Privacy protections: The genome hacker

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Genetics and Privacy: A Patchwork of Protections

Project is dedicated to raising public awareness of the importance of ensuring health privacy in order to improve health care access and quality, both on an individual and a community level. National Institutes of Health, for reviewing the science sections of this report and for her thoughtful comments. The California HealthCare Foundation (CHCF) is an independent philanthropy committed to impr...

متن کامل

Predicting Self-Protections of Online Privacy

An empirical study was conducted to examine the social psychological processes that may influence an individual's adoption of online privacy protection strategies. Building from the theory of planned behavior, a theoretical model predicting self-protection of online privacy was tested in the present study. This model accounted for nearly a quarter of the variability in actual adoption during a ...

متن کامل

Recalibrating Privacy Protections to Promote Patient Engagement.

n engl j med 377;16 nejm.org October 19, 2017 treatment and overestimate its likelihood for success, paving the way for later regret if the outcome is poor. Patients who choose elective procedures while in a hot state and end up with a bad outcome may be at particular risk for regret due to commission bias. Some researchers believe that the relationship of regret to either action or inertia mus...

متن کامل

Hacker Cartography: Crowdsourced Geography, OpenStreetMap, and the Hacker Political Imaginary

In this paper I trace the origins of “neogeography” (a constellation of new mapping practices and populations on the geospatial web) to its roots in computer hacker culture, notably through early mapping mashups, known originally as “map hacks”. I argue that a return to the figure of the hacker—via the proposed concept of hacker cartography—offers a productive lens for understanding the afforda...

متن کامل

User Hacker Routing

The use of multiple transmission paths is known to enhance communication security. By using a suitable split function and with the help of an additional encryption layer this approach provides an interesting method for securing client server communication on the Internet.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 2013

ISSN: 0028-0836,1476-4687

DOI: 10.1038/497172a