-
1
-
-
84878308414
-
Ethical challenges with welfare technology: A review of the literature
-
Bjorn, H. (2013). Ethical challenges with welfare technology: A review of the literature. Science and Engineering Ethics, 19, 389–406.
-
(2013)
Science and Engineering Ethics
, vol.19
, pp. 389-406
-
-
Bjorn, H.1
-
2
-
-
85041780497
-
Security and privacy issues in implanfigure wearable device: A comprehensive survey
-
Camaraa, C. L. (2015). Security and privacy issues in implanfigure wearable device: A comprehensive survey. Journal of Biomedical Informatics, 271–289.
-
(2015)
Journal of Biomedical Informatics
, pp. 271-289
-
-
Camaraa, C.L.1
-
3
-
-
84890636513
-
BNCI systems as a potential assistive technology: Ethical issues and participatory research in the BrainAble project
-
Carmichael, C. (2014). BNCI systems as a potential assistive technology: Ethical issues and participatory research in the BrainAble project. Disability and Rehabilitation: Assistive Technology, 9, 41–47.
-
(2014)
Disability and Rehabilitation: Assistive Technology
, vol.9
, pp. 41-47
-
-
Carmichael, C.1
-
4
-
-
84870420659
-
Current status and future challenges
-
Chana, M. (2012). Current status and future challenges. Artificial Intelligence in Medicine, 56, 137–156.
-
(2012)
Artificial Intelligence in Medicine
, vol.56
, pp. 137-156
-
-
Chana, M.1
-
5
-
-
85041771701
-
Bid data requires a renewal of policies. Privacy
-
Colclasure, S. (2014). Bid data requires a renewal of policies. Privacy Journal, 2–5.
-
(2014)
Journal
, pp. 2-5
-
-
Colclasure, S.1
-
7
-
-
84879723883
-
Challenges and opportunities of lifelof tecnologies: A literature review and critical analysis
-
Jacquemard, T. (2014). Challenges and opportunities of lifelof tecnologies: A literature review and critical analysis. Science and Engineering, 20, 379–409.
-
(2014)
Science and Engineering
, vol.20
, pp. 379-409
-
-
Jacquemard, T.1
-
8
-
-
84942366351
-
Emotions in context: Examining pervasive affective sensing systems, applications, and analyses
-
Kanjo, E., & Al-Husain, L. (2015). Emotions in context: Examining pervasive affective sensing systems, applications, and analyses. Personal and Ubiquitous Computing, 19, 1197–1212.
-
(2015)
Personal and Ubiquitous Computing
, vol.19
, pp. 1197-1212
-
-
Kanjo, E.1
Al-Husain, L.2
-
9
-
-
85041773051
-
Virtual walls: Protecting digital privacy in pervasive enviroments
-
Kapadial, A. (2014). Virtual walls: Protecting digital privacy in pervasive enviroments. Computer Science Journal, 234–256.
-
(2014)
Computer Science Journal
, pp. 234-256
-
-
Kapadial, A.1
-
11
-
-
84879723883
-
Challenges and opportunities of lifelog technologies: A literature review and critical analysis
-
Novitzky, P. (2014). Challenges and opportunities of lifelog technologies: A literature review and critical analysis. Science and Engineering, 20, 379–409.
-
(2014)
Science and Engineering
, vol.20
, pp. 379-409
-
-
Novitzky, P.1
-
13
-
-
85020116773
-
A Forecast of the Adoption of Wearable technology
-
Page, T. (2015b). A Forecast of the Adoption of Wearable technology. International Journal of Technology Diffusion, 6, 12–29.
-
(2015)
International Journal of Technology Diffusion
, vol.6
, pp. 12-29
-
-
Page, T.1
-
14
-
-
85041751853
-
Conecptual privacy framework for health information on wearable devices
-
Safavi, S. (2014). Conecptual privacy framework for health information on wearable devices. Plus One, 9, 9–12.
-
(2014)
Plus One
, vol.9
, pp. 9-12
-
-
Safavi, S.1
-
15
-
-
71449103724
-
Improving caregivers’ well-being by using technology to manage nighttime activity in persons with dementia
-
Spring, H. R. (2009). Improving caregivers’ well-being by using technology to manage nighttime activity in persons with dementia. Research in Gerontological Nursing, 2, 39–48.
-
(2009)
Research in Gerontological Nursing
, vol.2
, pp. 39-48
-
-
Spring, H.R.1
-
18
-
-
84879448131
-
Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
-
Wu, F. (2013). Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of Medical Systems, 4, 56–67.
-
(2013)
Journal of Medical Systems
, vol.4
, pp. 56-67
-
-
Wu, F.1
-
19
-
-
85041778856
-
The use of data mining by private health insurance copmanies and customer’s privacy
-
Yeslam, A.-S. (2015). The use of data mining by private health insurance copmanies and customer’s privacy. Bioethics and Information technology, 24, 281–292.
-
(2015)
Bioethics and Information technology
, vol.24
, pp. 281-292
-
-
Yeslam, A.-S.1
|