Search results

From LIMSWiki
Jump to navigationJump to search
  • ...rity Law, together with its Civil Code and Personal Information Protection Law, demonstrates China's great willingness towards a stronger data protection ...is referred to.}} The breadth and effectiveness of global data protection law is fragmented by the divergence among various data protection standards. As
    68 KB (9,682 words) - 19:21, 31 July 2021
  • ...rantee the credibility and admissibility of digital evidence in a court of law. A critical component of this process is to utilize an adequate [[chain of ...s.org/07_book/html/201101/201101001.html |journal=International Journal of Computer Science and Network Security |volume=11 |issue=1 |pages=1–9}}</ref> This
    55 KB (7,637 words) - 16:19, 28 June 2022
  • ...ic.oup.com/jlb/article/doi/10.1093/jlb/lsaa010/5825716 |journal=Journal of Law and the Biosciences |language=en |volume=7 |issue=1 |pages=lsaa010 |doi=10. ...//linkinghub.elsevier.com/retrieve/pii/S0267364918300827 |journal=Computer Law & Security Review |language=en |volume=34 |issue=5 |pages=1000–1018 |doi=
    91 KB (12,825 words) - 19:20, 7 February 2023
  • ...ting Resilience |url=http://ieeexplore.ieee.org/document/6701301/ |journal=Computer |volume=47 |issue=9 |pages=70–76 |doi=10.1109/MC.2013.448 |issn=0018-9162 .../retrieve/pii/S1319157821000203 |journal=Journal of King Saud University - Computer and Information Sciences |language=en |volume=34 |issue=8 |pages=5766–578
    94 KB (12,503 words) - 17:15, 16 March 2023
  • ...sis|analysis]] of physical traces (e.g., DNA, fingerprint, face) caused by computer hardware or software, ability to tamper with raw data files generated by la The computer systems used to store instruments' generated data files (raw and processed)
    62 KB (8,461 words) - 19:39, 19 September 2021
  • ...anging from computer software, to documents, to art. In general, copyright law is used by an author to prohibit recipients from reproducing, adapting, or Copyleft type licenses are a novel use of existing copyright law to ensure a work remains freely available. The GNU General Public License,
    71 KB (8,794 words) - 16:21, 19 January 2016
  • ...ave been significant developments in European Union (E.U.) data protection law recently that will have an impact on health care professionals, particularl Currently the relevant law in the United Kingdom is the Data Protection Act 1998, which is the United
    26 KB (3,723 words) - 15:04, 25 April 2017
  • ...Mobile health applications and agency posturing |journal=Boston University Law Review |author=Schulke, D.F. |volume=93 |pages=1699–1752 |year=2013}}</re ...Facilitator’ for Trust in E-Health: Challenges and Opportunities |journal=Law, Innovation and Technology |author=Vedder, A.; Cuijpers, C.; Vantsiouri, P.
    45 KB (6,297 words) - 19:48, 6 June 2016
  • ...Chapter 23: The Science of Forensic Entomology |title=Forensic Science and Law: Investigative Applications in Criminal, Civil and Family Justice |author=H ...n as the ''Bambergensis''). It was based on the humanistic school of Roman law, and it was in turn the basis for the ''Constitutio Criminalis Carolina'',
    39 KB (5,374 words) - 15:14, 14 April 2021
  • |journal = ''South African Journal of Bioethics and Law'' ...ency-driven medical environment, and that their application as required by law raises new and unforeseen ethical dilemmas.
    35 KB (4,745 words) - 22:45, 30 July 2018
  • ...n 2017, there were “over 130 large-scale, targeted breaches [by hackers of computer networks] in the U.S.,” and “between January 1, 2005 and April 18, 2018 ...in front of a hospital, the reverse hack could bring down that hospital’s computer networks. The focus of the attack could be on imitating a user or system ad
    67 KB (9,997 words) - 21:00, 19 September 2021
  • ...llenges in EU Data Protection Regulation |journal=International Journal of Law and Information Technology |author=Hörnle, J. |volume=27 |issue=2 |pages=1 ...obtaining informed consent for diagnostic procedures or interventions, the law requires individual and comprehensive information about and understanding o
    57 KB (8,206 words) - 18:13, 29 December 2020
  • ...which are not related to spatiality, so that one deduces the metallogenic law and guides the prospecting better.<ref name="PanMan17" /> ...rocess of establishing the metallogenic series, exploring the metallogenic law, and constructing the mathematical model, the spatial attribute of the meta
    69 KB (9,778 words) - 22:40, 20 February 2018
  • ...and robots is ushering in a paradigm shift in [[materials science]]. Using computer algorithms and robots to decide and perform all experimental steps, these s ...orange, and purple in Figure 1). Here, the term "autonomous" means that a computer algorithm decides the next experimental steps while robots perform all expe
    89 KB (12,422 words) - 21:17, 1 September 2023
  • ...stolen by state and non-state actors through infiltration of databases and computer systems containing this information. Countries have developed their own pol Advances in computer science, engineering, and data science have changed research, development,
    47 KB (6,188 words) - 18:25, 18 June 2019
  • ...ght by running the course on GNU/Linux running on inexpensive Raspberry Pi computer hardware, for which students may be granted full administrator access. ...urce for teaching and learning bioinformatics on the low-cost Raspberry Pi computer.
    84 KB (12,104 words) - 18:55, 12 April 2024
  • ...st=Tom M. |date=1997 |title=Machine Learning |series=McGraw-Hill series in computer science |publisher=McGraw-Hill |place=New York |isbn=978-0-07-042807-2}}</r
    148 KB (20,856 words) - 16:28, 29 April 2024
  • ...web |url=https://www.govinfo.gov/app/details/PLAW-104publ191 |title=Public Law 104 - 191 - Health Insurance Portability and Accountability Act of 1996 |pu ...egislation was signed into law by President Clinton and codified as Public Law 104-191, the Health Insurance Portability and Accountability Act of 1996 (H
    20 KB (2,906 words) - 00:43, 8 January 2022
  • '''Free and open-source software''' ('''FOSS''') is computer [[software]] that can be classified as a union of two software development ....com/books?id=568u_k1R4lUC&pg=PA532 |title=Berkshire Encyclopedia of Human-computer Interaction |editor=Bainbridge, William S. |publisher=Berkshire Publishing
    22 KB (3,162 words) - 14:36, 20 September 2022
  • Public health informatics is "the systematic application of information, computer science and technology to public health practice, research, and learning."< ...of medicine, but also include data gathered at the scene of death and from law enforcement agencies investigating the death. This data are critical in ass
    35 KB (5,038 words) - 16:02, 28 March 2016

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)