Showing 81 - 100 results of 426 for search '"Anonymity"', query time: 0.05s Refine Results
  1. 81

    Building Application-Related Patient Identifiers: What Solution for a European Country? by Catherine Quantin, François-André Allaert, Paul Avillach, Maniane Fassa, Benoît Riandey, Gilles Trouessin, Olivier Cohen

    Published 2008-01-01
    “…This data linkage would meet the anonymous data requirements of the European directive on data protection.…”
    Get full text
    Article
  2. 82

    Delving into the world of webCHAT – an e-mental health support service for distressed youths in Singapore by Yi Ping Lee, Ying Ying Lee, Hamidah Binte Otheman, Charmaine Tang, Mythily Subramaniam, Swapna K Verma

    Published 2025-01-01
    “…Results Many users accessed webCHAT to seek support with emotional and behavioural concerns, valuing its immediacy and anonymity over traditional appointment-based services. …”
    Get full text
    Article
  3. 83

    Solving Truthfulness-Privacy Trade-Off in Mixed Data Outsourcing by Using Data Balancing and Attribute Correlation-Aware Differential Privacy by Abdul Majeed, Seong Oun Hwang

    Published 2025-01-01
    “…However, data often encompass sensitive information about individuals, and outsourcing the data without sufficient protection may endanger privacy. Anonymization methods are mostly used in data outsourcing to protect privacy; however, it is very hard to apply anonymity to datasets of poor quality while maintaining an equilibrium between privacy, utility, and truthfulness (i.e., ensuring the values in anonymized data are consistent with the real data). …”
    Get full text
    Article
  4. 84

    Padlet: a tool for fostering collaborative learning and feedback literacy in dental education by Avita Rath

    Published 2025-01-01
    “…Padlet's asynchronous and anonymous nature fostered in-depth discussions, broader participation, and constructive feedback. …”
    Get full text
    Article
  5. 85

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…In terms of multi-party privacy information sharing control, localized control, extended control, and anonymization control techniques were discussed. In the aspect of multi-party data collaborative secure computing, commonly used techniques in both academia and industry were discussed. …”
    Get full text
    Article
  6. 86

    “I take hot showers so I can practice burning in hell” A corpus analytical study of Tinder female profiles in the UK by Clara Cantos-Delgado, Carmen Maíz-Arévalo

    Published 2024-07-01
    “…Then, to ensure an ethical research praxis, it assigned each profile random identification numbers that guaranteed the anonymity of the users. The corpus consists of two subcorpora (WSM.C and WSW.C) each containing 405 profiles (average number of words=20.15) from women (18-24 y.o.) based in the UK. …”
    Get full text
    Article
  7. 87

    Person Detection for an Orthogonally Placed Monocular Camera by Pavel Skrabanek, Petr Dolezel, Zdenek Nemec, Dominik Stursa

    Published 2020-01-01
    “…As the overall price is mainly given by prices of the used sensor and processing unit, we propose the utilization of a visible spectrum camera and data processing algorithms of low time complexity to ensure a low price of the final product. To guarantee the anonymity of passengers, we suggest orthogonal scanning of a scene. …”
    Get full text
    Article
  8. 88

    Cross-Chain Identity Authentication Method Based on Relay Chain by Qipeng Huang, Minsheng Tan, Wenlong Tian

    Published 2025-01-01
    “…Our method offers compatibility while ensuring unlinkability and anonymity through thorough security analysis. More importantly, comparative analysis and experimental results show that our proposed method achieves lower computational cost, reduced storage cost, lower latency, and higher throughput. …”
    Get full text
    Article
  9. 89

    A privacy-enhanced framework with deep learning for botnet detection by Guangli Wu, Xingyue Wang

    Published 2025-01-01
    “…It can hide the private information that the attack model tries to infer from the intermediate anonymity features, while maximally retaining the interactive behavior features contained in the original traffic for botnet detection. …”
    Get full text
    Article
  10. 90

    CHATGPT: ATTITUDES AND EXPERIENCES OF TECHNICAL UNIVERSITY STUDENTS IN UKRAINE by Oksana Chugai, Kateryna Havrylenko

    Published 2024-06-01
    “…Employing a mixed-method research design, a comprehensive array of quantitative and qualitative data was collected through Google Form surveys from a cohort of 208 student volunteers, ensuring anonymity and voluntary participation. Analysis of the data revealed that the majority of students employed ChatGPT sporadically, primarily seeking assistance with programming tasks and grappling with complex concepts. …”
    Get full text
    Article
  11. 91

    STEP 1: The Scottish Trauma & Orthopaedics Equality Project: demographics and working patterns of a national workforce by Monu Jabbal, Jennifer Cherry, Deborah Eastwood, Chloe E. H. Scott, Phil Walmsley, Emily Baird

    Published 2025-01-01
    “…Utilizing a secure third party ensured anonymity for all respondents. Data were recorded and analyzed by the CARD group. …”
    Get full text
    Article
  12. 92

    Acceptability of digital vending machines to improve access to sexual and reproductive health in Brighton, UK: a qualitative analysis by Jaime H Vera, Richard Cooper, Syra Dhillon, John Mear, Gillian Louise Dean, Rhys D Wenlock

    Published 2024-04-01
    “…VM acceptability was high with anonymity and instant access as main benefits. Some participants expressed concern that the public location of the VM may deter others from using it. …”
    Get full text
    Article
  13. 93

    Self-sampling and self-testing for HIV at a commercial and community-based test provider in the Netherlands: user preferences and usability by I. J. M. Willemstein, O. Shobowale, A. M. Żakowicz, H. Bos, E. L. M. Op de Coul

    Published 2025-01-01
    “…Overall, main reasons for choosing HIVSS/ST were saving time (42%), anonymity (36%) and not having to talk to a GP (35%). …”
    Get full text
    Article
  14. 94

    The effects of psychosocial and economic factors on the quality of life of patients with end-stage renal disease and their caregivers in Klang Valley, Malaysia: protocol for a mixe... by Norhayati Ibrahim, Sin Yee Chu, Ching Sin Siau, Noh Amit, Rozmi Ismail, Abdul Halim Abdul Gafor

    Published 2022-06-01
    “…Informed consent of the participants will be obtained beforehand, and no personal identifiers will be obtained from the participants to protect their anonymity. The findings will be published in peer-reviewed scientific journals and presented at national or international conferences with minimal anonymised data.…”
    Get full text
    Article
  15. 95

    Assessing routine childhood vaccination acceptance, hesitancy and refusal in Cape Town, Western Cape, South Africa: a mixed-method study protocol by Charles Shey Wiysonge, Lindi Mathebula, Moleen Zunza, Sara Cooper

    Published 2025-02-01
    “…Various steps will be taken to ensure the anonymity and confidentiality of participants. Findings of the study will be shared with various healthcare stakeholders through conferences and presentations at relevant meetings.Conclusion Evidence from several studies conducted in South Africa shows a significant increase in vaccine hesitancy within the country. …”
    Get full text
    Article
  16. 96

    Analysis of Ethereum transactions during the prevention and investigation of criminal offenses by V. V. Nosov, O. V. Manzhai, Ye. V. Panchenko

    Published 2022-12-01
    “…The purpose of email mixing, the conditions under which the anonymity of the email address is lost have been revealed. …”
    Get full text
    Article
  17. 97

    „... nenábožnost nynějšího věku ...“ Proměny zbožnosti ve druhé polovině 19. století očima katolických kněží by Hana Stoklasová

    Published 2011-01-01
    “…It was very hard for them to keep track of their parishioners who lived in towns, especially in emerging workers’ settlements, where, due to large fluctuation and anonymity of believers, it was not within priests’ powers to have an awareness of all their flock. …”
    Get full text
    Article
  18. 98

    Digital Information Exchange Between the Public and Researchers in Health Studies: Scoping Review by Nazli Soltani, Thilo Dietz, Doris Ochterbeck, Jens Dierkes, Katja Restel, Lara Christianson, Karina Karolina De Santis, Hajo Zeeb

    Published 2025-01-01
    “…The main barriers were that information exchange was not planned or not feasible due to inadequate resources, highly complex technical language was used, and ethical concerns (eg, breach of anonymity if study participants are brought together) were raised. …”
    Get full text
    Article
  19. 99

    Les voyages reproductifs vers la Tunisie : l’intime au prisme des pratiques de l’assistance médicale à la procréation by Irene Maffi, Betty Rouland, Carole Wenger

    Published 2023-07-01
    “…They preserve intimacy and anonymity allowing Internet users affected by infertility to share their experiences and express their suffering without fear of being stigmatised. …”
    Get full text
    Article
  20. 100

    Preferences and access to community-based HIV testing sites among men who have sex with men (MSM) in Côte d’Ivoire by Christine Danel, Joseph Larmarange, Lazare Sika, Maxime Inghels, Arsène Kra Kouassi, Serge Niangoran, Anne Bekelynck, Séverine Carilon, Mariatou Koné, Annabel Degrées du Loû

    Published 2022-06-01
    “…MSM who preferred undifferentiated HIV testing sites mentioned the lack of discretion and anonymity of community-based sites and the desire to avoid the gaze of others.Conclusion Community-based HIV testing is well suited for MSM who identify as homosexual and those close to the MSM community, while maintaining undifferentiated HIV testing is essential for others. …”
    Get full text
    Article