abs | rel | |
---|---|---|
Technology | 68 | 87.2% |
Health | 62 | 79.5% |
Privacy | 60 | 76.9% |
Human activities | 53 | 67.9% |
Research | 48 | 61.5% |
COVID-19 pandemic | 40 | 51.3% |
Risk | 40 | 51.3% |
Artificial intelligence | 39 | 50.0% |
Health care | 37 | 47.4% |
Computing | 36 | 46.2% |
Surveillance | 35 | 44.9% |
Information | 34 | 43.6% |
Disease | 32 | 41.0% |
Governance | 32 | 41.0% |
Infection | 28 | 35.9% |
Mobile app | 27 | 34.6% |
Innovation | 24 | 30.8% |
Policy | 24 | 30.8% |
Public health | 24 | 30.8% |
Computer security | 22 | 28.2% |
General Data Protection Regulation | 22 | 28.2% |
Information privacy | 21 | 26.9% |
Information security | 21 | 26.9% |
Personal data | 21 | 26.9% |
Collaboration | 20 | 25.6% |
Machine learning | 20 | 25.6% |
Electronic health record | 19 | 24.4% |
Information Age | 19 | 24.4% |
Regulatory compliance | 19 | 24.4% |
Emerging technologies | 18 | 23.1% |
Internet | 18 | 23.1% |
Leadership | 18 | 23.1% |
Politics | 18 | 23.1% |
Privacy law | 18 | 23.1% |
Contact tracing | 17 | 21.8% |
Economy | 17 | 21.8% |
Government | 17 | 21.8% |
Health sciences | 17 | 21.8% |
Analytics | 16 | 20.5% |
Coronavirus disease 2019 | 16 | 20.5% |
Information science | 16 | 20.5% |
Branches of science | 15 | 19.2% |
Hospital | 15 | 19.2% |
Information technology | 15 | 19.2% |
Science | 15 | 19.2% |
System | 15 | 19.2% |
Transparency (behavior) | 15 | 19.2% |
COVID-19 apps | 14 | 17.9% |
Database | 14 | 17.9% |
Health Insurance Portability and Accountability Act | 14 | 17.9% |
Issues in ethics | 14 | 17.9% |
Vulnerability (computing) | 14 | 17.9% |
Application software | 13 | 16.7% |
Automation | 13 | 16.7% |
Big data | 13 | 16.7% |
COVID-19 | 13 | 16.7% |
Cloud computing | 13 | 16.7% |
Infrastructure | 13 | 16.7% |
Medicine | 13 | 16.7% |
Pandemic | 13 | 16.7% |
Security | 13 | 16.7% |
Trust (social science) | 13 | 16.7% |
CT scan | 12 | 15.4% |
Computer network | 12 | 15.4% |
Cyberattack | 12 | 15.4% |
Encryption | 12 | 15.4% |
Facial recognition system | 12 | 15.4% |
Internet of things | 12 | 15.4% |
Medication | 12 | 15.4% |
Telehealth | 12 | 15.4% |
Authentication | 11 | 14.1% |
Business | 11 | 14.1% |
Chatbot | 11 | 14.1% |
Data | 11 | 14.1% |
Digital contact tracing | 11 | 14.1% |
Ethics | 11 | 14.1% |
Intelligence | 11 | 14.1% |
Interoperability | 11 | 14.1% |
Law | 11 | 14.1% |
Accountability | 10 | 12.8% |
Data security | 10 | 12.8% |
Deep learning | 10 | 12.8% |
Education | 10 | 12.8% |
Evaluation | 10 | 12.8% |
Federal Information Security Management Act of 2002 | 10 | 12.8% |
Internet privacy | 10 | 12.8% |
Medical diagnosis | 10 | 12.8% |
National security | 10 | 12.8% |
Sensitivity and specificity | 10 | 12.8% |
Smart city | 10 | 12.8% |
Smartphone | 10 | 12.8% |
Software | 10 | 12.8% |
Virus | 10 | 12.8% |
Artificial intelligence in healthcare | 9 | 11.5% |
Autonomous robot | 9 | 11.5% |
Bias | 9 | 11.5% |
Climate resilience | 9 | 11.5% |
Coronavirus | 9 | 11.5% |
DNA sequencing | 9 | 11.5% |
Digital economy | 9 | 11.5% |
Educational technology | 9 | 11.5% |
Ethics of artificial intelligence | 9 | 11.5% |
Information privacy law | 9 | 11.5% |
Learning | 9 | 11.5% |
Radiology | 9 | 11.5% |
Science, technology, engineering, and mathematics | 9 | 11.5% |
Supply chain | 9 | 11.5% |
TraceTogether | 9 | 11.5% |
World Wide Web | 9 | 11.5% |
2019–20 coronavirus outbreak | 8 | 10.3% |
Adaptive learning | 8 | 10.3% |
Anhui | 8 | 10.3% |
Citizenship | 8 | 10.3% |
Computer data storage | 8 | 10.3% |
Computer vision | 8 | 10.3% |
Creativity | 8 | 10.3% |
Credit | 8 | 10.3% |
Crime | 8 | 10.3% |
Critical thinking | 8 | 10.3% |
Decentralized Privacy-Preserving Proximity Tracing | 8 | 10.3% |
Economic growth | 8 | 10.3% |
Economic inequality | 8 | 10.3% |
Experiment | 8 | 10.3% |
Health equity | 8 | 10.3% |
Institution | 8 | 10.3% |
Intelligent tutoring system | 8 | 10.3% |
Medical imaging | 8 | 10.3% |
Middle East respiratory syndrome | 8 | 10.3% |
Motivation | 8 | 10.3% |
National College Entrance Examination | 8 | 10.3% |
Natural language processing | 8 | 10.3% |
Predictive analytics | 8 | 10.3% |
Research and development | 8 | 10.3% |
Retina | 8 | 10.3% |
Severe acute respiratory syndrome | 8 | 10.3% |
Social media | 8 | 10.3% |
Startup company | 8 | 10.3% |
Teacher | 8 | 10.3% |
Tutor | 8 | 10.3% |
Usability | 8 | 10.3% |
Watson (computer) | 8 | 10.3% |
BlueTrace | 7 | 9.0% |
EHealth | 7 | 9.0% |
Health informatics | 7 | 9.0% |
Information technology management | 7 | 9.0% |
MHealth | 7 | 9.0% |
Mobile phone | 7 | 9.0% |
Server (computing) | 7 | 9.0% |
Social distancing | 7 | 9.0% |
Statistics | 7 | 9.0% |
Bluetooth | 6 | 7.7% |
Exposure Notification | 6 | 7.7% |
Health data | 6 | 7.7% |
Medical privacy | 6 | 7.7% |
Operating system | 6 | 7.7% |
Password | 6 | 7.7% |
Procurement | 6 | 7.7% |
Severe acute respiratory syndrome coronavirus 2 | 6 | 7.7% |
Accessibility | 5 | 6.4% |
Applied ethics | 5 | 6.4% |
Backup | 5 | 6.4% |
Computer hardware | 5 | 6.4% |
Consent | 5 | 6.4% |
Contract | 5 | 6.4% |
Data sharing | 5 | 6.4% |
Employment | 5 | 6.4% |
Epidemiology | 5 | 6.4% |
Malware | 5 | 6.4% |
Medical record | 5 | 6.4% |
Public sphere | 5 | 6.4% |
Reliability engineering | 5 | 6.4% |
Requirement | 5 | 6.4% |
Algorithm | 4 | 5.1% |
Android (operating system) | 4 | 5.1% |
COVID-19 testing | 4 | 5.1% |
Computer file | 4 | 5.1% |
Computer science | 4 | 5.1% |
Confidentiality | 4 | 5.1% |
Copyright | 4 | 5.1% |
Data analysis | 4 | 5.1% |
Data quality | 4 | 5.1% |
Data science | 4 | 5.1% |
Health professional | 4 | 5.1% |
Management | 4 | 5.1% |
Medical device | 4 | 5.1% |
Medical guideline | 4 | 5.1% |
Metadata | 4 | 5.1% |
Mobile device | 4 | 5.1% |
NHS foundation trust | 4 | 5.1% |
Patch (computing) | 4 | 5.1% |
Patient | 4 | 5.1% |
Privacy policy | 4 | 5.1% |
Public health surveillance | 4 | 5.1% |
Risk management | 4 | 5.1% |
Safety | 4 | 5.1% |
Specification (technical standard) | 4 | 5.1% |
User (computing) | 4 | 5.1% |
Access control | 3 | 3.8% |
Accuracy and precision | 3 | 3.8% |
Adherence (medicine) | 3 | 3.8% |
Application programming interface | 3 | 3.8% |
Biometrics | 3 | 3.8% |
COVID-19 pandemic in the United Kingdom | 3 | 3.8% |
Communication protocol | 3 | 3.8% |
Computer programming | 3 | 3.8% |
Cryptography | 3 | 3.8% |
Cyberwarfare | 3 | 3.8% |
De-identification | 3 | 3.8% |
Discovery (law) | 3 | 3.8% |
End user | 3 | 3.8% |
Expert | 3 | 3.8% |
Graphical user interface | 3 | 3.8% |
HTTP cookie | 3 | 3.8% |
Information and communications technology | 3 | 3.8% |
Laptop | 3 | 3.8% |
Market (economics) | 3 | 3.8% |
Market segmentation | 3 | 3.8% |
Meta-analysis | 3 | 3.8% |
Microsoft Windows | 3 | 3.8% |
Personally identifiable information | 3 | 3.8% |
Point of care | 3 | 3.8% |
Preventive healthcare | 3 | 3.8% |
Protected health information | 3 | 3.8% |
Public policy | 3 | 3.8% |
Randomized controlled trial | 3 | 3.8% |
Rights | 3 | 3.8% |
Risk assessment | 3 | 3.8% |
SMS | 3 | 3.8% |
Software development | 3 | 3.8% |
Sustainability | 3 | 3.8% |
Tablet computer | 3 | 3.8% |
United States Code | 3 | 3.8% |
Vaccine | 3 | 3.8% |
Wearable technology | 3 | 3.8% |
API | 2 | 2.6% |
Active Directory | 2 | 2.6% |
Activity tracker | 2 | 2.6% |
Americas | 2 | 2.6% |
Architecture | 2 | 2.6% |
Areas of computer science | 2 | 2.6% |
Attitude (psychology) | 2 | 2.6% |
Automated decision-making | 2 | 2.6% |
Best practice | 2 | 2.6% |
Business continuity planning | 2 | 2.6% |
Business model | 2 | 2.6% |
C (programming language) | 2 | 2.6% |
CE marking | 2 | 2.6% |
Chief information officer | 2 | 2.6% |
Cipher suite | 2 | 2.6% |
Clinical commissioning group | 2 | 2.6% |
Clinical trial | 2 | 2.6% |
Closed-circuit television | 2 | 2.6% |
Communication | 2 | 2.6% |
Community | 2 | 2.6% |
Complaint | 2 | 2.6% |
Computer | 2 | 2.6% |
Computer engineering | 2 | 2.6% |
Copyright infringement | 2 | 2.6% |
Cross-site request forgery | 2 | 2.6% |
DMZ (computing) | 2 | 2.6% |
Data Protection Act 1998 | 2 | 2.6% |
Data Protection Directive | 2 | 2.6% |
Data breach | 2 | 2.6% |
Data center | 2 | 2.6% |
Data integrity | 2 | 2.6% |
Data re-identification | 2 | 2.6% |
Data retention | 2 | 2.6% |
Deliberation | 2 | 2.6% |
Dependent and independent variables | 2 | 2.6% |
Digital health | 2 | 2.6% |
Disease surveillance | 2 | 2.6% |
Documentation | 2 | 2.6% |
Emergency | 2 | 2.6% |
Emergency department | 2 | 2.6% |
Epidemic | 2 | 2.6% |
Expectation–maximization algorithm | 2 | 2.6% |
Fax | 2 | 2.6% |
Fingerprint | 2 | 2.6% |
GISAID | 2 | 2.6% |
Health information technology | 2 | 2.6% |
Health system | 2 | 2.6% |
Human rights | 2 | 2.6% |
IOS | 2 | 2.6% |
Identity document | 2 | 2.6% |
Image scanner | 2 | 2.6% |
Influenza | 2 | 2.6% |
Information sensitivity | 2 | 2.6% |
Informed consent | 2 | 2.6% |
Input/output | 2 | 2.6% |
Insurance | 2 | 2.6% |
Internet forum | 2 | 2.6% |
Kinect | 2 | 2.6% |
Life-cycle assessment | 2 | 2.6% |
Login | 2 | 2.6% |
Mobile phone tracking | 2 | 2.6% |
Mobile technology | 2 | 2.6% |
Monitoring (medicine) | 2 | 2.6% |
Multi-factor authentication | 2 | 2.6% |
Multiple choice | 2 | 2.6% |
NHS Test and Trace | 2 | 2.6% |
News | 2 | 2.6% |
Newspaper | 2 | 2.6% |
Ordinal data | 2 | 2.6% |
Organization | 2 | 2.6% |
PathCheck | 2 | 2.6% |
Patient safety | 2 | 2.6% |
Personal digital assistant | 2 | 2.6% |
Physician | 2 | 2.6% |
Prison | 2 | 2.6% |
Privacy by design | 2 | 2.6% |
Product lifecycle | 2 | 2.6% |
Project management | 2 | 2.6% |
Pseudonymization | 2 | 2.6% |
Psychological resilience | 2 | 2.6% |
Public opinion | 2 | 2.6% |
Publishing | 2 | 2.6% |
QR code | 2 | 2.6% |
Quarantine | 2 | 2.6% |
Record linkage | 2 | 2.6% |
Regression analysis | 2 | 2.6% |
Regulation | 2 | 2.6% |
Relational database | 2 | 2.6% |
Remote patient monitoring | 2 | 2.6% |
Representational state transfer | 2 | 2.6% |
Right to be forgotten | 2 | 2.6% |
SWOT analysis | 2 | 2.6% |
Secure Digital | 2 | 2.6% |
Self-care | 2 | 2.6% |
Simulation | 2 | 2.6% |
Social Security number | 2 | 2.6% |
Social exclusion | 2 | 2.6% |
Software bug | 2 | 2.6% |
Software development process | 2 | 2.6% |
Software engineering | 2 | 2.6% |
Sport | 2 | 2.6% |
Standardization | 2 | 2.6% |
Streaming media | 2 | 2.6% |
Subroutine | 2 | 2.6% |
Systematic review | 2 | 2.6% |
Tabloid (newspaper format) | 2 | 2.6% |
Telecare | 2 | 2.6% |
Traffic | 2 | 2.6% |
Training, validation, and test sets | 2 | 2.6% |
Transport | 2 | 2.6% |
Triage | 2 | 2.6% |
Type I and type II errors | 2 | 2.6% |
Verification and validation | 2 | 2.6% |
Web application | 2 | 2.6% |
Website | 2 | 2.6% |
XML schema | 2 | 2.6% |
2019–20 coronavirus pandemic | 1 | 1.3% |
Aadhaar | 1 | 1.3% |
Abstraction (computer science) | 1 | 1.3% |
Accounts payable | 1 | 1.3% |
Act of Parliament (UK) | 1 | 1.3% |
Ada Lovelace | 1 | 1.3% |
Addendum | 1 | 1.3% |
Adoption | 1 | 1.3% |
Advanced Message Queuing Protocol | 1 | 1.3% |
Agile software development | 1 | 1.3% |
Aloysius Pang | 1 | 1.3% |
AlphaGo | 1 | 1.3% |
Antiviral drug | 1 | 1.3% |
Apache Kafka | 1 | 1.3% |
Application security | 1 | 1.3% |
Assistive technology | 1 | 1.3% |
Asymptomatic carrier | 1 | 1.3% |
Attention | 1 | 1.3% |
Attribute-based access control | 1 | 1.3% |
Audit | 1 | 1.3% |
Authorization | 1 | 1.3% |
Autonomy | 1 | 1.3% |
Bank | 1 | 1.3% |
Bioinformatics | 1 | 1.3% |
Bionix AFV | 1 | 1.3% |
Bit | 1 | 1.3% |
BlackBerry | 1 | 1.3% |
Breach of contract | 1 | 1.3% |
Bring your own device | 1 | 1.3% |
Budget | 1 | 1.3% |
Bus (computing) | 1 | 1.3% |
Business Process Model and Notation | 1 | 1.3% |
Business intelligence | 1 | 1.3% |
Business process | 1 | 1.3% |
CCOW | 1 | 1.3% |
CD-ROM | 1 | 1.3% |
COVID passports in the United Kingdom | 1 | 1.3% |
COVID-19 misinformation | 1 | 1.3% |
COVID-19 vaccine | 1 | 1.3% |
Caregiver | 1 | 1.3% |
Cell site | 1 | 1.3% |
Central processing unit | 1 | 1.3% |
Charitable organization | 1 | 1.3% |
Chief privacy officer | 1 | 1.3% |
Chikungunya | 1 | 1.3% |
Child care | 1 | 1.3% |
Cholesterol | 1 | 1.3% |
Chronic condition | 1 | 1.3% |
Civil liberties | 1 | 1.3% |
Climate change mitigation | 1 | 1.3% |
Clinical Document Architecture | 1 | 1.3% |
Closed captioning | 1 | 1.3% |
Cluster analysis | 1 | 1.3% |
Code | 1 | 1.3% |
Cognition | 1 | 1.3% |
Cohort study | 1 | 1.3% |
Commercial off-the-shelf | 1 | 1.3% |
Common Alerting Protocol | 1 | 1.3% |
Common Gateway Interface | 1 | 1.3% |
Component-based software engineering | 1 | 1.3% |
Computer data | 1 | 1.3% |
Computer program | 1 | 1.3% |
Computers | 1 | 1.3% |
Conceptual model | 1 | 1.3% |
Conditional (computer programming) | 1 | 1.3% |
Configuration management | 1 | 1.3% |
Conflict of interest | 1 | 1.3% |
Confounding | 1 | 1.3% |
Continuous delivery | 1 | 1.3% |
Continuous integration | 1 | 1.3% |
Control flow | 1 | 1.3% |
Coronary artery disease | 1 | 1.3% |
Creative Commons license | 1 | 1.3% |
Crime prevention | 1 | 1.3% |
Criminal record | 1 | 1.3% |
Cross Enterprise Document Sharing | 1 | 1.3% |
Cryptographic hash function | 1 | 1.3% |
DICOM | 1 | 1.3% |
Dashboard (business) | 1 | 1.3% |
Data migration | 1 | 1.3% |
Data mining | 1 | 1.3% |
Data model | 1 | 1.3% |
Data transmission | 1 | 1.3% |
Data visualization | 1 | 1.3% |
DataWorks Plus | 1 | 1.3% |
Database schema | 1 | 1.3% |
Database transaction | 1 | 1.3% |
Decision-making | 1 | 1.3% |
Derivative work | 1 | 1.3% |
Design | 1 | 1.3% |
Desktop computer | 1 | 1.3% |
Determinism | 1 | 1.3% |
DevOps | 1 | 1.3% |
Diabetes | 1 | 1.3% |
Digital data | 1 | 1.3% |
Digital divide | 1 | 1.3% |
Digital electronics | 1 | 1.3% |
Digital technology | 1 | 1.3% |
Digital transformation | 1 | 1.3% |
Disability | 1 | 1.3% |
Discrimination | 1 | 1.3% |
Disease management (health) | 1 | 1.3% |
Disk storage | 1 | 1.3% |
Document | 1 | 1.3% |
Document management system | 1 | 1.3% |
Document type definition | 1 | 1.3% |
Domain name | 1 | 1.3% |
Domestic violence | 1 | 1.3% |
Drug discovery | 1 | 1.3% |
Due diligence | 1 | 1.3% |
EPROM | 1 | 1.3% |
Eclipse (software) | 1 | 1.3% |
Economic development | 1 | 1.3% |
Ecosystem | 1 | 1.3% |
Efficient energy use | 1 | 1.3% |
Electronic assessment | 1 | 1.3% |
Electronic prescribing | 1 | 1.3% |
Embedded system | 1 | 1.3% |
Empathy | 1 | 1.3% |
End-of-life care | 1 | 1.3% |
Environmental impact assessment | 1 | 1.3% |
Europe | 1 | 1.3% |
European Convention on Human Rights | 1 | 1.3% |
Evidence-based medicine | 1 | 1.3% |
False positives and false negatives | 1 | 1.3% |
Federal Information Technology Acquisition Reform Act | 1 | 1.3% |
File format | 1 | 1.3% |
File system | 1 | 1.3% |
Financial statement | 1 | 1.3% |
Fine (penalty) | 1 | 1.3% |
Five Year Forward View | 1 | 1.3% |
Flash memory | 1 | 1.3% |
FluView | 1 | 1.3% |
Forecasting | 1 | 1.3% |
Form (HTML) | 1 | 1.3% |
Formulary (pharmacy) | 1 | 1.3% |
Freedom of Information Act (United States) | 1 | 1.3% |
Front-side bus | 1 | 1.3% |
Fundamental rights | 1 | 1.3% |
GCE Advanced Level | 1 | 1.3% |
GCE Ordinary Level | 1 | 1.3% |
Gambling | 1 | 1.3% |
General Certificate of Education | 1 | 1.3% |
General contractor | 1 | 1.3% |
General practice | 1 | 1.3% |
Genetic linkage | 1 | 1.3% |
Genetics | 1 | 1.3% |
Global Digital Exemplar | 1 | 1.3% |
Global Positioning System | 1 | 1.3% |
Global health | 1 | 1.3% |
HTTPS | 1 | 1.3% |
Hard disk drive | 1 | 1.3% |
Hard disk drive performance characteristics | 1 | 1.3% |
Health Information Technology for Economic and Clinical Health Act | 1 | 1.3% |
Health Level 7 | 1 | 1.3% |
Health crisis | 1 | 1.3% |
Health insurance | 1 | 1.3% |
Help desk | 1 | 1.3% |
High-density lipoprotein | 1 | 1.3% |
Home Mortgage Disclosure Act | 1 | 1.3% |
Human resource management | 1 | 1.3% |
Human-centered design | 1 | 1.3% |
Human–computer interaction | 1 | 1.3% |
ISO 13485 | 1 | 1.3% |
IT infrastructure | 1 | 1.3% |
Icon (computing) | 1 | 1.3% |
Identity theft | 1 | 1.3% |
Impedance matching | 1 | 1.3% |
Implementation | 1 | 1.3% |
Incident management | 1 | 1.3% |
Indian Gaming Regulatory Act | 1 | 1.3% |
Influenza-like illness | 1 | 1.3% |
Infodemic | 1 | 1.3% |
Information governance | 1 | 1.3% |
Institutional review board | 1 | 1.3% |
Instruction set architecture | 1 | 1.3% |
Intellectual property | 1 | 1.3% |
Intensive care unit | 1 | 1.3% |
Interdisciplinarity | 1 | 1.3% |
Interface (computing) | 1 | 1.3% |
Internal control | 1 | 1.3% |
Internet access | 1 | 1.3% |
Invoice | 1 | 1.3% |
Java (programming language) | 1 | 1.3% |
Java Platform, Micro Edition | 1 | 1.3% |
Joint venture | 1 | 1.3% |
Jury | 1 | 1.3% |
Justice | 1 | 1.3% |
Kerberos (protocol) | 1 | 1.3% |
Keyboard technology | 1 | 1.3% |
Latency (engineering) | 1 | 1.3% |
Latin America | 1 | 1.3% |
Law of the United States | 1 | 1.3% |
Lawsuit | 1 | 1.3% |
Leeds | 1 | 1.3% |
Legacy system | 1 | 1.3% |
Legal liability | 1 | 1.3% |
Legal professional privilege | 1 | 1.3% |
Legislation | 1 | 1.3% |
Library (computing) | 1 | 1.3% |
License | 1 | 1.3% |
Likelihood function | 1 | 1.3% |
Low-carbon economy | 1 | 1.3% |
Making false statements | 1 | 1.3% |
Mammography | 1 | 1.3% |
Mass media | 1 | 1.3% |
Mass surveillance | 1 | 1.3% |
Medicaid | 1 | 1.3% |
Medical prescription | 1 | 1.3% |
Medicare (United States) | 1 | 1.3% |
Mental health | 1 | 1.3% |
Metaphone | 1 | 1.3% |
Microsoft Azure | 1 | 1.3% |
Microsoft Office | 1 | 1.3% |
Misinformation | 1 | 1.3% |
Mobile app development | 1 | 1.3% |
Mobile broadband | 1 | 1.3% |
Mobile device management | 1 | 1.3% |
Mobile game | 1 | 1.3% |
Mortality displacement | 1 | 1.3% |
Motherboard | 1 | 1.3% |
Multicast | 1 | 1.3% |
National Environmental Policy Act | 1 | 1.3% |
National service in Singapore | 1 | 1.3% |
Native American gaming | 1 | 1.3% |
Network topology | 1 | 1.3% |
New Drug Application | 1 | 1.3% |
Non-governmental organization | 1 | 1.3% |
Non-volatile memory | 1 | 1.3% |
Northbridge (computing) | 1 | 1.3% |
Null (SQL) | 1 | 1.3% |
Nursing | 1 | 1.3% |
Office 365 | 1 | 1.3% |
Old age | 1 | 1.3% |
Online and offline | 1 | 1.3% |
Online community | 1 | 1.3% |
Option (finance) | 1 | 1.3% |
Ownership | 1 | 1.3% |
1 | 1.3% | |
PHP | 1 | 1.3% |
Parsing | 1 | 1.3% |
Payment Card Industry Data Security Standard | 1 | 1.3% |
Performance indicator | 1 | 1.3% |
Personal computer | 1 | 1.3% |
Personal identification number | 1 | 1.3% |
Personalized medicine | 1 | 1.3% |
Pharmaceutical industry | 1 | 1.3% |
Phishing | 1 | 1.3% |
Physical fitness | 1 | 1.3% |
Physical security | 1 | 1.3% |
Picture archiving and communication system | 1 | 1.3% |
Pivot table | 1 | 1.3% |
Positive and negative predictive values | 1 | 1.3% |
Poverty | 1 | 1.3% |
Prediction | 1 | 1.3% |
Privacy Impact Assessment | 1 | 1.3% |
Privacy-enhancing technologies | 1 | 1.3% |
Probability | 1 | 1.3% |
Professional certification | 1 | 1.3% |
Programming language | 1 | 1.3% |
Protection Profile | 1 | 1.3% |
Prototype | 1 | 1.3% |
Public Health Emergency of International Concern | 1 | 1.3% |
Public engagement | 1 | 1.3% |
Public-key cryptography | 1 | 1.3% |
Publish–subscribe pattern | 1 | 1.3% |
Qualitative research | 1 | 1.3% |
Quality (business) | 1 | 1.3% |
Quality assurance | 1 | 1.3% |
Quality management | 1 | 1.3% |
Quality management system | 1 | 1.3% |
Racialization | 1 | 1.3% |
Radiography | 1 | 1.3% |
Random number generation | 1 | 1.3% |
Randomness | 1 | 1.3% |
Ransomware | 1 | 1.3% |
Read-only memory | 1 | 1.3% |
Real-time computing | 1 | 1.3% |
Reason | 1 | 1.3% |
Receipt | 1 | 1.3% |
Recursion (computer science) | 1 | 1.3% |
Regulatory technology | 1 | 1.3% |
Request for proposal | 1 | 1.3% |
Right to privacy | 1 | 1.3% |
Robot | 1 | 1.3% |
Router (computing) | 1 | 1.3% |
Rulemaking | 1 | 1.3% |
SARS-CoV-2 Omicron variant | 1 | 1.3% |
SHA-2 | 1 | 1.3% |
Safari (web browser) | 1 | 1.3% |
Sanitization (classified information) | 1 | 1.3% |
Scalability | 1 | 1.3% |
Scientific method | 1 | 1.3% |
Security engineering | 1 | 1.3% |
Self-driving car | 1 | 1.3% |
Sensor | 1 | 1.3% |
Serial ATA | 1 | 1.3% |
Sexual harassment | 1 | 1.3% |
SharePoint | 1 | 1.3% |
Singapore-Cambridge GCE Ordinary Level | 1 | 1.3% |
Social determinants of health | 1 | 1.3% |
Social inequality | 1 | 1.3% |
Social institutions | 1 | 1.3% |
Social issues | 1 | 1.3% |
Social work | 1 | 1.3% |
Societal racism | 1 | 1.3% |
Society | 1 | 1.3% |
Software testing | 1 | 1.3% |
Software verification and validation | 1 | 1.3% |
Solid-state drive | 1 | 1.3% |
Sorting algorithm | 1 | 1.3% |
Soundex | 1 | 1.3% |
Spatial analysis | 1 | 1.3% |
Statement of work | 1 | 1.3% |
Statistical model | 1 | 1.3% |
Steganography | 1 | 1.3% |
Strategic management | 1 | 1.3% |
Stroke | 1 | 1.3% |
Supplemental Nutrition Assistance Program | 1 | 1.3% |
Surgery | 1 | 1.3% |
Survey methodology | 1 | 1.3% |
System administrator | 1 | 1.3% |
Systems engineering | 1 | 1.3% |
Systems science | 1 | 1.3% |
T9 (predictive text) | 1 | 1.3% |
TCN Protocol | 1 | 1.3% |
Tab (interface) | 1 | 1.3% |
Technical support | 1 | 1.3% |
Technology roadmap | 1 | 1.3% |
Telecommunication | 1 | 1.3% |
Telecommuting | 1 | 1.3% |
Telephone | 1 | 1.3% |
Test (assessment) | 1 | 1.3% |
Text messaging | 1 | 1.3% |
Time series | 1 | 1.3% |
Top-down and bottom-up design | 1 | 1.3% |
Tort | 1 | 1.3% |
Traceability | 1 | 1.3% |
Transmission (medicine) | 1 | 1.3% |
Troubleshooting | 1 | 1.3% |
Type 2 diabetes | 1 | 1.3% |
USB | 1 | 1.3% |
Unfunded mandate | 1 | 1.3% |
Unified Modeling Language | 1 | 1.3% |
Unified communications | 1 | 1.3% |
Use case | 1 | 1.3% |
Vaccine passports during the COVID-19 pandemic | 1 | 1.3% |
Variants of SARS-CoV-2 | 1 | 1.3% |
Venture capital | 1 | 1.3% |
Video | 1 | 1.3% |
Videotelephony | 1 | 1.3% |
Visualization (graphics) | 1 | 1.3% |
Volunteering | 1 | 1.3% |
Warranty | 1 | 1.3% |
Web content | 1 | 1.3% |
Wi-Fi | 1 | 1.3% |
Windows 10 | 1 | 1.3% |
XBRL | 1 | 1.3% |
XML | 1 | 1.3% |
Xbox | 1 | 1.3% |
abs | rel | |
---|---|---|
Cholesterol | 1 | 100.0% |
Common Gateway Interface | 1 | 100.0% |
Computing | 1 | 100.0% |
Coronary artery disease | 1 | 100.0% |
Database | 1 | 100.0% |
Health | 1 | 100.0% |
High-density lipoprotein | 1 | 100.0% |
Information science | 1 | 100.0% |
Medical guideline | 1 | 100.0% |
Relational database | 1 | 100.0% |
Technology | 1 | 100.0% |
World Wide Web | 1 | 100.0% |
abs | rel | |
---|---|---|
Application programming interface | 1 | 100.0% |
Artificial intelligence | 1 | 100.0% |
Automation | 1 | 100.0% |
Business | 1 | 100.0% |
Computing | 1 | 100.0% |
Database | 1 | 100.0% |
Database schema | 1 | 100.0% |
File format | 1 | 100.0% |
Health care | 1 | 100.0% |
Health insurance | 1 | 100.0% |
Home Mortgage Disclosure Act | 1 | 100.0% |
Human activities | 1 | 100.0% |
Information | 1 | 100.0% |
Insurance | 1 | 100.0% |
Medication | 1 | 100.0% |
New Drug Application | 1 | 100.0% |
Publishing | 1 | 100.0% |
Regulation | 1 | 100.0% |
Regulatory compliance | 1 | 100.0% |
Regulatory technology | 1 | 100.0% |
Software | 1 | 100.0% |
Software development | 1 | 100.0% |
Technology | 1 | 100.0% |
Verification and validation | 1 | 100.0% |
Website | 1 | 100.0% |
World Wide Web | 1 | 100.0% |
XBRL | 1 | 100.0% |
XML schema | 1 | 100.0% |
abs | rel | |
---|---|---|
Analytics | 1 | 100.0% |
Application software | 1 | 100.0% |
Branches of science | 1 | 100.0% |
COVID-19 pandemic | 1 | 100.0% |
Chikungunya | 1 | 100.0% |
Chronic condition | 1 | 100.0% |
Common Alerting Protocol | 1 | 100.0% |
Communication protocol | 1 | 100.0% |
Computer network | 1 | 100.0% |
Computing | 1 | 100.0% |
Coronavirus disease 2019 | 1 | 100.0% |
Data | 1 | 100.0% |
Data analysis | 1 | 100.0% |
Data quality | 1 | 100.0% |
Data visualization | 1 | 100.0% |
Database | 1 | 100.0% |
Database transaction | 1 | 100.0% |
Disease | 1 | 100.0% |
Disease surveillance | 1 | 100.0% |
Document type definition | 1 | 100.0% |
EHealth | 1 | 100.0% |
Educational technology | 1 | 100.0% |
Electronic health record | 1 | 100.0% |
Epidemiology | 1 | 100.0% |
Evaluation | 1 | 100.0% |
Graphical user interface | 1 | 100.0% |
Health | 1 | 100.0% |
Health care | 1 | 100.0% |
Health informatics | 1 | 100.0% |
Health professional | 1 | 100.0% |
Hospital | 1 | 100.0% |
Human activities | 1 | 100.0% |
Implementation | 1 | 100.0% |
Infection | 1 | 100.0% |
Influenza | 1 | 100.0% |
Influenza-like illness | 1 | 100.0% |
Information | 1 | 100.0% |
Information Age | 1 | 100.0% |
Interoperability | 1 | 100.0% |
Java (programming language) | 1 | 100.0% |
Java Platform, Micro Edition | 1 | 100.0% |
MHealth | 1 | 100.0% |
Mobile phone | 1 | 100.0% |
Nursing | 1 | 100.0% |
PHP | 1 | 100.0% |
Pandemic | 1 | 100.0% |
Pivot table | 1 | 100.0% |
Public health | 1 | 100.0% |
Public health surveillance | 1 | 100.0% |
Relational database | 1 | 100.0% |
Representational state transfer | 1 | 100.0% |
Requirement | 1 | 100.0% |
Research | 1 | 100.0% |
SMS | 1 | 100.0% |
Server (computing) | 1 | 100.0% |
Simulation | 1 | 100.0% |
Software | 1 | 100.0% |
Spatial analysis | 1 | 100.0% |
Specification (technical standard) | 1 | 100.0% |
Statistics | 1 | 100.0% |
Subroutine | 1 | 100.0% |
Surveillance | 1 | 100.0% |
System | 1 | 100.0% |
T9 (predictive text) | 1 | 100.0% |
Technology | 1 | 100.0% |
Text messaging | 1 | 100.0% |
Time series | 1 | 100.0% |
Top-down and bottom-up design | 1 | 100.0% |
Usability | 1 | 100.0% |
Virus | 1 | 100.0% |
World Wide Web | 1 | 100.0% |
XML | 1 | 100.0% |
XML schema | 1 | 100.0% |
abs | rel | |
---|---|---|
Business | 2 | 100.0% |
Computing | 2 | 100.0% |
Encryption | 2 | 100.0% |
Technology | 2 | 100.0% |
Adherence (medicine) | 1 | 50.0% |
Authentication | 1 | 50.0% |
Bias | 1 | 50.0% |
CD-ROM | 1 | 50.0% |
Caregiver | 1 | 50.0% |
Clinical commissioning group | 1 | 50.0% |
Component-based software engineering | 1 | 50.0% |
Computer | 1 | 50.0% |
Computer data storage | 1 | 50.0% |
Computer hardware | 1 | 50.0% |
Copyright | 1 | 50.0% |
Copyright infringement | 1 | 50.0% |
Database | 1 | 50.0% |
Derivative work | 1 | 50.0% |
Diabetes | 1 | 50.0% |
Disease management (health) | 1 | 50.0% |
Disk storage | 1 | 50.0% |
EPROM | 1 | 50.0% |
Eclipse (software) | 1 | 50.0% |
End user | 1 | 50.0% |
Flash memory | 1 | 50.0% |
Formulary (pharmacy) | 1 | 50.0% |
Gambling | 1 | 50.0% |
HTTPS | 1 | 50.0% |
Health care | 1 | 50.0% |
Human activities | 1 | 50.0% |
Indian Gaming Regulatory Act | 1 | 50.0% |
Information technology | 1 | 50.0% |
Information technology management | 1 | 50.0% |
Interface (computing) | 1 | 50.0% |
Internal control | 1 | 50.0% |
Legal liability | 1 | 50.0% |
Microsoft Windows | 1 | 50.0% |
National Environmental Policy Act | 1 | 50.0% |
Native American gaming | 1 | 50.0% |
Non-volatile memory | 1 | 50.0% |
Patient | 1 | 50.0% |
Patient safety | 1 | 50.0% |
Privacy | 1 | 50.0% |
Privacy policy | 1 | 50.0% |
Public-key cryptography | 1 | 50.0% |
Random number generation | 1 | 50.0% |
Randomness | 1 | 50.0% |
Read-only memory | 1 | 50.0% |
Regulatory compliance | 1 | 50.0% |
Risk | 1 | 50.0% |
Risk assessment | 1 | 50.0% |
Rulemaking | 1 | 50.0% |
Self-care | 1 | 50.0% |
Software | 1 | 50.0% |
Technical support | 1 | 50.0% |
Tort | 1 | 50.0% |
Unfunded mandate | 1 | 50.0% |
United States Code | 1 | 50.0% |
Warranty | 1 | 50.0% |
World Wide Web | 1 | 50.0% |
abs | rel | |
---|---|---|
Android (operating system) | 2 | 100.0% |
Application software | 2 | 100.0% |
Business model | 2 | 100.0% |
EHealth | 2 | 100.0% |
Electronic health record | 2 | 100.0% |
Health | 2 | 100.0% |
Health care | 2 | 100.0% |
Human activities | 2 | 100.0% |
Information | 2 | 100.0% |
Kinect | 2 | 100.0% |
MHealth | 2 | 100.0% |
Market (economics) | 2 | 100.0% |
Medication | 2 | 100.0% |
Mobile app | 2 | 100.0% |
Mobile phone | 2 | 100.0% |
Monitoring (medicine) | 2 | 100.0% |
Point of care | 2 | 100.0% |
Remote patient monitoring | 2 | 100.0% |
SMS | 2 | 100.0% |
Smartphone | 2 | 100.0% |
Sport | 2 | 100.0% |
Tablet computer | 2 | 100.0% |
Technology | 2 | 100.0% |
Telecare | 2 | 100.0% |
Telehealth | 2 | 100.0% |
Computer network | 1 | 50.0% |
Computing | 1 | 50.0% |
Health informatics | 1 | 50.0% |
Health sciences | 1 | 50.0% |
Information and communications technology | 1 | 50.0% |
Market segmentation | 1 | 50.0% |
Mobile device | 1 | 50.0% |
Mobile game | 1 | 50.0% |
Pharmaceutical industry | 1 | 50.0% |
Physical fitness | 1 | 50.0% |
Preventive healthcare | 1 | 50.0% |
Research | 1 | 50.0% |
Strategic management | 1 | 50.0% |
Telecommunication | 1 | 50.0% |
Telephone | 1 | 50.0% |
Xbox | 1 | 50.0% |
abs | rel | |
---|---|---|
Algorithm | 1 | 100.0% |
Authentication | 1 | 100.0% |
Biometrics | 1 | 100.0% |
Bus (computing) | 1 | 100.0% |
Central processing unit | 1 | 100.0% |
Cohort study | 1 | 100.0% |
Computer data | 1 | 100.0% |
Computer data storage | 1 | 100.0% |
Computer file | 1 | 100.0% |
Computer hardware | 1 | 100.0% |
Computer network | 1 | 100.0% |
Computing | 1 | 100.0% |
Confounding | 1 | 100.0% |
Cryptographic hash function | 1 | 100.0% |
Cryptography | 1 | 100.0% |
Data | 1 | 100.0% |
Database | 1 | 100.0% |
De-identification | 1 | 100.0% |
Encryption | 1 | 100.0% |
Evaluation | 1 | 100.0% |
Expectation–maximization algorithm | 1 | 100.0% |
Federal Information Security Management Act of 2002 | 1 | 100.0% |
File system | 1 | 100.0% |
Front-side bus | 1 | 100.0% |
Genetic linkage | 1 | 100.0% |
Hard disk drive | 1 | 100.0% |
Hard disk drive performance characteristics | 1 | 100.0% |
Health | 1 | 100.0% |
Health Insurance Portability and Accountability Act | 1 | 100.0% |
Health care | 1 | 100.0% |
Health informatics | 1 | 100.0% |
Human activities | 1 | 100.0% |
Identity document | 1 | 100.0% |
Information | 1 | 100.0% |
Information science | 1 | 100.0% |
Information security | 1 | 100.0% |
Information technology | 1 | 100.0% |
Institutional review board | 1 | 100.0% |
Internet | 1 | 100.0% |
Likelihood function | 1 | 100.0% |
Medical privacy | 1 | 100.0% |
Medical record | 1 | 100.0% |
Motherboard | 1 | 100.0% |
Northbridge (computing) | 1 | 100.0% |
Password | 1 | 100.0% |
Personal data | 1 | 100.0% |
Personal identification number | 1 | 100.0% |
Positive and negative predictive values | 1 | 100.0% |
Privacy | 1 | 100.0% |
Probability | 1 | 100.0% |
Protected health information | 1 | 100.0% |
Randomized controlled trial | 1 | 100.0% |
Record linkage | 1 | 100.0% |
Regulatory compliance | 1 | 100.0% |
Research | 1 | 100.0% |
Risk | 1 | 100.0% |
Risk management | 1 | 100.0% |
SHA-2 | 1 | 100.0% |
SWOT analysis | 1 | 100.0% |
Security | 1 | 100.0% |
Sensitivity and specificity | 1 | 100.0% |
Serial ATA | 1 | 100.0% |
Server (computing) | 1 | 100.0% |
Social Security number | 1 | 100.0% |
Solid-state drive | 1 | 100.0% |
Statistics | 1 | 100.0% |
Technology | 1 | 100.0% |
Type I and type II errors | 1 | 100.0% |
Usability | 1 | 100.0% |
User (computing) | 1 | 100.0% |
abs | rel | |
---|---|---|
Authentication | 5 | 100.0% |
Computer network | 5 | 100.0% |
Computing | 5 | 100.0% |
Information technology | 5 | 100.0% |
Technology | 5 | 100.0% |
Backup | 4 | 80.0% |
Computer data storage | 4 | 80.0% |
Computer security | 4 | 80.0% |
Disease | 4 | 80.0% |
Encryption | 4 | 80.0% |
Health | 4 | 80.0% |
Health care | 4 | 80.0% |
Human activities | 4 | 80.0% |
Information | 4 | 80.0% |
Information security | 4 | 80.0% |
Internet | 4 | 80.0% |
Malware | 4 | 80.0% |
Privacy | 4 | 80.0% |
Regulatory compliance | 4 | 80.0% |
Risk | 4 | 80.0% |
Vulnerability (computing) | 4 | 80.0% |
Application software | 3 | 60.0% |
Contract | 3 | 60.0% |
Database | 3 | 60.0% |
Information science | 3 | 60.0% |
Operating system | 3 | 60.0% |
Password | 3 | 60.0% |
Server (computing) | 3 | 60.0% |
Smartphone | 3 | 60.0% |
Surveillance | 3 | 60.0% |
World Wide Web | 3 | 60.0% |
Access control | 2 | 40.0% |
Accessibility | 2 | 40.0% |
Accuracy and precision | 2 | 40.0% |
Activity tracker | 2 | 40.0% |
Adherence (medicine) | 2 | 40.0% |
Areas of computer science | 2 | 40.0% |
Business | 2 | 40.0% |
Business continuity planning | 2 | 40.0% |
C (programming language) | 2 | 40.0% |
Cipher suite | 2 | 40.0% |
Complaint | 2 | 40.0% |
Computer file | 2 | 40.0% |
Confidentiality | 2 | 40.0% |
Consent | 2 | 40.0% |
Copyright | 2 | 40.0% |
Cross-site request forgery | 2 | 40.0% |
Cryptography | 2 | 40.0% |
Cyberattack | 2 | 40.0% |
DMZ (computing) | 2 | 40.0% |
Data Protection Directive | 2 | 40.0% |
Data breach | 2 | 40.0% |
Data integrity | 2 | 40.0% |
Discovery (law) | 2 | 40.0% |
EHealth | 2 | 40.0% |
Electronic health record | 2 | 40.0% |
Employment | 2 | 40.0% |
Evaluation | 2 | 40.0% |
Fax | 2 | 40.0% |
Health Insurance Portability and Accountability Act | 2 | 40.0% |
Health data | 2 | 40.0% |
Health informatics | 2 | 40.0% |
Health professional | 2 | 40.0% |
Information Age | 2 | 40.0% |
Information privacy | 2 | 40.0% |
Information sensitivity | 2 | 40.0% |
Internet forum | 2 | 40.0% |
Interoperability | 2 | 40.0% |
MHealth | 2 | 40.0% |
Medical device | 2 | 40.0% |
Medical guideline | 2 | 40.0% |
Medical privacy | 2 | 40.0% |
Medical record | 2 | 40.0% |
Meta-analysis | 2 | 40.0% |
Mobile app | 2 | 40.0% |
Mobile device | 2 | 40.0% |
Multiple choice | 2 | 40.0% |
Patch (computing) | 2 | 40.0% |
Personal digital assistant | 2 | 40.0% |
Personally identifiable information | 2 | 40.0% |
Preventive healthcare | 2 | 40.0% |
Prison | 2 | 40.0% |
Privacy policy | 2 | 40.0% |
Protected health information | 2 | 40.0% |
Randomized controlled trial | 2 | 40.0% |
Reliability engineering | 2 | 40.0% |
Requirement | 2 | 40.0% |
Right to be forgotten | 2 | 40.0% |
Risk management | 2 | 40.0% |
Safety | 2 | 40.0% |
Secure Digital | 2 | 40.0% |
Software | 2 | 40.0% |
Software development process | 2 | 40.0% |
Standardization | 2 | 40.0% |
Systematic review | 2 | 40.0% |
United States Code | 2 | 40.0% |
Usability | 2 | 40.0% |
Accounts payable | 1 | 20.0% |
Android (operating system) | 1 | 20.0% |
Authorization | 1 | 20.0% |
Biometrics | 1 | 20.0% |
BlackBerry | 1 | 20.0% |
Bluetooth | 1 | 20.0% |
Communication protocol | 1 | 20.0% |
Criminal record | 1 | 20.0% |
Cyberwarfare | 1 | 20.0% |
Data retention | 1 | 20.0% |
DataWorks Plus | 1 | 20.0% |
De-identification | 1 | 20.0% |
Digital technology | 1 | 20.0% |
Emergency | 1 | 20.0% |
Facial recognition system | 1 | 20.0% |
Fingerprint | 1 | 20.0% |
Government | 1 | 20.0% |
IOS | 1 | 20.0% |
Icon (computing) | 1 | 20.0% |
Identity document | 1 | 20.0% |
Image scanner | 1 | 20.0% |
Information technology management | 1 | 20.0% |
Invoice | 1 | 20.0% |
Issues in ethics | 1 | 20.0% |
Laptop | 1 | 20.0% |
Law | 1 | 20.0% |
Law of the United States | 1 | 20.0% |
Login | 1 | 20.0% |
Microsoft Windows | 1 | 20.0% |
Mobile broadband | 1 | 20.0% |
Mobile device management | 1 | 20.0% |
Mobile phone | 1 | 20.0% |
Multi-factor authentication | 1 | 20.0% |
Option (finance) | 1 | 20.0% |
Physical security | 1 | 20.0% |
Policy | 1 | 20.0% |
Procurement | 1 | 20.0% |
Public health | 1 | 20.0% |
Public sphere | 1 | 20.0% |
Receipt | 1 | 20.0% |
Risk assessment | 1 | 20.0% |
Security | 1 | 20.0% |
Security engineering | 1 | 20.0% |
Social institutions | 1 | 20.0% |
Software development | 1 | 20.0% |
Specification (technical standard) | 1 | 20.0% |
Statement of work | 1 | 20.0% |
Supplemental Nutrition Assistance Program | 1 | 20.0% |
System administrator | 1 | 20.0% |
Tab (interface) | 1 | 20.0% |
Tablet computer | 1 | 20.0% |
USB | 1 | 20.0% |
User (computing) | 1 | 20.0% |
abs | rel | |
---|---|---|
Accuracy and precision | 1 | 100.0% |
Algorithm | 1 | 100.0% |
Best practice | 1 | 100.0% |
Biometrics | 1 | 100.0% |
Cluster analysis | 1 | 100.0% |
Computer science | 1 | 100.0% |
Computing | 1 | 100.0% |
Data mining | 1 | 100.0% |
Data quality | 1 | 100.0% |
Database | 1 | 100.0% |
De-identification | 1 | 100.0% |
Decision-making | 1 | 100.0% |
Determinism | 1 | 100.0% |
Electronic health record | 1 | 100.0% |
End user | 1 | 100.0% |
Evaluation | 1 | 100.0% |
Expectation–maximization algorithm | 1 | 100.0% |
False positives and false negatives | 1 | 100.0% |
Fingerprint | 1 | 100.0% |
Health Insurance Portability and Accountability Act | 1 | 100.0% |
Health care | 1 | 100.0% |
Health informatics | 1 | 100.0% |
Identity theft | 1 | 100.0% |
Impedance matching | 1 | 100.0% |
Information | 1 | 100.0% |
Information security | 1 | 100.0% |
Internet privacy | 1 | 100.0% |
Interoperability | 1 | 100.0% |
Medical privacy | 1 | 100.0% |
Medical record | 1 | 100.0% |
Metaphone | 1 | 100.0% |
Parsing | 1 | 100.0% |
Patient | 1 | 100.0% |
Personally identifiable information | 1 | 100.0% |
Policy | 1 | 100.0% |
Privacy | 1 | 100.0% |
Record linkage | 1 | 100.0% |
Research | 1 | 100.0% |
Risk | 1 | 100.0% |
Scalability | 1 | 100.0% |
Sensitivity and specificity | 1 | 100.0% |
Social Security number | 1 | 100.0% |
Soundex | 1 | 100.0% |
Statistical model | 1 | 100.0% |
Statistics | 1 | 100.0% |
Stroke | 1 | 100.0% |
Surveillance | 1 | 100.0% |
System | 1 | 100.0% |
Type I and type II errors | 1 | 100.0% |
Usability | 1 | 100.0% |
abs | rel | |
---|---|---|
Health care | 5 | 100.0% |
Computing | 4 | 80.0% |
Human activities | 4 | 80.0% |
Technology | 4 | 80.0% |
Computer security | 3 | 60.0% |
Governance | 3 | 60.0% |
Health | 3 | 60.0% |
Information | 3 | 60.0% |
Information Age | 3 | 60.0% |
Information technology | 3 | 60.0% |
Interoperability | 3 | 60.0% |
Mobile app | 3 | 60.0% |
Privacy | 3 | 60.0% |
Risk | 3 | 60.0% |
Analytics | 2 | 40.0% |
Application software | 2 | 40.0% |
Artificial intelligence | 2 | 40.0% |
Authentication | 2 | 40.0% |
Business | 2 | 40.0% |
Cloud computing | 2 | 40.0% |
Collaboration | 2 | 40.0% |
Computer network | 2 | 40.0% |
Electronic health record | 2 | 40.0% |
General Data Protection Regulation | 2 | 40.0% |
Information science | 2 | 40.0% |
Information technology management | 2 | 40.0% |
Internet | 2 | 40.0% |
Internet of things | 2 | 40.0% |
Mobile technology | 2 | 40.0% |
Operating system | 2 | 40.0% |
Procurement | 2 | 40.0% |
Research | 2 | 40.0% |
Telehealth | 2 | 40.0% |
Accessibility | 1 | 20.0% |
Act of Parliament (UK) | 1 | 20.0% |
Adoption | 1 | 20.0% |
AlphaGo | 1 | 20.0% |
Application programming interface | 1 | 20.0% |
Application security | 1 | 20.0% |
Architecture | 1 | 20.0% |
Artificial intelligence in healthcare | 1 | 20.0% |
Automation | 1 | 20.0% |
Best practice | 1 | 20.0% |
Bring your own device | 1 | 20.0% |
Business intelligence | 1 | 20.0% |
CCOW | 1 | 20.0% |
Chief information officer | 1 | 20.0% |
Clinical Document Architecture | 1 | 20.0% |
Clinical commissioning group | 1 | 20.0% |
Computer hardware | 1 | 20.0% |
Computer program | 1 | 20.0% |
Confidentiality | 1 | 20.0% |
Consent | 1 | 20.0% |
Continuous delivery | 1 | 20.0% |
Continuous integration | 1 | 20.0% |
Contract | 1 | 20.0% |
Copyright | 1 | 20.0% |
Cross Enterprise Document Sharing | 1 | 20.0% |
DICOM | 1 | 20.0% |
Dashboard (business) | 1 | 20.0% |
Data Protection Act 1998 | 1 | 20.0% |
Data center | 1 | 20.0% |
Data quality | 1 | 20.0% |
Data sharing | 1 | 20.0% |
Desktop computer | 1 | 20.0% |
Digital health | 1 | 20.0% |
Digital transformation | 1 | 20.0% |
Disability | 1 | 20.0% |
Document management system | 1 | 20.0% |
Domain name | 1 | 20.0% |
Domestic violence | 1 | 20.0% |
Due diligence | 1 | 20.0% |
Economic development | 1 | 20.0% |
Ecosystem | 1 | 20.0% |
Education | 1 | 20.0% |
Electronic prescribing | 1 | 20.0% |
Empathy | 1 | 20.0% |
Employment | 1 | 20.0% |
Encryption | 1 | 20.0% |
Ethics | 1 | 20.0% |
Evaluation | 1 | 20.0% |
Five Year Forward View | 1 | 20.0% |
Global Digital Exemplar | 1 | 20.0% |
Health Level 7 | 1 | 20.0% |
Health informatics | 1 | 20.0% |
Health information technology | 1 | 20.0% |
Help desk | 1 | 20.0% |
IT infrastructure | 1 | 20.0% |
Information and communications technology | 1 | 20.0% |
Information governance | 1 | 20.0% |
Information privacy | 1 | 20.0% |
Information security | 1 | 20.0% |
Infrastructure | 1 | 20.0% |
Innovation | 1 | 20.0% |
Intelligence | 1 | 20.0% |
Internet access | 1 | 20.0% |
Issues in ethics | 1 | 20.0% |
Kerberos (protocol) | 1 | 20.0% |
Laptop | 1 | 20.0% |
Learning | 1 | 20.0% |
Leeds | 1 | 20.0% |
Life-cycle assessment | 1 | 20.0% |
Login | 1 | 20.0% |
MHealth | 1 | 20.0% |
Machine learning | 1 | 20.0% |
Mammography | 1 | 20.0% |
Management | 1 | 20.0% |
Medical device | 1 | 20.0% |
Medical prescription | 1 | 20.0% |
Medical privacy | 1 | 20.0% |
Medical record | 1 | 20.0% |
Medication | 1 | 20.0% |
Medicine | 1 | 20.0% |
Mental health | 1 | 20.0% |
Metadata | 1 | 20.0% |
Microsoft Office | 1 | 20.0% |
Microsoft Windows | 1 | 20.0% |
Mobile app development | 1 | 20.0% |
Mobile device | 1 | 20.0% |
NHS foundation trust | 1 | 20.0% |
Office 365 | 1 | 20.0% |
Organization | 1 | 20.0% |
Patient | 1 | 20.0% |
Performance indicator | 1 | 20.0% |
Personal computer | 1 | 20.0% |
Personal data | 1 | 20.0% |
Personalized medicine | 1 | 20.0% |
Point of care | 1 | 20.0% |
Privacy Impact Assessment | 1 | 20.0% |
Privacy by design | 1 | 20.0% |
Privacy-enhancing technologies | 1 | 20.0% |
Project management | 1 | 20.0% |
Protection Profile | 1 | 20.0% |
Pseudonymization | 1 | 20.0% |
Public health | 1 | 20.0% |
Regulatory compliance | 1 | 20.0% |
Risk assessment | 1 | 20.0% |
Self-care | 1 | 20.0% |
Server (computing) | 1 | 20.0% |
SharePoint | 1 | 20.0% |
Smartphone | 1 | 20.0% |
Social work | 1 | 20.0% |
Software | 1 | 20.0% |
Sustainability | 1 | 20.0% |
System | 1 | 20.0% |
Technology roadmap | 1 | 20.0% |
Telecommuting | 1 | 20.0% |
Transparency (behavior) | 1 | 20.0% |
Unified communications | 1 | 20.0% |
Usability | 1 | 20.0% |
User (computing) | 1 | 20.0% |
Venture capital | 1 | 20.0% |
Windows 10 | 1 | 20.0% |
abs | rel | |
---|---|---|
Human activities | 3 | 100.0% |
Application software | 2 | 66.7% |
Cloud computing | 2 | 66.7% |
Computer hardware | 2 | 66.7% |
Computing | 2 | 66.7% |
Database | 2 | 66.7% |
Information | 2 | 66.7% |
Information technology | 2 | 66.7% |
Internet | 2 | 66.7% |
Password | 2 | 66.7% |
Software | 2 | 66.7% |
System | 2 | 66.7% |
Technology | 2 | 66.7% |
Usability | 2 | 66.7% |
World Wide Web | 2 | 66.7% |
API | 1 | 33.3% |
Abstraction (computer science) | 1 | 33.3% |
Access control | 1 | 33.3% |
Accessibility | 1 | 33.3% |
Active Directory | 1 | 33.3% |
Addendum | 1 | 33.3% |
Algorithm | 1 | 33.3% |
Aloysius Pang | 1 | 33.3% |
Application programming interface | 1 | 33.3% |
Architecture | 1 | 33.3% |
Artificial intelligence | 1 | 33.3% |
Assistive technology | 1 | 33.3% |
Authentication | 1 | 33.3% |
Automation | 1 | 33.3% |
Backup | 1 | 33.3% |
Bionix AFV | 1 | 33.3% |
Bit | 1 | 33.3% |
Breach of contract | 1 | 33.3% |
Business | 1 | 33.3% |
Business Process Model and Notation | 1 | 33.3% |
Business process | 1 | 33.3% |
Child care | 1 | 33.3% |
Clinical trial | 1 | 33.3% |
Closed captioning | 1 | 33.3% |
Code | 1 | 33.3% |
Collaboration | 1 | 33.3% |
Communication protocol | 1 | 33.3% |
Computer | 1 | 33.3% |
Computer data storage | 1 | 33.3% |
Computer engineering | 1 | 33.3% |
Computer file | 1 | 33.3% |
Computer network | 1 | 33.3% |
Computer programming | 1 | 33.3% |
Computer science | 1 | 33.3% |
Computer security | 1 | 33.3% |
Computers | 1 | 33.3% |
Conceptual model | 1 | 33.3% |
Conditional (computer programming) | 1 | 33.3% |
Conflict of interest | 1 | 33.3% |
Contract | 1 | 33.3% |
Control flow | 1 | 33.3% |
Copyright infringement | 1 | 33.3% |
Data | 1 | 33.3% |
Data analysis | 1 | 33.3% |
Data center | 1 | 33.3% |
Data migration | 1 | 33.3% |
Data model | 1 | 33.3% |
Data quality | 1 | 33.3% |
Data security | 1 | 33.3% |
Data transmission | 1 | 33.3% |
Design | 1 | 33.3% |
Discovery (law) | 1 | 33.3% |
Document | 1 | 33.3% |
Documentation | 1 | 33.3% |
Education | 1 | 33.3% |
Electronic assessment | 1 | 33.3% |
Embedded system | 1 | 33.3% |
Employment | 1 | 33.3% |
Encryption | 1 | 33.3% |
Environmental impact assessment | 1 | 33.3% |
Evaluation | 1 | 33.3% |
Financial statement | 1 | 33.3% |
Form (HTML) | 1 | 33.3% |
Freedom of Information Act (United States) | 1 | 33.3% |
GCE Advanced Level | 1 | 33.3% |
GCE Ordinary Level | 1 | 33.3% |
General Certificate of Education | 1 | 33.3% |
General contractor | 1 | 33.3% |
Government | 1 | 33.3% |
Graphical user interface | 1 | 33.3% |
Human–computer interaction | 1 | 33.3% |
Image scanner | 1 | 33.3% |
Incident management | 1 | 33.3% |
Information Age | 1 | 33.3% |
Information security | 1 | 33.3% |
Information technology management | 1 | 33.3% |
Informed consent | 1 | 33.3% |
Input/output | 1 | 33.3% |
Instruction set architecture | 1 | 33.3% |
Insurance | 1 | 33.3% |
Intellectual property | 1 | 33.3% |
Internet privacy | 1 | 33.3% |
Interoperability | 1 | 33.3% |
Joint venture | 1 | 33.3% |
Keyboard technology | 1 | 33.3% |
Laptop | 1 | 33.3% |
Lawsuit | 1 | 33.3% |
Library (computing) | 1 | 33.3% |
Making false statements | 1 | 33.3% |
Malware | 1 | 33.3% |
Management | 1 | 33.3% |
Mass media | 1 | 33.3% |
Metadata | 1 | 33.3% |
Mobile app | 1 | 33.3% |
Multi-factor authentication | 1 | 33.3% |
National service in Singapore | 1 | 33.3% |
Network topology | 1 | 33.3% |
Online and offline | 1 | 33.3% |
Online community | 1 | 33.3% |
Operating system | 1 | 33.3% |
Ownership | 1 | 33.3% |
1 | 33.3% | |
Patch (computing) | 1 | 33.3% |
Payment Card Industry Data Security Standard | 1 | 33.3% |
Phishing | 1 | 33.3% |
Physician | 1 | 33.3% |
Prediction | 1 | 33.3% |
Privacy | 1 | 33.3% |
Procurement | 1 | 33.3% |
Product lifecycle | 1 | 33.3% |
Professional certification | 1 | 33.3% |
Programming language | 1 | 33.3% |
Project management | 1 | 33.3% |
Prototype | 1 | 33.3% |
Publishing | 1 | 33.3% |
Quality assurance | 1 | 33.3% |
Recursion (computer science) | 1 | 33.3% |
Reliability engineering | 1 | 33.3% |
Request for proposal | 1 | 33.3% |
Requirement | 1 | 33.3% |
Risk | 1 | 33.3% |
Router (computing) | 1 | 33.3% |
Safari (web browser) | 1 | 33.3% |
Safety | 1 | 33.3% |
Sanitization (classified information) | 1 | 33.3% |
Science | 1 | 33.3% |
Security | 1 | 33.3% |
Sensor | 1 | 33.3% |
Sexual harassment | 1 | 33.3% |
Simulation | 1 | 33.3% |
Singapore-Cambridge GCE Ordinary Level | 1 | 33.3% |
Social media | 1 | 33.3% |
Software bug | 1 | 33.3% |
Software development | 1 | 33.3% |
Software engineering | 1 | 33.3% |
Software testing | 1 | 33.3% |
Sorting algorithm | 1 | 33.3% |
Specification (technical standard) | 1 | 33.3% |
Steganography | 1 | 33.3% |
Streaming media | 1 | 33.3% |
Subroutine | 1 | 33.3% |
Surgery | 1 | 33.3% |
Surveillance | 1 | 33.3% |
Test (assessment) | 1 | 33.3% |
Troubleshooting | 1 | 33.3% |
Unified Modeling Language | 1 | 33.3% |
User (computing) | 1 | 33.3% |
Video | 1 | 33.3% |
Visualization (graphics) | 1 | 33.3% |
Web application | 1 | 33.3% |
Web content | 1 | 33.3% |
Website | 1 | 33.3% |
abs | rel | |
---|---|---|
Privacy | 31 | 93.9% |
Technology | 31 | 93.9% |
Health | 28 | 84.8% |
COVID-19 pandemic | 27 | 81.8% |
Research | 25 | 75.8% |
Disease | 23 | 69.7% |
Infection | 23 | 69.7% |
Artificial intelligence | 19 | 57.6% |
Surveillance | 19 | 57.6% |
Human activities | 18 | 54.5% |
Contact tracing | 14 | 42.4% |
Coronavirus disease 2019 | 14 | 42.4% |
Health care | 14 | 42.4% |
Machine learning | 14 | 42.4% |
Public health | 14 | 42.4% |
Risk | 14 | 42.4% |
Governance | 13 | 39.4% |
Big data | 12 | 36.4% |
Information | 12 | 36.4% |
Mobile app | 12 | 36.4% |
COVID-19 | 11 | 33.3% |
Chatbot | 11 | 33.3% |
Facial recognition system | 11 | 33.3% |
Health sciences | 11 | 33.3% |
Transparency (behavior) | 11 | 33.3% |
COVID-19 apps | 10 | 30.3% |
CT scan | 10 | 30.3% |
Deep learning | 10 | 30.3% |
Digital contact tracing | 10 | 30.3% |
Electronic health record | 10 | 30.3% |
Hospital | 10 | 30.3% |
Law | 10 | 30.3% |
Medical diagnosis | 10 | 30.3% |
Medicine | 10 | 30.3% |
Analytics | 9 | 27.3% |
Automation | 9 | 27.3% |
Emerging technologies | 9 | 27.3% |
Ethics | 9 | 27.3% |
Ethics of artificial intelligence | 9 | 27.3% |
Innovation | 9 | 27.3% |
Intelligence | 9 | 27.3% |
Leadership | 9 | 27.3% |
Privacy law | 9 | 27.3% |
Radiology | 9 | 27.3% |
System | 9 | 27.3% |
TraceTogether | 9 | 27.3% |
Virus | 9 | 27.3% |
2019–20 coronavirus outbreak | 8 | 24.2% |
Accountability | 8 | 24.2% |
Adaptive learning | 8 | 24.2% |
Anhui | 8 | 24.2% |
Artificial intelligence in healthcare | 8 | 24.2% |
Bias | 8 | 24.2% |
Citizenship | 8 | 24.2% |
Cloud computing | 8 | 24.2% |
Collaboration | 8 | 24.2% |
Computer vision | 8 | 24.2% |
Coronavirus | 8 | 24.2% |
Creativity | 8 | 24.2% |
Credit | 8 | 24.2% |
Crime | 8 | 24.2% |
Critical thinking | 8 | 24.2% |
DNA sequencing | 8 | 24.2% |
Economic growth | 8 | 24.2% |
Economic inequality | 8 | 24.2% |
Economy | 8 | 24.2% |
Education | 8 | 24.2% |
Educational technology | 8 | 24.2% |
Experiment | 8 | 24.2% |
Institution | 8 | 24.2% |
Intelligent tutoring system | 8 | 24.2% |
Internet privacy | 8 | 24.2% |
Learning | 8 | 24.2% |
Medical imaging | 8 | 24.2% |
Medication | 8 | 24.2% |
Middle East respiratory syndrome | 8 | 24.2% |
Motivation | 8 | 24.2% |
National College Entrance Examination | 8 | 24.2% |
Natural language processing | 8 | 24.2% |
Predictive analytics | 8 | 24.2% |
Research and development | 8 | 24.2% |
Retina | 8 | 24.2% |
Sensitivity and specificity | 8 | 24.2% |
Severe acute respiratory syndrome | 8 | 24.2% |
Smart city | 8 | 24.2% |
Startup company | 8 | 24.2% |
Teacher | 8 | 24.2% |
Telehealth | 8 | 24.2% |
Tutor | 8 | 24.2% |
Watson (computer) | 8 | 24.2% |
BlueTrace | 7 | 21.2% |
Branches of science | 7 | 21.2% |
Decentralized Privacy-Preserving Proximity Tracing | 7 | 21.2% |
Health equity | 7 | 21.2% |
Information privacy | 6 | 18.2% |
Pandemic | 6 | 18.2% |
Personal data | 6 | 18.2% |
Bluetooth | 5 | 15.2% |
Computing | 5 | 15.2% |
Exposure Notification | 5 | 15.2% |
General Data Protection Regulation | 5 | 15.2% |
Policy | 5 | 15.2% |
Social distancing | 5 | 15.2% |
Computer security | 4 | 12.1% |
Government | 4 | 12.1% |
Politics | 4 | 12.1% |
Smartphone | 4 | 12.1% |
Social media | 4 | 12.1% |
Application software | 3 | 9.1% |
Encryption | 3 | 9.1% |
Epidemiology | 3 | 9.1% |
Mobile phone | 3 | 9.1% |
Public health surveillance | 3 | 9.1% |
Public sphere | 3 | 9.1% |
Applied ethics | 2 | 6.1% |
Automated decision-making | 2 | 6.1% |
Business | 2 | 6.1% |
COVID-19 testing | 2 | 6.1% |
Computer programming | 2 | 6.1% |
Cyberwarfare | 2 | 6.1% |
Data | 2 | 6.1% |
Data re-identification | 2 | 6.1% |
Deliberation | 2 | 6.1% |
Evaluation | 2 | 6.1% |
Information Age | 2 | 6.1% |
Information security | 2 | 6.1% |
Information technology | 2 | 6.1% |
Issues in ethics | 2 | 6.1% |
Management | 2 | 6.1% |
Mobile phone tracking | 2 | 6.1% |
PathCheck | 2 | 6.1% |
QR code | 2 | 6.1% |
Quarantine | 2 | 6.1% |
Regulatory compliance | 2 | 6.1% |
Reliability engineering | 2 | 6.1% |
Science | 2 | 6.1% |
Severe acute respiratory syndrome coronavirus 2 | 2 | 6.1% |
Software | 2 | 6.1% |
Training, validation, and test sets | 2 | 6.1% |
2019–20 coronavirus pandemic | 1 | 3.0% |
Aadhaar | 1 | 3.0% |
Accessibility | 1 | 3.0% |
Americas | 1 | 3.0% |
Android (operating system) | 1 | 3.0% |
Antiviral drug | 1 | 3.0% |
Asymptomatic carrier | 1 | 3.0% |
Authentication | 1 | 3.0% |
Bioinformatics | 1 | 3.0% |
Budget | 1 | 3.0% |
COVID-19 misinformation | 1 | 3.0% |
Cell site | 1 | 3.0% |
Chief information officer | 1 | 3.0% |
Chief privacy officer | 1 | 3.0% |
Climate change mitigation | 1 | 3.0% |
Clinical trial | 1 | 3.0% |
Commercial off-the-shelf | 1 | 3.0% |
Communication | 1 | 3.0% |
Community | 1 | 3.0% |
Computer data storage | 1 | 3.0% |
Computer engineering | 1 | 3.0% |
Computer network | 1 | 3.0% |
Computer science | 1 | 3.0% |
Configuration management | 1 | 3.0% |
Consent | 1 | 3.0% |
Crime prevention | 1 | 3.0% |
Cyberattack | 1 | 3.0% |
Data analysis | 1 | 3.0% |
Data retention | 1 | 3.0% |
DevOps | 1 | 3.0% |
Digital data | 1 | 3.0% |
Digital electronics | 1 | 3.0% |
Discrimination | 1 | 3.0% |
Disease surveillance | 1 | 3.0% |
Documentation | 1 | 3.0% |
Drug discovery | 1 | 3.0% |
Efficient energy use | 1 | 3.0% |
End user | 1 | 3.0% |
Epidemic | 1 | 3.0% |
European Convention on Human Rights | 1 | 3.0% |
Evidence-based medicine | 1 | 3.0% |
Expert | 1 | 3.0% |
Federal Information Technology Acquisition Reform Act | 1 | 3.0% |
Fine (penalty) | 1 | 3.0% |
FluView | 1 | 3.0% |
Forecasting | 1 | 3.0% |
Fundamental rights | 1 | 3.0% |
GISAID | 1 | 3.0% |
Genetics | 1 | 3.0% |
Global Positioning System | 1 | 3.0% |
Graphical user interface | 1 | 3.0% |
HTTP cookie | 1 | 3.0% |
Health Information Technology for Economic and Clinical Health Act | 1 | 3.0% |
Health Insurance Portability and Accountability Act | 1 | 3.0% |
Health crisis | 1 | 3.0% |
Health information technology | 1 | 3.0% |
Health system | 1 | 3.0% |
Human resource management | 1 | 3.0% |
Human rights | 1 | 3.0% |
Human-centered design | 1 | 3.0% |
IOS | 1 | 3.0% |
ISO 13485 | 1 | 3.0% |
Influenza | 1 | 3.0% |
Infodemic | 1 | 3.0% |
Information and communications technology | 1 | 3.0% |
Information technology management | 1 | 3.0% |
Informed consent | 1 | 3.0% |
Input/output | 1 | 3.0% |
Intensive care unit | 1 | 3.0% |
Internet of things | 1 | 3.0% |
Interoperability | 1 | 3.0% |
Latin America | 1 | 3.0% |
Legacy system | 1 | 3.0% |
Legal professional privilege | 1 | 3.0% |
Legislation | 1 | 3.0% |
License | 1 | 3.0% |
Life-cycle assessment | 1 | 3.0% |
Low-carbon economy | 1 | 3.0% |
MHealth | 1 | 3.0% |
Medicaid | 1 | 3.0% |
Medical device | 1 | 3.0% |
Medical guideline | 1 | 3.0% |
Medical privacy | 1 | 3.0% |
Medicare (United States) | 1 | 3.0% |
Mortality displacement | 1 | 3.0% |
National security | 1 | 3.0% |
Old age | 1 | 3.0% |
Organization | 1 | 3.0% |
Patch (computing) | 1 | 3.0% |
Patient safety | 1 | 3.0% |
Physician | 1 | 3.0% |
Picture archiving and communication system | 1 | 3.0% |
Poverty | 1 | 3.0% |
Privacy policy | 1 | 3.0% |
Procurement | 1 | 3.0% |
Product lifecycle | 1 | 3.0% |
Pseudonymization | 1 | 3.0% |
Public policy | 1 | 3.0% |
Quality (business) | 1 | 3.0% |
Quality management | 1 | 3.0% |
Quality management system | 1 | 3.0% |
Radiography | 1 | 3.0% |
Ransomware | 1 | 3.0% |
Regulation | 1 | 3.0% |
Requirement | 1 | 3.0% |
Right to privacy | 1 | 3.0% |
Rights | 1 | 3.0% |
Risk management | 1 | 3.0% |
Robot | 1 | 3.0% |
Safety | 1 | 3.0% |
Security | 1 | 3.0% |
Self-driving car | 1 | 3.0% |
Social exclusion | 1 | 3.0% |
Societal racism | 1 | 3.0% |
Society | 1 | 3.0% |
Software bug | 1 | 3.0% |
Software engineering | 1 | 3.0% |
Software verification and validation | 1 | 3.0% |
Specification (technical standard) | 1 | 3.0% |
Statistics | 1 | 3.0% |
Sustainability | 1 | 3.0% |
Systems engineering | 1 | 3.0% |
Systems science | 1 | 3.0% |
TCN Protocol | 1 | 3.0% |
Traceability | 1 | 3.0% |
Transmission (medicine) | 1 | 3.0% |
Trust (social science) | 1 | 3.0% |
Verification and validation | 1 | 3.0% |
Videotelephony | 1 | 3.0% |
Vulnerability (computing) | 1 | 3.0% |
Wearable technology | 1 | 3.0% |
Wi-Fi | 1 | 3.0% |
abs | rel | |
---|---|---|
Health | 18 | 100.0% |
Human activities | 16 | 88.9% |
Privacy | 16 | 88.9% |
Artificial intelligence | 15 | 83.3% |
Policy | 15 | 83.3% |
Technology | 15 | 83.3% |
Governance | 14 | 77.8% |
Research | 14 | 77.8% |
Innovation | 13 | 72.2% |
Computing | 12 | 66.7% |
General Data Protection Regulation | 12 | 66.7% |
Infrastructure | 12 | 66.7% |
Personal data | 12 | 66.7% |
Politics | 12 | 66.7% |
Risk | 12 | 66.7% |
Science | 12 | 66.7% |
Information security | 11 | 61.1% |
Trust (social science) | 11 | 61.1% |
Computer security | 10 | 55.6% |
Information Age | 10 | 55.6% |
Information privacy | 10 | 55.6% |
Autonomous robot | 9 | 50.0% |
Climate resilience | 9 | 50.0% |
Collaboration | 9 | 50.0% |
Cyberattack | 9 | 50.0% |
Data security | 9 | 50.0% |
Digital economy | 9 | 50.0% |
Economy | 9 | 50.0% |
Emerging technologies | 9 | 50.0% |
Federal Information Security Management Act of 2002 | 9 | 50.0% |
Government | 9 | 50.0% |
Health Insurance Portability and Accountability Act | 9 | 50.0% |
Information privacy law | 9 | 50.0% |
Information science | 9 | 50.0% |
Internet | 9 | 50.0% |
Internet of things | 9 | 50.0% |
Leadership | 9 | 50.0% |
National security | 9 | 50.0% |
Privacy law | 9 | 50.0% |
Regulatory compliance | 9 | 50.0% |
Science, technology, engineering, and mathematics | 9 | 50.0% |
Security | 9 | 50.0% |
Supply chain | 9 | 50.0% |
Surveillance | 9 | 50.0% |
Vulnerability (computing) | 9 | 50.0% |
COVID-19 pandemic | 7 | 38.9% |
Issues in ethics | 7 | 38.9% |
Mobile app | 6 | 33.3% |
Branches of science | 5 | 27.8% |
Data | 5 | 27.8% |
Information | 5 | 27.8% |
Public health | 5 | 27.8% |
Analytics | 4 | 22.2% |
Data sharing | 4 | 22.2% |
Health care | 4 | 22.2% |
Infection | 4 | 22.2% |
Machine learning | 4 | 22.2% |
COVID-19 apps | 3 | 16.7% |
COVID-19 pandemic in the United Kingdom | 3 | 16.7% |
Data science | 3 | 16.7% |
Database | 3 | 16.7% |
Disease | 3 | 16.7% |
Health sciences | 3 | 16.7% |
Hospital | 3 | 16.7% |
NHS foundation trust | 3 | 16.7% |
Pandemic | 3 | 16.7% |
Severe acute respiratory syndrome coronavirus 2 | 3 | 16.7% |
Social media | 3 | 16.7% |
Statistics | 3 | 16.7% |
Applied ethics | 2 | 11.1% |
Attitude (psychology) | 2 | 11.1% |
CE marking | 2 | 11.1% |
COVID-19 testing | 2 | 11.1% |
CT scan | 2 | 11.1% |
Closed-circuit television | 2 | 11.1% |
Contact tracing | 2 | 11.1% |
Dependent and independent variables | 2 | 11.1% |
Emergency department | 2 | 11.1% |
Expert | 2 | 11.1% |
HTTP cookie | 2 | 11.1% |
Health data | 2 | 11.1% |
Market segmentation | 2 | 11.1% |
Medicine | 2 | 11.1% |
Metadata | 2 | 11.1% |
NHS Test and Trace | 2 | 11.1% |
News | 2 | 11.1% |
Newspaper | 2 | 11.1% |
Ordinal data | 2 | 11.1% |
Psychological resilience | 2 | 11.1% |
Public opinion | 2 | 11.1% |
Regression analysis | 2 | 11.1% |
Rights | 2 | 11.1% |
Smart city | 2 | 11.1% |
Social distancing | 2 | 11.1% |
Tabloid (newspaper format) | 2 | 11.1% |
Traffic | 2 | 11.1% |
Transport | 2 | 11.1% |
Triage | 2 | 11.1% |
Wearable technology | 2 | 11.1% |
API | 1 | 5.6% |
Active Directory | 1 | 5.6% |
Ada Lovelace | 1 | 5.6% |
Advanced Message Queuing Protocol | 1 | 5.6% |
Agile software development | 1 | 5.6% |
Apache Kafka | 1 | 5.6% |
Attention | 1 | 5.6% |
Attribute-based access control | 1 | 5.6% |
Automation | 1 | 5.6% |
Autonomy | 1 | 5.6% |
Big data | 1 | 5.6% |
Business | 1 | 5.6% |
COVID-19 | 1 | 5.6% |
Charitable organization | 1 | 5.6% |
Cloud computing | 1 | 5.6% |
Cognition | 1 | 5.6% |
Communication | 1 | 5.6% |
Community | 1 | 5.6% |
Computer science | 1 | 5.6% |
Coronavirus | 1 | 5.6% |
Coronavirus disease 2019 | 1 | 5.6% |
Creative Commons license | 1 | 5.6% |
Data analysis | 1 | 5.6% |
Digital health | 1 | 5.6% |
EHealth | 1 | 5.6% |
Electronic health record | 1 | 5.6% |
Employment | 1 | 5.6% |
Epidemic | 1 | 5.6% |
Ethics | 1 | 5.6% |
Evaluation | 1 | 5.6% |
Exposure Notification | 1 | 5.6% |
Global health | 1 | 5.6% |
Health equity | 1 | 5.6% |
Health professional | 1 | 5.6% |
Health system | 1 | 5.6% |
Human rights | 1 | 5.6% |
Information technology | 1 | 5.6% |
Information technology management | 1 | 5.6% |
Intelligence | 1 | 5.6% |
Interdisciplinarity | 1 | 5.6% |
Interoperability | 1 | 5.6% |
Latency (engineering) | 1 | 5.6% |
Market (economics) | 1 | 5.6% |
Microsoft Azure | 1 | 5.6% |
Misinformation | 1 | 5.6% |
Multicast | 1 | 5.6% |
Null (SQL) | 1 | 5.6% |
Public Health Emergency of International Concern | 1 | 5.6% |
Publish–subscribe pattern | 1 | 5.6% |
Racialization | 1 | 5.6% |
Real-time computing | 1 | 5.6% |
Reason | 1 | 5.6% |
Representational state transfer | 1 | 5.6% |
SWOT analysis | 1 | 5.6% |
Scientific method | 1 | 5.6% |
Server (computing) | 1 | 5.6% |
Social determinants of health | 1 | 5.6% |
Social exclusion | 1 | 5.6% |
Social issues | 1 | 5.6% |
Streaming media | 1 | 5.6% |
Survey methodology | 1 | 5.6% |
Sustainability | 1 | 5.6% |
Transparency (behavior) | 1 | 5.6% |
Type 2 diabetes | 1 | 5.6% |
Use case | 1 | 5.6% |
Vaccine | 1 | 5.6% |
Volunteering | 1 | 5.6% |
Web application | 1 | 5.6% |
abs | rel | |
---|---|---|
COVID-19 pandemic | 4 | 100.0% |
Health | 4 | 100.0% |
Health care | 3 | 75.0% |
Risk | 3 | 75.0% |
Accountability | 2 | 50.0% |
Branches of science | 2 | 50.0% |
General Data Protection Regulation | 2 | 50.0% |
Governance | 2 | 50.0% |
Health data | 2 | 50.0% |
Health sciences | 2 | 50.0% |
Issues in ethics | 2 | 50.0% |
Pandemic | 2 | 50.0% |
Public health | 2 | 50.0% |
Public policy | 2 | 50.0% |
Research | 2 | 50.0% |
Technology | 2 | 50.0% |
Vaccine | 2 | 50.0% |
Algorithm | 1 | 25.0% |
Americas | 1 | 25.0% |
Artificial intelligence | 1 | 25.0% |
Audit | 1 | 25.0% |
Bank | 1 | 25.0% |
COVID passports in the United Kingdom | 1 | 25.0% |
COVID-19 | 1 | 25.0% |
COVID-19 vaccine | 1 | 25.0% |
Confidentiality | 1 | 25.0% |
Consent | 1 | 25.0% |
DNA sequencing | 1 | 25.0% |
Data | 1 | 25.0% |
Data Protection Act 1998 | 1 | 25.0% |
Data science | 1 | 25.0% |
Digital contact tracing | 1 | 25.0% |
Disease | 1 | 25.0% |
End-of-life care | 1 | 25.0% |
Epidemiology | 1 | 25.0% |
GISAID | 1 | 25.0% |
General practice | 1 | 25.0% |
Government | 1 | 25.0% |
Hospital | 1 | 25.0% |
Human activities | 1 | 25.0% |
Information | 1 | 25.0% |
Information privacy | 1 | 25.0% |
Innovation | 1 | 25.0% |
Jury | 1 | 25.0% |
Machine learning | 1 | 25.0% |
Meta-analysis | 1 | 25.0% |
Patient | 1 | 25.0% |
Personal data | 1 | 25.0% |
Policy | 1 | 25.0% |
Politics | 1 | 25.0% |
Privacy | 1 | 25.0% |
Procurement | 1 | 25.0% |
Public engagement | 1 | 25.0% |
Qualitative research | 1 | 25.0% |
SARS-CoV-2 Omicron variant | 1 | 25.0% |
Severe acute respiratory syndrome coronavirus 2 | 1 | 25.0% |
Social inequality | 1 | 25.0% |
System | 1 | 25.0% |
Transparency (behavior) | 1 | 25.0% |
Trust (social science) | 1 | 25.0% |
Vaccine passports during the COVID-19 pandemic | 1 | 25.0% |
Variants of SARS-CoV-2 | 1 | 25.0% |
abs | rel | |
---|---|---|
Applied ethics | 1 | 100.0% |
COVID-19 apps | 1 | 100.0% |
COVID-19 pandemic | 1 | 100.0% |
Civil liberties | 1 | 100.0% |
Contact tracing | 1 | 100.0% |
Decentralized Privacy-Preserving Proximity Tracing | 1 | 100.0% |
Digital divide | 1 | 100.0% |
EHealth | 1 | 100.0% |
Emergency | 1 | 100.0% |
Europe | 1 | 100.0% |
General Data Protection Regulation | 1 | 100.0% |
Government | 1 | 100.0% |
Human activities | 1 | 100.0% |
Information | 1 | 100.0% |
Information privacy | 1 | 100.0% |
Interoperability | 1 | 100.0% |
Issues in ethics | 1 | 100.0% |
Justice | 1 | 100.0% |
Mass surveillance | 1 | 100.0% |
Mobile app | 1 | 100.0% |
Non-governmental organization | 1 | 100.0% |
Pandemic | 1 | 100.0% |
Policy | 1 | 100.0% |
Politics | 1 | 100.0% |
Privacy | 1 | 100.0% |
Privacy by design | 1 | 100.0% |
Public sphere | 1 | 100.0% |
Research | 1 | 100.0% |
Surveillance | 1 | 100.0% |
Technology | 1 | 100.0% |
Transparency (behavior) | 1 | 100.0% |