Articles with "privacy security" as a keyword



Photo from wikipedia

A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps

Sign Up to like & get
recommendations!
Published in 2021 at "Empirical Software Engineering"

DOI: 10.1007/s10664-020-09934-4

Abstract: As this article is being drafted, the SARS-CoV-2/COVID-19 pandemic is causing harm and disruption across the world. Many countries aimed at supporting their contact tracers with the use of digital contact tracing apps in order… read more here.

Keywords: contact tracing; privacy security; security; privacy ... See more keywords
Photo from wikipedia

Patients’ Perceptions About Medical Record Privacy and Security: Implications for Withholding of Information During the COVID-19 Pandemic

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of General Internal Medicine"

DOI: 10.1007/s11606-020-05998-6

Abstract: Some patients may withhold relevant medical information from their provider because of concerns about the security and privacy of their information, or about how their information will be used. With increasing reliance on telemedicine and… read more here.

Keywords: information; privacy security; withholding information; security ... See more keywords
Photo by austindistel from unsplash

The symbiotic relationship between privacy and security in the context of the general data protection regulation

Sign Up to like & get
recommendations!
Published in 2019 at "ERA Forum"

DOI: 10.1007/s12027-019-00578-6

Abstract: Traditionally, privacy and security are considered to be opposing values, constantly to be seen in contrast with each other. The purpose of this article is to demonstrate how technological development, instead of worsening the cleavage… read more here.

Keywords: data protection; relationship; privacy security; security ... See more keywords
Photo from wikipedia

Effects of privacy and security on the acceptance and usage of EMR: The mediating role of trust on the basis of multiple perspectives

Sign Up to like & get
recommendations!
Published in 2020 at "Informatics in Medicine Unlocked"

DOI: 10.1016/j.imu.2020.100450

Abstract: Abstract Problem statement Malaysian public hospitals apply an electronic medical record (EMR) system. However, health-care professionals are facing several difficulties in trusting the EMR system in Malaysia. Studies that have addressed EMR acceptance, particularly its… read more here.

Keywords: basis; privacy security; security; role trust ... See more keywords
Photo by scottwebb from unsplash

Digital DNA lifecycle security and privacy: an overview

Sign Up to like & get
recommendations!
Published in 2022 at "Briefings in bioinformatics"

DOI: 10.1093/bib/bbab607

Abstract: DNA sequencing technologies have advanced significantly in the last few years leading to advancements in biomedical research which has improved personalised medicine and the discovery of new treatments for diseases. Sequencing technology advancement has also… read more here.

Keywords: dna; privacy; privacy security; digital dna ... See more keywords
Photo by scottwebb from unsplash

Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2820182

Abstract: Decentralizing multi-authority attribute-based encryption (ABE) has been adopted for solving problems arising from sharing confidential corporate data in cloud computing. For decentralizing multi-authority ABE systems that do not rely on a central authority, collusion resistance… read more here.

Keywords: decentralizing multi; multi authority; privacy security; security ... See more keywords
Photo from wikipedia

Smart City IoT Platform Respecting GDPR Privacy and Security Aspects

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2968741

Abstract: The Internet of Things (IoT) paradigm enables computation and communication among tools that everyone uses daily. The vastness and heterogeneity of devices and their composition offer innovative services and scenarios that require a new challenging… read more here.

Keywords: privacy security; respecting gdpr; security aspects; security ... See more keywords
Photo by scottwebb from unsplash

How Perceptions of Information Privacy and Security Impact Consumer Trust in Crypto-Payment: An Empirical Study

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3186786

Abstract: The ever-increasing acceptance of cryptocurrencies has fueled applications beyond investment purposes. Crypto-payment is one such application that can bring radical changes to financial transactions in many industries, particularly e-commerce and online retail. However, characteristics of… read more here.

Keywords: privacy security; payment; consumer; crypto payment ... See more keywords
Photo from wikipedia

Protecting Privacy and Security of Genomic Data in i2b2 with Homomorphic Encryption and Differential Privacy

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE/ACM Transactions on Computational Biology and Bioinformatics"

DOI: 10.1109/tcbb.2018.2854782

Abstract: Re-use of patients’ health records can provide tremendous benefits for clinical research. Yet, when researchers need to access sensitive/identifying data, such as genomic data, in order to compile cohorts of well-characterized patients for specific studies,… read more here.

Keywords: privacy security; genomic data; biology; privacy ... See more keywords
Photo by voneciacarswell from unsplash

Co-designing for Community Oversight

Sign Up to like & get
recommendations!
Published in 2019 at "Proceedings of the ACM on Human-Computer Interaction"

DOI: 10.1145/3359248

Abstract: Collective feedback can support an individual's decision-making process. For instance, individuals often seek the advice of friends, family, and co-workers to help them make privacy decisions. However, current technologies often do not provide mechanisms for… read more here.

Keywords: community oversight; community; decision making; privacy security ... See more keywords
Photo by drew_hays from unsplash

Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications

Sign Up to like & get
recommendations!
Published in 2022 at "Applied Bionics and Biomechanics"

DOI: 10.1155/2022/1201339

Abstract: Computing model may train on a distributed dataset using Medical Applications, which is a distributed computing technique. Instead of a centralised server, the model trains on device data. The server then utilizes this model to… read more here.

Keywords: privacy security; medical applications; using medical; privacy ... See more keywords