Results for 'Information security'

1000+ found
Order:
  1. Part III. An emerging America.. Emerging technology and America's economy / excerpt: from "How will machine learning transform the labor market?" by Erik Brynjolfsson, Daniel Rock, and Prasanna Tambe ; Emerging technology and America's national security.Excerpt: From "Information: The New Pacific Coin of the Realm" by Admiral Gary Roughead, Emelia Spencer Probasco & Ralph Semmel - 2020 - In George P. Shultz (ed.), A hinge of history: governance in an emerging new world. Stanford, California: Hoover Institution Press, Stanford University.
     
    Export citation  
     
    Bookmark  
  2. Information Security Culture in Russian ICT Small and Medium Size Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2013 - Iris 34.
    No categories
     
    Export citation  
     
    Bookmark  
  3. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  4.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  14
    Academic Information Security Researchers: Hackers or Specialists?Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (2):785-790.
    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  15
    Do You Ignore Information Security in Your Journal Website?Mehdi Dadkhah, Glenn Borchardt & Mohammad Lagzian - 2017 - Science and Engineering Ethics 23 (4):1227-1231.
    Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  78
    Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
    This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  92
    Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  50
    Information security in cross-enterprise collaborative knowledge work.Ann Majchrzak & Sirkka L. Jarvenpaa - 2004 - Emergence: Complexity and Organization 6 (4).
    Direct download  
     
    Export citation  
     
    Bookmark  
  10. Information Security Culture in Russian ICT Small and Medium Size Enterprises.Hannakaisa Isomäki & Oleksandr Bilozerov - 2013 - Iris 34.
    No categories
     
    Export citation  
     
    Bookmark  
  11. Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki & Oleksandr Bilozerov - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  12. Chapter 9. Information Security in the Structure of the Security Complex.Сергій СТАВЧЕНКО - 2024 - Epistemological studies in Philosophy, Social and Political Sciences 1 (1):259-280.
    The essence of the security complex is revealed. Approaches to understanding the essence of information security are determined, in particular, as a state of security, as a type of public information legal relations, the direction of information relations within the limits of information legislation, the state of information (information environment of society, information development). The informational component of national security is considered. The institutional landscape of information security (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  14.  60
    Critical Theory as an Approach to the Ethics of Information Security.Bernd Carsten Stahl, Neil F. Doherty, Mark Shaw & Helge Janicke - 2014 - Science and Engineering Ethics 20 (3):675-699.
    Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  15. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  16.  23
    Semantic Information and Information Security : Definitional Issues.Björn Lundgren - unknown
    This licentiate thesis consist of two separate research papers which concern two tangential topics – that of semantic information and that of information security. Both topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I – concerning the concept of information, and a semantic conception thereof – the conceptual, and definitional, issues focus on one property, that of truthfulness. It is argued – against the veridicality thesis – that (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  7
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  6
    Developing a theory-based information security management framework for human service organizations.Sameera Mubarak - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):254-271.
    Purpose This paper aims to identify organizations’ information security issues and to explore dynamic, organizational culture and contingency theories to develop an implementable framework for information security systems in human service organizations based soundly in theory and practice. Design/methodology/approach The paper includes a critical review of global information security management issues for HSOs and relevant multi-disciplinary organizational theories to address them. Findings Effective information security management can be particularly challenging to HSO because (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  9
    A Critical Evaluation of Information Security Risks Associated with Networked Information Systems: A Case Study of Beitbridge Town Council.Newten Mujena - unknown
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  22
    Control mechanisms in information security: a principal agent perspective.Tejaswini Herath & H. Raghav Rao - 2010 - International Journal of Business Governance and Ethics 5 (1/2):2.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  16
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  22
    CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices.Andrea M. Matwyshyn - 2009 - Journal of Business Ethics 88 (S4):579 - 594.
    Relying heavily on Thomas Dunfee's work, this article conducts an in-depth analysis of the relationship between law and business ethics in the context of corporate information security. It debunks the two dominant arguments against corporate investment in information security and explains why socially responsible corporate conduct necessitates strong information security practices. This article argues that companies have ethical obligations to improve information security arising out of a duty to avoid knowingly causing harm (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  61
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  19
    Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  25. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  11
    Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties.Rebecca Slayton - 2021 - Science, Technology, and Human Values 46 (1):81-111.
    Information security governance has become an elusive goal and a murky concept. This paper problematizes both information security governance and the broader concept of governance. What does it mean to govern information security, or for that matter, anything? Why have information technologies proven difficult to govern? And what assurances can governance provide for the billions of people who rely on information technologies every day? Drawing together several distinct bodies of literature—including multiple strands (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  10
    Risk management in digitalized educational environments: Teachers’ information security awareness levels.Hamza Fatih Sapanca & Sezer Kanbul - 2022 - Frontiers in Psychology 13.
    With the spread of Information and Communication Technologies tools and the Internet, Twenty first century technologies have significantly affected human life, and it has been desired to be obtained continuously. It has become challenging to protect information due to the increase in the methods by which malicious people can get information. As a result, it is crucial to determine people’s awareness levels by revealing the risks and threats to information security. In this context, a study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  26
    Organizational Repertoires and Rites in Health Information Security.Ted Cooper, Jeff Collmann & Henry Neidermeier - 2008 - Cambridge Quarterly of Healthcare Ethics 17 (4):441-452.
    The privacy and security rules of the Health Insurance Portability and Accountability Act of 1996 emphasize taking steps for protecting protected health information from unauthorized access and modification. Nonetheless, even organizations highly skilled in data security that comply with regulations and all good practices will suffer and must respond to breaches. This paper reports on a case study in responding to an important breach of the confidentiality and integrity of identifiable patient information of the Kaiser Internet (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  29.  5
    Critical Thinking as a Component of Information Security.Viktoriia Melnychuk & Lyudmyla Horokhova - forthcoming - Visnyk of the Lviv University Series Philosophical Sciences.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. A chaos-based robust software watermarking, information security practice and experience.Liu Fenlin, Lu Bin & Luo Xiangyang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3903--355.
     
    Export citation  
     
    Bookmark  
  31. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  21
    Information Ethics, Security and the Genre of Encylopedia.David E. DeCosse - 2008 - Metascience 17 (3):481-483.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Hybrid Information Technology Using Computational Intelligence-Security Intelligence: Web Contents Security System for Semantic Web.Nam-Deok Cho, Eun-ser Lee & Hyun-gun Park - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4252--819.
     
    Export citation  
     
    Bookmark  
  34.  58
    Information warfare and security by Dorothy E. denning.Jean-François Blanchette - 1999 - Ethics and Information Technology 1 (3):237-238.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  48
    Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information.Nick Hajli & Xiaolin Lin - 2016 - Journal of Business Ethics 133 (1):111-123.
    Social networking sites have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  36.  17
    Ethics, Information Manipulation and Cyber Security in Social Media.Aynur Tekke & Aybala Lale - 2021 - Akademik İncelemeler Dergisi 16 (2):44-62.
    The aim of this study is to analyze the information in the social media which is being produced and included into the stream by mass media in the context of digital ethics and cyber security. The principles of digital ethics includes norms that takes individual’s privacy of life into consideration. In addition to being a concept related to cyberspace, computer, and computer networks, it also includes the whole human-made activities, for this reason manipulation techniques in cyberspace appear as (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  14
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  38.  37
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  9
    Food security and obesity: Can passerine foraging behavior inform explanations for human weight gain?Ursula Pool - 2019 - Behavioral and Brain Sciences 42.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  2
    Secure distributed constraint satisfaction: reaching agreement without revealing private information.Makoto Yokoo, Koutarou Suzuki & Katsutoshi Hirayama - 2005 - Artificial Intelligence 161 (1-2):229-245.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  20
    Information warfare and security.Gary Gocek - 1999 - Acm Sigcas Computers and Society 29 (3):36-37.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  42. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
  43.  22
    The Schengen Information System and Data Retention. On Surveillance, Security and Legitimacy in the European Union.Elisa Orrù - 2017 - In Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate. Baden-Baden: Nomos. pp. 115-136.
    As a technique of social control based on the collection of information, surveillance has been a central instrument of any administrative power since the modern era. Surveillance, however, can be carried out in different ways and these can provide important information on the basic features of a particular political system. Indeed, the introduction of surveillance measures has an impact on key relationships of a political system, such as liberty and security, autonomy and authority. When a political system (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  5
    Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining.Zhibin Yang, Gang Wang, Shuheng Xu, Yaodong Tao, Defeng Chen & Shuai Ren - 2022 - Journal of Intelligent Systems 31 (1):817-834.
    The power grid is an important connection between power sources and users, responsible for supplying and distributing electric energy to users. Modern power grids are widely distributed and large in scale, and their security faces new problems and challenges. Information entropy theory is an objective weighting method that compares the information order of each evaluation index to judge the weight value. With the wide application of entropy theory in various disciplines, the subject of introducing entropy into the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  9
    Privacy and Security within Biobanking: The Role of Information Technology.Raymond Heatherly - 2016 - Journal of Law, Medicine and Ethics 44 (1):156-160.
    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  8
    Exploring in Security: Towards an Attachment-Informed Psychoanalytic Psychotherapy.Jeremy Holmes - 2009 - Routledge.
    _Winner of the 2010 Goethe Award for Psychoanalytic and Psychodynamic Scholarship!_ This book builds a key clinical bridge between attachment theory and psychoanalysis, deploying Holmes' unique capacity to weld empirical evidence, psychoanalytic theory and consulting room experience into a coherent and convincing whole. Starting from the theory–practice gap in psychoanalytic psychotherapy, the book demonstrates how attachment theory can help practitioners better understand what they intuitively do in the consulting room, how this benefits clients, and informs evidence-based practice. Divided into two (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  30
    On (the Burdens of) Securing Rights to Access Information.Jonathan Trerise - 2014 - Journal of Information Ethics 23 (1):42-54.
    Some might argue that a right to access information is problematic, as it requires too much from others. Being a "positive right," the possession of which foists upon others a duty to provide something, an RAI might be thought to contrast with a "negative right," such as the right not to be harmed. Here, other people have duties only to refrain from performing certain actions. The critics this paper is concerned with continue that positive rights are problematic, where negative (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  41
    Negligence in securing informed consent and medical malpractice.Clifton Perry - 1988 - Journal of Medical Humanities 9 (2):111-120.
  49. Invited Sessions-Information Engineering and Applications in Ubiquotous Computing Environments-General Drawing of the Integrated Framework for Security Governance.Heejun Park, Sangkyun Kim & Hong Joo Lee - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 1234-1241.
     
    Export citation  
     
    Bookmark  
  50. Guidelines for the Security of Health Information, University of Thessaioniki, Greece. 26-30 September 1994.U. S. Senator Jay Rockefeller - 1994 - Health Care Analysis 2:271-272.
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000