Full Text Available
Access Full Text at Repository
Search Results - "Privacy"
-
Prevalence, perceptions and factors associated with non-adherence to hepatotoxicity monitoring among people living with HIV on tuberculosis preventive treatment at Mulago ISS clini...
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
Online Article RSS Article -
Deep inspiration breath hold versus free breathing in postoperative radiotherapy strategy for patients with left-sided breast cancer treated with volumetric modulated arc therapy:...
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Price elasticity of demand for cigarettes in Nepal: Evidence from a lower middle-income country in South Asia using Deaton’s demand model
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Assessment of miRNAs as transcriptional regulators in respiratory syncytial virus infection through computational analysis and molecular docking studies
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Psychosocial predictors of non-adherence to antihypertensive medication among Korean adults: A nationwide cross-sectional study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Support-seeking and rehoming pathways differ by surrender circumstances among pet owners
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Joint modelling of left- and interval-censored viral load for couples in Mozambique
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Where do they come from and where do they go: Understanding the relationship between deprivation and the geographical journeys of trainee doctors in England
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
When the source is a bot: How people adapt their evaluation strategies to assess AI-generated content
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
The effect of game-based education on adherence to treatment and anxiety level in type 2 diabetics started on insulin therapy
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Exploring prenatal care experiences in Ontario, Canada: An equity-oriented qualitative study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Exploring the spatial coupling relationship between green vegetation carbon stock and recreational intensity in urban parks: A case study of Hangzhou
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Barriers and facilitators in physical activity among youth with cerebral palsy in Sweden: A qualitative study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Using core components in process evaluation: Passport skills for life
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Artificial intelligence-based dairy cattle behavior recognition for estrus detection via ensemble fusion of two camera views
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Back to the future: The advantage of studying key events in human evolution using a new high resolution radiocarbon method
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
‘Sustainable Choices’ - An intervention to promote climate change mitigation behaviours: Study protocol for a randomized controlled trial
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Twelve‑month rehospitalization after IBD‑related hospitalization in Germany: A retrospective cohort study using administrative hospital data
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Predicted antiviral potential of phytochemicals prolific in Cleistanthus bracteosus Jabl. and essential oils of Artemisia scoparia and Thuja orientalis against Nipah virus and Huma...
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
The effects of combined balance and plyometric training on change-of-direction and dynamic balance: A meta-analysis
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text