Showing 2,261 - 2,280 results of 2,784 for search '"\"((((\"uses OR \\"useddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.18s Refine Results
  1. 2261

    Dynamics of Robo-Advisory Financial Services in Saudi Arabia by Heba Gazzaz

    Published 2025-06-01
    “…The key limitations of adopting Robo-advisory services include algorithmic bias, a lack of trust and transparency, legal and regulatory issues, privacy and data security concerns, and limited financial literacy. …”
    Get full text
    Article
  2. 2262

    Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Han-Chieh Chao

    Published 2024-11-01
    “…Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.…”
    Get full text
    Article
  3. 2263

    Exploring the potential of GenAI for personalised English teaching: Learners' experiences and perceptions by Lucas Kohnke, Di Zou, Fan Su

    Published 2025-06-01
    “…Our results underscore the need for professional development for educators and the establishment of guidelines to address academic integrity and data privacy.…”
    Get full text
    Article
  4. 2264

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  5. 2265

    Pooled Rideshare in the U.S.: An Exploratory Study of User Preferences by Rakesh Gangadharaiah, Johnell Brooks, Lisa Boor, Kristin Kolodge, Haotian Su, Yunyi Jia

    Published 2025-05-01
    “…The study incorporated 77 actionable items developed from the results of the 2021 survey to assess whether addressing specific user-generated topics such as safety, reliability, convenience, and privacy can improve pooled rideshare use. A side-by-side comparison of the 2021 and 2025 data revealed shifts in transportation behavior, with personal rideshare usage increasing from 22% to 28%, public transportation from 21% to 27%, and pooled rideshare from 6% to 8%, while personal vehicle (79%) use remained dominant. …”
    Get full text
    Article
  6. 2266

    Towards AI-Powered Applications: The Development of a Personalised LLM for HRI and HCI by Khashayar Ghamati, Maryam Banitalebi Dehkordi, Abolfazl Zaraki

    Published 2025-03-01
    “…Furthermore, this study engages with the broader ethical dimensions of PLLM, critically discussing issues of generalisability and data privacy concerns in AI research. Our findings demonstrate the usability of using the PLLM in a human–robot interaction scenario in real-world settings, highlighting its applicability across diverse domains, including healthcare, education, and assistive technologies. …”
    Get full text
    Article
  7. 2267

    Role of digital technology in epidemic control: a scoping review on COVID-19 and Ebola by Amanuel Adugna, Gossa Fetene Abebe, Desalegn Girma, Melsew Setegn Alie, Tewodros Yosef, Daniel Asmelash, Dorka Dessalegn

    Published 2025-01-01
    “…Five main themes emerged: digital epidemiological surveillance (using data visualisation tools and online sources for early disease detection), rapid case identification, community transmission prevention (via digital contact tracing and assessing interventions with mobility data), public education messages and clinical care. …”
    Get full text
    Article
  8. 2268

    Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks by ALEKSANDAR JEVREMOVIC, Zona Kostic, Ivan Chorbev, Dragan Perakovic, Andrii Shalaginov, Ivan Cvitic

    Published 2025-01-01
    “…The ability to process data locally using complex algorithms is becoming increasingly important in Internet of Things (IoT) contexts. …”
    Get full text
    Article
  9. 2269

    Revolutionizing e-health: the transformative role of AI-powered hybrid chatbots in healthcare solutions by Jack Ng Kok Wah

    Published 2025-02-01
    “…After screening 116 studies, 29 met the criteria for inclusion. Data was extracted using a structured template, capturing study objectives, methodologies, findings, and challenges. …”
    Get full text
    Article
  10. 2270

    Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis by Lana V Ivanitskaya, Dimitrios Zikos, Elina Erzikova

    Published 2025-06-01
    “…Researchers’ concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. …”
    Get full text
    Article
  11. 2271

    Mobile Apps and Wearable Devices for Cardiovascular Health: Narrative Review by Gauri Kumari Chauhan, Patrick Vavken, Christine Jacob

    Published 2025-04-01
    “…While 20% (4/20) of the included apps had clinical integration features such as clinician dashboards, only 10% (2/20) had the potential to effectively enhance clinician workflows. Privacy policies were present in 95% (19/20) of the apps, with 75% (15/20) adhering to General Data Protection Regulation (GDPR) regulations; 1 app had no data protection policy. …”
    Get full text
    Article
  12. 2272

    Healthcare professionals’ perspectives on artificial intelligence (AI)-based mobile applications (apps) for diabetes education and behavioural management by Phei-Ching Lim, Yung-Wey Chong, Qiu-Ting Chie, Hadzliana Zainal, Kok-Lim Alvin Yau, Soo-Huat Teoh

    Published 2025-03-01
    “…However, significant concerns were raised about accessibility for older adults, data privacy, and the apps’ ability to modify entrenched behaviours without human intervention. …”
    Get full text
    Article
  13. 2273

    Redefining Urban Traffic Dynamics With TCN-FL Driven Traffic Prediction and Control Strategies by K. M. Karthick Raghunath, C. Rohith Bhat, Venkatesan Vinoth Kumar, Velmurugan Athiyoor Kannan, T. R. Mahesh, K. Manikandan, N. Krishnamoorthy

    Published 2024-01-01
    “…The system guarantees data privacy and utilizes decentralized information analysis using Federated Learning. …”
    Get full text
    Article
  14. 2274

    Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3 by Merryana Lestari, Hindriyanto Dwi Purnomo, Irwan Sembiring

    Published 2021-10-01
    “…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
    Get full text
    Article
  15. 2275

    Generative Artificial Intelligence Tools in Medical Research (GAMER): Protocol for a Scoping Review and Development of Reporting Guidelines by Xufei Luo, Yih Chung Tham, Mohammad Daher, Zhaoxiang Bian, Yaolong Chen, Janne Estill

    Published 2025-08-01
    “…However, the increasing use of GenAI tools in medical research presents challenges, including ethical concerns, data privacy issues, and the potential for generating false content. …”
    Get full text
    Article
  16. 2276

    Barriers to access to care in the implementation of telemedicine in public hospitals in Southern Ethiopia: A phenomenological qualitative study. by Getachew Nigussie Bolado, Bizuayehu Atinafu Ataro, Christian Kebede Gadabo, Tamirat Ersino Kebamo, Worku Mimanu Minuta, Abenezer Duta Wolde

    Published 2025-01-01
    “…The data analysis was conducted using OpenCode 4.02 software, and a content thematic analysis was executed following Colaizzi's 7-step method.…”
    Get full text
    Article
  17. 2277

    Human centered design of AI-powered Digital Therapeutics for stress prevention: Perspectives from multi-stakeholders' workshops about the SHIVA solution by Marco Bolpagni, Susanna Pardini, Silvia Gabrielli

    Published 2024-12-01
    “…Results: Stakeholders perceived AI-based data processing as beneficial for personalized treatment in a secure, privacy-preserving environment. …”
    Get full text
    Article
  18. 2278

    Analyzing the trend of government support for cloud computing usage in e-government architecture by Muhammad Younus, Eko Priyo Purnomo, Achmad Nurmandi, Dyah Mutiarin, Halimah Abdul Manaf, Fathiya Mumtaz, Tiara Khairunnisa

    Published 2025-02-01
    “…Overall, challenges persist, spanning from concerns regarding data safekeeping and privacy, but it also signifies a strategic transition towards harnessing digital technologies to provide more agile, citizen-focused public services.…”
    Get full text
    Article
  19. 2279

    Bi-Modal Multiperspective Percussive (BiMP) Dataset for Visual and Audio Human Fall Detection by Joe Dibble, Michael C. F. Bazzocchi

    Published 2025-01-01
    “…Typical fall detection systems classify a fall event using either inertial- or vision-based data. Aside from these two modes of input for fall detection, sparse human fall audio data is available. …”
    Get full text
    Article
  20. 2280

    A personalized federated learning approach to enhance joint modeling for heterogeneous medical institutions by Hong Ye, Xiangzhou Zhang, Kang Liu, Ziyuan Liu, Weiqi Chen, Bo Liu, Eric WT Ngai, Yong Hu

    Published 2025-07-01
    “…Background Federated Learning (FL) offers a privacy-preserving solution for multi-party data collaboration in smart healthcare. …”
    Get full text
    Article