities in agribusiness are reviewed. This review leads to a consideration of the agribusiness research issues including: funding sources, identifying users of agribusiness research, data needs, and limitations of agribusiness research programs.The final part of the paper presents a potpourri of suggested research initiatives in agribusiness research for agricultural economists. Research in these areas m
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Zaini, Zulfi Diane, Yulia Hesti, and Rivo Raihanza Passa. "Legal Aspects of Implementing Confidentiality Protection of Customer Fund Deposits at BUMD Bank Lampung." AURELIA: Jurnal Penelitian dan Pengabdian Masyarakat Indonesia 2, no. 1 (2023): 195–200. http://dx.doi.org/10.57235/aurelia.v2i1.273.

Повний текст джерела
Анотація:
Bank secrecy is important because banks as trusted institutions are required to keep everything related to depositors and their deposits confidential. As for the legal protection process for the secrecy of customer funds depositing funds at BUMD Bank Lampung, namely the prevalence of bank operations involving the collection of public funds such as through current accounts, savings, deposits, and so on. Meanwhile, after collecting these funds, the bank needs to distribute these funds to the public, namely through the provision of credit. Other efforts, namely adequate recording of bank operatio
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Yu, Jinhu, Yue Han, Kai Zhang, Siyuan Chen, and Jinguo Li. "Blockchain-Based Privacy-Preserving Sensor Data Sharing with Fine-Grained Authorization in Microgrid." Security and Communication Networks 2023 (May 11, 2023): 1–11. http://dx.doi.org/10.1155/2023/9621839.

Повний текст джерела
Анотація:
Microgrid is a power system that includes various energy sources (e.g., solar panels and wind turbines), where a number of device status and sensing data are collected and transmitted by smart sensors. Based on sensing-as-a-service in microgrid, sensor owners and sensor data consumers can effectively perform data sharing operations. However, the state-of-the-art sensor data sharing works in microgrid have the following two limitations: (i) cannot support fine-grained authorization for sensor owners and sensor data consumers and (ii) fail to simultaneously consider confidentiality and authentic
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Holmes, J. H., J. Sun, and N. Peek. "Technical Challenges for Big Data in Biomedicine and Health: Data Sources, Infrastructure, and Analytics." Yearbook of Medical Informatics 23, no. 01 (2014): 42–47. http://dx.doi.org/10.15265/iy-2014-0018.

Повний текст джерела
Анотація:
Summary Objectives: To review technical and methodological challenges for big data research in biomedicine and health. Methods: We discuss sources of big datasets, survey infrastructures for big data storage and big data processing, and describe the main challenges that arise when analyzing big data. Results: The life and biomedical sciences are massively contributing to the big data revolution through secondary use of data that were collected during routine care and through new data sources such as social media. Efficient processing of big datasets is typically achieved by distributing comput
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Albaar, Abdullah, M. Yusuf, and Ragwan Albaar. "The Principle of Confidentiality in Islamic Guidance and Counseling: A Review of Hadith." Jurnal Bimbingan dan Konseling Islam 12, no. 2 (2022): 184–207. http://dx.doi.org/10.29080/jbki.2022.12.2.184-207.

Повний текст джерела
Анотація:
This paper discusses the principle of secrecy in Islamic guidance and counseling in terms of a hadith of the Prophet. The purpose of this paper is to get an explanation regarding the importance of the principle of confidentiality in Islamic guidance and counseling when viewed from the hadith of the Prophet. The method used is library research, by analyzing or reviewing writings from various sources and the most important data is the hadith of the Prophet Muhammad. From the results of the studies that have been collected and studied by researchers, it can be concluded that in carrying out gener
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Ernawati, Endang. "Manajemen Literatur Kelabu sebagai Pendukung Penelitian dan Penulisan Karya Ilmiah." Winners 7, no. 2 (2006): 150. http://dx.doi.org/10.21512/tw.v7i2.619.

Повний текст джерела
Анотація:
Article explores the role of grey literature in supporting research and the writing of scientific articles in Indonesia. The discussion covers introduction of grey literature terminology, forms, causes, sources, level of confidentiality, users’ view, and ts development. It is concluded that the grey literature have not been well managed by its institutions; The Indonesia government has paid much attention to the collection, management, and documentation of grey literature; Internet development help the dissemination of grey litearature information in which users can easily access through the w
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Manmeet, Singh, Ahmed Suhaib, and Sharma Sparsh. "Blockchain-Based Smart Electricity Measurement and Monitoring System: A Survey." i-manager’s Journal on Embedded Systems 11, no. 1 (2022): 12. http://dx.doi.org/10.26634/jes.11.1.19084.

Повний текст джерела
Анотація:
Humans' dependence on electricity is rising with each passing day. The challenge of global warming can be mitigated by using clean energy sources like electricity instead of burning fossil fuels. In order to meet this increased demand, there is a strong need for an effective electricity management system. The use of smart meters for recording electricity consumption data is vital to the idea of a "smart city." Some of the challenges faced in detailing electricity consumption data include saving large amounts of data, deletion, manipulation, and adjustment of data. Blockchain is a promising tec
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Vozár, Ondřej, and Luboš Marek. "Multicriteria Evaluation of Randomized Response Techniques for Population Mean." Statistika: Statistics and Economy Journal 103, no. 4 (2023): 492–503. http://dx.doi.org/10.54694/stat.2023.32.

Повний текст джерела
Анотація:
Increasing demand in surveys focused on quantitative characteristics (population mean among others) of controversial issues like corruption, tax evasion, drugs consumption of sensitive variables like spending on drugs or illegal sources of income which lead to lively research, are of randomized response techniques for quantitative variables. Therefore, we propose complex multicriteria evaluation methodology for randomized response techniques for population mean. Based on extensive review in the literature, following ranges of criteria were proposed: statistical properties of estimator, impleme
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Simanjuntak, Dwi Amanda, and Irwan Padli Nasution. "Perlindungan Platform Halodoc Dalam Menjaga Kerahasiaan Data Pengguna." Jurnal Sains dan Teknologi (JSIT) 3, no. 2 (2023): 211–15. http://dx.doi.org/10.47233/jsit.v3i2.884.

Повний текст джерела
Анотація:
The purpose of this article is to investigate the methods used by the Halodoc platform in protecting user data during doctor consultations. To collect information, the author uses a literature review approach, collecting and examining various literature, books, scientific papers, as well as data from the media and other related sources. The findings show that Halodoc implements an oath-taking process for medical and non-medical staff to ensure the confidentiality of user data. even non-medical staff also take the oath as they are part of the Halodoc integrated health care unit which is respons
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Vázquez, Adrián. "Protection of Confidential Information in the Mexican Trade Remedy System." Global Trade and Customs Journal 9, Issue 7/8 (2014): 298–306. http://dx.doi.org/10.54648/gtcj2014036.

Повний текст джерела
Анотація:
Ordinarily, a host of information is employed during unfair international trade practices investigations, such as dumping and subsidies. A vast majority of the information submitted by parties to these investigations comes from public sources, but they also offer confidential information. Therefore, interested parties in an investigation of this nature have the right to have their confidential information protected from misuse, as well as a right to timely access the information contained in the administrative record that is necessary for the adequate protection of their interests. This essay
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Arif Hernawan, Muhammad, Cecep Pahrudin, Muhammad Rifa Affiat, and Siti Nurhayati. "OVERVIEW OF FINANCIAL TECHNOLOGY (FINTECH) IN LOGISTICS: LITERATURE STUDY." Journal of Economics, Management, Entrepreneurship, and Business (JEMEB) 1, no. 1 (2021): 72–78. http://dx.doi.org/10.52909/jemeb.v1i1.20.

Повний текст джерела
Анотація:
The purpose of this study is to provide ideas in the existing literature from various sources that can be combined with the reality of existing scientific articles. The ideas and results of the research into this scientific article also provide an overview of the variables that can be used in further research such as data confidentiality, financial technology, logistics and government policy regulations. Of the three descriptions in the results and discussion above, there are three variables that can make future research materials or references, namely Financial technology that has been used w
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Przybysz, Artur, Krystian Grzesiak, and Ireneusz Kubiak. "Electromagnetic Safety of Remote Communication Devices—Videoconference." Symmetry 13, no. 2 (2021): 323. http://dx.doi.org/10.3390/sym13020323.

Повний текст джерела
Анотація:
Devices powered by electricity become sources of electromagnetic emissions in the course of their operation. In the case of devices oriented to process information, these emissions can have a character of revealing emissions, i.e., those whose reception and analysis allow for remote reconstruction of related data. The best known example of this phenomenon is the formation of revealing emissions during the operation of imaging devices: monitors, projectors or printers. Increasingly more often, these components are used for communication in the form of videoconferences with other network users.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Jeon, Hyunsik, Seongmin Lee, and U. Kang. "Unsupervised multi-source domain adaptation with no observable source data." PLOS ONE 16, no. 7 (2021): e0253415. http://dx.doi.org/10.1371/journal.pone.0253415.

Повний текст джерела
Анотація:
Given trained models from multiple source domains, how can we predict the labels of unlabeled data in a target domain? Unsupervised multi-source domain adaptation (UMDA) aims for predicting the labels of unlabeled target data by transferring the knowledge of multiple source domains. UMDA is a crucial problem in many real-world scenarios where no labeled target data are available. Previous approaches in UMDA assume that data are observable over all domains. However, source data are not easily accessible due to privacy or confidentiality issues in a lot of practical scenarios, although classifie
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Galinec, Davor, Jadranka Vuglar, and Dario Cvrtila. "Residential property price index in Croatia: from experimental to official statistics." Croatian Review of Economic, Business and Social Statistics 5, no. 1 (2019): 33–42. http://dx.doi.org/10.2478/crebss-2019-0004.

Повний текст джерела
Анотація:
AbstractThe official statistics framework is based on internationally agreed standards, taking into account the core principles of impartiality, objectivity, professional independence, cost effectiveness, statistical confidentiality, minimisation of the reporting burden and high output quality. Since the latest 2007 global economic crisis, a growing demand for more, better and timelier data under limited resources for compilers and reporting agents has been observed. The concept of experimental statistics becomes more relevant, despite the lower quality in terms of coverage, data sources and h
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Campbell, Ellsworth M., Anthony Boyles, Anupama Shankar, et al. "MicrobeTrace: Retooling molecular epidemiology for rapid public health response." PLOS Computational Biology 17, no. 9 (2021): e1009300. http://dx.doi.org/10.1371/journal.pcbi.1009300.

Повний текст джерела
Анотація:
Outbreak investigations use data from interviews, healthcare providers, laboratories and surveillance systems. However, integrated use of data from multiple sources requires a patchwork of software that present challenges in usability, interoperability, confidentiality, and cost. Rapid integration, visualization and analysis of data from multiple sources can guide effective public health interventions. We developed MicrobeTrace to facilitate rapid public health responses by overcoming barriers to data integration and exploration in molecular epidemiology. MicrobeTrace is a web-based, client-si
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Geraldi, Aldo Rico. "PENYELESAIAN SENGKETA INVESTASI MELALUI INTERNATIONAL CENTRE FOR SETTLEMENT OF INVESTMENT DISPUTE (Studi Kasus Pemerintah Indonesia vs Churchill Mining)." TANJUNGPURA LAW JOURNAL 1, no. 2 (2017): 89. http://dx.doi.org/10.26418/tlj.v1i2.24252.

Повний текст джерела
Анотація:
This research aims to determine International Centre For Settlement of Investment Dispute (ICSID), benefits and losses for Indonesia related with Choice of Option on Indonesian investment dispute settlement with Churchill Mining Plc in ICSID. This research uses normative legal research by gathering secondary data. Data collected is using the methods of literary study by collecting legal material and information in the form of legal materials of primary sources, secondary sources, and tertiary sources. In order to get a clear explanation, the data will arrange systematically and analyzed with d
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Ruiz de la Fuente, Consuelo. "El acceso a las fuentes de prueba en los procesos de daños por actos anticoncurrenciales." Anales de Derecho 41, no. 1 (2024): 1–39. http://dx.doi.org/10.6018/analesderecho.558711.

Повний текст джерела
Анотація:
Royal Decree Law 9/2017 regulates the compensation of damages caused by practices restricting competition. To facilitate proof in those procedures, it introduces and regulates the access to evidence sources in damage proceedings, modifying the Code of Civil Procedure (LEC 1/2000). This mechanism coexists with other pre-existing procedural mechanisms in civil proceedings to access sources of evidence: the exhibition of documents and preliminary investigations. This study analyzes the mechanism of access to sources of evidence in antitrust tort law and the advisability of extending the applicati
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Rangan, Febigrace, Aaron Simanjuntak, and Yohanes Seralurin. "Pengaruh Persepsi Kegunaan, Persepsi Kemudahan, Kesiapan Teknologi Informasi, Keamanan Dan Kerahasiaan Terhadap Minat Perilaku Penggunaan E-Filing (Studi Empiris Pada Kantor Pelayanan Pajak Pratama Jayapura)." JURNAL AKUNTANSI DAN KEUANGAN DAERAH 15, no. 2 (2020): 111–25. http://dx.doi.org/10.52062/jakd.v15i2.1629.

Повний текст джерела
Анотація:
Abstract This research aims to examine and analyze the effect of perceived usefulness, perceived convenience, readiness of information technology, security and confidentiality on the behavioral interest in using e-filing. This research uses quantitative data and data sources, namely primary data. The population in this study were individual taxpayers who were registered at the Jayapura Primary Tax Office. The sample used in this study were 100 individual taxpayers. The sampling technique used snowball sampling technique. The method of data collection is using primary data obtained by distribut
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Conte, Raffaele, Francesco Sansone, Alessandro Tonacci, and Anna Paola Pala. "Privacy-by-Design and Minimization within a Small Electronic Health Record: The Health360 Case Study." Applied Sciences 12, no. 17 (2022): 8441. http://dx.doi.org/10.3390/app12178441.

Повний текст джерела
Анотація:
Electronic health records are playing an important role in todays’ clinical research, with the possibility to collect a wide amount of data from different sources, not only within a structured clinical setting, but also making best use of new portable technologies, such as smartphones, sensors and Internet-of-Things, as an unprecedented spring of data. In this way, even in small clinical centers, often featuring limited financial availabilities, not only clinicians can have a complete, timely outlook on patients’ health, but also data scientists could use such information to build and train ta
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Wali, Kaka, Bnar Karim Darwish, and Shadan Jabbar Abdulfattah. "Security and confidentiality of information under the application of cloud accounting compared to traditional accounting." Journal of Economics and Administrative Sciences 28, no. 134 (2022): 186–204. http://dx.doi.org/10.33095/jeas.v28i134.2430.

Повний текст джерела
Анотація:
Due to the continuous development and transition from manual to electronic accounting methods, users are now finding that accounting is simpler and more convenient. The recent shift in accounting to a faster technology has greatly improved its ability to serve users.
 The research aims at a number of objectives, including getting to know cloud accounting and software-based accounting, comparing the services of the top ten cloud accounting service providers around the world in terms of security and confidentiality to understand how they differ from traditional accounting, and understanding
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Fernandez, Joseph, and Mark Pearson. "Shield laws in Australia: Legal and ethical implications for journalists and their confidential sources." Pacific Journalism Review 21, no. 1 (2015): 61. http://dx.doi.org/10.24135/pjr.v21i1.148.

Повний текст джерела
Анотація:
This article examines whether Australia’s current shield law regime meets journalists’ expectations and whistleblower needs in an era of unprecedented official surveillance capabilities. According to the peak journalists’ organisation, the Media, Entertainment and Arts Alliance (MEAA), two recent Australian court cases ‘despite their welcome outcome for our members, clearly demonstrate Australia’s patchy and disparate journalist shields fail to do their job’ (MEAA, 2014a). Journalists’ recent court experiences exposed particular shield law inadequacies, including curious omissions or ambiguiti
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Putra, Tegar Islami, Akbar Jihadul Islam, and Abdullah Mufti Abdul Rahman. "Integrating Islamic Laws into Indonesian Data Protection Laws: An Analysis of Regulatory Landscape and Ethical Considerations." Contemporary Issues on Interfaith Law and Society 3, no. 1 (2024): 85–118. http://dx.doi.org/10.15294/ciils.v3i1.78690.

Повний текст джерела
Анотація:
This study explores the intersection of personal data protection laws in Indonesia with Islamic principles, focusing on the regulatory landscape and ethical considerations surrounding data privacy. With the proliferation of digital technologies and data-driven processes, safeguarding personal information has become paramount. Drawing from legal frameworks, Islamic jurisprudence, and contemporary discussions on data privacy, this research investigates how Islamic principles inform and complement existing data protection measures in Indonesia. The analysis begins by examining the legal foundatio
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Nikitkov, Alexei N., Dan N. Stone, and Timothy C. Miller. "Internal Controls, Routine Activity Theory (RAT), and Sustained Online Auction Deception: A Longitudinal Analysis." Journal of Information Systems 28, no. 1 (2014): 311–37. http://dx.doi.org/10.2308/isys-50708.

Повний текст джерела
Анотація:
ABSTRACT This paper adapts and extends routine activity theory (RAT) to investigate the co-evolution of eBay's controls with mundane crime in the rapidly growing auction market of 1997–2005. A suspected deceptive seller's eight-year account history indicates the presence of the three market characteristics that RAT identifies as essential for deception: (1) a motivated offender, (2) suitable targets, and (3) an absence of capable guardians (i.e., regulation and eBay controls). The results document the co-evolution of a deceptive seller's tactics with eBay's controls. The investigation introduc
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Weinberg, Daniel H., John M. Abowd, Robert F. Belli, et al. "Effects of a Government-Academic Partnership: Has the NSF-CENSUS Bureau Research Network Helped Improve the US Statistical System?" Journal of Survey Statistics and Methodology 7, no. 4 (2018): 589–619. http://dx.doi.org/10.1093/jssam/smy023.

Повний текст джерела
Анотація:
Abstract The National Science Foundation-Census Bureau Research Network (NCRN) was established in 2011 to create interdisciplinary research nodes on methodological questions of interest and significance to the broader research community and to the Federal Statistical System (FSS), particularly to the Census Bureau. The activities to date have covered both fundamental and applied statistical research and have focused at least in part on the training of current and future generations of researchers in skills of relevance to surveys and alternative measurement of economic units, households, and p
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Ing-udomnoogoon, Kitcha. "Essays on Pharmaceutical Marketing with A Case Study Company." ABC Research Alert 6, no. 3 (2018): Thailand. http://dx.doi.org/10.18034/ra.v6i3.336.

Повний текст джерела
Анотація:
The objective of this thesis was to design a marketing strategy plan for a case company in Thailand. Due to confidentiality, the case company is blinded as Company X, who has also sponsored primary research surveys included in the study. The ideal outcome of this thesis was to design a marketing strategy plan to help the case company become a successful pharmaceutical company and strengthen topline business performance over the near future period in 2019-2021. Quantitative research methods were mainly used in this dissertation research. A single case study with two marketing hypotheses were ut
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Ahmed, Omar Saad, Fay Fadhil, Laith H. Jasim Alzubaidi, and Riyadh Al Al-Obaidi. "Fusion Processing Techniques and Bio-inspired Algorithm for E-Communication and Knowledge Transfer." Fusion: Practice and Applications 10, no. 1 (2023): 143–55. http://dx.doi.org/10.54216/fpa.100109.

Повний текст джерела
Анотація:
This study suggests employing a dynamic natural and bio-inspired algorithm (DNBIA) to strengthen the confidentiality, integrity, and availability of digital information exchanges. You may think of the suggested method as a clever approach to Fusion Processing. Fusion Processing is the practice of combining and analyzing information from many databases. The efficiency and reaction time of e-communication systems may be increased by the use of the suggested DNBIA algorithm, which processes and integrates data from different sources. It is also possible to see the multi-objective optimization stu
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Wardana, I. Wayan Dody Putra, Ni Ketut Supasti Dharmawan, and Ni Luh Gede Astariyani. "Legality for Electronic Signatures in Implementing Electronic Medical Records." JMMR (Jurnal Medicoeticolegal dan Manajemen Rumah Sakit) 12, no. 3 (2023): 366–78. http://dx.doi.org/10.18196/jmmr.v12i3.96.

Повний текст джерела
Анотація:
An electronic signature is an authentic marker to show a person's responsibility. Electronic signatures also ensure confidentiality, integrity, authorization, access control, and non-repudiation of information in electronic medical records. Therefore, this research was conducted to determine the legal aspects of electronic signatures in administering electronic medical records. This research used a qualitative method with a normative juridical approach. The research sources were based on laws, government regulations, journals, and other tertiary sources related to electronic signatures and ele
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Galea, Patrick. "Legal professional privilege—what do we make of it in jurisdiction Malta? Part 1." Trusts & Trustees 28, no. 2 (2021): 104–24. http://dx.doi.org/10.1093/tandt/ttab104.

Повний текст джерела
Анотація:
Abstract Malta is a European Union and Commonwealth Member, and among the family of the “mixed” jurisdictions, being a Civil Law jurisdiction with extensive Common Law experience. This article will assess Legal Professional Privilege in the small island state. The historical, domestic and contemporary ECHR/EU sources, along with other areas such as the sometimes-blurred distinction or overlapping between professional secrecy, confidentiality and Privilege and the jurisprudential contribution of the Maltese Courts, are reviewed. The review addresses ethical standards including the recommendatio
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Jannah, Raudatul, and H. K. Marjo. "Etika Profesi Konselor dalam Layanan Bimbingan Konseling Virtual." Jurnal Paedagogy 9, no. 1 (2022): 55. http://dx.doi.org/10.33394/jp.v9i1.4556.

Повний текст джерела
Анотація:
The purpose of this study was to describe the professional ethics of counselors in virtual counseling guidance services. The method used in this research is a literature study with a qualitative descriptive approach. The data sources come from document studies in the form of books and previous research from various references. Furthermore, the data analysis technique used is descriptive analysis. The results of this study indicate that online counseling takes the form of virtual counseling technology, namely, websites, telephone or cell phones, email, video conferencing, chat, instant messagin
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Sternberg, Kevan M., Stacy L. Loeb, David Canes, Laura Donnelly, and Mitchell H. Tsai. "The use of Twitter to facilitate sharing of clinical expertise in urology." Journal of the American Medical Informatics Association 25, no. 2 (2017): 183–86. http://dx.doi.org/10.1093/jamia/ocx055.

Повний текст джерела
Анотація:
Abstract The use of social media in the urologic community is common and increasing. Although the potential benefits of platforms like Twitter have been described in the literature, the use of social media in the clinical context of Urology has not been explored. In this case report, we describe how we used Twitter to share ideas about the clinical management of a complex urologic patient. By posting a clinical scenario, a timely discussion was generated with global participation and expert suggestions. This knowledge was applied to the surgical management of a patient with positive clinical o
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Axelrod, Robert Michael. "Criminality and suspicious activity reports." Journal of Financial Crime 24, no. 3 (2017): 461–71. http://dx.doi.org/10.1108/jfc-03-2017-0019.

Повний текст джерела
Анотація:
Purpose This paper aims to suggest alternative suspicious activity analyses to improve the focus of financial institution reporting to law enforcement and to identify some limitations in the current practice. Design/methodology/approach This paper employs the consideration of US and Financial Action Task Force policies and text sources of suspicious activity reporting in the anti-money laundering context in light of how the reports are used. Furthermore, there is consideration of confidentiality and privacy constraints on public and private sector in assessing strategies to make the reporting
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Benrhouma, Oussama, Ahmad B. Alkhodre, Ali AlZahrani, Abdallah Namoun, and Wasim A. Bhat. "Using Singular Value Decomposition and Chaotic Maps for Selective Encryption of Video Feeds in Smart Traffic Management." Applied Sciences 12, no. 8 (2022): 3917. http://dx.doi.org/10.3390/app12083917.

Повний текст джерела
Анотація:
Traffic management in a smart city mainly relies on video feeds from various sources such as street cameras, car dash cams, traffic signal cameras, and so on. Ensuring the confidentiality of these video feeds during transmission is necessary. However, due to these devices’ poor processing power and memory capacity, the applicability of traditional encryption algorithms is not feasible. Therefore, a selective encryption system based on singular value decomposition (SVD) and chaotic maps is presented in this study. The proposed cryptosystem can be used in smart traffic management. We apply SVD t
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!