Showing 781 - 800 results of 2,784 for search '"\"((((\"uses OR \\"useddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.21s Refine Results
  1. 781

    Chatbots in medicine: certification process and applied use case by Mayssam Nehme, Franck Schneider, Esther Amruthalingam, Elio Schnarrenberger, Raphaël Trëmeaud, Idris Guessous

    Published 2024-10-01
    “…However, their application in medicine and healthcare has been limited due to concerns over data privacy, ther risk of providing medical diagnoses, and ensuring regulatory and legal compliance. …”
    Get full text
    Article
  2. 782

    Patient Perspective on Use of an Interactive Website for Sleep Apnea by Carl Stepnowsky, Christine Edwards, Tania Zamora, Robert Barker, Zia Agha

    Published 2013-01-01
    “…The goal of this paper is to report on CPAP adherence, internet use, privacy concerns and user satisfaction in using the website. …”
    Get full text
    Article
  3. 783

    Exploring assessment methods used by Grade Four English First Additional Language Teachers by Kofi Nkonkonya Mpuangnan, Gladys Phumzile Mngomezulu, Samantha Govender

    Published 2024-06-01
    “…The researchers opted for a thematic analysis approach, allowing for a thorough examination of the data while respecting the privacy and confidentiality of the participants. …”
    Get full text
    Article
  4. 784

    Artificial intelligence methods used in various aquaculture applications: A systematic literature review by Thurein Aung, Rafiza Abdul Razak, Adibi Rahiman Bin Md Nor

    Published 2025-02-01
    “…However, the review also uncovered substantial challenges that will continue limiting widespread adoption, including restricted access to representative data, prohibitive expenses, technical complexities, lack of social acceptance, and data privacy and security concerns. …”
    Get full text
    Article
  5. 785

    Investigating Sensitive Issues in Class Through Randomized Response Polling by Christian Genest, James A. Hanley, Sahir R. Bhatnagar

    Published 2024-10-01
    “…This article provides an introduction to randomized response polling, a technique which was designed to allow for questioning on sensitive issues while protecting the respondent’s privacy and avoiding social desirability bias. It is described in terms that are suitable for presentation and use in any classroom environment. …”
    Get full text
    Article
  6. 786

    Employing Ontology-Alignment and Locality-Sensitive Hashing to Improve Attribute Interoperability in Federated eID Systems by Walter Priesnitz Filho, Carlos Ribeiro, Thomas Zefferer

    Published 2016-10-01
    “…Furthermore, providing attributes to intermediate entities required to align and aggregate attributes potentially violates privacy rules. To tackle these problems, we propose the use of combined ontology-alignment (OA) approaches and locality-sensitive hashing (LSH) functions. …”
    Get full text
    Article
  7. 787

    ‘Over Time Everyone’s Gonna Be Open to It’: User Attitudes Toward Security and Privacy in Continuous Authentication for Smart Homes by Heting Wang, Yu-Peng Chen, Dinank Bista, Rodrigo Calvo, Niriksha Regmi, Xuanpu Zhang, Tempestt Neal, Jaime Ruiz, Lisa Anthony

    Published 2025-01-01
    “…Participants also envisioned CA systems that offer more granular permission controls over personal data. Our findings indicate the contextual dependencies in balancing usability with privacy and security concerns. …”
    Get full text
    Article
  8. 788

    Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain by Ahmad M. Almasabi, Ahmad B. Alkhodre, Maher Khemakhem, Fathy Eassa, Adnan Ahmed Abi Sen, Ahmed Harbaoui

    Published 2025-05-01
    “…In this study, we applied the proposed simulation to the proposed hybrid framework, making use of deep learning to continue monitoring IoT data; we also used the blockchain association in the framework to log, tackle, manage, and document all of the IoT sensor’s data points. …”
    Get full text
    Article
  9. 789

    Dual verifiable cloud storage scheme based on blockchain by Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher

    Published 2021-12-01
    “…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
    Get full text
    Article
  10. 790

    Trust and Privacy Concerns Among Cancer Survivors Who Did Not Visit a Research Website Offering Free Genetic Counseling Services for Families: Survey Study by James A Shepperd, Colleen M McBride, Weihua An, Jingsong Zhao, Rebecca D Pentz, Cam Escoffery, Kevin Ward, Yue Guan

    Published 2025-05-01
    “…The survey was brief and contained 27 items, including recall of the invitation, interest in ovarian cancer information, benefits of using health websites, trust in health websites, and trust in university-based health research. …”
    Get full text
    Article
  11. 791

    Secure vehicular digital forensics system based on blockchain by Meng LI, Chengxiang SI, Liehuang ZHU

    Published 2020-06-01
    “…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
    Get full text
    Article
  12. 792

    Secure vehicular digital forensics system based on blockchain by Meng LI, Chengxiang SI, Liehuang ZHU

    Published 2020-06-01
    “…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
    Get full text
    Article
  13. 793

    Big data transfer service architecture for cloud data centers: problems, methods, applications, and future trends by Muhammad Umar Majigi, Ismaila Idris, Shafi’i Muhammad Abdulhamid, Richard A. Ikuesan

    Published 2025-08-01
    “…After thoroughly screening selected peer-reviewed articles, the primary open issues are: incorporating a data placement module in the data transfer service, providing end-to-end safeguards for packet delivery, improving data transfer time and speed, minimizing costs and implementation overhead, ensuring secure data transfer between servers in the cloud, demonstrating effective big data transfer architectures, considering topology-specific extensions to reduce the busty nature of data centers, and enhancing data transfer services using machine learning algorithms during upload and download operations. …”
    Get full text
    Article
  14. 794
  15. 795

    Evaluation of Adblock Software Usage by Anna Sołtysik-Piorunkiewicz, Artur Strzelecki, Edyta Abramek

    Published 2019-12-01
    “…The study was based on data obtained by a web questionnaire. The research was focused on evaluation of adblocking software usage factors in five categories: (1) gender, age, and education; (2) use of advertising and sources of knowledge about advertising; (3) technical and social reasons for blocking online advertisements; (4) usage of an adblock-wall; and (5) type of online advertisement. …”
    Get full text
    Article
  16. 796

    Federated learning-based semantic segmentation framework for sustainable development by Deepthi Godavarthi, Deepa Jose, Sachi Nandan Mohanty, Mohamed Medani, Mohamed Kallel, Sherzod Abdullaev, M. Ijaz Khan

    Published 2025-06-01
    “…Federated Learning protects user privacy by processing data locally on client devices rather than storing it centrally on a server. …”
    Get full text
    Article
  17. 797

    LightLSB: a lightweight secure transmission mechanism for large-scale biometric images in computing limited environment by ZHANG Denghui, SHEN Shengshang, YAO Jiefeng, LI Mohan, LI Aiping

    Published 2025-04-01
    “…The widespread use of biometric recognition has intensified social concerns about personal privacy disclosure. …”
    Get full text
    Article
  18. 798

    Deconstructing Bentham’s Panopticon: The New Metaphors of Surveillance in the Web 2.0 Environment by Manuela Farinosi

    Published 2011-02-01
    “…The attention is focused on the metaphors used to describe online platforms and on the social environments they mention when they speak about the impacts of online diffusion of personal content on offline life. …”
    Get full text
    Article
  19. 799

    User Centric Android Application Permission Manager by Belal Amro, Zaid Abu Znaid

    Published 2021-12-01
    “…Like other systems, mobile devices are prune to different attacks that might invade user’s privacy and lead to private data leakage. Millions of Mobile application have been developed and used Worldwide, most of them are requiring permissions to work properly. …”
    Get full text
    Article
  20. 800