Sandefur, 2014 - Google Patents
Young investigator perspectives. Blogging for electronic record keeping and collaborative researchSandefur, 2014
View HTML- Document ID
- 12084036735328158308
- Author
- Sandefur C
- Publication year
- Publication venue
- American Journal of Physiology-Gastrointestinal and Liver Physiology
External Links
Snippet
Blogging also provides an easy and relatively painless way to share your science with the public. By 34 nature, the blogs we read online are public. Blog access, however, can be restricted using blog software 35 privacy settings. The available blogging software …
- 230000035479 physiological effects, processes and functions 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Freelon | Computational research in the post-API age | |
Corti | Recent developments in archiving social research | |
WO2013152117A2 (en) | Web-based content aggregation, organization, and publication system and methods of use | |
Chireshe | Career guidance and counselling provisions at a South African University: Career advisors’ reflections | |
Baro et al. | Electronic theses and dissertations initiatives: a survey of university libraries in Nigeria | |
Smith | Special issue on using secondary data in educational research | |
McKinney | EndNote web: web-based bibliographic management | |
Sandefur | Young investigator perspectives. Blogging for electronic record keeping and collaborative research | |
Salo et al. | Ain’t nobody’s business if I do (read serials) | |
London et al. | Automatic export of PubMed® citations to EndNote® | |
Davis | The future of web citation practices | |
Page | Articles in PresS. Am J Physiol Gastrointest Liver Physiol (October 30, 2014). doi: 10.1152/ajpgi. 00384.2014 | |
Johnson | Internet resources for the anaesthesiologist | |
Reilly et al. | Collaboration to build a meaningful connection between library content and the researcher | |
Kálmán et al. | Sustainable preservation for the arts and humanities | |
Goldstein et al. | Prototyping a collaborative data curation service for coastal science | |
Tattersall | Road map: from Web 2.0 to altmetrics | |
Smith | Fundamentals of Government Information: Mining, Finding, Evaluating, and Using Government Resources ., by Cassandra Hartnett, Andrea Sevetson, Eric Forte: Chicago, IL: Neal-Shuman, 2016, 424 pp., ISBN: 978-0-8389-1395-6, $85.00 | |
Fronk | Teaching about fake news: Lesson plans for different disciplines and audiences: Benjes-Small, C., Wittig, C., & Oberlies, MK (Eds.).(2021). Association of College and Research Libraries. 321 pp., $88.00, ISBN 9780838938904 | |
Wensing et al. | Planning for Urban Country. Taking First Nations Values into Future Urban Designs: by David S. Jones, Singapore, Springer Nature, 2023, 310 pp., E-book: 158.00AUD/ 99.00 US Dollars, Softcover: 208:00AUD/ 129.99 US Dollars, Hardcover: 208:00AUD/ 129.99 US Dollars, ISBN 978-981-99-7194-7, https://doi. org/10.1007/978-981-99-7192-3 | |
Greenberg | Big Data, Little Data, No Data: Scholarship in the Networked World: by Christine L. Borgman. Cambridge, MA: MIT Press, 2015. xxv, 383 p. illus. ISBN 9780262529914. $27.00 | |
Eden | Managing Digital Cultural Objects: Analysis, Discovery and Retrieval: Allen Foster and Pauline Rafferty (Eds.). 2016. London, England: Facet Publishing. ISBN: 978-1-85604-941-2 | |
Pesch | An Update on COUNTER and SUSHI | |
Entrup et al. | Introducing GeoBib: An Annotated and Geo-referenced Online Bibliography of Early German and Polish Holocaust and Camp Literature (1933 1949) | |
Christensen | Review of Working on the Dark Side of the Moon: Life Inside the National Security Agency by Thomas Reed Willemain: Willemain, Thomas R. Working on the Dark Side of the Moon: Life Inside the National Security Agency. Mill City Press, Maitland, FL, 2017. 119 pages, Paperback, $15.99. ISBN 9781629528724. |