Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber threats to health information systems: A systematic review
R Luna, E Rhine, M Myhra, R Sullivan… - … and Health Care, 2016 - content.iospress.com
BACKGROUND: Recent legislation empowering providers to embrace the electronic
exchange of health information leaves the healthcare industry increasingly vulnerable to …
exchange of health information leaves the healthcare industry increasingly vulnerable to …
[HTML][HTML] TEA-IS: A hybrid DEA-TOPSIS approach for assessing performance and synergy in Chinese health care
This paper presents an assessment of the Chinese healthcare system in 31 provinces for a
10-year period in light of relevant physical and human resource variables. First, a novel TEA …
10-year period in light of relevant physical and human resource variables. First, a novel TEA …
[HTML][HTML] Development of a risk index for cross-border data movement
J Li, W Dong, C Zhang, Z Zhuo - Data Science and Management, 2022 - Elsevier
Cross-border data transmission in the biomedical area is on the rise, which brings potential
risks and management challenges to data security, biosafety, and national security …
risks and management challenges to data security, biosafety, and national security …
Discrete nonlinear optimization by state-space decompositions
This paper investigates a decomposition approach for binary optimization problems with
nonlinear objectives and linear constraints. Our methodology relies on the partition of the …
nonlinear objectives and linear constraints. Our methodology relies on the partition of the …
Pricing and disseminating customer data with privacy awareness
XB Li, S Raghunathan - Decision support systems, 2014 - Elsevier
Organizations today regularly share their customer data with their partners to gain
competitive advantages. They are also often requested or even required by a third party to …
competitive advantages. They are also often requested or even required by a third party to …
Is hidden safe? Location protection against machine-learning prediction attacks in social networks
User privacy protection is a vital issue in online social networks (OSNs). Even though users
often intentionally hide their private information in OSNs, adversaries may conduct …
often intentionally hide their private information in OSNs, adversaries may conduct …
Analysing the attractiveness, availability and accessibility of healthcare providers via social network analysis (SNA)
Due to the increasing pressure on resource limitations and the need for efficiency
improvements, effective healthcare service planning should analyse trends in citizens' …
improvements, effective healthcare service planning should analyse trends in citizens' …
Privacy preservation in service operations by minimizing sensitive data exposure
In IT service operations such as service help desk, the primary task is to resolve customer
queries satisfactorily within the stipulated service level agreements (SLA). These customer …
queries satisfactorily within the stipulated service level agreements (SLA). These customer …
When being hot is not cool: Monitoring hot lists for information security
We study operational and managerial problems arising in the context of security monitoring
where sessions, rather than raw individual events, are monitored to prevent attacks. The …
where sessions, rather than raw individual events, are monitored to prevent attacks. The …
[PDF][PDF] Factors affecting the decision making process in healthcare institutions
In health care organizations, decision making is very complicated and could be of both
clinical and nonclinical nature. Decision towards patients is usually associated with multiple …
clinical and nonclinical nature. Decision towards patients is usually associated with multiple …