[HTML][HTML] Improving open and rigorous science: ten key future research opportunities related to rigor, reproducibility, and transparency in scientific research

D Valdez, CJ Vorland, AW Brown, E Mayo-Wilson… - …, 2020 - ncbi.nlm.nih.gov
Background: As part of a coordinated effort to expand research activity around rigor,
reproducibility, and transparency (RRT) across scientific disciplines, a team of investigators …

[HTML][HTML] US privacy laws go against public preferences and impede public health and research: survey study

C Schmit, T Giannouchos, M Ramezani… - Journal of medical …, 2021 - jmir.org
Background Reaping the benefits from massive volumes of data collected in all sectors to
improve population health, inform personalized medicine, and transform biomedical …

Regulations and Funding to Create Enterprise Architecture for a Nationwide Health Data Ecosystem

G Seidman, A AlKasir, K Ricker… - … Journal of Public …, 2024 - ajph.aphapublications.org
The COVID-19 pandemic highlighted the United States' lack of a nationwide infrastructure
for collecting, sharing, and using health data, especially for secondary uses (eg, population …

US immigration policies pose threat to health security during COVID-19 pandemic

HM Ross, S Desiderio, T St. Mars, P Rangel - Health security, 2021 - liebertpub.com
The COVID-19 pandemic struck the United States at a time of multiple intersectional public
health challenges, including a chronically underfunded public health system, growing …

The Financial Implications of Information Security: A Correlational Study

ST Lanier - 2022 - search.proquest.com
Cybersecurity threats and successful breaches are constantly increasing which impacts an
organization's financial risk. Organizational financial priorities can fluctuate based on …

[图书][B] Approach to the psychiatric patient: Case-based essays

JW Barnhill - 2018 - books.google.com
A fascinating text that addresses the clinical and educational challenges of treating
psychiatric patients from a truly multidisciplinary perspective using a case-based format …

[图书][B] Implementing Cybersecurity Measures in New Information Technology Systems: A Generic Qualitative Inquiry

S Hidalgo - 2021 - search.proquest.com
Cybersecurity breaches cost businesses tens of millions of dollars because cybersecurity
measures were not implemented. The lack of implementing cybersecurity measures during …

Analysis of Law Enforcement's Use of Internet of Things for Digital Evidence Collection in Metropolitan Atlanta

EL Guy - 2022 - search.proquest.com
Abstract The Internet of Things devices is a part of every aspect of society. Improvements in
technology can change the perception of how society thinks, behaves, and live. These …

Exfiltrated Data and the Privacy Laws Digital Forensics Examiners Need to Understand for Analysis

BC Baye - 2022 - search.proquest.com
In the digital age, individuals must understand the protections they are provided when giving
outtheir personal information. Whether they are at the doctor's office, school, the hospital, the …

Determining Critical Information Asset Identification, Classification, and Valuation

JL Bitzan - 2020 - search.proquest.com
Research has shown that the identification, classification, and valuation of critical
information assets are inadequate. The purpose of this qualitative exploratory, descriptive …