Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 16.

Add to Quick Collection   All 16 Results

Sort:
 Add All Items to Quick Collection
Date: 2017
Language: eng
Resource Type: Thesis PhD
Identifier: http://hdl.handle.net/1959.14/1268093
Description: Theoretical thesis.
Full Text: Full Text
Date: 2015
Subject Keyword: mHealth | security | privacy | Apps
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1058734
Description: In line with a patient-centred model of healthcare, Mobile Health applications (mHealth apps) provide convenient and equitable access to health and well-being resources and programs that can enable co ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2014
Subject Keyword: authentication protocol | CRC | privacy | RFID | security
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/305516
Description: Authentication is one of the most important technologies to protect the privacy and security of RFID systems. The EPCglobal Class-1 Gen-2 specification is an important standard for RFID. The tags conf ... More
Reviewed: Reviewed
Date: 2014
Subject Keyword: mHealth | security | privacy | Apps
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/335872
Description: Mobile Health applications (mHealth apps) have become integrated into the field of consumer health informatics as tools that maintain a patient-centered model of health care by allowing consumers to m ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/306990
Description: Objective: The study aimed to examine the difference in response rates between opt-out and opt-in participant recruitment in a population-based study of heavy-vehicle drivers involved in a police-atte ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: reference entry
Identifier: http://hdl.handle.net/1959.14/273256
Description: “Confidentiality” refers to the duty not to disclose private information to other people. It is often associated with healthcare professionals’ duty to safeguard patient information, but confidentiali ... More
Date: 2012
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/189579
Description: Large housing is an issue of growing concern across popular culture, academic and policy domains, yet little is known about how and why people live in large houses. This paper addresses this gap, inve ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/119758
Description: Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem d ... More
Full Text: Full Text
Reviewed: Reviewed
Authors: Matthews, Steve
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/120365
Description: We will analyze the concept of anonymity, along with cognate notions, and their relation to privacy, with a view to developing an understanding of how we control our identity in public and why such co ... More
Reviewed: Reviewed
Authors: Weisbrot, David
Date: 2010
Language: eng
Resource Type: newspaper article
Identifier: http://hdl.handle.net/1959.14/110427
Description: An analysis of the ethical, legal and social implications of genetic science and technology, a decade after the completion of the Human Genetic Project.
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/104759
Description: The Telecommunications (Interception and Access) Act 1979 (Cth) allows law enforcement agencies to obtain a warrant to intercept or access telecommunications where there are reasonable grounds for sus ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: reference entry
Identifier: http://hdl.handle.net/1959.14/1079900
Description: 11 page(s)
Authors: Weisbrot, David
Date: 2009
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/113612
Description: Looks at the changes to privacy law and practice required by the rapid advances in genetic science and technology; the specific nature of genetic information, which is deeply personal and sensitive, b ... More
Date: 2007
Language: eng
Resource Type: reference entry
Identifier: http://hdl.handle.net/1959.14/1079997
Description: 12 page(s)
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148328
Description: Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the general networks modeled by h ... More
Reviewed: Reviewed