Showing 841 - 860 results of 2,784 for search '"\"((((\"uses OR \\"useddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.22s Refine Results
  1. 841

    Based on model randomization and adaptive defense for federated learning schemes by Gaofeng Yue, Xiaowei Han

    Published 2025-02-01
    “…Abstract Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data. …”
    Get full text
    Article
  2. 842
  3. 843

    Medical data sharing and synthetic clinical data generation – maximizing biomedical resource utilization and minimizing participant re-identification risks by Simeone Marino, Ruth Cassidy, Joseph Nanni, Yuxuan Wang, Yipeng Liu, Mingyi Tang, Yuan Yuan, Toby Chen, Anik Sinha, Balaji Pandian, Ivo D. Dinov, Michael L. Burns

    Published 2025-08-01
    “…This article introduces an end-to-end, titratable pipeline that generates privacy-preserving “digital twin” datasets from complex EHR and wearable-device records (Apple Watch data from 3029 participants) using DataSifter and Synthetic Data Vault (SDV) methods. …”
    Get full text
    Article
  4. 844

    Cybersecurity and Liability in a Big Data World by Maria Lillà Montagnani, Mirta Antonella Cavallo

    Published 2018-10-01
    “…We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use “contractual shields” and escape liability. …”
    Get full text
    Article
  5. 845

    Data Protection in Pre-Tertiary Schools In Ghana by Ephrem Kwaa-Aidoo, Elizabeth Serwaa Baah

    Published 2025-05-01
    “…The study also identifies a lack of coordination, formal guidance, inadequate consent procedures, and fragmented implementation strategies in data protection practices. Furthermore, the use of varied data protection mechanisms by different schools suggests a lack of standardised security protocols, which is likely to result in security gaps. …”
    Get full text
    Article
  6. 846

    Heterogeneous bioinformatic data encryption on portable devices by Hao Chen, Xiayun Hong, Yao Cheng, Xiaotong Wang, Liyan Chen, Xuan Cheng, Juncong Lin

    Published 2025-04-01
    “…Abstract With the popularity of mobile health monitoring and genome sequencing techniques, the scale of biomedical and genomic data grow rapidly, with their privacy receiving more and more concerns. …”
    Get full text
    Article
  7. 847

    AI-based treatment of psychological conditions: the potential use, benefits and drawbacks by Michael Baber, Barbara Baker

    Published 2025-04-01
    “…This suggests that translating small-scale, short-term trials into effective large-scale, longer-term real-world applications may be a particular challenge. While the use of AI in mental healthcare appears to have potential, its use also raises important ethical and privacy concerns, potential risk of bias, and the risk of unintended consequences such as over-diagnosis or unnecessary treatment of normal emotional experiences. …”
    Get full text
    Article
  8. 848

    Blockchain Technology for Secure Patient Data Sharing by Robert-Stefan CIZMAŞ

    Published 2025-05-01
    “… This paper presents a decentralized healthcare data management system that utilizes blockchain technology to address critical challenges in data security, patient privacy, and interoperability of electronic medical records (EMR). …”
    Get full text
    Article
  9. 849

    The Use of AI in Elementary School Learning: A Systematic Literature Review by Natalina Purba, Desti Pujiati, Partohap Saut Raja Sihombing, Hendra Simanjuntak, Desi Sijabat

    Published 2025-03-01
    “…However, the study also highlights challenges such as inadequate infrastructure, teacher competence, and ethical concerns regarding data privacy and algorithmic bias. Addressing these challenges requires investment in infrastructure, ongoing teacher training, and clear ethical guidelines to ensure equitable access to AI-driven learning. …”
    Get full text
    Article
  10. 850

    Perceived risk and intention to use digital financial services of Vietnamese youth by Nguyễn Thị Thương, Khúc Thế Anh, Nguyễn Mạnh Cường, Phan Anh Tuấn, Bùi Thị Thanh Huyền, Võ Mỹ Linh

    Published 2025-01-01
    “…SPSS26 and AMOS24 software were used for data processing. The results show that “Security risk” does not affect the “Perceived Risk” of the youth. …”
    Get full text
    Article
  11. 851

    Opportunities and Challenges: The Use of ChatGPT in Enabling Library Knowledge Services by Huaming LI

    Published 2024-08-01
    “…At the same time, the application focuses on the risks and challenges posed by technical limitations, intellectual property rights, user privacy, harmful information, data sources, academic integrity and other aspects. …”
    Get full text
    Article
  12. 852
  13. 853
  14. 854

    Federated knee injury diagnosis using few shot learning by Chirag Goel, Anita X, Jani Anbarasi L

    Published 2025-07-01
    “…While deep learning approaches have shown promise in identifying knee injuries from MRI scans, they often require large amounts of labeled data, which can be both scarce and privacy-sensitive.MethodsThis paper analyses a hybrid methodology that integrates few-shot learning with federated learning for the diagnosis of knee injuries using MRI scans. …”
    Get full text
    Article
  15. 855

    A systematic review of digital twins’ potential for citizen participation and influence in land use agenda-setting by David Adade, Walter Timo de Vries

    Published 2025-04-01
    “…The findings also reveal two ways of citizen participation: (1) providing data for developing digital twins and (2) utilising digital twins to analyse and identify key land use challenges and to push forward land use claims and proposals within a policy system.…”
    Get full text
    Article
  16. 856

    Ethical Challenges of Using the Internet of Behavior in the Medical and Healthcare Practice by Zahra Sadeqi-Arani, Esmaeil Mazroui Nasrabadi

    Published 2024-11-01
    “…To address these concerns, healthcare organizations must establish ethical protocols, including stringent security measures, informed consent procedures, and robust data protection strategies. Ensuring the secure and responsible use of patient data is critical to maintaining trust in IoB systems. …”
    Get full text
    Article
  17. 857

    User Needs of Online Tutoring Applications Using House of Quality by Qurrata Aini, Eko Ruddy Cahyadi, Faqih Udin

    Published 2025-01-01
    “…Methodology: The study employs the House of Quality method and was conducted in the Jabodetabek area from 2021 to 2022. Data collection methods included voluntary and purposive sampling, using questionnaires distributed via Google Forms, as well as interviews and focus group discussions. …”
    Get full text
    Article
  18. 858

    GraphXplore: Visual exploration and accessible preprocessing of medical data by Louis Bellmann, Karl Gottfried, Philipp Breitfeld, Frank Ückert

    Published 2025-02-01
    “…It enables explainable, easy-to-use exploratory data analysis paired with dataset preparation and metadata annotation accessible for physicians. …”
    Get full text
    Article
  19. 859

    Mannaging medical records with blockchain by Paulo Caetano da Silva, Reginalda Santos Silva, Daniel José Diaz

    Published 2025-07-01
    “…Therefore, the goal of this work is to evaluate, through a systematic literature review (SLR), the use of blockchain to guarantee data privacy and security in e-Health systems. …”
    Get full text
    Article
  20. 860

    A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol by Baidaa Abdulrahman Jalil, Taha Mohammed Hasan, Ghassan Sabeeh Mahmood, Hazim Noman Abed

    Published 2022-07-01
    “…Hence, public cloud storage auditing is critical, so users can use a Third-party auditor (TPA) to verify data integrity. …”
    Get full text
    Article