已选(0)清除
条数/页: 排序方式:
|
| Chapter 20 – Ethics and Information Technology 期刊论文 Ethical Challenges in Oncology, 2017, 页码: 313-323 作者: LeslieA.Kian; ScottD.Eastman 收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
|
| An effective value swapping method for privacy preserving data publishing 期刊论文 Security and communication networks, 2016 作者: A S M Touhidul Hasan; Qingshan Jiang; Jun Luo; Chengming Li; Lifei Chen 收藏  |  浏览/下载:19/0  |  提交时间:2017/01/15 |
| The digital patient 期刊论文 Monitor on Psychology, 2013, 卷号: Vol.44 No.5, 页码: 59-61 作者: Clay,RebeccaA. 收藏  |  浏览/下载:4/0  |  提交时间:2020/01/04
|
| Privacy, Consent, and the Electronic Mental Health Record: The Person vs. the System. 期刊论文 Journal Of Psychiatric Practice, 2012, 卷号: Vol.18 No.1, 页码: 46-50 作者: ClemensNA 收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
|
| Health IT to-do list: Timetable for maintenance and security tasks.[Miscellaneous] 期刊论文 American Medical News, 2010, 卷号: Vol.53 No.22, 页码: 24 作者: Dolan,PamelaLewis 收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13
|
| Data breached? Culprit could be a former employee.[Miscellaneous] 期刊论文 American Medical News, 2010, 卷号: Vol.53 No.16, 页码: 35 作者: Dolan,PamelaLewis 收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
|
| Views Sought on Data Breach Notification 期刊论文 Agent, The, 2008, 卷号: Vol.41 No.3, 页码: 20 - 收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13
|
| An Insider Attack on Shilling Attack Detection for Recommendation Systems (CPCI-S收录) 会议 作者: Luo, Zhifeng[1]; Liang, Chen[1] 收藏  |  浏览/下载:3/0  |  提交时间:2019/04/11
|