×
10% Discount on All E-Books through IGI Global’s Online Bookstore Extended
(10% discount on all e-books cannot be combined with most offers. Discount is valid on purchases made directly through IGI Global Online Bookstore (
www.igi-global.com
)
and may not be utilized by booksellers and distributors. Offer does not apply to e-Collections and exclusions of select titles may apply. Offer expires December 31, 2022.)
Browse Titles
Login/Create Account
Language:
English
US
China
Cart
0
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
10% Discount on All E-Books through IGI Global’s Online Bookstore
With the continued paper shortages and supply chain issues, we have been informed by our partners that there will be substantial delays in printing and shipping publications, especially as we approach the holiday season. To help incentive the electronic format and streamline access to the latest research, we are offering a 10% discount on all our e-books through IGI Global’s Online Bookstore. Hosted on the InfoSci
®
platform, these titles feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Browse Titles
IGI Global to Convert an Additional 30 Journals to Full Gold Open Access for the 2022 Volume Year
IGI Global is to convert an additional 30 journals to full gold open access (OA) for their 2022 volume year, which will expand their OA collection to contain 60 gold open access and one (1) platinum open access journal.
Learn More
All IGI Global Scholarly Journals Shift to "Digital Preferred" Format
In response to the overwhelming demand for electronic content coupled with the mission to decrease the overall environmental impacts of print production and distribution, all IGI Global journals will shift into a digital preferred model for the 2022 volume year. Under this model, journals will become primarily available under electronic format and articles will be immediately available upon acceptance. Print subscriptions and print + electronic subscriptions will still be available, but for the print version, all articles that are published during the volume year will become available at the end of the year in a single (1) printed volume.
Learn More
IGI Global’s New DEI e-Book Collection
Acquire Over 320+ E-Books on Diversity, Equity, and Inclusivity from a publisher that has been dedicated to DEI since its inception over 30 years ago. Now, benefit from a collection of all of our DEI e-Books at a 90% Discount.
Learn More
Offering a
5% Pre-Publication Discount
on
All Reference Books Ordered Through IGI Global’s Online Bookstore*
To support customers with accessing the latest research, IGI Global is offering a 5% pre-publication discount on all hardcover, softcover, e-books, and hardcover + e-books titles.
*5% discount offer is eligible on hardcover, softcover, e-books, and hardcover + e-books titles and is automatically applied directly to the shopping cart. Discount offer only valid on purchases made directly through IGI Global’s Online Bookstore and offer expires 30 days after the publication’s release. This automatic discount is not intended for use by book distributors or wholesalers.
Browse Titles
Books
Books
Open Access Books
OnDemand Book Chapters
Journals
Journals
Open Access Journals
OnDemand Journal Articles
e-Collections
e-Collections
Transformative Open Access (Read & Publish)
Open Access
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
Author Services
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Confidentiality
1.
Corresponds to the information that should be preserved, being made available just for who is authorized to use it.
Learn more in: Security of ICTs Supporting Healthcare Activities
2.
Is the process to assure that nobody is able to get into the possession of the data and read it without the legitimate user.
Learn more in: CSAP: Cyber Security Asynchronous Programming With C++20 and C# 8 for Internet of Things and Embedded Software Systems
3.
The protection of information against theft and eavesdropping.
Learn more in: Information Security and Risk Management
4.
A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
Learn more in: National Security Policy and Strategy and Cyber Security Risks
5.
Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.
Learn more in: Security and Privacy on Personalized Multi-Agent System
6.
The protection of private information, once it has been disclosed by a patient to a healthcare professional (e.g., during a medical examination or taking of a medical history).
Confidentiality
requires patients to give up their informational privacy.
Learn more in: Healthcare Ethics in the Information Age
7.
A cryptographic security service which allows only authorized users or network nodes to access information content.
Learn more in: Evaluation of Security Architectures for Mobile Broadband Access
8.
Data or information prevented from the exposure to unauthorized individuals is labeled as confidential.
Learn more in: Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
9.
A promise or assurance guaranteed by a pastoral carer that they will not to divulge the information to anyone.
Confidentiality
and anonymity are the codes of ethics that bind one to ensure that the other person’s issues are not repeated to anyone.
Learn more in: Pastoral Care and Counseling in Early Childhood Years: Implication for Intervention
10.
A set of rules or a promise that limits access or places restrictions on certain types of information.
Learn more in: Access Control Framework for Cloud Computing
11.
The protection of data and information from disclosure to unauthorized persons.
Learn more in: Information Security Policies
12.
Ensures that information and data are not disclosed to any unauthorized person or entity (International Federation of Accountants, 2000).
Learn more in: Information Security Within an E-Learning Environment
13.
A property by which the data enclosed in a message is secret, if acquired however, the data is non-intelligent to be read.
Learn more in: Security Challenges in Cloud Computing
14.
Literally, it is the state of keeping or being kept secret or private. In medical practice,
confidentiality
is the duty to keep and/or maintain (not to unlawfully disclose to third person) the patient’s private information (secrets) revealed during a professional relationship.
Learn more in: Impact of Information Technology on Patient Confidentiality Rights: A Perspective
15.
Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Learn more in: Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
16.
Private content in data communication between users.
Learn more in: Computer Forensics and Cyber Attacks
17.
A duty held by professionals towards their clients and patients whereby they are committed to keep secret anything they learn in the course of the context of their professional relation with their client or patient.
Learn more in: Which Rights for Which Subjects? Genetic Confidentiality and Privacy in the Post-Genomic Era
18.
The quality that a document or file must have so that it is only accessible in an understandable way or is read by the authorized person or system.
Learn more in: Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
19.
(in relation to biomedical research): Prevention of disclosure, to other than authorized individuals, of a research unit proprietary information or of a subject´s identity.
Learn more in: Social and Ethical Aspects of Biomedical Research
20.
It is the practice of keeping private information as secret.
Learn more in: Implementing Information Security Using Multimodal Biometrics
21.
A legally protected right that prohibits the health care provider from disclosing information communicated during the consultation to a third party about the patient.
Learn more in: Certification and Medico-Legal Aspects of Neurodevelopmental Disorders in India
22.
The state of keeping or being kept secret or private.
Learn more in: Importance of Ethics and Education to Understand the Audit Mission
23.
The ability to prevent unauthorized parties from interpreting or understanding data.
Learn more in: Security Policy Issues in Internet Banking in Malaysia
24.
Refers to the ability to ensure that messages and data are available only to those who are authorised to view them.
Learn more in: Information Security Threats to Network Based Information Systems
25.
Assurance that information is not disclosed to unauthorized individuals, processes, or devices (Harris, 2002 AU30: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Learn more in: Understanding the Methods behind Cyber Terrorism
26.
Managing and maintaining information such that it is known no more widely than necessary.
Learn more in: Disruptive Technology Impacts on Security
27.
Confidentiality
is the property that ensures the accessibility of information only for authorized persons.
Learn more in: Secure Techniques for Remote Reconfiguration of Wireless Embedded Systems
28.
Protect sensitive information from unauthorized people.
Learn more in: Cloud Computing Security Issues of Sensitive Data
29.
The nonoccurrence of the unauthorized disclosure of information (Barbacci, 1995 AU20: The in-text citation "Barbacci, 1995" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Learn more in: Agents and Payment Systems in E-Commerce
30.
Personal health records of the patients, must be protected from being misused by those who are not concerned with it. The information of the patient must be released only with patient’s formal consent and authorized medical persons have access to the information for clinical treatment or research purposes.
Learn more in: My Health Record and Emerging Cybersecurity Challenges in the Australian Digital Environment
31.
Assurance that information is not disclosed to unauthorized individuals, processes, or devices (Harris, 2002 AU13: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Learn more in: Argument for Improved Security in Local Governments Within the Economic Community of West African States
32.
Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Learn more in: Compliance With Information Systems Security Controls in Higher Education in South Africa
33.
The ability to ensure secrecy and prevent unauthorized disclosure of information.
Learn more in: The Different Aspects of Information Security Education
34.
Is the prevention of unauthorized disclosure of information concerns the content of a message. Only the sender and the receiver are supposed to know the content. Attacks include message interception (man-in-the-middle attacks), content release to other parties, etc.
Learn more in: Emerging Security Issues in VANETS for E-Business
35.
Data or information prevented from the exposure to unauthorized individuals is labeled as confidential.
Learn more in: Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework
36.
Prevention of unauthorized disclosure of information.
Learn more in: Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry
37.
A principle of cybersecurity which dictates that only those who should be able to have access to certain data, should be able to access it.
Learn more in: Perspectives of Blockchain in Cybersecurity: Applications and Future Developments
38.
One of the primary security properties that protects information from unauthorized disclosure.
Learn more in: E-Commerce: The Benefits, Security Risks, and Countermeasures
39.
Protects the privacy of information and reveals data only to authorized parties who have the legitimate need to access the system.
Learn more in: Knowledge Management and Information Technology Security Services
40.
The key feature of security to ensure the data or the information is accessed only by the authorized users.
Learn more in: A Comparative Study on DNA-Based Cryptosystem
41.
The assurance that no one other than the intended recipient(s) can read the data; in other words, the data is kept secret between the sender and recipient.
Learn more in: Security in Swarm Robotics
42.
Corresponds to the information that should be preserved, being made available just for who is authorized to use it.
Learn more in: The Problem with People and Information Security
43.
Protecting the information from disclosure to unauthorized parties.
Learn more in: Secure Data Deduplication of Encrypted Data in Cloud
44.
Keeping information restricted to only those who should have access to it. Information should be controlled from outside interception.
Confidentiality
suggests control of information on the outbound communication channel as a security service.
Learn more in: Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
45.
Assurance that information is not disclosed to unauthorized persons, processes, or devices.
Learn more in: Teletranslation
46.
Restrictions on the dissemination of information (Garner, 2004, p. 318).
Learn more in: A Guide to Non-Disclosure Agreements for Researchers
47.
A set of rules that limits the access to some information. In the cases of therapy or research, the actions undertook by the psychologist in order to protect the personal information of their clients.
Learn more in: Ethical Issues in Couple and Family Research and Therapy
48.
Confidentiality
is the concept of ensuring that data are disclosed only to authorized subjects (e.g., individuals, processes).
Confidentiality
protects data from unauthorized disclosure. It could involve ensuring all user data is protected or fields are selectively protected. Traffic flow
confidentiality
may also be provided, protecting the information that may be derived from a traffic analysis.
Confidentiality
is one of the three goals of a security program
Learn more in: Practical Measures for Securing Government Networks
49.
The protection of information, so that someone not authorized to access the information cannot read the information, even though the unauthorized person might see the information’s container.
Learn more in: A Formal Verification Centred Development Process for Security Protocols
50.
Confidentiality
is the most important characteristic of the information security which means that only authorized person is able to access the resource. It imposed some constraints over the sharing of resources with users.
Learn more in: Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
51.
Ensuring that only authorized people can access information and data.
Learn more in: Security Issues of Smartphones Regarding M-Commerce
52.
Confidentiality
is any private data stored on a platform or carried by an agent that must remain confidential. Mobile agents also need to keep their present location and the whole route confidential
Learn more in: Security of Mobile Code
53.
Confidentiality
is a property that ensures that data is not made disclosed to unauthorized persons. It enforces predefined rules while accessing the protected data.
Learn more in: Big Data Security: Challenges, Recommendations and Solutions
54.
To respect the confidential nature of the information gathered during the research and preserve the anonymity of participants.
Learn more in: Data Speaks: Use of Poems and Photography in Qualitative Research
55.
The status accorded to specific attributes (such as salary) in datasets, whose original values should not be revealed. Generally, some type of protection such as masking must be provided before these confidential attributes are disseminated.
Learn more in: Privacy-Preserving Estimation
56.
The condition of information held in private, outside of the public view. A central value in medicine and law in regard to patient medical information and in information technology regarding control over one’s data.
Learn more in: An Analysis of Privacy Language in the Scholarly Literature on Mental Health Apps
57.
is the absence of unauthorized disclosure of information or functions. It implies that information is readable only to authorized users.
Learn more in: PolyOrBAC: An Access Control Model for Inter-Organizational Web Services
58.
It ensures that only authorized person or object can have access to the data.
Learn more in: Internet of Things: Architecture, Challenges, and Future Directions
59.
It is defined as one of the key aspect of ethical consideration of keeping the participant’s information, such as name, socio-demographic details, identity, medical history and records as a secret and not disclosing it to anyone except for research and publication purposes.
Learn more in: Reflections of Challenges and Resolutions in Fieldwork Research on Quality of Life of Cancer Patients: Counseling and Psychology
60.
The assurance that data are not made available or disclosed to unauthorized person.
Learn more in: Data Protection and Data Security Regarding Grid Computing in Biomedical Research
61.
Refers to the protection of transactions sent and received via Web services against unauthorized reading, copying, or disclosure using encryption mechanisms.
Learn more in: A Case Study in the Role of Trust in Web Service Securities
62.
A set of principles and metrics that control information access.
Learn more in: Cybersecurity of Industrial Internet of Things
63.
This is a basic security requirement in which the address, location, and/or the data transferring between two communicating parties are to be kept as secrets.
Learn more in: Security Measures for Mobile Ad-Hoc Networks (MANETs)
64.
A cryptographic security service, which allows only authorized users or network nodes to access information content.
Learn more in: Secure Routing and Mobility in Future IP Networks
65.
A security service equivalent to privacy which can be achieved by encrypting the message using a cryptographic algorithm.
Learn more in: Security of Internet-, Intranet-, and Computer-Based Examinations in Terms of Technical, Authentication, and Environmental, Where Are We?
Find more terms and definitions using our
Dictionary Search
.
Confidentiality
appears in:
Handbook of Research on ICTs for Human-Centered...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Confidentiality
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 169,400 titles for
Confidentiality
to find related research papers.
Learn More About Confidentiality in These Related Titles
Handbook of Research on Clinical Application...
Medicine & Healthcare
Copyright 2020. 1356 pages.
In the past, individuals in the dentistry field ha...
In Stock
$37.50 Individual Chapters
Exploring Online Learning Through Synchronou...
Education
Copyright 2020. 333 pages.
Exploring online learning through the lens of sync...
In Stock
$37.50 Individual Chapters
Theory and Practice of Business Intelligence...
Medicine & Healthcare
Copyright 2020. 322 pages.
Business intelligence supports managers in enterpr...
In Stock
$37.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$37.50 Individual Chapters
Handbook of Research on Competency-Based Edu...
Education
Copyright 2017. 454 pages.
The majority of adult learners are looking to atta...
In Stock
$37.50 Individual Chapters
Censorship and Student Communication in Onli...
Education
Copyright 2016. 622 pages.
While freedom of speech is a defining characterist...
In Stock
$37.50 Individual Chapters
Handbook of Research on Computerized Occlusa...
Medicine & Healthcare
Copyright 2015. 973 pages.
Modern medicine is changing drastically as new tec...
In Stock
$37.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$37.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$37.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$37.50 Individual Chapters