CORC

浏览/检索结果: 共8条,第1-8条 帮助

已选(0)清除 条数/页:   排序方式:
Chapter 20 – Ethics and Information Technology 期刊论文
Ethical Challenges in Oncology, 2017, 页码: 313-323
作者:  LeslieA.Kian;  ScottD.Eastman
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
An effective value swapping method for privacy preserving data publishing 期刊论文
Security and communication networks, 2016
作者:  A S M Touhidul Hasan;  Qingshan Jiang;  Jun Luo;  Chengming Li;  Lifei Chen
收藏  |  浏览/下载:19/0  |  提交时间:2017/01/15
The digital patient 期刊论文
Monitor on Psychology, 2013, 卷号: Vol.44 No.5, 页码: 59-61
作者:  Clay,RebeccaA.
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/04
Privacy, Consent, and the Electronic Mental Health Record: The Person vs. the System. 期刊论文
Journal Of Psychiatric Practice, 2012, 卷号: Vol.18 No.1, 页码: 46-50
作者:  ClemensNA
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
Health IT to-do list: Timetable for maintenance and security tasks.[Miscellaneous] 期刊论文
American Medical News, 2010, 卷号: Vol.53 No.22, 页码: 24
作者:  Dolan,PamelaLewis
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13
Data breached? Culprit could be a former employee.[Miscellaneous] 期刊论文
American Medical News, 2010, 卷号: Vol.53 No.16, 页码: 35
作者:  Dolan,PamelaLewis
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
Views Sought on Data Breach Notification 期刊论文
Agent, The, 2008, 卷号: Vol.41 No.3, 页码: 20
-
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13
An Insider Attack on Shilling Attack Detection for Recommendation Systems (CPCI-S收录) 会议
作者:  Luo, Zhifeng[1];  Liang, Chen[1]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/11


©版权所有 ©2017 CSpace - Powered by CSpace