Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,861 - 1,880 results of 2,784 for search '"\"((((\\"usedddds OR \"usedddddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.18s Refine Results
  1. 1861

    ADVANCE AND DEVELOPMENT OF CHAOTIC OPTICAL COMMUNICATIONS: A REVIEW by Mohamed Khudhair Al-Gburi, Ibrahim A. Murdas

    Published 2025-07-01
    “…Chaotic optical communication is a hopeful technique for improving the privacy and security of communications networks. It uses synchronized chaotic emitters and receiver lasers for encoding and decoding the data at the hardware level. …”
    Get full text
    Article
  2. 1862

    MedBlockSure: Blockchain‐based insurance system by Charu Krishna, Divya Kumar, Dharmender Singh Kushwaha

    Published 2024-12-01
    “…The conceptual view of the proposed system using sequence and use case diagrams and data management framework and smart claim processing system is demonstrated.…”
    Get full text
    Article
  3. 1863

    Work process of community health workers in the context of digital health: a non-participant observation study by Romário Correia dos Santos, Lenira Ferreira Ribeiro, Cláudia Fell Amado, Lívia Milena Barbosa de Deus e Méllo, Liliana Santos

    Published 2025-08-01
    “…The results point to advantages for the work of the CHW, such as expanding access to health and communication between the team and users, agility in data collection and qualification of care; Disadvantages also emerged in the scenario of using digital technologies, such as delays in replacing damaged instruments, loss of workers’ privacy and precarious working conditions. …”
    Get full text
    Article
  4. 1864

    When AI Joins the scope: Canadian endoscopists’ perceptions of NodeAI versus conventional methods for identifying lymph node malignancies in EBUS imaging. by Ria Datta

    Published 2025-07-01
    “…The baseline and endline surveys measured shifts in opinions regarding NodeAI's usability in diagnostic accuracy, procedure time, and ease of use. Qualitative insights were gathered through open-ended questions during the focus group to explore clinicians' views on AI's potential role, while quantitative data was captured using scales/ratings. …”
    Get full text
    Article
  5. 1865

    There’s (not) an App for that: situating smartphones, Excel and the techno-political interfaces and infrastructures of digital solutions for COVID-19 by Luke Heemsbergen, Catherine Bennett, Monique Mann

    Published 2025-02-01
    “…While CTA user-software interactions produce certain research questions, querying the infrastructural complexity of digital public health projects require and produce a different set of data and knowledge.…”
    Get full text
    Article
  6. 1866

    Evaluation and performance comparison of a model for adoption of biometrics in online banking by Norah AlJanahi, Mostafa Abd-El-Barr, Kalim Qureshi

    Published 2021-04-01
    “…A total of 500 invitations were sent and 302 valid responses were received. The data was analysed using SPSS software tool, version 22. …”
    Get full text
    Article
  7. 1867

    Integrating AI in Project-Based Learning for Differentiated English Language Instruction: A Scoping Review by Arqam, Andi Asrifan

    Published 2024-08-01
    “…However, the analysis also notes ethical issues connected to data privacy and algorithmic biases and the need for teacher training to use AI in schools effectively. …”
    Get full text
    Article
  8. 1868

    GenAI and effective reading among university students: Prospects, challenges, and future directions by George Matto, Jaffar Msafiri Ponera, Valeria Kyumana

    Published 2025-04-01
    “…The system can also lead to breach of data privacy and it is resources intensive.  Most of the limitations are, however, manageable. …”
    Get full text
    Article
  9. 1869

    Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks by Jun Niu, Peng Liu, Chunhui Huang, Yangming Zhang, Moxuan Zeng, Kuo Shen, Yangzhong Wang, Suyu An, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, He Wang, Gaofei Wu, Anmin Fu, Chunjie Cao, Xiaoyan Zhu, Yuqing Zhang

    Published 2025-01-01
    “…Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. …”
    Get full text
    Article
  10. 1870

    Challenges of online teaching and adaptation strategies among Iranian female teachers during the COVID-19 pandemic: a qualitative study by Javad Yoosefi lebni, Seyed Fahim Irandoost, Mandana Saki, Masoud Behzadifar, Ahmad Ahmadi

    Published 2025-01-01
    “…Data analysis was carried out using the Colaizzi approach in MAXQDA-2018 software, and the Guba and Lincoln criteria were used to improve the quality of the findings. …”
    Get full text
    Article
  11. 1871

    Evaluation of the strategy for implementing the GLA:D programme in Switzerland: protocol for an implementation-effectiveness hybrid type 3 design study with a mixed-method approach by Karin Niedermann, Lea Ettlin, Marina Bruderer-Hofstetter, Anne-Kathrin Rausch-Osthoff, Irina Nast, Olivier Gaugler

    Published 2022-06-01
    “…The study population will be the healthcare professionals who are involved in the conservative management of knee OA in Switzerland, that is, physiotherapists and medical doctors, and their patients.Ethics and dissemination The use of the registry data containing data of patients participating in the GLA:D Switzerland OA programme does not fall within the scope of the Swiss Human Research Act (BASEC-Nr. …”
    Get full text
    Article
  12. 1872

    Assessment of Patient Satisfaction Attaining Primary Health Care Services at Health Centers in Mogadishu, Somalia by Abdi HA, Warsame MO, Adan MA, Hassan MA

    Published 2024-12-01
    “…Quantitative data was analyzed using appropriate statistical methods, such as descriptive statistics and chi-square tests, to examine the relationships between patient satisfaction and various factors the statistical significance was declared at p-value < 0.05. …”
    Get full text
    Article
  13. 1873

    Hybrid AI for Predictive Cyber Risk Assessment: Federated Graph-Transformer Architecture With Explainability by Jaime Govea, Rommel Gutierrez, William Villegas-Ch, Alexandra Maldonado Navarro

    Published 2025-01-01
    “…This paper proposes a hybrid model for predictive cyber risk assessment that integrates Graph Neural Networks (GNNs) for relational pattern modeling, a Transformer-based language model (CyberBERT) for semantic representation of logs and traffic data, and a Federated Learning framework to preserve data privacy during training. …”
    Get full text
    Article
  14. 1874

    Determinants of Antenatal Care Service Satisfaction among Women in Ethiopia: A Systematic Review and Meta-Analysis by Kenbon Seyoum

    Published 2022-01-01
    “…The extracted data were analyzed using STATA version 14 software and the results were presented using the forest plot. …”
    Get full text
    Article
  15. 1875

    The Prevalence and Predictors of Digital Proxy Behavior in the United States: Cross-Sectional Survey Study by Pin Sym Foong, Camellia Zakaria, Pavithren Pakianathan, Andrew Ian-Hong Phua, Gerald CH Koh

    Published 2025-08-01
    “…Although most proxies used formal access when available, a significant portion have used insecure, informal methods. …”
    Get full text
    Article
  16. 1876

    Predictors of client satisfaction with family planning services in Ethiopia: a systematic review and meta-analysis by Yeshiwas Ayale Ferede, Worku Chekol Tassew, Agerie Mengistie Zeleke

    Published 2025-01-01
    “…BackgroundThe use of modern contraceptives by married Ethiopian women has increased over the past 15 years. …”
    Get full text
    Article
  17. 1877

    From Centralization to Decentralization: Blockchain&#x2019;s Role in Transforming Social Media Platforms by Bidita Sarkar Diba, Jayonto Dutta Plabon, Nishat Tasnim, Mehjabin Hossain, Durjoy Mistry, Sourav Sarker, M. F. Mridha, Yuichi Okuyama, Jungpil Shin

    Published 2025-01-01
    “…Conventionally, social media systems are based on central architectures that may indirectly solve the problems of data privacy and platform responsibility since there are increased threats, including identity theft and fake news spread across such systems. …”
    Get full text
    Article
  18. 1878

    Economic and social benefits of socially responsible actions towards employees in agribusiness enterprises by Matejun Marek, Ratajczak Marcin

    Published 2019-12-01
    “…Key socially responsible actions towards employees include employee satisfaction surveys as well as data protection and protection of employee privacy. …”
    Get full text
    Article
  19. 1879

    A novel blockchain-based surveillance and early-warning technology for infectious diseases by Liwei OUYANG, Yong YUAN, Xinhu ZHENG, Jun ZHANG, Fei-Yue WANG

    Published 2020-06-01
    “…The key of early prevention and control of infectious diseases is to use the early warning technology and system to monitor the abnormal occurrence and trend of infectious diseases.There are still some problems in the existing infectious diseases automated-alert and response systems,such as lack of intelligence,poor efficiency in exchange of key information,as well as difficulties in distributed decision-making.Based on the distributed blockchain architecture,a novel blockchain-based surveillance and early-warning technology for infectious diseases was proposed,leveraging emerging information technologies including artificial intelligence,big data and smart contract.The technology could aggregate monitoring forces from multiple parties efficiently,integrate various early warning technologies flexibly,and establish a distributed and collaborative monitoring environment for knowledge integration and intelligent interconnection with guaranteed security and privacy protection.In this framework,smart contract was served as a “software-defined agent” to fuse decisions,monitor the outbreak,and issue warnings in an automatic and real-time fashion,so as to meet the key requirements of accuracy and timeliness,and avoid the decision bias of single evidence.…”
    Get full text
    Article
  20. 1880

    What Factors Determine the Online Consumer Behavior in This Digitalized World? A Systematic Literature by Muluken Ayalew, Shimelis Zewdie

    Published 2022-01-01
    “…A conventional review strategy was used to address the objective raised above, i.e., systematic strategy, and also, the obtained data were analyzed via content analysis. …”
    Get full text
    Article