Author of the publication

Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act.

, , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 91-102. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Support Vector Machine Algorithm to Classify Instagram Users' Accounts Based on Users' Interests., , , and . HCI (37), volume 12217 of Lecture Notes in Computer Science, page 179-196. Springer, (2020)Heuristic Evaluation of University Institutional Repositories Based on DSpace., and . HCI (20), volume 9188 of Lecture Notes in Computer Science, page 119-130. Springer, (2015)Toward Applying Online Privacy Patterns Based on the Design Problem: A Systematic Review., , and . HCI (18), volume 10918 of Lecture Notes in Computer Science, page 608-627. Springer, (2018)Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act., , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 91-102. Springer, (2016)A novel technique for detecting sudden concept drift in healthcare data using multi-linear artificial intelligence techniques., , , and . Frontiers Artif. Intell., (2022)Anti-procrastination Online Tool for Graduate Students Based on the Pomodoro Technique., , , and . HCI (26), volume 12206 of Lecture Notes in Computer Science, page 133-144. Springer, (2020)Artificial Intelligence-based Speech Signal for COVID-19 Diagnostics., , and . ICFNDS, page 311-317. ACM, (2022)An Experimental Study to Understand How Users Choose Password., , , and . ICFNDS, page 37:1-37:5. ACM, (2020)A Study Using the In-Depth Interview Approach to Understand Current Practices in the Management of Personal Health Information and Privacy Compliance., and . ICHI, page 75-86. IEEE Computer Society, (2018)Transforming data-intensive workflows: A cutting-edge multi-layer security and quality aware security framework.. Concurr. Comput. Pract. Exp., (June 2024)