Search results for "Anonymity"

showing 10 items of 17 documents

MASK 2017: ARIA digitally-enabled, integrated, person-centred care for rhinitis and asthma multimorbidity using real-world-evidence

2018

mHealth, such as apps running on consumer smart devices is becoming increasingly popular and has the potential to profoundly affect healthcare and health outcomes. However, it may be disruptive and results achieved are not always reaching the goals. Allergic Rhinitis and its Impact on Asthma (ARIA) has evolved from a guideline using the best evidence-based approach to care pathways suited to real-life using mobile technology in allergic rhinitis (AR) and asthma multimorbidity. Patients largely use over-the-counter medications dispensed in pharmacies. Shared decision making centered around the patient and based on self-management should be the norm. Mobile Airways Sentinel networK (MASK), th…

AllergyHEALTH-ORGANIZATIONIMPACTRespiratory Medicine and Allergy[SDV]Life Sciences [q-bio]Allergic Rhinitis and its Impact on Asthma - ARIAReviewMASK - Mobile Airways Sentinel networK0302 clinical medicine610 Medical sciences MedicineApp; ARIA; Asthma; Care pathways; MASK; mHealth; Rhinitis; Immunology and Allergy; Immunology; Pulmonary and Respiratory MedicineHealth careMedicine and Health SciencesImmunology and Allergy030212 general & internal medicineAndroid (operating system)mHealthRinitisRhinitiComputingMilieux_MISCELLANEOUSLungmedicin och allergiRhinitisPRODUCTIVITY3. Good healthALLERGIC RHINITISmHealthRiniteCare pathwaysMedical emergencyLife Sciences & BiomedicinePulmonary and Respiratory MedicineSTRATEGIESMASKMASK study groupImmunologyMEDLINE610K-ANONYMITYPharmacy[object Object]Settore MED/10 - Malattie Dell'Apparato RespiratorioVALIDATIONMACVIA-ARIA03 medical and health sciencesmedicineMobile technologyTECHNOLOGYApp -MASKApp ; ARIA ; Asthma ; Care pathways ; MASK ; mHealth ; RhinitisARIA; App; Asthma; Care pathways; MASK; Rhinitis; mHealthAsmaAsthmaCare pathwayScience & TechnologyARIAbusiness.industryApp; ARIA; Asthma; Care pathways; MASK; mHealth; RhinitisSettore MED/09 - MEDICINA INTERNACorrectionGuidelineRC581-607medicine.diseaseAsthma030228 respiratory systemImmunologic diseases. AllergybusinessAppEUROPEAN COUNTRIES[SDV.MHEP]Life Sciences [q-bio]/Human health and pathology
researchProduct

The hallmark of anonymity. Questions of authorship in the Hippocratic Corpus, specifically regarding the so-called 'Author C'

2020

Since Émile Littrés’ time a particular attention has been devoted to a group of Hippocratic treatises (On Generation/On the Nature of the Child + Book IV of Diseases) showing a significant range of affinities and common elements in language, style, tenor and thought. Studies by Hermann Grensemann (in the 1980s) contributed to further philological analysis of the peculiar traits of the so-called Hippocratic ‘author C’, widening the textual basis to be involved in the investigation (including gynaecological treatises like On Diseases of Women 1-2 as well as parts of Infertile Women). Recently new light has also been shed by Elizabeth Craik (editing 2009 the treatise On Glands) on the historic…

Doxographical Tradition (Anonymus Londinensis)Anonymity and Questions of Authorschip in the HCthe Hippocratic Treatises On Generation/On the Nature of the Child Book IV of Diseases On GlandAegimius of Elis.Hippocratic Corputhe Hippocratic ‘Author C’Settore L-FIL-LET/02 - Lingua E Letteratura Greca
researchProduct

Selection by committee: Anonymity and gratitude

2018

Abstract What kind of candidate is selected into a job when the principal has to appoint a committee to measure the candidates’ ability and select a winner? We find that if the committee takes into account the candidate’s gratitude towards them, a candidate with less than first best ability will be selected. A relevant exception may occur if the first best is the overall best candidate. First best selection is always achieved if the committee is anonymous to the candidates. If the committee is not detached enough from the candidates then delegation fares even worse than random selection.

Economics and EconometricsActuarial scienceDelegationmedia_common.quotation_subject05 social sciencesPrincipal (computer security)Principal–agent problemExpert appointment0502 economics and businessGratitudeEconomicsGratitude and reciprocity050207 economicsCandidate selection050203 business & managementSelection (genetic algorithm)media_commonAnonymity
researchProduct

Análisis contrastivo de la (des)cortesía en los comentarios digitales del periódico 20minutos.es y del Facebook de viajacontumascota.com: anonimato y…

2019

Esta investigación analiza las diferencias entre dos tipos de discursos digitales: las intervenciones reactivas a cinco posts por parte de los seguidores de una página de Facebook, ViajaconTuMascota.com, en la que existe cierta camaradería por la afición compartida; y los comentarios de lectores anónimos, entre los que no se establece esa solidaridad, a cinco noticias del periódico digital, 20minutos.es. Se pretende comprobar cómo inciden estas diferencias, la presencia o ausencia de solidaridad y el anonimato frente a la identidad real, cuando se producen desacuerdos: si se mantiene la cortesía social, a través de una cortesía mitigadora, o si se quiebra al activarse una estrategia de cibe…

Lingüística GeneralPolitenessmedia_common.quotation_subjectMedia studiesIdentity (social science)DescortesíaSolidarityNewspaperLengua EspañolaPolitenessAnàlisi del discurs literariMitigation and digital genreCortesíaAtenuación y géneros digitalesSociologyAffect (linguistics)ImpolitenessHobbymedia_commonAnonymity
researchProduct

Asset Market Equilibria in Cryptocurrency Markets: Evidence from a Study of Privacy and Non-Privacy Coins

2019

This paper explores whether asset market equilibria in cryptocurrency markets exist. In doing so, it distinguishes between privacy and non-privacy coins. Most recently, privacy coins have attracted increasing attention in the public debate as non-privacy cryptocurrencies, such as Bitcoin, do not satisfy some users’ demands for anonymity. Analyzing ten cryptocurrencies with the highest market capitalization in each sub-market in the 2016–2018 period, we find that privacy coins and non-privacy coins exhibit two distinct market equilibria. Contributing to the current debate on the market efficiency of cryptocurrency markets, our findings provide evidence of market inefficiency. Moreover, the a…

Market capitalizationCryptocurrencyPublic debateMarket efficiencyAsset marketBusinessMonetary economicsInefficiencyAnonymitySSRN Electronic Journal
researchProduct

A secret sharing scheme for anonymous DNS queries

2013

Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…

Name serverInformation privacyComputer scienceRound-robin DNSecret sharing schemeOverlay networkServersServernsupdateISPDNS spoofingPeer-to-peer computingDNS hijackingdomain name systemInternetdata privacyender anonymitybusiness.industrySettore ING-INF/03 - TelecomunicazioniDomain Name Systemquery processinguser privacyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultiple nodeIP networkInternet service provideranonymous DNS queryPrivacyecurity of dataCryptographybusinessComputer networkDSN serverRadiation detector
researchProduct

Communities, Communication, and Online Identities

2012

Social media and online communities offer increased possibilities for connection, interaction and participation but also new media with tools for self-presentation and identity management. Interacting anonymously or eponymously, having one, none or many identities online expresses richness in online communication. Contentious identities for communication are part of everyday online and offline interaction. The authors examine critically five types of online identity and analyse the differences, similarities, advantages, pitfalls, and disadvantages of using them. Examples illustrate the usage of these identity types, clarify possible misconceptions, and provide the reader with an improved un…

Online participationMedia studiesIdentity (social science)SociologyAnonymity
researchProduct

"Dis poem shall call names names": Naming in reggae culture, the example of dub poetry

2013

International audience; The question of names and naming emerged as a crucial concern in the cultures of the African diaspora as a way to resist the anonymity and loss of identity imposed upon slaves. Through examples taken from reggae culture and the subgenre known as dub poetry, this paper looks at how names imply a political and poetic use of language in black Atlantic cultures.

Personal Namesmedia_common.quotation_subjectGeography Planning and DevelopmentIdentity (social science)African diasporaDiasporaPolitics[SHS.LANGUE]Humanities and Social Sciences/LinguisticsWater Science and Technologymedia_commonLiteraturePoetrybusiness.industryLanguage and languagesReggae musicArt[SHS.LANGUE] Humanities and Social Sciences/LinguisticsLinguistics[SHS.SCIPO]Humanities and Social Sciences/Political science[ SHS.LANGUE ] Humanities and Social Sciences/LinguisticsGeneral Earth and Planetary SciencesPoetrybusiness[SHS.SCIPO] Humanities and Social Sciences/Political science[ SHS.SCIPO ] Humanities and Social Sciences/Political scienceAnonymity
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

Scientific peer-review - a time for renovation?

2015

Ability of the peer review system to deliver what is expected from it is increasingly challenged. Peerage of Science (PoS) is a web-based service, offering new innovations to solve the problems in the current peer-review processes. This keynote talk describes how PoS pursues to keep the traditions of scientific peer-reviewing that are worth retaining and to fix the parts that are broken.

Service (business)Engineering managementEngineeringPeeragebusiness.industryPublic relationsbusinessResubmissionAnonymityProceedings of International Workshop on Forest Science Publishing, Helsinki, Finland, 15-16 October 2015
researchProduct