1 - 25 of 166
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Francis, LeslieEnsuring the privacy and confidentiality of electronic health recordsIn 2004, President Bush announced his plan to ensure that most Americans would have electronic health records within ten years. Although substantial progress has been made toward achieving that goal, this progress has primarily reflected institutional interests and priorities by focusing on system ...2007
2 Randy L. Dyer; Alex Boren; Marianne Carpenter; Isabelle Ghabash; Tanner Gould; Lindsai Gren; Niki Harris; Theresa Krause; Candance Oman; Allie Tripp; Tianna Tu; Corper JamesTRANSPARENCY PRIVACY CLASHING PARADIGMS IN A WEB 2.0 WORLDA University of Utah Honors Think Tank 20122012
3 Gardner, Reed M.Integrated Computerized Records Provide Improved Quality of Care with Little Loss of PrivacyBiomedical Informatics1994
4 Nebeker, Jonathan R.pSCANNER: Patient-centered scalable national network for effectiveness researchThis article describes the patient-centered Scalable National Network for Effectiveness Research (pSCANNER), which is part of the recently formed PCORnet, a national network composed of learning healthcare systems and patient-powered research networks funded by the Patient Centered Outcomes Research...2014-01-01
5 Salari, Sonia LynneSocial and environmental infantilization of aged persons: observations in two adult day care centersThis study examines the social environments, staff behavior, and social interaction of elderly clients in two adult day care centers. Goffman's (1961) description of the psycho-social effects of the "total institution" is used as a framework for conceptualizing the effects of "partial institutions" ...Infantilization2001
6 Kasera, Sneha K.Exploiting altruism in social networks for friend-to-friend malware detectionWe propose a novel malware detection application- SocialScan-which enables friend-to-friend (f2f) malware scanning services among social peers, with scanning resource sharing governed by levels of social altruism. We show that with f2f sharing of resources, SocialScan achieves a 65% increase in the ...2014-01-01
7 Francis, LeslieVirtue and the American family: abortion and divorce in Western law by Mary Ann GlendonAbortion and Divorce in Western Law is seductive and dangerous. It is seductive because it is half right; it is dangerous because it is half wrong on many levels: the data assembled about abortion law, the comparative law methodology employed, and the conclusions drawn for American public policy abo...Abortion and divorce in American law; Book review; Glendon, Mary Ann1988
8 Patwari, NealEfficient high rate secret key extraction in sensor networks using collaboration2010-02-26
9 Flynn, John J.ResponseSpeculation proceeding upon no set path and minimizing a logical thread of analysis may often be far more productive of insights into our never-ending search for knowledge than the most logical and analytical pursuit of "truth." The latter process is often premised upon unchallenged and unchallenge...Truth; Society ; Values1975
10 Craigle, Valeri; Herbert, John; Mower, AllysonCracking the code: illuminating new directions in scholarly communications and publishing initiativesLibrary publishing; Scholarly communications; Digital scholarship2012-11-04
11 Kasera, Sneha K.Violating privacy through walls by passive monitoring of radio windowsWe investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a pers...2014-01-01
12 Brunvand, Erik L.Speculatorum OculiDescription Speculatorum Oculi (The Eyes of Spies) comments on current surveillance activities of governments and corporations through an installation that includes an architectural model surveilled with looming video cameras providing live feeds to a set of video monitors. These monitors show views...2014-01-01
13 Evans, DavidImproving communication between man and computers: some recent developments1967-10-11
14 Battin, Margaret P.Aging and ethics: philosophical problems in gerontologyAging and Ethics addresses a crucial issue: In order to address the dilemmas aging poses concerning distributive justice in health care, don't we need to rethink both the personal and social significance of old age?1993
15 Myntti, JeremyDigital Preservation in LibrariesPresentation given at the Sharjah International Library Conference, Sharjah Expo Centre, United Arab Emirates. Presented on World Digital Preservation Day 2019.Digital preservation2019-11-07
16 Kasera, Sneha K.Enhancing covert communications with multiple colluding receiversTraditional (single receiver) system setup: ? Choose exploit field (e.g. last byte of TCP Timestamp) ? Alice: probabilistically inject parts of coded message into field ? Bob: extract symbols from field, decode to correct errors ?Warden: assume full knowledge of system and keys Can we create un...2010-10-06
17 Le Ber, Jeanne M.Integrating palm devices into the School of Medicine curriculumBuilt on existing relationship with course master to integrate PDAs into the School of Medicine curriculum.Palm Devices; Medicine Curriculum; Personal Digital Assistant; PDA2006-03-31
18 Poynton, Mollie RebeccaElectronic information exchange between emergency departments and poison control centers: consensus opinion on issues, opportunities, and barriers2011-06-07
19 Kasera, Sneha K.Secret key extraction using Bluetooth wireless signal strength measurementsBluetooth has found widespread adoption in phones, wireless headsets, stethoscopes, glucose monitors, and oximeters for communication of, at times, very critical information. However, the link keys and encryption keys in Bluetooth are ultimately generated from a short 4 digit PIN, which can be crack...2014-01-01
20 Pounder, June I.; Simmon, Keith E.; Barton, Claudia A.; Hohmann, Sheri L.Identification of nonsporulating molds by sequencing internal transcribed spacer regions with Virodec software and databaseFungal infections are increasing, particularly among immunocompromised hosts, and a rapid, accurate diagnosis is essential for the initiation of targeted antifungal therapy. Identification of fungi from culture requires the presence of reproductive structures, and the absence of spores can increase ...nonsporulating molds; genetic sequencing; Virodec; ITS I; ITS II2006-01-09
21 Pounder, June I.; Voelkerding, Karl V.; Storts, D.; Anderson, Clint M.Differentiation of species within mycobacterium tuberculosis complex by real-time PCR-based genomic deletion analysisDifferentiation of members within Mycobacterium tuberculosis complex (MTC) is essential for patient management and infection control. MTC is comprised of M. tuberculosis (Mtb), M. bovis (Mb), M. bovis BCG (vaccine strain; Mbcg), M. africanum (Ma), and M. microti (Mm). Because MTC have highly similar...MTC; species differentiation; Mycobacterium bovis BCG; Mycobacterium africanum; Mycobacterium microtic; PCR2006-01-09
22 Owen, William E.; Martins, Thomas B.; Litwin, Christine M.; Roberts, William L.Performance characteristics of six IMMULITE 2000 TORCH assaysTORCH is an acronym for Toxoplasma gondii (Toxo), other microorganisms (like syphilis), rubella (RV), cytomegalovirus (CMV), and herpesviruses (HSV) that are associated with congenital abnormalities during maternal infection. Prenatal testing for antibodies against these agents is one tool for preve...TORCH; Toxoplasma gondii; syphilis virus; rubella; cytomegalovirus; herpesvirus; IMMULITE 2000; congenital abnormalities; laboratory testing2006-01-04
23 Pounder, Diana G.Opportunities and challenges of school collaborationCollaborative work organizations and related themes (such as community, cooperation, etc.) have become the focus of both research and practice in education during the past few years. Some may view emphasis on collaboration (or community) in schools as the second stage of the initial "site-based m...School collaboration1999
24 Morrow, Anne; Mower, AllysonUniversity scholarly knowledge inventory system: a workflow system for institutional repositoriesThe University Scholarly Knowledge Inventory System (U-SKIS) provides workspace for institutional repository staff. U-SKIS tracks files, communications, and publishers' archiving policies to determine what may be added to a repository. A team at the University of Utah developed the system as part o...Digital repositories; workflow management; copyright permissions2009
25 Couldwell, William T.Personal perspective: AANS Bulletin's momentum continues: new editor considers peer review, practice survey impactWith this issue, I assume the reins as editor of the AANS Bulletin. I am indebted to James Bean, MD, for his extraordinary efforts in this capacity, as witnessed by review of the recent issues published under his leadership. An important initiative put forth by Dr. Bean and the Bulletin Advisory Boa...2005
1 - 25 of 166