Suggested Topics within your search.
Suggested Topics within your search.
-
2601
Telehealth abortion services via Women on Web in Kenya (2013–2019): a descriptive analysis of the characteristics and motivations of the care seekers
Published 2025-12-01“…This study explores the characteristics and motivations of individuals in Kenya who completed an online consultation on the WoW website in 2013–2019. We used anonymised data provided by WoW to describe participants’ characteristics (n = 857) and their motivations for accessing the WoW online consultation (n = 449, since this information was only available for those who filled out the questionnaire from December 2017). …”
Get full text
Article -
2602
Computational persuasion technologies, explainability, and ethical-legal implications: A systematic literature review
Published 2025-03-01“…Ethical and legal concerns, such as patient consent, data privacy, and potential for users’ manipulation, are under-explored and require deeper investigation. …”
Get full text
Article -
2603
Mental health promotion in disasters: exploring the synergy of artificial intelligence, spirituality, and psychology: a SWOT analysis
Published 2025-06-01“…Two independent reviewers assessed the methodological quality of the 30 included studies using the PRISMA checklist. Thematic analysis was conducted manually to categorize the data into the four domains of SWOT (Strengths, Weaknesses, Opportunities, and Threats). …”
Get full text
Article -
2604
Students’ Perceptions of Learning Analytics for Mental Health Support: Qualitative Study
Published 2025-08-01“…However, students raised concerns regarding data reliability and identified several ethical issues, such as privacy and lack of transparency. …”
Get full text
Article -
2605
Nursing Educators’ Perspectives on the Integration of Artificial Intelligence Into Academic Settings
Published 2025-05-01“…However, barriers such as insufficient training, infrastructural challenges, and ethical concerns related to data privacy, algorithmic bias, and AI-driven decision making were highlighted. …”
Get full text
Article -
2606
What is the Role of Medical Informatics in Digital Healthcare?
Published 2025-05-01“…. • Cybersecurity & Privacy in Healthcare – Implementing robust security solutions (e.g., encryption, blockchain) to safeguard sensitive patient data and ensure compliance with regulations like HIPAA (USA), GDPR (EU), and local healthcare laws…”
Get full text
Article -
2607
Low Saturation Confidence Distribution-based Test-Time Adaptation for cross-domain remote sensing image classification
Published 2025-05-01“…However, most UDA approaches require access to source data, which may be infeasible due to data privacy or transmission constraints. …”
Get full text
Article -
2608
BESPOKE study protocol: a multicentre, prospective observational study to evaluate the impact of circulating tumour DNA guided therapy on patients with colorectal cancer
Published 2021-09-01“…The secondary endpoints are MRD clearance rate (MRD+ to MRD−) during or after adjuvant chemotherapy, percentage of patients that undergo surgery for oligometastatic recurrence, survival of MRD-negative patients treated with adjuvant chemotherapy versus no adjuvant chemotherapy (active surveillance), overall survival, examine the number of stage I CRC that have recurrent disease detected postsurgery, and patient-reported outcomes.Ethics and dissemination This study has received ethical approval from the Advarra Institutional Review Board (IRB) protocol: Natera—20-041-NCP/3766.01, BESPOKE Study of ctDNA Guided Therapy in Colorectal Cancer (BESPOKE CRC) (Pro00041473) on 10 June 2021. Data protection and privacy regulations will be strictly observed in the capturing, forwarding, processing and storing of patients’ data. …”
Get full text
Article -
2609
HealthPass: a contactless check-in and adaptive access control system for lowering cluster infection risk in public health crisis
Published 2024-12-01“…IntroductionEnsuring effective measures against the spread of the virus is paramount for educational institutions and workplaces as they resume operations amidst the ongoing public health crisis. A touchless and privacy-conscious check-in procedure for visitor assessment is critical to safeguarding venues against potential virus transmission.MethodsIn our study, we developed an interaction-free entry system featuring anonymous visitors who voluntarily provide data. …”
Get full text
Article -
2610
Comparing nurses’ and patients’ perceptions of dignity in burn care: a cross-sectional study
Published 2025-03-01“…Methods This cross-sectional study was conducted on 110 nurse-patient dyads at Amir-Al-Moemenin Burn Hospital, Shiraz, Iran between August 2023 to February 2024. Data were collected using patient dignity questionnaire and analyzed using SPSS software version 23.0, utilizing descriptive tests, Mann-Whitney, Kruskal-Wallis, Wilcoxon, and Spearman’s correlation coefficient. …”
Get full text
Article -
2611
Assessing user preferences and competitive strategies of Gojek and Grab in ASEAN’s ride-hailing market
Published 2024-12-01“…This study aims to determine the criteria, sub-criteria, and alternatives influencing users in choosing ride-hailing and map Gojek and Grab’s grand strategy to compete in the ASEAN market, especially in Indonesia, Thailand, Vietnam, and Singapore. This research uses a questionnaire to collect data, with 377 Gojek and Grab users as participants. …”
Get full text
Article -
2612
Internet of Things in Medicine: a Bibliometric Review
Published 2024-07-01“…Data visualization was conducted using VOSviewer software. …”
Get full text
Article -
2613
Bridging Cities and Citizens with Generative AI: Public Readiness and Trust in Urban Planning
Published 2025-07-01“…This study explores whether Saudi residents are ready to engage with AI-driven tools in urban planning, how they prefer to interact with them, and what ethical concerns may arise. Using a quantitative, survey-based approach, the study collected data from 232 Saudi residents using non-probability stratified sampling. …”
Get full text
Article -
2614
Operation Strategy of Multi-Virtual Power Plants Participating in Joint Electricity–Carbon Market Based on Carbon Emission Theory
Published 2025-05-01“…The study uses data from a VPP dispatch center in Shanxi Province. …”
Get full text
Article -
2615
A comprehensive systematic review of intrusion detection systems: emerging techniques, challenges, and future research directions
Published 2025-05-01“…Blockchain and quantum computing technologies are explored to improve data privacy, resilience, and scalability in decentralized and resource-constrained environments. …”
Get full text
Article -
2616
Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks
Published 2017-01-01“…The proposed protocol includes steps for secure RO and handover management, where mutual authentication, key exchange, perfect forward secrecy, and privacy are supported. The correctness of the proposed protocol is formally analyzed using BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). …”
Get full text
Article -
2617
How Gender-Sensitive Disaster Management is Addressed in the Turkish Parliament: A Qualitative Study from Feminist Bioethics Perspective
Published 2025-07-01“…The data were systematically retrieved using the keywords “earthquake,” “disaster,” “gender,” “women,” and “health.” …”
Get full text
Article -
2618
Unveiling practical insights of eHealth implementation in Europe: a grey literature review on legal, ethical, financial, and technological (LEFT) considerations
Published 2025-08-01“…Legal barriers include navigating complex regulatory frameworks, interpreting regulations, and concerns about data privacy. Facilitators focus on centralized governance and Europe's role in the global data market. …”
Get full text
Article -
2619
Exploring the role of digital technology for feedback exchange in clinical training: a scoping review
Published 2024-12-01“…The incorporation of virtual reality and artificial intelligence presents promising opportunities for personalized, real-time feedback, but requires vigilant governance to ensure data integrity and privacy. Scoping review protocol https://doi.org/10.1186/s13643-022-02151-8…”
Get full text
Article -
2620
Acceptability of Guided Symptom Entry and Asynchronous Clinical Communication Software Among Primary Care Staff: Qualitative Study
Published 2025-07-01“…The software was reported to satisfy perceived feature needs for patient verification, privacy and data security, editable plain-language symptom summaries of symptoms, and integration with prewritten response templates (particularly for staff who were nonnative speakers). …”
Get full text
Article