Mostrando 101 - 120 Resultados de 258 Para Buscar '"pseudonym"', tiempo de consulta: 0.49s Limitar resultados
  1. 101
    “…We explain how the process of pseudonymization is to be understood in the context of transfer of genomic data to third parties, as well as how adequacy of data protection in a third country is to be determined in general terms. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 102
    “…The Main Association of Austrian Social Security Institutions collects pseudonymized claims data from Austrian social security institutions and information about hospital stays in a database for research purposes. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 103
    “…The tEMR is a derivative of a real-world electronic health record (EHR), a large, pseudonymized patient database, and a population health tool designed to support curricular goals. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 104
    “…The article then leverages recent draft guidance from the European Data Protection Board to explain how entities may be able to adopt widely used contractual and technical measures, such as data pseudonymization, to provide ‘essentially equivalent’ protections in the clinical research context.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 105
    “…Using a comprehensive dataset of pseudonymized mobile phone records, we analyse the impact of electrification on attractiveness for rural areas in Senegal. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 106
    “…CONCLUSIONS: This fast and efficient method of record linkage with pseudonymized data and without unique and direct identifier might inspire other research teams. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 107
    “…However, despite claims such as “GDPR compliance”, “anonymity”, “pseudonymity” or other forms of “privacy”, the authors of these designs usually neglect to precisely define what they (aim to) protect. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 108
    “…Our results provide strong evidence that disconnected and even re-pseudonymized interaction data can be linked together making them personal data under the European Union’s General Data Protection Regulation.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 109
    “…Participation was voluntary and pseudonymized; prior written consent was obtained. RESULTS: We achieved a participation rate of 57.6% (219/380) and a completion rate of 50.2% (110/219). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 110
  11. 111
    “…. & T) sensors) monitor the breath air exhaled into the expiratory line of the bi-tube patient breathing circuit during a noninvasive ventilo-therapy session; the sensor raw signals are transmitted pseudonymized to National Health Service units by TCP/IP communication through a cloud remote platform. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 112
    “…The Purpose of the study was to analyse administrative prevalence of MS, medication use and type of specialists involved in MS treatment in the outpatient setting in Bavaria. METHODS: Pseudonymized claims data from Bavarian Statutory Health Insurance (SHI)-accredited physicians were used. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 113
    “…This study leveraged pseudonymized mobile money interactions combined with cell phone data to shed light on urban migration patterns and deprivation in Tanzania. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 114
    “…The strategy involves self‐sampling based on gargling saline, pseudonymized sample handling, automated RNA extraction, and viral RNA detection using a semiquantitative multiplexed colorimetric reverse transcription loop‐mediated isothermal amplification (RT‐LAMP) assay with an analytical sensitivity comparable with RT‐qPCR. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 115
    “…Methods: Patients and partners from courses at four different locations who consented to the online course offer were asked to fill in a pseudonymous questionnaire on access to the training, technical challenges, acceptance and well-being (1-item visual analog scale from 1 to 10) before and after the training. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 116
    “…However, there are challenges in applying community detection in cryptocurrency transaction networks: (1) the use of pseudonymous addresses that are not directly linked to personal information make it difficult to interpret the detected communities; (2) on Bitcoin, a user usually owns multiple Bitcoin addresses, and nodes in transaction networks do not always represent users. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  17. 117
    “…De-identification, using anonymization or pseudonymization, is the most common method to perform information removal within DICOM data. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 118
    “…METHODS: Acquisition of two pseudonymized case-based data sources (national TB notification data and antibiotic resistance surveillance data) was followed by two-source Capture-recapture (CRC) analysis, as case-based data from a third source was unavailable. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 119
  20. 120
    “…Methods: The overcoming of existential suffering with indigenous understandings has been addressed through photo-elicitation in retrospective timelines with students Lihile+, Tanaka+, and Diana+, +Pseudonyms to protect identity Thematic analysis with semi-structured virtual interviews has also been utilized to gain insights into Africentric and Eurocentric worldviews. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS