Works matching DE "CONFIDENTIAL communications"
Results: 3186
Impaired Nurses: Whose Problem Is It?
- Published in:
- ISNA Bulletin, 2006, v. 32, n. 3, p. 9
- By:
- Publication type:
- Article
A review of security of electronic health records.
- Published in:
- Health Information Management Journal, 2005, v. 34, n. 1, p. 13
- By:
- Publication type:
- Article
Ethical Issues Pertaining to Forensic Assessments in Mental Capacity Proceedings: Reflections from South Africa.
- Published in:
- Psychiatry, Psychology & Law, 2017, v. 24, n. 4, p. 628, doi. 10.1080/13218719.2016.1264255
- By:
- Publication type:
- Article
The Working Alliance in Psychotherapy: Risk, Criticism and Perspectives in the Italian Context.
- Published in:
- Psychiatry, Psychology & Law, 2017, v. 24, n. 2, p. 302, doi. 10.1080/13218719.2016.1247638
- By:
- Publication type:
- Article
Informed Consent and the Limits of Confidentiality.
- Published in:
- Western Journal of Nursing Research, 2000, v. 22, n. 4, p. 508, doi. 10.1177/01939450022044557
- By:
- Publication type:
- Article
WARE V. WARE AND THE PRESUMPTION OF UNDUE INFLUENCE IN CONFIDENTIAL RELATIONSHIPS.
- Published in:
- Alaska Law Review, 2021, v. 38, n. 2, p. 341
- By:
- Publication type:
- Article
"Talking" Computers: A Reliable and Private Method to Conduct Interviews on Sensitive Topics With Children.
- Published in:
- Journal of Sex Research, 1997, v. 34, n. 1, p. 3, doi. 10.1080/00224499709551859
- By:
- Publication type:
- Article
Law Libraries in the Cloud.
- Published in:
- Law Library Journal, 2009, v. 101, n. 2, p. 249
- By:
- Publication type:
- Article
Unanswerable Questions.
- Published in:
- Law Library Journal, 2008, v. 100, n. 3, p. 581
- By:
- Publication type:
- Article
A Rose By Any Other Name Is Still a Rose? Problematizing Pseudonyms in Research.
- Published in:
- Qualitative Inquiry, 2015, v. 21, n. 5, p. 445, doi. 10.1177/1077800415572391
- By:
- Publication type:
- Article
Taking Refuge in the Branches of a Guava Tree: The Difficulty of Retaining Consenting and Nonconsenting Participants’ Confidentiality as an Indigenous Researcher.
- Published in:
- Qualitative Inquiry, 2011, v. 17, n. 10, p. 962, doi. 10.1177/1077800411425151
- By:
- Publication type:
- Article
Neotypification of Paecilomyces hepiali (Hypocreales).
- Published in:
- Taxon, 2015, v. 64, n. 1, p. 147, doi. 10.12705/641.28
- By:
- Publication type:
- Article
Socio-psychological Profile of a Person Who Confidentially Provides Assistance to the Operational Unit.
- Published in:
- Anuario de Psicología Jurídica, 2020, v. 30, n. 1, p. 13, doi. 10.5093/apj2019a10
- By:
- Publication type:
- Article
E-Therapy: Ethical Considerations of a Changing Healthcare Communication Environment.
- Published in:
- Pastoral Psychology, 2013, v. 62, n. 2, p. 211, doi. 10.1007/s11089-012-0434-3
- By:
- Publication type:
- Article
DICOM imaging watermarking for hiding medical reports.
- Published in:
- 2020
- By:
- Publication type:
- journal article
Differential privacy based on importance weighting.
- Published in:
- Machine Learning, 2013, v. 93, n. 1, p. 163, doi. 10.1007/s10994-013-5396-x
- By:
- Publication type:
- Article
Information Seeking in Pre-Trial Investigation with Particular Reference to Records Management.
- Published in:
- Archival Science, 2003, v. 3, n. 2, p. 157, doi. 10.1007/BF02435656
- By:
- Publication type:
- Article
Disentangling cancer patients' trust in their oncologist: a qualitative study.
- Published in:
- Psycho-Oncology, 2012, v. 21, n. 4, p. 392, doi. 10.1002/pon.1910
- By:
- Publication type:
- Article
Partial Pre-Publication Review Gaining Favor at Newspapers.
- Published in:
- Newspaper Research Journal, 2006, v. 27, n. 4, p. 23, doi. 10.1177/073953290602700402
- By:
- Publication type:
- Article
Efficient block-based transparent encryption for H.264/SVC bitstreams.
- Published in:
- Multimedia Systems, 2014, v. 20, n. 2, p. 165, doi. 10.1007/s00530-013-0326-0
- By:
- Publication type:
- Article
Secrecy Capacity Achievable Time Reversal Pre-filter in MISO Communication System and the Unequal Secrecy Protection Application.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 5427, doi. 10.1007/s11277-017-4787-x
- By:
- Publication type:
- Article
Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5635, doi. 10.1007/s11277-017-4438-2
- By:
- Publication type:
- Article
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 497, doi. 10.1007/s11277-015-3128-1
- By:
- Publication type:
- Article
Defeating the Eavesdropper: On the Achievable Secrecy Capacity Using Reconfigurable Antennas.
- Published in:
- Wireless Personal Communications, 2016, v. 91, n. 2, p. 729, doi. 10.1007/s11277-016-3491-6
- By:
- Publication type:
- Article
Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 2, p. 867, doi. 10.1007/s11277-014-2061-z
- By:
- Publication type:
- Article
DSBS: A Novel Dependable Secure Broadcast Stream over Lossy Channels.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 1, p. 599, doi. 10.1007/s11277-014-1773-4
- By:
- Publication type:
- Article
Trusted Neighbors Based Secured Routing Scheme in Wireless Sensor Networks Using Agents.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 1, p. 1, doi. 10.1007/s11277-014-1704-4
- By:
- Publication type:
- Article
A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2013, v. 69, n. 2, p. 805, doi. 10.1007/s11277-012-0613-7
- By:
- Publication type:
- Article
The ultimate physical limits of privacy.
- Published in:
- Nature, 2014, v. 507, n. 7493, p. 443, doi. 10.1038/nature13132
- By:
- Publication type:
- Article
A how-to for peer review.
- Published in:
- Nature, 2011, v. 473, n. 7345, p. 17, doi. 10.1038/473017a
- By:
- Publication type:
- Article
Anna Krulatz, Georgios Neokleous, and Anne Dahl: Theoretical and applied perspectives on teaching foreign languages in multilingual settings: pedagogical Implications.
- Published in:
- 2024
- By:
- Publication type:
- Book Review
VI INTERNATIONAL CRIMINAL COURT.
- Published in:
- Netherlands Quarterly of Human Rights, 2009, v. 27, n. 2, p. 281, doi. 10.1177/016934410902700210
- By:
- Publication type:
- Article
PROTECTION OF TRADITIONAL KNOWLEDGE AND HUMAN RIGHTS OBLIGATIONS: THE STATUS OF DISCUSSION IN INTERNATIONAL ORGANISATIONS.
- Published in:
- Netherlands Quarterly of Human Rights, 2007, v. 25, n. 3, p. 401, doi. 10.1177/016934410702500302
- By:
- Publication type:
- Article
Identity Crisis.
- Published in:
- Marketing Research, 2005, v. 17, n. 4, p. 8
- By:
- Publication type:
- Article
Fuzzy Control Based Resource Planning for Fog Computing.
- Published in:
- International Journal of Social Science, Innovation, & Educational Technologies, 2023, v. 4, n. 16, p. 264, doi. 10.54603/iss.194
- By:
- Publication type:
- Article
Medical Confidentiality in French Law.
- Published in:
- Bialystok Legal Studies / Bialostockie Studia Prawnicze, 2020, v. 25, n. 2, p. 219, doi. 10.15290/bsp.2020.25.02.11
- By:
- Publication type:
- Article
The Professional Secrets of a Sexologist from the Perspective of Ethical and Legal Dilemmas: A Case Study.
- Published in:
- Bialystok Legal Studies / Bialostockie Studia Prawnicze, 2020, v. 25, n. 2, p. 165, doi. 10.15290/bsp.2020.25.02.08
- By:
- Publication type:
- Article
Informatics and Public Health at CDC.
- Published in:
- MMWR: Morbidity & Mortality Weekly Report, 2006, v. 55, p. 25
- By:
- Publication type:
- Article
MODELS FOR MANAGING SECRETS.
- Published in:
- Management Science, 1989, v. 35, n. 2, p. 240, doi. 10.1287/mnsc.35.2.240
- By:
- Publication type:
- Article
Questionnaire survey for challenging cases of medical professionalism in Japan.
- Published in:
- Medical Teacher, 2009, v. 31, n. 6, p. 502, doi. 10.1080/01421590802203488
- By:
- Publication type:
- Article
ZASADY ETYCZNE OBOWIĄZUJĄCE W ODNIESIENIU DO PUBLIKACJI ZAMIESZCZANYCH W KWARTALNIKU „MYŚL EKONOMICZNA I POLITYCZNA".
- Published in:
- Economic & Political Thought / Myśl Ekonomiczna i Polityczna, 2023, v. 79, n. 4, p. 1
- By:
- Publication type:
- Article
JOINT CONTROLLER AGREEMENT UNDER GDPR.
- Published in:
- EU & Comparative Law Issues & Challenges Series (ECLIC), 2019, v. 3, p. 1030
- By:
- Publication type:
- Article
Attorney-client privilege (History and aim -- constitutional view).
- Published in:
- Studia Iuridica Toruniensia, 2017, v. 21, p. 119, doi. 10.12775/SIT.2017.030
- By:
- Publication type:
- Article
Taking Intellectual Property Rights Seriously: Are We In or Out? (Phase 1: Intellectual Property Awareness Among Students and Faculty: Tracking Changing Attitudes and Awareness).
- Published in:
- KnE Social Sciences, 2018, p. 325, doi. 10.18502/kss.v3i6.2390
- By:
- Publication type:
- Article
CLOUD COMPUTING SECURITY AND ITS CHALLENGES.
- Published in:
- i-Manager's Journal On Cloud Computing, 2020, v. 7, n. 2, p. 20, doi. 10.26634/jcc.7.2.17965
- By:
- Publication type:
- Article
INFORMATION FORTIFICATION, CONFIDENTIALITY, ACCESSIBILITY AND RELIABILITY IN CLOUD COMPUTING: ISSUES AND PRESENT SOLUTION.
- Published in:
- i-Manager's Journal On Cloud Computing, 2021, v. 8, n. 1, p. 16, doi. 10.26634/jcc.8.1.18457
- By:
- Publication type:
- Article
The ethical issues in instructions for authors of Chinese biomedical journals.
- Published in:
- Learned Publishing, 2015, v. 28, n. 3, p. 216, doi. 10.1087/20150307
- By:
- Publication type:
- Article
Undercutting Employee Mobility.
- Published in:
- Brooklyn Law Review, 2014, v. 79, n. 2, p. 831
- By:
- Publication type:
- Article
FRAMING JUSTICE: MEDIA, BIAS, AND LEGAL DECISIONMAKING.
- Published in:
- Maryland Law Review, 2010, v. 69, n. 4, p. 849
- By:
- Publication type:
- Article
THE FUTURE OF INADVERTENT DISCLOSURE: THE LINGERING NEED TO REVISE PROFESSIONAL CONDUCT RULES.
- Published in:
- Maryland Law Review, 2010, v. 69, n. 2, p. 195
- By:
- Publication type:
- Article