-
161
Special issue: Proceedings of the 15th ISIC - The Information Behaviour Conference, Aalborg, Denmark, August 26-29, 2024
Published 2024-06-01“…Garwood The reading practices of people with neuropsychiatric disabilities: a review of library and information science literature Katarina Hagberg, Karin Lundin, Anna Lundh, Åse Hedemark Representational exchange and edgework: towards theorising the coping with fragmentary information Isto Huvila Digital health applications and health literacy: an explorative analysis Aylin Imeri, Sabrina Schorr, Sebastian Merkel To share or not to share? Image data sharing in the social sciences and humanities Elina Late, Mette Skov, Sanna Kumpulainen Analysing humanities scholars’ data seeking behaviour patterns using Ellis' model Wenqi Li, Pengyi Zhang, Jun Wang Can ChatGPT provide health information as physicians do? …”
Get full text
Article -
162
Epilepsy care pathway: The Finnish model
Published 2025-02-01“…To improve outcomes, we emphasize the use of modern digital tools, data sharing, and peer support.…”
Get full text
Article -
163
MalAware: A tabletop exercise for malware security awareness education and incident response training
Published 2024-01-01“…Despite that, this interconnectivity and data sharing between systems and devices over the internet poses security and privacy risks as threat actors can intercept, steal, and use owners’ data for nefarious purposes. …”
Get full text
Article -
164
Workflow for detecting biomedical articles with underlying open and restricted-access datasets.
Published 2024-01-01“…Here, we describe in detail our screening procedure and its validation, based on automated screening of 11035 biomedical research articles, of which 1381 articles with potential data sharing were subsequently screened manually. The screening results were highly reliable, as witnessed by inter-rater reliability values of ≥0.8 (Krippendorff's alpha) in two different validation samples. …”
Get full text
Article -
165
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01“…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
Get full text
Article -
166
Frequency Resource Sharing and Allocation Scheme Based on Coalition Formation Game in Hybrid D2D-Cellular Network
Published 2015-01-01“…Taking the cost for coalition formation into account, such as the path loss for data sharing, we prove that the core of the proposed game is empty, which shows the impossibility of grand coalition. …”
Get full text
Article -
167
Advanced Deep Learning Algorithms for Energy Optimization of Smart Cities
Published 2025-01-01“…Federated learning ensures privacy-preserving data sharing in distributed energy systems, promoting collaboration without compromising security. …”
Get full text
Article -
168
Metadata functional requirements for genomic data practice and curation
Published 2024-06-01“…Architectural layout as flat file needs extra administrative metadata to support data sharing and documentation. The resulting metadata requirement model can serve as valuable resources to genome scientists, data curators and administrators for designing metadata schema and developing data-curation policies.…”
Get full text
Article -
169
Developing airport management practices towards net zero emissions: Experiences from the Australian aviation industry
Published 2025-01-01“…After reviewing environmental policies and reports from eight major airports and conducting in-depth interviews with 18 sustainable aviation experts, five key strategies are proposed: 1) Collaborating data-sharing among stakeholders, including airport operators, ground handlers, airlines and air traffic controllers; 2) Evaluating emissions from aircraft ground idling delays; 3) Advancing in the Airport Carbon Accreditation program; 4) Assessing air pollutant emissions directly emitted from airport sources; 5) Maintaining an air pollutant emissions inventory. …”
Get full text
Article -
170
Antibiotics Profile, Prevalence of Extended-Spectrum Beta-Lactamase (ESBL), and Multidrug-Resistant Enterobacteriaceae from Different Clinical Samples in Khartoum State, Sudan
Published 2020-01-01“…Active antimicrobial-resistant (AMR) observation through constant data sharing and management of all stakeholders is crucial to recognize and control the AMR global burden. …”
Get full text
Article -
171
Blockchain Applications in the Military Domain: A Systematic Review
Published 2025-01-01“…Key areas analyzed include the role of blockchain in securing communications, fostering transparency, promoting real-time data sharing, and using smart contracts for maintenance management. …”
Get full text
Article -
172
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“…According to the re-search results, the respondents believe the key drivers of cloud migration comprise the following: improving effi-ciency, enabling more extensive data sharing capabilities, improving security, increasing innovations, reducing costs. …”
Get full text
Article -
173
Coordinated One Health investigation and management of outbreaks in humans and animals caused by zoonotic avian influenza viruses
Published 2025-01-01“…By presenting each scenario alongside the integrated actions of stakeholders, the report identifies critical development needs, such as tools (e.g. communication and data sharing platforms); key points for information exchange across sectors, triggers for joint risk assessments, and gaps in existing knowledge. …”
Get full text
Article -
174
The Impact of Data Control and Delayed Discounting on the Public’s Willingness to Share Different Types of Health Care Data: Empirical Study
Published 2025-01-01“…ResultsOur findings indicate that the type of health data does not significantly affect the perceived benefits of data sharing. Instead, it negatively influences willingness to share by indirectly affecting data acquisition costs and perceived risks. …”
Get full text
Article -
175
swaRmverse: An R package for the comparative analysis of collective motion
Published 2025-01-01“…The package allows the calculation and use of complex metrics for users without a strong quantitative background and will promote communication and data‐sharing across disciplines, standardising the quantification of collective motion across species and promoting comparative investigations.…”
Get full text
Article -
176
A State-of-the-Art Review on Empirical Data Collection for External Governed Pedestrians Complex Movement
Published 2018-01-01“…We put emphasis on the need for the future global collaborative efforts on data sharing for the complex crowd movements.…”
Get full text
Article -
177
Distributed training of foundation models for ophthalmic diagnosis
Published 2025-01-01“…This approach supports collaborative model development without data sharing, providing a scalable, privacy-preserving solution for effective retinal disease screening and diagnosis in diverse clinical settings.…”
Get full text
Article -
178
An annotated heterogeneous ultrasound database
Published 2025-01-01“…It includes 13 different ultrasound image anomalies, and all data have been anonymized. Our data-sharing program aims to support benchmark testing of ultrasound disease diagnosis in multi-center environments.…”
Get full text
Article -
179
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility
Published 2025-01-01“…Data anonymization is an essential prerequisite that enables data sharing in a privacy-preserving manner. However, anonymization affects the quality of the data and thus might affect the performance of later conducted data analysis. …”
Get full text
Article -
180
Practice of comorbidity management based on community chronic disease health management support centers: an introduction and discussion
Published 2024-10-01“…Shanghai city has developed a comprehensive and closed-loop chronic disease health management system, which includes pre-diagnosis risk assessment and identification with tagged classification, intra-diagnosis standardized monitoring, data sharing integration, multidisciplinary collaboration, decision support, and post-diagnosis complication screening, intelligent follow-up, patient self-management, standardized health education, and re-evaluation. …”
Get full text
Article