Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
---|---|---|---|---|
Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology | Digital Forensic Research: The Good, the Bad and the Unaddressed | differential diagnosis of pain around the hip joint . | eng_Latn | 18,100 |
An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications | Short signatures from the Weil pairing | Willingness-to-pay for a probabilistic flood forecast: a risk-based decision-making game | eng_Latn | 18,101 |
Quantifying Interdependent Privacy Risks with Location Data | Inferring friendship network structure by using mobile phone data | 8 Renewable Energy Opportunities in Water Desalination | eng_Latn | 18,102 |
Nudging users towards privacy on mobile devices | Information revelation and privacy in online social networks | data security in the world of cloud computing . | eng_Latn | 18,103 |
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds | Pors: proofs of retrievability for large files | Deep Homography Based Localization on Videos of Endoscopic Capsules | kor_Hang | 18,104 |
l g ] 2 0 fe b 20 18 local differential privacy for evolving data . | Differential privacy under continual observation | hospital - readmission risk - isolating hospital effects from patient effects . | eng_Latn | 18,105 |
Our Data, Ourselves: Privacy via Distributed Noise Generation | Privacy Preserving Data Mining | Studies of malformation syndromes in man XXXX: Multiple congenital anomalies/mental retardation syndrome or variant familial developmental pattern; differential diagnosis and description of the McDonough syndrome (with XXY son from XY/XXY father) | eng_Latn | 18,106 |
INFORMATION PRIVACY CONCERNS AMONG NOVICE AND EXPERT USERS OF SOLOMO | On risk, convenience, and Internet shopping behavior | Practical partial evaluation for high-performance dynamic language runtimes | yue_Hant | 18,107 |
Toward privacy-assured and searchable cloud data storage services | Searchable symmetric encryption: improved definitions and efficient constructions | FindU: Privacy-preserving personal profile matching in mobile social networks | eng_Latn | 18,108 |
Rethinking Privacy Decisions: Pre-Existing Attitudes, Pre-Existing Emotional States, and a Situational Privacy Calculus | Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users | Matricide: A Critique of the Literature | eng_Latn | 18,109 |
To Drop or Not to Drop: Robustness, Consistency and Differential Privacy Properties of Dropout | Local Privacy and Statistical Minimax Rates | Segmenting Consumers Based on Luxury Value Perceptions | eng_Latn | 18,110 |
An effective grouping method for privacy-preserving bike sharing data publishing | Generalizing data to provide anonymity when disclosing information (abstract) | Screenmilker: How to Milk Your Android Screen for Secrets. | eng_Latn | 18,111 |
Function-Private Functional Encryption in the Private-Key Setting | Identity-based cryptosystems and signature schemes | Current Status of the Prevention and Treatment of Stoma Complications. A Narrative Review | eng_Latn | 18,112 |
Privacy and security in online social networks: A survey | Privacy and security for online social networks: challenges and opportunities | The impact of critical success factors across the stages of enterprise resource planning implementations | eng_Latn | 18,113 |
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare | Robust De-anonymization of Large Sparse Datasets | You are what you say: privacy risks of public mentions | eng_Latn | 18,114 |
Tracking the Trackers | t-Closeness: Privacy Beyond k-Anonymity and l-Diversity | Incognito: efficient full-domain K-anonymity | eng_Latn | 18,115 |
A Privacy-Preserving Index for Range Queries | Executing SQL over encrypted data in the database-service-provider model | Reinforcement Learning of Question-Answering Dialogue Policies for Virtual Museum Guides | eng_Latn | 18,116 |
Privacy preserving data mining — ‘A state of the art’ | Bottom-Up Generalization : A Data Mining Solution to Privacy Protection | Learning Robust Representations of Text | eng_Latn | 18,117 |
Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates | Leakage-Abuse Attacks Against Searchable Encryption | Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma | eng_Latn | 18,118 |
A comprehensive framework for secure query processing on relational data in the cloud | A Privacy-Preserving Index for Range Queries | Aliasing Artifacts and Accidental Algorithmic Art | eng_Latn | 18,119 |
Secure Cloud based Privacy Preserving DataMinning Platform | Above the Clouds: A Berkeley View of Cloud Computing | Amoxicillin plus clavulanic acid versus appendicectomy for treatment of acute uncomplicated appendicitis: an open-label, non-inferiority, randomised controlled trial | eng_Latn | 18,120 |
Towards trajectory anonymization: a generalization-based approach | k-Anonymity: A Model for Protecting Privacy | Energy-efficient surveillance system using wireless sensor networks | eng_Latn | 18,121 |
A privacy-preserving framework for outsourcing location-based services to the cloud | Geo-indistinguishability: differential privacy for location-based systems | Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation | eng_Latn | 18,122 |
Privacy-preserving pattern matching over encrypted genetic data in cloud computing | Efficient Secure Outsourcing of Genome-Wide Association Studies | secure indexes . | eng_Latn | 18,123 |
Smart Meter Privacy: A Theoretical Framework | Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures | Long-term effects of glans penis augmentation using injectable hyaluronic acid gel for premature ejaculation | kor_Hang | 18,124 |
Measuring privacy leaks in Online Social Networks | Understanding Privacy Settings in Facebook with an Audience View | Privacy-preserving anonymization of set-valued data | eng_Latn | 18,125 |
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks | Efficient and robust pseudonymous authentication in VANET | Segmentation of stock trading customers according to potential value | eng_Latn | 18,126 |
Structural Data De-anonymization: Quantification, Practice, and Implications | Protecting location privacy: optimal strategy against localization attacks | SoundSense: scalable sound sensing for people-centric applications on mobile phones | kor_Hang | 18,127 |
Wearable Privacy: Skeletons in The Data Closet | Construal level theory of psychological distance | Survey and Comparison of Operating Concept for Routing Protocols in DTN | kor_Hang | 18,128 |
A Novel Dummy-Based KNN Query Anonymization Method in Mobile Services | Protecting location privacy: optimal strategy against localization attacks | An architecture for privacy-sensitive ubiquitous computing | eng_Latn | 18,129 |
Inferring the source of encrypted HTTP connections | Tor: The Second-Generation Onion Router | Influence of single nucleotide polymorphism in IL-27 and IL-33 genes on breast cancer. | eng_Latn | 18,130 |
A Process for Data Protection Impact Assessment Under the European General Data Protection Regulation | Privacy and Data Protection by Design - from policy to engineering | curlybot: designing a new class of computational toys | kor_Hang | 18,131 |
Why is the entry point allowed to be private? | Why is Main method private? | Terence Tao, Analysis I, Ex. 5.5.2: Entry point needed | eng_Latn | 18,132 |
A LIE NEVER LIVES TO BE OLD: THE EFFECTS OF FAKE SOCIAL INFORMATION ON CONSUMER DECISION- MAKING IN CROWDFUNDING | Signaling in Equity Crowdfunding | LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code | yue_Hant | 18,133 |
Privacy leakage vs. protection measures: the growing disconnect | How unique is your web browser | Mate Preference Necessities in Long- and Short-Term Mating: People Prioritize in Themselves What Their Mates Prioritize in Them | eng_Latn | 18,134 |
Dynamic Consent: A Possible Solution to Improve Patient Confidence and Trust in How Electronic Patient Records Are Used in Medical Research | a case study of the secure anonymous information linkage ( sail ) gateway : a privacy - protecting remote access system for health - related research and evaluation☆ . | living lab : user - driven innovation for sustainability . | eng_Latn | 18,135 |
what are the two main rules of hipaa | To fulfill this requirement, HHS published what are commonly known as the HIPAA Privacy Rule and the HIPAA Security Rule. The Privacy Rule, or Standards for Privacy of Individually Identifiable Health Information, establishes national standards for the protection of certain health information. | 3. HIPAA Security Rule. The HIPAA Security Rule describes what covered entities must do to secure electronic personal health information (PHI). Even though data security operates behind the scenes and out of patientsâ hands, the Security Rule is important for patients to understand because it sets a national standard. | eng_Latn | 18,136 |
personally identifiable information definition | Personally identifiable information (PII), or Sensitive Personal Information (SPI), as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.hen a person wishes to remain anonymous, descriptions of them will often employ several of the above, such as a 34-year-old white male who works at Target. Note that information can still be private, in the sense that a person may not wish for it to become publicly known, without being personally identifiable. | Personally identifiable information (PII) includes information that can be used to distinguish or trace an individualâs identity either directly or indirectly through linkages with other information.ersonally identifiable information (PII) includes information that can be used to distinguish or trace an individualâs identity either directly or indirectly through linkages with other information. | eng_Latn | 18,137 |
define publicize | publicize definition, meaning, what is publicize: to make information about something generally available: . Learn more. | A public service announcement (PSA) or public service ad, are messages in the public interest disseminated by the media without charge, with the objective of raising awareness, changing public attitudes and behavior towards a social issue. | eng_Latn | 18,138 |
information dictionnaire definition | The definition of information is news or knowledge received or given. An example of information is what's given to someone who asks for background about something. information. information. | An Information is a written statement filed and presented in behalf of the State by the district or county attorney, charging the defendant with an offense which may by law be so prosecuted. Acts 1965, 59th Leg., p. 317, ch. | eng_Latn | 18,139 |
dod pii definition | According to the Department of Defense (DoD), a breach of personal information occurs when the information is lost, disclosed to, accessed by, or potentially exposed to unauthorized individuals, or compromised in a way where the subjects of the information are negatively affected. 1 Full DoD breach definition.ccording to the Department of Defense (DoD), a breach of personal information occurs when the information is lost, disclosed to, accessed by, or potentially exposed to unauthorized individuals, or compromised in a way where the subjects of the information are negatively affected. 1 Full DoD breach definition. | What is Sensitive Personal Identifying Information (PII)? Sensitive Personal Identifying Information (PII) is defined as information that if lost, compromised, or disclosed could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual(1). | eng_Latn | 18,140 |
what is data surveillance activities | Public health surveillance. Public health surveillance is the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice. Such surveillance can: serve as an early warning system for impending public health emergencies; | What is surveillance? Surveillance means continued watchfulness over the distribution and trends of incidence through the systematic collection, consolidation, and evaluation of morbidity reports and other relevant data for the purposes of prevention of disease. | eng_Latn | 18,141 |
what is dpa | From Wikipedia, the free encyclopedia. The Data Protection Act 1998 (DPA) is an Act of Parliament of the United Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable living people.It is the main piece of legislation that governs the protection of personal data in the UK.he UK Data Protection Act is a large Act that has a reputation for complexity. While the basic principles are honoured for protecting privacy, interpreting the act is not always simple. Many companies, organisations and individuals seem very unsure of the aims, content and principles of the DPA. | DPAA Programmatic Standards. 1 The Digital Place Based Advertising Association (DPAA) has been working with Prohaska Consulting and the digital place based/digital out of home industry to develop a standard practice for programmatic trading... 2 See what the industry is saying about DPAA. | eng_Latn | 18,142 |
what act deals with patient privacy | In 1996, HIPAA or the Health Insurance Portability and Accountability Act (HIPAA) was enacted into law. This law has had a significant impact on the health care industry including the need for numerous changes in the way we communicate with our patients, their families, and with each other. | What is personally identifiable information (PII)? Does the HIPAA Privacy Rule create a conflict with the Fair Credit Reporting Act (FCRA)? Who is responsible for information privacy at the UM Miller School Of Medicine and UHealth? As a patient of the University of Miami, what rights do I have under HIPAA? | eng_Latn | 18,143 |
which regulation covers privacy | Privacy Regulation 2013. The Privacy Regulation 2013 relate to various provisions of the Privacy Act including: the definition of various terms relevant to the credit reporting provisions in Part III A of the Privacy Act. permitted disclosures of credit information to a credit reporting body (see s 21D of the Privacy Act) | The Privacy Act of 1974 (5 U.S.C. § 552a) protects personal information held by the federal government by preventing unauthorized disclosures of such information. Individuals also have the right to review such information, request corrections, and be informed of any disclosures. | eng_Latn | 18,144 |
what is considered a public record | Freedom of Information Act. The Freedom of Information Act (FOIA) is the national law regarding the release of government agency public records. While using FOIA, you can: 1 Request any type of public record report from the agency. Determine the form you want the information in. | Rap sheet redirects here. For the DMX album, see Rap Sheet. A criminal record or police record is a record of a person's criminal history, generally used by potential employers, lenders etc. to assess his or her trustworthiness. The information included in a criminal record and the existence of a criminal record varies between countries and even between jurisdictions within a country. | eng_Latn | 18,145 |
privacy settings definition | privacy settings noun [plural]. ⺠the âpart of a âsocial ânetworking âwebsite, internet âbrowser, âpiece of âsoftware, etc. that âallows you to âcontrol who âsees âinformation about you. (Definition of privacy settings from the Cambridge Advanced Learners Dictionary & Thesaurus © Cambridge University Press). Browse. | Definition of privacy. plural. privacies. 1a : the quality or state of being apart from company or observation : seclusionb : freedom from unauthorized intrusion one's right to privacy. 2 archaic : a place of seclusion. 3a : secrecyb : a private matter : secret. | eng_Latn | 18,146 |
is privacy a right of american citizen | 1 The Constitution contains no reference to any right to privacy. 2 However, over more than 100 years, courts have found a fundamental (but somewhat vague) right to privacy implicit in the Constitution. | The Privacy Act is a cornerstone of American privacy law. The Privacy Act grants individuals certain rightsâlike access to and amendment of their records held by government agencies. It also details how federal agencies and government contractors entrusted with personal records must protect that information from unauthorized disclosure. | eng_Latn | 18,147 |
what departments handle privacy policy | Your Privacy Rights. If you believe your health information privacy has been violated, the U.S. Department of Health and Human Services has a division, the Office for Civil Rights, to educate you about your privacy rights, enforce the rules, and help you file a complaint. Learn About Your Privacy. | Authorities and Responsibilities of the Chief Privacy Officer. The activities of the Privacy Office serve to build privacy into departmental programs. Implementing the Recommendations of the 9/11 Commission Act of 2007 (Public Law 110-53): Amends the Homeland Security Act to give new authorities to the Chief Privacy Officer. | eng_Latn | 18,148 |
person who is the subject of the information | (1) A state or local agency, upon request, shall disclose medical, psychiatric, or psychological information to a person who is the subject of the information or to the person's legal guardian, unless a physician, psychiatrist, or psychologist determines for the agency that the disclosure of the information is likely to have an adverse effect on the ... | Yesterday, the credit reporting agency Equifax revealed that the personal data of 143 million US consumers, as well as limited personal information for certain UK and Canadian residents, was exposed by an attack exploiting security flaws in the company's website. | eng_Latn | 18,149 |
in what ways are our privacy rights | The first is the fact that privacy as a concept is closely related to information-in terms of the definition of Neethling (1996, p. 35) privacy refers to the entirety of facts and information which is applicable to a person in a state of isolation. | In addition to specifying access rights for patients and limiting fees they may be charged, HIPAA privacy and security rights also limits disclosure or release of patient medical records to third parties without patient authorization. | eng_Latn | 18,150 |
can request amendment to privacy act | Your Rights. The Privacy Act (PA) permits an individual to request an amendment of a record that is not complete, accurate, timely, or relevant (see Full Text of PA and Code of Federal Regulations, Central Intelligence Agency, 32 CFR). Thus you are given a chance to correct errors and to prevent incorrect information from being disseminated. | B. the right to privacy is explicitly granted in the Constitution. C. the Supreme Court has ruled that the right to privacy is implied in the Bill of Rights. D. there is no right to privacy, but the government seldom violates individualsâ privacy because it is not necessary for it to do so. Add your answer. Source. Submit Cancel. | eng_Latn | 18,151 |
what is the broad evidence rule in insurance | DEFINITION of 'Broad Evidence Rule'. A rule outlining the guidelines insurers must go about determining the value of lost, stolen or damaged property. The broad evidence rule does not specify any one method to value any one piece of property, only that the means which most accurately displays the true cash value of the property will be used. | The Rule strikes a balance that permits important uses of information, while protecting the privacy of people who seek care and healing. Given that the health care marketplace is diverse, the Rule is designed to be flexible and comprehensive to cover the variety of uses and disclosures that need to be addressed. This is a summary of key elements of the Privacy Rule and not a complete or comprehensive guide to compliance. | eng_Latn | 18,152 |
why is privacy important | Importance of a Privacy Policy. A privacy policy is one of the most important documents on any website. It details your company's views and procedures on the information collected from visitors. Although a privacy policy is technically a legal document, great effort should be made to craft a document that is both accurate and easy to understand, obscuring hidden clauses in reams of text is not acceptable. | Privacy (/prɪvÉsi/ or /praɪvÉsi/ ; from Latin: privatus) is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. | eng_Latn | 18,153 |
what is data protection legislation | The Data Protection Act, 2012 (The Act) is legislation enacted by the Parliament of the Republic of Ghana to protect the privacy and personal data of individuals. | The Data Protection Act. The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone responsible for using data has to follow strict rules called âdata protection principlesâ. They must make sure the information is: 1 used fairly and lawfully. 2 used for limited, specifically stated purposes. | eng_Latn | 18,154 |
what is the medical privacy act called | Medical privacy or health privacy is the practice of maintaining the confidentiality of patient records. This involves both the conversational discretion by health care providers and the security of medical records. The terms can also refer to the physical privacy of patients from other patients and providers while in a medical facility. | The Health Insurance Portability and Accountability Act (HIPAA) protects the privacy of Protected Health Information (PHI). It establishes regulations for the use and disclosure of PHI, including a patientâs health status, provision of health care, medical records, or payment history. | eng_Latn | 18,155 |
difference between confidentiality of data & privacy of data | Main Difference â Privacy vs Confidentiality. Privacy and confidentiality deal with keeping information to oneself. Privacy refers to the state in which one is not observed or disturbed by other people. Confidentiality is a state where certain information is kept secret. The main difference between privacy and confidentiality is that privacy is about people whereas confidentiality is about information. What is Privacy Privacy is the state of being away from public attention. | What is the difference between copyright and privacy? Just because you appear in a video, image, or audio recording does not mean you own the copyright to it. For example, if your friend filmed a conversation between the two of you, she would own the copyright to that video recording. | eng_Latn | 18,156 |
anonymity psychology definition | ⢠Anonymity is not revealing or maintain the secrecy of the identity, or person unknown or unacknowledged, and confidentiality is not disclosing the information, maintaining the secret, secrecy of the information.⢠Confidentiality means a researcher agrees not to reveal the identity of the participants to anyone else.ifference between anonymity and confidentiality can be understood if you pay attention to each term very well. | Perceived Anonymity Even though many disciplines such as psychology, computer science, and communications may define anonymity in objective terms, it is ultimately the subjective experience of anonymity that may lead survey respondents or experiment participants to inhibit their behavior or self-disclosure. NONYMITY & C ONFIDENTIALITY 6 Anonymity and confidentiality perceptions. Two items were administered to measure perceptions of anonymity and confidentiality specific to the survey that respondents had just completed. | eng_Latn | 18,157 |
what is data privacy in healthcare | Healthcare providers recognize that data security is of vital importance to their business.. Healthcare organizations are particularly vulnerable. They house both personal health and payment information, plus intellectual property -- all lucrative targets for hackers. | The HIPAA privacy rule formalizes many of the policies and procedures you may already use to safeguard patient information and maintain physician-patient confidentiality. The privacy rule doesn't require patient consent for routine uses or disclosures of medical information, such as for treatment or billing purposes. | eng_Latn | 18,158 |
information that cannot be shared with others | Employers can't bar employees from discussing their salaries on their own time. Additionally, employees may not discuss another worker's salary unless that worker shared that information with them; information gleaned from improperly accessing confidential employee records can be barred. | A common restriction is that data about a person is not normally available to others; for example, the California Public Records Act (PRA) states that except for certain explicit exceptions, personal information maintained about an individual may not be disclosed without the person's consent. | eng_Latn | 18,159 |
what is the privacy rule in healthcare | The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule is the first comprehensive Federal protection for the privacy of personal health information. Research organizations and researchers may or may not be covered by the HIPAA Privacy Rule. This website provides information on the Privacy Rule for the research community. HIPAA Resources | The Privacy Rule protects certain information that covered entities use and disclose. This information is called protected health information (PHI), which is generally individually identifiable health information that is transmitted by, or maintained in, electronic media or any other form or medium. | eng_Latn | 18,160 |
what is the data protection act | U.K. Data Protection Act 1998 (DPA 1998) The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled. The main intent is to protect individuals against misuse or abuse of information about them. | Individuals, as citizens and consumers need to have the means to exercise their right to privacy and protect themselves and their information from abuse. This is particularly the case when it comes to our personal information. Data protection is about safeguarding our fundamental right to privacy, which is enshrined in international and regional laws and conventions. | eng_Latn | 18,161 |
Attitudes toward online availability of US public records | The measurement of observer agreement for categorical data. | Let's Fix OpenGL | eng_Latn | 18,162 |
Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences | Cyberstalking, personal privacy, and moral responsibility | sudokusat - a tool for analyzing difficult sudoku puzzles . | eng_Latn | 18,163 |
an experimental study on ubiquitous commerce adoption : impact of personalization and privacy concerns . | Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma | Synthetic lethality: emerging targets and opportunities in melanoma | eng_Latn | 18,164 |
Towards quality metrics for OpenStreetMap | The role of site features, user attributes, and information verification behaviors on the perceived credibility of web-based information: | A Portable Continuous Blood Purification Machine for Emergency Rescue in Disasters | eng_Latn | 18,165 |
Subdermal neo-umbilicoplasty in abdominoplasty | A simple new technique for neo-umbilicoplasty | Solutions to Security and Privacy Issues in Mobile Social Networking | eng_Latn | 18,166 |
Privacy, security, risk, and trust concerns in e-commerce | Making sense of Cronbach's alpha | Advances in Ultrasonic Assessment of Acardiac Twin | eng_Latn | 18,167 |
The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network | Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce | Hyaluronic Acid in Inflammation and Tissue Regeneration. | eng_Latn | 18,168 |
Why don't some people care about online privacy? | Why most people don't care about their security and privacy in the cyber space? | Why can't we create security that keeps hackers out? | eng_Latn | 18,169 |
Analyzing the Problem of Employee Internal Social Network Site Avoidance: Are Users Resistant due to Their Privacy Concerns? | Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework | A beginners guide to SNP calling from high-throughput DNA-sequencing data | eng_Latn | 18,170 |
Impact of privacy concern in social networking web sites | Internet social network communities: Risk taking, trust, and privacy concerns | Technical Advances of the Recombinant Antibody Microarray Technology Platform for Clinical Immunoproteomics | eng_Latn | 18,171 |
Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users: | Cyberstalking, personal privacy, and moral responsibility | A fall detection system using k-nearest neighbor classifier | eng_Latn | 18,172 |
VALIDATION GUIDELINES FOR IS POSITIVIST RESEARCH | Information privacy: measuring individuals' concerns about organizational practices | A work-efficient parallel breadth-first search algorithm (or how to cope with the nondeterminism of reducers) | kor_Hang | 18,173 |
Can I upload a selfie on facebook that I took with a pediatric patient? Is it against patient confidentiality ethics? | Can I upload a selfie in Facebook that I took with a paediatric patient? Is it against patient confidentiality ethics? | Has anyone used Medical Care Alert's Elite system? | eng_Latn | 18,174 |
what is whitepages premium | Whitepages Premium provides subscribers access to U.S. public records to verify contact details, mobile numbers, bankruptcy history, criminal records, and more to facilitate trusting interactions in todayâs sharing economy. | Login to Safe Shepherd. WhitePages Premium. We could tell you that our data just magically appears on your computer and phone, but itâs actually the work of some very smart people. Our talented team of engineers put their heads together and built what we call the Identity Graph. | eng_Latn | 18,175 |
are backgrond checks free? | Ok, I don't know if this works or not, but on TV today there was a commercial for intelius.com, and they said they will give you one background check for free, if you type in the code "TV" in the promo code box. I don't know if it works or not, but it is worth a try.\n\nOtherwise...I believe they cost $$$. | not long ago Tom send out a bulliten saying that all those trackers are hoaxs... also that he will not be charging for myspace and most of the bulletins are oaxs.. people have nothing better to do thatn to write stupid bullets to see how many people will actually pay attention.... | eng_Latn | 18,176 |
what data is available on beenverified | from 176 reviews Review It. BeenVerified.com is online database that allows anyone to perform background checks. Using just a name and a state of residence, Been Verified can provide a variety of resources on a new neighbor, a prospective date, or anyone you wish. Been Verified is not a credit agency or a private investigator service. | Supported formats (import):NX, Parasolid, Pro Engineer, Rhino, Solidworks, sat, wmf, dgn, 3ds, iges, step, dxf Export:dxf,stp,bmp,pdf,jpeg Inventor Fusion can import/edit all the files Inventor can. | eng_Latn | 18,177 |
what is the most trustworthy credit report company | PrivacyGuard is a company that offers credit reporting with access to three bureau credit reports, identity theft protection and regular credit monitoring services. The company is headquartered in Stamford, CT. | Lexington Law is the leading firm in credit report repair for a reason: they make the process easy and effective for their clients. | eng_Latn | 18,178 |
what is truthfinder | For more information about TruthFinder, visit http://www.truthfinder.com. ABOUT TRUTHFINDER. TruthFinder is an online service that provides public record, people finder, and criminal record information to members on a subscription basis. | Vertical configuration. 1 Bushnell's The Truth Rangefinder with ClearShot eliminates the guesswork bowhunters face with accurate, lightning-fast readings to 200 yds in bow mode and 850 yds. for line-of-sight ranging. ClearShot provides arrow-flight information to determine if there is indeed a clear shot and can be calibrated for each bow and user. | eng_Latn | 18,179 |
Mass Effect 3 public match locked | How do I unlock privacy in multiplayer modes mission settings? | How do I unlock privacy in multiplayer modes mission settings? | eng_Latn | 18,180 |
Prevent Crime at a Public or Private Place | Most crime is clustered in certain “hotspots." [1] You can prevent crime by focusing on these hotspots and using different prevention methods. Many of these methods are designed to limit the ability of people to commit crimes by, for example, limiting their access to the hotspot. | This wikiHow teaches you how to set privacy preferences for each app that keeps track of your iPhone's location using Location Services. | eng_Latn | 18,181 |
Revealing avatars in anonymous accounts | Anonymous questions and Avatars | Anonymous questions and Avatars | eng_Latn | 18,182 |
Why would a LinkedIn user select the totally anonymous profile view setting? | Why do many people view LinkedIn profiles in private or anonymous mode? | How do I leverage groups on LinkedIn? | eng_Latn | 18,183 |
Why don't some people care about online privacy? | Why do people care so little about their online privacy? | Why does anonymity work the way it does on Quora? | eng_Latn | 18,184 |
Is anything truly anonymous? | Is anonymous 100% anonymous? | When do you go anonymous on Quora? | eng_Latn | 18,185 |
Does Quora track me when I post anonymously? | Does Quora Team gets to know who posted something if it was posted anonymously? | How anonymous is ‘going anonymous’ on Quora? | eng_Latn | 18,186 |
what is the anonymous | Anonymous is a loosely organized hacktivist collective created to promote free speech, unimpeded access to information, and transparency in government and corporate activities. The collective's slogan We are Legion refers to both the group's numbers and the anonymity of its members. | A secret identity is a person's alter ego which is not known to the general populace, most often used in fiction. | eng_Latn | 18,187 |
Oral Narrative and Literary Text: Afro-American Folklore in Their Eyes Were Watching God | “Hard Skies” and Bottomless Questions | Failure of Acanthamoeba castellanii to produce intraocular infections. | eng_Latn | 18,188 |
Prudie, too, has lived through this a few times. | Prudie has gone through this a few times. | Prudie has never been through this before. | eng_Latn | 18,189 |
Land, Legacy, and Return: Negotiating a Post-Assimilationist Stance in Allegra Goodman's Kaaterskill Falls | Text, Terrain, and Temporality: Re-exploring Judaism in Allegra Goodman’s The Cookbook Collector | Surface of localized pleural plaques quantitated by computed tomography scanning: no relation with cumulative asbestos exposure and no effect on lung function | eng_Latn | 18,190 |
Double-Talking: Essays on Verbal and Visual Ironies in Canadian Contemporary Art and Literature | The crisis of gender identity in the Greek film noir : sexuality, paranoia and the unconscious in Efialtis/Nightmare (1961) and O Ergenis /The Bachelor (1997) | There Was No Counter-Enlightenment | eng_Latn | 18,191 |
In this article, I suggest that narratives’ importance for social change may be understood by examining specific elements of narrative syntax — key rhetorical tropes within stories, and story genres. I argue that these stylistic elements generate social connections that themselves support and stimulate social change. I use Young’s (2006) theorisation of responsibility and global justice in terms of connection, to suggest how narratives may support or generate progressive social change. I then examine narrative tropes and genres of similarisation and familiarisation at work in narratives produced around the HIV pandemic, and the limits of those tropes and genres for supporting and catalysing social change. | In a response to critiques of his On the Postcolony in a 2006 African Identities article, Achille Mbembe declared that the book was written at a time when the study of Africa was caught in a dramatic analytical gridlock. Traditional critical frameworks and discourses on the condition of postcolonial Africa seemed inadequate and ineffectual. Marxian analysis of colonization and its consequences is specifically isolated as one such impotent tool of critical analysis. As an alternative to these “failed” traditional paradigms, Mbembe launches into a deconstructive experimental hermeneutic that leads him to the explication of colonial alterity in libidinal, representational and semiotically analogous language, as exhibited in On the Postcolony. This article challenges the efficacy of this post-structuralist semiotics and phenomenological extrapolations as the proposed way out of his perceived “cul-de-sac” in African postcolonial self-imagination. In particular, his dismissal of Marxian theory is turned around and demonstrated as an analytical paradigm that most radically diagnoses the essence of colonization as it affects the African subject. On the basis of the schema of Das Kapital, which is primarily about the postulation of the expropriation of labour power as the surplus value that fuelled the Atlantic slave trade and colonization, what Mbembe deems hermeneutically as a discursive distortion of the imagery of the African in the past and the present, is exposed as being a material-political misappropriation of the human essence, and as such a historical injustice that remains embedded into the logic of prevailing neo-colonialism. | Blunt trauma abdomen rarely leads to gastrointestinal injury in children and isolated gastric rupture is even rarer presentation. We are reporting a case of isolated gastric rupture after fall from height in a three year old male child. | eng_Latn | 18,192 |
An Irish priest was once describing with great disapproval a practice common among his fellow priests and brothers who were also teachers in the early grades, the practice of caning or striking the child with a thin flexible rod. He remarked that these men, having read that passage in the New Testament that says “Suffer the little children to come unto me ...” had taken it literally. It is the suffering of the littlest of the little children, not by caning but by accidents of conception and birth, and by the actions of their medical caretakers, that is my topic. Not merely the suffering of the children themselves, but also the suffering caused to their parents and family, and to the medical staff into whose care they are entrusted. Along the way I want to discuss some features of suffering in infants that are not unique to, but perhaps are still acutely true of, this group of sufferers. | Combining cinematic and diplomatic history, this article examines a curious relic of the detente phase of the Cold War, the fantasy-musical The Blue Bird. Released on the silver screen in 1976, The Blue Bird was the only U.S.-Soviet cinematic coproduction during the Cold War. The movie was made for a variety of commercial, artistic, and ideological reasons but failed to live up to expectations. The production was shambolic, critics were disdainful, and the film was a dud at the box office. The Blue Bird is largely forgotten nowadays, but the story of the film's production and reception sheds valuable light on the economics and politics of cross-bloc filmmaking. It also provides insight into the importance of cinema as an instrument of public diplomacy at the height of detente. | Current accounts of the development of scientific reasoning focus on individual children's ability to coordinate the collection and evaluation of evidence with the creation of theories to explain the evidence. This observational study of parent - child interactions in a children's museum demonstrated that parents shape and support children's scientific thinking in everyday, nonobligatory activity. When children engaged an exhibit with parents, their exploration of evidence was observed to be longer, broader, and more fo- cused on relevant comparisons than children who engaged the exhibit without their parents. | eng_Latn | 18,193 |
An accessory instrument panel adapted to be mounted on an angular surface in a vehicle. The panel consists of a one piece molding having an upper mounting bracket that is fastened to the angular surface in the vehicle with arcuate flanges projecting downwardly from the bracket and having arcuate serrations on the outer surfaces thereof that interengage arcuate serrations on the sides of an instrument mounting panel. The mounting panel is pivotally mounted with respect to the mounting bracket so that the angular position of the mounting panel with respect to the mounting bracket and the mounting surface may be adjusted as desired. | The aim of this article is to examine the legitimacy of claims that athletes in extreme sports may encounter the mystical and sublime, when examined though a Christian theological lens. Drawing on the works of theologians and religious studies scholars – in particular, that of Richard Zaehner (1961) – and social scientists who have written on the topic of the mystical and sublime in sporting experience, the two major themes explored are first, the differences and similarities between positive psychological states commonly reported in extreme sport, for example the ‘flow’ experience, and theistic mystical experiences articulated in the bible and in Christian theology, and, secondly, the possibility of experiencing the sublime through the nature–person interaction in wilderness settings. As to whether extreme sport experience provides access to the mystical realms of the Holy that Rudolph Otto, St Paul, Jonathan Edwards and St John of the Cross refer to, our answer is an emphatic no. That said, we wish clea... | The socio-cultural behaviour of Scandinavian Mesolithic hunter-gatherers has been difficult to understand due to the dearth of sites thus far investigated. Recent excavations at Kanaljorden in Sweden, however, have revealed disarticulated human crania intentionally placed at the bottom of a former lake. The adult crania exhibited antemortem blunt force trauma patterns differentiated by sex that were probably the result of interpersonal violence; the remains of wooden stakes were recovered inside two crania, indicating that they had been mounted. Taphonomic factors suggest that the human bodies were manipulated prior to deposition. This unique site challenges our understanding of the handling of the dead during the European Mesolithic. | eng_Latn | 18,194 |
Materiality and Meaning in Social Life: Toward an Iconic Turn in Cultural Sociology D.Bartmanski & J.Alexander PART I Representation, Presentation, Presence: Tracing the Homo Pictor G.Boehm Iconic Power and Performance: the Role of the Critic J.Alexander PART II Inconspicuous Revolutions of 1989. Culture and Contingency in The Making of Political Icons D.Bartmanski The Making of Humanitarian Visual Icons. On the 1921-1923 Russian Famine as Foundational Event F.Kurasawa Seeing Tragedy in the News Images of September 11 W.Bowler The Emergence of Iconic Depth. Secular Icons in a Comparative Perspective W.Binder PART III Shifting Extremism: On the Political Iconology in Post-socialist Serbia D.Suber & S.Karamanic The Visualization of Uncertainty: HIV Statistics in Public Media V.Rauer How To Make an Iconic Commodity: The Case of Penfolds' Grange Wine I.Woodward & D.Ellison Becoming Iconic. The Cases of Woodstock and Bayreuth P.Smith PART IV Body and Image H.Belting Iconic Difference and Seduction B.Giesen Iconic Rituals. Towards a Social Theory of Encountering Images J.Sonnevend Visible Meanings P.Sztompka Afterword B.Giesen | The aim of this article is to theorize how materials can play an active, constitutive, and causally effective role in the production and sustenance of cultural forms and meanings. It does so through an empirical exploration of the Museum of Modern Art of New York (MoMA). The article describes the museum as an “objectification machine” that endeavors to transform and to stabilize artworks as meaningful “objects” that can be exhibited, classified, and circulated. The article explains how the extent to which the museum succeeds in this process of stabilization ultimately depends on the material properties of artworks and, more specially, on whether these behave as “docile” or “unruly” objects. Drawing on different empirical examples, the article explores how docile and unruly objects shape organizational dynamics within the museum and, through them, the wider processes of institutional and cultural reproduction. The article uses this empirical example to highlight the importance of developing a new “material sensibility” that restores heuristic dignity to the material within cultural sociology. | Blunt trauma abdomen rarely leads to gastrointestinal injury in children and isolated gastric rupture is even rarer presentation. We are reporting a case of isolated gastric rupture after fall from height in a three year old male child. | eng_Latn | 18,195 |
The autonomous self-portrait, a central mode of expression in western art, was a Renaissance invention. This book explores for the first time the genesis and early development of this important genre as it took place in Italy in the fifteenth and sixteenth centuries. Joanna Woods-Marsden examines a series of self-portraits in Renaissance Italy and their relation to the social status of art and artists. She argues that these self-images represented the aspirations of their creators to change the status of art and thereby their own social standing. | This paper explores and highlights the value given to craftsmanship or technê in the community of liefhebbers and artists associated with the pictures of collections genre. Taking as its case study a group of gallery interiors by the probable inventor and leading light of the genre, Frans II Francken, it places pictures of collections within the reform of attitudes towards manual dexterity and the mechanical arts that took place in the Early Modern period. Antwerp gallery interiors exemplify the intellectual metamorphosis of the hand, urging us to see in them an appeal both to the senses and to the intellect, which are fused together by the skilled artist’s technical facility. | It is proved, by using topological properties, that when a group automorphism of a locally compact totally disconnected group is ergodic under the Haar measure, the group is compact. The result is an answer for Halmos's question that has remained open for the totally disconnected case. | eng_Latn | 18,196 |
The Historical Dictionary of Holocaust Cinema examines the history of how the Holocaust is presented in film, including documentaries, feature films, and television productions. It contains a chronology of events needed to give the films and their reception a historical context, an introductory essay, a bibliography, a filmography of more than 600 titles, and over 100 cross-referenced dictionary entries on films, directors, and historical figures. Foreign language films and experimental films are included, as well as canonical films. This book is a must for anyone interested in the scope of films on the Holocaust and also for scholars interested in investigating ideas for future research. | Holocaust cinema is important constituent in conveying the events of the Holocaust and its aftermath within present day culture. Recommendations by film advisory boards can encourage or deject exposure to Holocaust cinema. Age-classifications and their justifications of Holocaust movies produced between 1993 and 2015, by film advisory boards in five English speaking countries, were investigated. Differences in age classifications, and similarity in depicting Holocaust movies as mainly heavy with violence, sex, profanity and mature contents, were noted. In order to capture more fully the complexities marking Holocaust cinema, expansion of the vocabulary used by these boards is needed. | Berzelius failed to make use of Faraday's electrochemical laws in his laborious determination of equivalent weights. | eng_Latn | 18,197 |
This review paper examines some of the main theoretical influences prompting a reappreciation of the importance of the body and how it may be conceived as relevant to information studies (IS). It starts by placing this increased recognition of the body in its historical and social context. It then examines, in turn, how the body is viewed in the phenomenology of Merleau-Ponty; practice theory; embodied cognition; and sensory studies. Existing and potential influences in information studies are discussed. Most work that reexamines the place of the body reflects the influence of Merleau-Ponty, but he has had relatively little direct impact on IS. Practice theory does deal with the body, and this has already been picked up quite strongly in IS. Work in the area of embodied cognition has the potential to fundamentally change our view of the relation of the mind and the body, and information as an aspect of that relation. Sensory studies offers a powerful framework for examining the cultural shaping of the senses as a source of information. The implications of the bodily turn for methodology are briefly discussed. | Though urban sociologists tend to study the growth and development of cities, there is a venerable yet often marginalized tradition that addresses the embodied experience of urban life. Studies of urban experiences have recently begun to flourish due, in part, to the rise of sensory scholarship. Recognizing the connections between urban experiences and sensory stimulations provides nuanced ways to explore the actions and interactions between individuals and their relationships to and with urban places. Relying on a diverse literature of recent studies that focus on cities as dense sensory environments, this article shows the significance of studying city life at the experiential and sensory levels. First, a few seminal early works are discussed, with specific emphasis on Georg Simmel. Then, each of the five bodily senses and their correlated sensescapes – seescapes, soundscapes, smellscapes, tastescapes, and touchscapes – are presented in order to show individuals and groups use their senses to experience and make sense of the city. The article concludes with a brief discussion of methods and few suggestions to encourage future analyses of the everyday embodied and emplaced practices and interpretations of being in the city. | Blunt trauma abdomen rarely leads to gastrointestinal injury in children and isolated gastric rupture is even rarer presentation. We are reporting a case of isolated gastric rupture after fall from height in a three year old male child. | eng_Latn | 18,198 |
For many scholars of language, discourse and society, multimodal analysis has come effectively to mean the interrelating analysis of text and image. Definitions of multimodality do of course make reference to other modes including sound, music, taste, gesture or somatic perception, but there has until now been very little attention to the social semiotics of sound within multimodal texts. Multimodal semiotics, and indeed social semiotic treatments of music have been theorized primarily upon the static, and interrelated modes of text and image. Much of this work in multimodality has relied on homologous relationships frozen in time although embedded in complex social life. Whilst we acknowledge that our own role as interpreters of signs changes in different contexts and times, much of the literature of multimodality considers fairly static texts such as posters, paintings or roadsigns. This is one reason why sound, and more specifically music, has not been fully theorized in multimodality and its significant social semiotic power is largely absent from many analyses of important social discourses about power, ethnicity, race, gender, nationalism, to name but a few. Musical experience is today very often multimodal, and has a powerfully affective role in contemporary society, and has inspired a wide range of semiotic, aesthetic and mystical theories of how it makes meaning in people’s lives. Moreover, much of the discourse of multimodal semiotics has until recently, relied upon linguistic models of musical meaning. This book however builds upon a growing interest in the work in this area of key scholars such as Theo Van Leeuwen and David Machin amongst others, who have been working within Social Semiotics or discourse analytical approaches to communication who have been dealing with musical sound as communication. Therefore, building upon this new surge of interest, the aim of this book is to bring together a collection of key scholars working in this area to demonstrate, across a range of distinct contexts, how music acts as a fundamental aspect of multimodal communication. We therefore believe that music and sound are not trivial concerns for scholars of communication and media, but that they play an important role both as a discrete mode in itself, but perhaps even more crucially, in dialogue with other modes of communication such as image and text. | Foreword PART I Introduction to Part 1: Music and Meaning in the Commercials 1. Synaesthesia and Similarity 2. Multimedia as metaphor 3. Models of multimedia PART 2 Introduction to Part 1: Steps Towards Analysis 4. Credit Where It's Due: Madonna's Material Girl 5. Disney's Dream: The Rite of Spring sequence from Fantasia 6. Reading film and re-reading opera: from Armide to Aria Conclusion: The Lonely Muse Index | Blunt trauma abdomen rarely leads to gastrointestinal injury in children and isolated gastric rupture is even rarer presentation. We are reporting a case of isolated gastric rupture after fall from height in a three year old male child. | eng_Latn | 18,199 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.