Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,901 - 1,920 results of 2,784 for search '"\"((((\\"usedddds OR \"usedddddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 1901

    Language barriers and their consequences in healthcare: a qualitative case study of Nepali migrants in Finland by Shrwan Kumar Khanal

    Published 2025-04-01
    “…The shortage of professional interpreters further worsened these challenges, while privacy concerns discouraged the use of community-based interpreters. …”
    Get full text
    Article
  2. 1902
  3. 1903

    Electronic Records Management Practices and Academic Performance of Higher Institutions of Learning: A Case Study of Kabale University. by Tukahirwa, Elizabeth

    Published 2024
    “…A descriptive research design was used to collect both qualitative and quantitative data through purposive and simple random sampling techniques, with a sample size of 92 respondents. …”
    Get full text
    Thesis
  4. 1904

    Ethics in Consumer Neuroscience: A Non-Exhaustive Presentation by Dănuț TRIFU

    Published 2025-04-01
    “…From this standpoint, large differences were found when analyzing research objectives, instruments, data disclosure, and findings dissemination and use as well as participants’ protection and data privacy rights. …”
    Get full text
    Article
  5. 1905

    From assistance to integrity: exploring the role of AI in academic communication across Russian and Turkish campuses by Olga V. Sergeeva, Marina R. Zheltukhina, Servet Demir

    Published 2025-05-01
    “…Turkish students exhibited a predominantly favorable outlook toward the collaborative capabilities of AI, but Russian students placed greater emphasis on apprehensions over privacy and data security.DiscussionThe study highlights the complex interplay between the benefits and challenges of AI in educational environments. …”
    Get full text
    Article
  6. 1906

    Assessment of implementation challenges of electronic medical record in Yekatit 12 hospital medical college. by Abiyot Alemu Mamae, Ephrem Mamo

    Published 2025-01-01
    “…Descriptive statistics was employed to summarise the quantitative data. Qualitative data was thematically presented.…”
    Get full text
    Article
  7. 1907

    Generative AI as Third Agent: Large Language Models and the Transformation of the Clinician-Patient Relationship by Hugo de O Campos, Daniel Wolfe, Hongzhou Luan, Ida Sim

    Published 2025-08-01
    “…While affirming LLMs as a tool enabling the rise of the “AI patient,” we also explore concerns surrounding data privacy, algorithmic bias, moral injury, and the erosion of human connection. …”
    Get full text
    Article
  8. 1908

    SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks by Jiajun Bu, Mingjian Yin, Daojing He, Feng Xia, Chun Chen

    Published 2011-07-01
    “…To preserve authenticity and integrity of query results, we propose a novel data structure called Authenticity & Integrity tree. …”
    Get full text
    Article
  9. 1909

    Emerging and Pioneering AI Technologies in Aesthetic Dermatology: Sketching a Path Toward Personalized, Predictive, and Proactive Care by Diala Haykal

    Published 2024-11-01
    “…However, this manuscript also addresses significant challenges that practitioners face, such as technical constraints, data privacy concerns, algorithmic biases, and financial barriers, which impact the accessibility and efficacy of AI across diverse patient populations. …”
    Get full text
    Article
  10. 1910

    Cloud Resilience: A Comprehensive Review of Infrastructure-as-a-Service Security Issues by Chopde Nitin, Raut Atul, Chaudhari Shrikant, Shelokar Yogesh, Yawale Pratik

    Published 2025-01-01
    “…The research paper examines IaaS security challenges, including shared responsibility models, data privacy, identity management, and multi-tenancy implications. …”
    Get full text
    Article
  11. 1911

    Current limitations in technology-based cognitive assessment for severe mental illnesses: a focus on feasibility, reliability, and ecological validity by Edoardo Caporusso, Antonio Melillo, Andrea Perrottelli, Luigi Giuliani, Francesco Flavio Marzocchi, Pasquale Pezzella, Giulia Maria Giordano

    Published 2025-04-01
    “…EMA may capture real-world functioning by increasing the number of evaluations throughout the day, but its use might be hindered by high participant burden and missing data. …”
    Get full text
    Article
  12. 1912

    Acceptance of Digital Health Technologies in Palliative Care Patients by Stefan Wicki, Ian C. Clark, Manuel Amann, Sebastian M. Christ, Markus Schettle, Caroline Hertler, Gudrun Theile, David Blum

    Published 2024-10-01
    “…Methods: We used a 39-item questionnaire to evaluate acceptance and use of smartphone-based electronic patient report outcome measures, wearables, AI, data privacy, and virtual reality (VR) in 29 female and male PC inpatients. …”
    Get full text
    Article
  13. 1913

    Applications of UAV Technologies in Assessment of Transportation Infrastructure Systems by Ahmad Akib Uz Zaman, Ahmed Abdelaty, Mohamed S. Yamany

    Published 2025-06-01
    “…Respondents emphasize the need for longer flight times, better automation, and advanced data tools, underscoring growing adoption and highlighting the need to overcome technical, regulatory, and data privacy challenges for optimal UAV integration within transportation infrastructure systems management.…”
    Get full text
    Article
  14. 1914

    Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review by Jones Márcio Nambundo, Otávio de Souza Martins Gomes, Adler Diniz de Souza, Raphael Carlos Santos Machado

    Published 2025-03-01
    “…These gaps include design requirements, software and firmware updates, physical security, the use of big data to detect vulnerabilities, user data privacy, and inconsistencies in machine learning algorithms. …”
    Get full text
    Article
  15. 1915

    Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain by Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG

    Published 2021-12-01
    “…To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and the evidence report were stored in the cloud server and the block chain respectively to realize the secure storage and sharing of the electronic evidence.The identity-based signcryption technology was used to ensure the confidentiality of data, and the proxy re-encryption technology was used to realize the sharing of electronic evidence of Internet of vehicles by insurance companies.The aggregation signature technique was introduced to reduce the computation cost of multi vehicle user signature verification.The reliability of electronic evidence was improved by using credibility incentive mechanism.Security analysis shows that the proposed scheme achieves data confidentiality, integrity, verifiability and unforgeability.Compared with the existing schemes, the proposed scheme has certain advantages in terms of computational overhead.…”
    Get full text
    Article
  16. 1916

    Congruent Learning for Self-Regulated Federated Learning in 6G by Jalil Taghia, Farnaz Moradi, Hannes Larsson, Xiaoyu Lan, Adam Orucu, Masoumeh Ebrahimi, Andreas Johnsson

    Published 2024-01-01
    “…Across four networking use cases on several tasks, reflecting different profiles of data heterogeneity and limited availability of data, it is shown that CFL greatly reduces overfitting and in nearly all cases improves the performance—a relative gain of about 21% averaged across all use cases.…”
    Get full text
    Article
  17. 1917

    A scoping review of the governance of federated learning in healthcare by Rebekah Eden, Ignatius Chukwudi, Chris Bain, Sebastiano Barbieri, Leonie Callaway, Susan de Jersey, Yasmeen George, Alain-Dominique Gorse, Michael Lawley, Peter Marendy, Steven M. McPhail, Anthony Nguyen, Mahnaz Samadbeik, Clair Sullivan

    Published 2025-07-01
    “…Abstract In healthcare, federated learning (FL) is emerging as a methodology to enable the analysis of large and disparate datasets while allowing custodians to retain sovereignty. While FL minimises data-sharing challenges, concerns surrounding ethics, privacy, maleficent use, and harm remain. …”
    Get full text
    Article
  18. 1918

    Federated Learning for Decentralized DDoS Attack Detection in IoT Networks by Yaser Alhasawi, Salem Alghamdi

    Published 2024-01-01
    “…Our approach prioritizes data privacy by processing data locally, thereby avoiding the need for central data collection, while enhancing detection efficiency. …”
    Get full text
    Article
  19. 1919

    Membangun Kepercayaan yang Berkelanjutan di Era Disruptif Komunikasi: Perspektif Media dan Komunikasi Digital by Agung Dharmajaya, Harmonis Minangkabawi

    Published 2024-04-01
    “… The purpose of this research is to find out the factors that can build sustainable trust in the field of disruptive communication from the perspective of digital media and communication. This research uses qualitative research methods. The data collection technique in this research is done by literature study by exploring journals, books and other information relevant to the research. …”
    Get full text
    Article
  20. 1920

    Deep learning in the fog by Andrzej Sobecki, Julian Szymański, David Gil, Higinio Mora

    Published 2019-08-01
    “…Processing all the data in the cloud may not be sufficient in cases when we need privacy and low latency, and when we have limited Internet bandwidth, or it is simply too expensive. …”
    Get full text
    Article