Results for 'Court records Access control'

1000+ found
Order:
  1. Courts, Litigants and the Digital Age: Law, Ethics and Practice.Karen Eltis - 2012 - Irwin Law.
     
    Export citation  
     
    My bibliography  
  2.  9
    Evidence: Supreme Court of Georgia Denies Law Firm Access to Hospital Records.Randi Burnstine - 2000 - Journal of Law, Medicine & Ethics 28 (3):314-315.
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  3. Evidence: Supreme Court of Georgia Denies Law Firm Access to Hospital Records.Randi Burnstine - 2000 - Journal of Law, Medicine and Ethics 28 (3):314-315.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  4.  5
    Provider Responses to Patients Controlling Access to Their Electronic Health Records: A Prospective Cohort Study in Primary Care.William M. Tierney, Sheri A. Alpert, Amy Byrket, Kelly Caine, Jeremy C. Leventhal, Eric M. Meslin & Peter H. Schwartz - 2015 - Journal of General Internal Medicine 30 (1):31-37.
    Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data.
    Direct download  
     
    Export citation  
     
    My bibliography  
  5.  5
    How Bioethics Principles Can Aid Design of Electronic Health Records to Accommodate Patient Granular Control.Eric M. Meslin & Peter H. Schwartz - 2014 - Journal of General Internal Medicine 30 (1):3-6.
    Ethics should guide the design of electronic health records (EHR), and recognized principles of bioethics can play an important role. This approach was adopted recently by a team of informaticists designing and testing a system where patients exert granular control over who views their personal health information. While this method of building ethics in from the start of the design process has significant benefits, questions remain about how useful the application of bioethics principles can be in this process, (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  6.  4
    Patient Preferences in Controlling Access to Their Electronic Health Records: A Prospective Cohort Study in Primary Care.Peter H. Schwartz, Kelly Caine, Sheri A. Alpert, Eric M. Meslin, Aaron E. Carroll & William M. Tierney - 2015 - Journal of General Internal Medicine 30:25-30.
    Introduction: Previous studies have measured individuals’ willingness to share personal information stored in an electronic health record (EHR) with healthcare providers. But none have measured preferences when patients’ choices determine access by healthcare providers. -/- Methods: Patients were given the ability to control the access of doctors, nurses or other staff in a primary care clinic to personal information stored in an EHR. Patients could restrict access to all personal data or to specific types of sensitive (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  7. Client-Server Based Remote Access Through the Internet: Internet Based Remote Process Control.Mohammed Abdullah Hussein - 2011 - Germany: LAP Lambert Academic Publishing.
    Internet based process control usage has grown in the past years. Industry field demands were behind this, and it ranges from factory, office and home automation to tasks simplifications and cost reduction. In this book a hardware interface circuit and a software system used to control the temperature and level of a liquid tank is described. The advantage of the designed interface circuit is its simplicity and low cost. The same can be true for the software system in (...)
     
    Export citation  
     
    My bibliography  
  8. Conflicts Over Control and Use of Medical Records at the New York Hospital Before the Standardization Movement.Eugenia L. Siegler & Andrew B. Cohen - 2011 - Journal of Law, Medicine & Ethics 39 (4):640-648.
    Historians of medicine generally credit the hospital standardization movement of the early 20th century with establishing the record as a sign of hospital and staff quality. The medical record's role had already been the subject of intense interest at the New York Hospital several decades before, however. In the 1880s malpractice and insurance concerns caused the administration to attempt to supervise record creation, quality, and access, over the objections of physicians. Contemporary concerns about the uses of the medical record (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  9.  26
    A Meta-Model of Access Control in a Fibred Security Language.Barker Steve, Boella Guido, M. Gabbay Dov & Genovese Valerio - 2009 - Studia Logica 92 (3):437-477.
    The issue of representing access control requirements continues to demand significant attention. The focus of researchers has traditionally been on developing particular access control models and policy specification languages for particular applications. However, this approach has resulted in an unnecessary surfeit of models and languages. In contrast, we describe a general access control model and a logic-based specification language from which both existing and novel access control models may be derived as particular (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  10. Context-Aware Access Control Model for Privacy Support in Mobile-Based Assisted Living.Nikolay Teslya, Nikolay Shilov, Alexey Kashevnik & Alexander Smirnov - 2015 - Journal of Intelligent Systems 24 (3):333-342.
    The average lifetime of people in advanced countries is significantly increased in the XXI century. The number of old and dependent people is rising due many innovations in health care: new technologies, medicine, and a lot of innovative devices that allow people to monitor their health and consult with a doctor in case of problems. In the last years, a number of information systems have been developed in the health-care area to assist people in living. Modern systems increase their mobility (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  11.  3
    Biomedical Big Data: New Models of Control Over Access, Use and Governance.Vayena Effy & Blasimme Alessandro - forthcoming - Journal of Bioethical Inquiry:1-13.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  12.  32
    Salomon: Automatic Abstracting of Legal Cases for Effective Access to Court Decisions. [REVIEW]Caroline Uyttendaele, Marie-Francine Moens & Jos Dumortier - 1998 - Artificial Intelligence and Law 6 (1):59-79.
    The SALOMON project is a contribution to the automatic processing of legal texts. Its aim is to automatically summarise Belgian criminal cases in order to improve access to the large number of existing and future cases. Therefore, techniques are developed for identifying and extracting relevant information from the cases. A broader application of these techniques could considerably simplify the work of the legal profession.A double methodology was used when developing SALOMON: the cases are processed by employing additional knowledge to (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  13.  12
    Access to Medical Records for Research Purposes: Varying Perceptions Across Research Ethics Boards.D. J. Willison, C. Emerson, K. V. Szala-Meneok, E. Gibson, L. Schwartz, K. M. Weisbaum, F. Fournier, K. Brazil & M. D. Coughlin - 2008 - Journal of Medical Ethics 34 (4):308-314.
    Introduction: Variation across research ethics boards in conditions placed on access to medical records for research purposes raises concerns around negative impacts on research quality and on human subject protection, including privacy.Aim: To study variation in REB consent requirements for retrospective chart review and who may have access to the medical record for data abstraction.Methods: Thirty 90-min face-to-face interviews were conducted with REB chairs and administrators affiliated with faculties of medicine in Canadian universities, using structured questions around (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  14.  26
    Access and Control of Resources: Lessons From the Sanrem Crsp. [REVIEW]Cornelia Butler Flora - 2001 - Agriculture and Human Values 18 (1):41-48.
    Attention to differences within communities is important in working toward sustainability of an agro-ecosystem. In the Sustainable Agriculture and Natural Resource Management Collaborative Research Support Program, gender made a difference in terms of access and control over key resources – financial, human, natural, and social capital – critical for project success. Efforts to build social capital among women proved critical in developing both collective and households strategies for sustainability. The sites differed greatly in both landscape and lifescape. Women's (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  15.  14
    Strengthening the United States' Database Protection Laws: Balancing Public Access and Private Control.David B. Resnik - 2003 - Science and Engineering Ethics 9 (3):301-318.
    This paper develops three arguments for increasing the strength of database protection under U.S. law. First, stronger protections would encourage private investment in database development, and private databases have many potential benefits for science and industry. Second, stronger protections would discourage extensive use of private licenses to protect databases and would allow for greater public control over database laws and policies. Third, stronger database protections in the U.S. would harmonize U.S. and E.U. laws and would thus enhance international trade, (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  16.  3
    Security Analysis and Resource Requirements of Group-Oriented User Access Control for Hardware-Constrained Wireless Network Services.D. Ventura, Aitor Gómez-Goiri, V. Catania, Diego López-de-Ipiña, J. A. M. Naranjo & L. G. Casado - 2016 - Logic Journal of the IGPL 24 (4).
    Direct download  
     
    Export citation  
     
    My bibliography  
  17.  1
    A Semantic Approach for Fine-Grain Access Control of E-Health Documents.F. Amato, V. Casola, N. Mazzocca & S. Romano - 2013 - Logic Journal of the IGPL 21 (4):692-701.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  18. An Abstract Dynamic Access Control Architecture.Chuchang Liu, Angela Billard & Benjamin Long - 2011 - Journal of Applied Logic 9 (4):239-249.
  19. Maternal Guardianship by “Nature” and “Nurture”: Eighteenth-Century Chancery Court Records and Clarissa.C. Nixon - 2001 - Intertexts 5 (2):128-155.
    No categories
     
    Export citation  
     
    My bibliography  
  20. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-A Model of XML Access Control with Dual-Level Security Views.Wei Sun, Da-xin Liu & Tong Wang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3842--799.
     
    Export citation  
     
    My bibliography  
  21. In the High Court of South Africa, Case No. 4138/98: The Global Politics of Access to Low-Cost AIDS Drugs in Poor Countries. [REVIEW]David Barnard - 2002 - Kennedy Institute of Ethics Journal 12 (2):159-174.
    : In 1998, 39 pharmaceutical manufacturers sued the government of South Africa to prevent the implementation of a law designed to facilitate access to AIDS drugs at low cost. The companies accused South Africa, the country with the largest population of individuals living with HIV/AIDS in the world, of circumventing patent protections guaranteed by intellectual property rules that were included in the latest round of world trade agreements. The pharmaceutical companies dropped their lawsuit in the spring of 2001 after (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  22. Apostasy as Objective and Depersonalized Fact: Two Recent Egyptian Court Judgments.Baber Johansen - 2003 - Social Research: An International Quarterly 70 (3):687-710.
    The jurists of classical Islamic Law defined the interior forum as a limit to the religious validity of the sentences of Muslim judges , because these have neither access to God's knowledge nor to the individual believer’s conscience and motivations. They can base their decisions solely on exterior appearances and can, therefore, neither be sure that their judgments correspond to the facts nor to the intentions and memories of the individuals concerned. This holds especially true for questions of belief (...)
     
    Export citation  
     
    My bibliography   1 citation  
  23.  2
    How Much Control Do Children and Adolescents Have Over Genomic Testing, Parental Access to Their Results, and Parental Communication of Those Results to Others?Ellen Wright Clayton - 2015 - Journal of Law, Medicine and Ethics 43 (3):538-544.
    Adolescents may often have opinions about whether they want genetic and genomic testing in both the clinic and research and about who should have access to the results. This legal analysis demonstrates that the law provides very little protection to minors' wishes.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  24.  6
    Lexical Access and Discourse Planning: Bottom-Up Interference or Top-Down Control Troubles?Wendy G. Lehnert - 1986 - Behavioral and Brain Sciences 9 (3):528.
  25.  26
    Widening Access While Tightening Control: Office-Holding, Marriages, and Elite Consolidation in Early Modern Poland.Paul D. Mclean - 2004 - Theory and Society 33 (2):167-212.
  26.  27
    This Essay Will Address the Practical Conflicts for Journalists, Their Employers, the Owners of News Organizations, and the Public Regarding Issues of Privacy in Reporting the News. Privacy Will Be Understood, Here, as Control Over Access to Oneself and to Certain Kinds of Information About Oneself. First, the Relevant Inter-Ests of the Public, Journalists, and News Organizations Will Be Discussed. Then, Building on Deni Elliott and David Ozar (Chap. 1 in This Volume), Ethical Principles Will Be ... [REVIEW]Respecting Privacy - 2010 - In Christopher Meyers (ed.), Journalism Ethics: A Philosophical Approach. Oxford University Press. pp. 215.
    Direct download  
     
    Export citation  
     
    My bibliography  
  27. Paternalism and Access to Medical Records.Simon Clarke - 2003 - Journal of Information Ethics 12 (1):80-91.
  28.  19
    Genetic Information: Acquisition, Access, and Control: Edited by Alison K Thompson and Ruth F Chadwick, New York, Kluwer Academic/Plenum Publishers, 1999, 348 Pages, $115 (Hc). [REVIEW]L. Abramsky - 2001 - Journal of Medical Ethics 27 (3):213-a-214.
  29.  13
    Patient Access to Medical Records.George J. Annas, Daryl Matthews & Leonard H. Glantz - 1980 - Journal of Law, Medicine & Ethics 8 (2):17-18.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  30.  1
    Accordıng to The Records of Kadı’s Nicosia Court, The Money Foundations Which Founded In Cyprus In The First Period Of 18th Century.Mehmet Demi̇ryürek - 2010 - Journal of Turkish Studies 6:965-984.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  31.  3
    Medical Records: Should Patients Have Access?Alan F. Westin - 1977 - Hastings Center Report 7 (6):23-28.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  32.  1
    The Place in Legal History of Sir William Shareshull. Bertha Haven PutnamAn Introduction to the History and Records of the Court of Wards and Liveries. H. E. Bell. [REVIEW]S. E. Thorne - 1954 - Speculum 29 (1):160-162.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  33.  1
    Patient Access to Medical Records.George J. Annas, Daryl Matthews & Leonard H. Glantz - 1980 - Journal of Law, Medicine and Ethics 8 (2):17-18.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  34.  1
    Patient Access to Medical Records in Australia in the Light of Breen V Williams.Bill McManus - 1995 - Monash Bioethics Review 14 (2):38.
    Direct download  
     
    Export citation  
     
    My bibliography  
  35.  1
    Confidentiality and Patient-Access to Medical Records.D. S. Short - 1988 - Ethics and Medicine: A Christian Perspective on Issues in Bioethics 4 (2):26.
    Direct download  
     
    Export citation  
     
    My bibliography  
  36. Resolving Visual Interference During Covert Spatial Orienting: Online Attentional Control Through Static Records of Prior Visual Experience.Edward Awh, Antoinette Marie Sgarlata & John Kliestik - 2005 - Journal of Experimental Psychology: General 134 (2):192-206.
  37. Access to the Court of Justice of the European Union Seeking to Challenge the Inaction of European Union Institutions.Arvydas Budnikas - 2015 - Jurisprudencija: Mokslo darbu žurnalas 21 (4):1003.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  38. Indiana Court Rules on Prisoners' Access to OTC Drugs.S. M. Canick - 1996 - Journal of Law, Medicine & Ethics 24 (3):271.
    Direct download  
     
    Export citation  
     
    My bibliography  
  39. Genetic Information. Acquisition, Access, and Control. Edited by Alison K. Thompson & Ruth F. Chadwick. Pp. 348. (Kluwer Academic/Plenum Publishers, New York, 1999.) $115, ISBN 0-306-46052-1, Hardback. [REVIEW]Stanislaw Cebrat - 2003 - Journal of Biosocial Science 35 (1):153-160.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  40. Mechanisms That Control Referential Access.Ma Gernsbacher - 1987 - Bulletin of the Psychonomic Society 25 (5):335-335.
  41. Regulation of Activin's Access to the Cell: Why is Mother Nature Such a Control Freak?David J. Phillips - 2000 - Bioessays 22 (8):689-696.
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  42. Lamber Joachim. The Mathematics of Sentence Structure. American Mathematical Monthly, Vol. 65 No. 3 , Pp. 154–170.Lambek Joachim. Contributions to a Mathematical Analysis of the English Verb-Phrase. Journal of the Canadian Linguistic Association, Vol. 5 , Pp. 83–89.Lambek Joachim. On the Calculus of Syntactic Types. Structure of Language and its Mathematical Aspects, Proceedings of Symposia in Applied Mathematics, Vol. 12, American Mathematical Society, Providence 1961, Pp. 166–178.Court L. M., Lambek J., Hiż H.. Comments. Structure of Language and its Mathematical Aspects, Proceedings of Symposia in Applied Mathematics, Vol. 12, American Mathematical Society, Providence 1961, Pp. 264–265.Cohen Joel M.. The Equivalence of Two Concepts of Categorial Grammar. Information and Control, Vol. 10 , Pp. 475–484. [REVIEW]Eliahu Shamir - 1969 - Journal of Symbolic Logic 33 (4):627-628.
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  43. Conflicts Over Control and Use of Medical Records at the New York Hospital Before the Standardization Movement.Eugenia L. Siegler & Andrew B. Cohen - 2011 - Journal of Law, Medicine and Ethics 39 (4):640-648.
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  44.  12
    Delegation of Access Rights in Multi-Domain Service Compositions.Laurent Bussard, Anna Nano & Ulrich Pinsdorf - 2009 - Identity in the Information Society 2 (2):137-154.
    Today, it becomes more and more common to combine services from different providers into one application. Service composition is however difficult and cumbersome when there is no common trust anchor. Hence, delegation of access rights across trust domains will become essential in service composition scenarios. This article specifies abstract delegation, discusses theoretical aspects of the concept, and provides technical details of a validation implementation supporting a variety of access controls and associated delegation mechanisms. Abstract delegation allows to harmonize (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  45.  54
    The E-Z Reader Model of Eye-Movement Control in Reading: Comparisons to Other Models.Erik D. Reichle, Keith Rayner & Alexander Pollatsek - 2003 - Behavioral and Brain Sciences 26 (4):445-476.
    The E-Z Reader model (Reichle et al. 1998; 1999) provides a theoretical framework for understanding how word identification, visual processing, attention, and oculomotor control jointly determine when and where the eyes move during reading. In this article, we first review what is known about eye movements during reading. Then we provide an updated version of the model (E-Z Reader 7) and describe how it accounts for basic findings about eye movement control in reading. We then review several alternative (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography   31 citations  
  46.  26
    Confidentiality, Consent and Autonomy in the Physician-Patient Relationship.Beverly Woodward - 2001 - Health Care Analysis 9 (3):337-351.
    In the practice of medicine there has long been a conflict between patient management and respect for patient autonomy. In recent years this conflict has taken on a new form as patient management has increasingly been shifted from physicians to insurers, employers, and health care bureaucracies. The consequence has been a diminshment of both physician and patient autonomy and a parallel diminishment of medical record confidentiality. Although the new managers pay lip service to the rights of patients to confidentiality of (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  47.  5
    Cudak V. Lithuania and the European Court of Human Rights Approach to the State Immunity Doctrine.Lijana Štarienė - 2010 - Jurisprudencija: Mokslo darbu žurnalas 120 (2):159-175.
    The application of the state immunity doctrine with regard to the guarantee of access to court in the case-law of the European Court of Human Rights has been proved to be a complicated issue. In the ECHR’s case-law before the case Cudak v. Lithuania, the application of the state immunity doctrine had been considered as a proportionate restriction of the right of access to court even in cases of the realization of the protection of the (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  48.  3
    Les publications scientifiques : faut-il choisir entre libre accès et libre recherche?Valérie-Laure Benabou - 2010 - Hermès: La Revue Cognition, communication, politique 57 (2):95.
    La confrontation de l’Open Access avec la propriété intellectuelle demeure mesurée dès lors que l’exercice du droit d’auteur n’est nullement antinomique avec un modèle de gratuité pour l’utilisateur final. L’existence de prérogatives morales fortes présente les garanties mêmes que la communauté scientifique appelle de ses vœux, à savoir l’identification de la source et la traçabilité de la version originale de la publication. Le constat est sans doute moins angélique s’agissant du mouvement du Public Access, lequel ne se soucie (...)
    No categories
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    My bibliography  
  49.  7
    “Illegal Loves and Sexual Deviancy: Homosexuality as a Threat in Cold War Canada”.Erin Gallagher-Cohoon - 2013 - Constellations (University of Alberta Student Journal) 4 (2).
    This paper analyzes the criminalization and medicalization of homosexuality during the early twentieth century in Canada. Through court records and medical texts the discourse of homosexuality as a threat to the family unit and to the nation is contextualized within Cold War rhetoric. A Foucaultian conceptualization of power and discipline helps frame questions regarding homosexuality as a criminal offense and as a mental illness. It is argued that both state control and societal pressures constructed the homosexual as (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  50. Typology of Perpetrators of Domestic Violence.Danuta Rode - 2010 - Polish Psychological Bulletin 41 (1):36-45.
    Typology of perpetrators of domestic violence The objective of the research conducted by the author was to obtain an answer to the question: could we distinguish different types of intrafamily violence perpetrators considering a specified profile of personality factors and temperament traits and how domestic violence perpetrators cope with stressful situations? The research was conducted on a group of 325 men who were convicted pursuant to article 207§1 & 2 of harassment over family members. In terms of a gender the (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
1 — 50 / 1000