منابع مشابه
The Phone as a Tool for Combining Online and Offline Social Activity: Teenagers' Phone Access to an Online Community
We have analyzed two months of log data and 100 surveys on the phone use of a Swedish online community for teenagers to investigate the mobile use of an established online service. This shows that the phone use mostly takes place during times of the day when teenagers have social time and the use is not influenced by the availability of a computer. The phone makes the community access more priv...
متن کاملAdolescents' access to care: teenagers' self-reported use of services and perceived access to confidential care.
BACKGROUND Most surveys on adolescents' use of health services rely on parental report, and this may underestimate adolescents' use of confidential services. OBJECTIVE To investigate adolescents' report of their own use of health services, access to care, and knowledge and use of confidential services. METHOD A random digit-dialed survey of 14- to 19-year-old adolescents was conducted in Mo...
متن کاملSecure Contexts for Confidential Data
Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which the process is going to run is available. To deal with these situations we introduce the notion of secure c...
متن کاملProviding confidential care for adolescents.
Near the end of her sports physical examination, a 16-yearold girl seems worried. The physician offers her some time without her mother in the room. Once in private, the girl quickly requests a pregnancy test. Although the test result is negative, this is a perfect teaching opportunity. Adolescents are generally healthy, but they commonly present with high-risk behaviors that are often missed b...
متن کاملCompact Confidential Transactions for Bitcoin
An enhancement is suggested to make Bitcoin transaction amounts hidden to all but the sender and receiver. In each transaction, the output amounts are encrypted with the public keys of the respective receivers. Only the transaction fee is publicly revealed, to allow miners to prioritise transactions. A homomorphic commitment for each transaction proves that the sum of the transaction inputs mat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Psychiatric Bulletin
سال: 1989
ISSN: 0955-6036,1472-1473
DOI: 10.1192/pb.13.11.615