Showing 721 - 740 results of 2,784 for search '"\"((((\\"usedddds OR \"usedddddds) OR \"uses) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 721

    Architectural Design for Data Security in Cloud-based Big Data Systems by Mujeeb-ur-Rehman Jamali, Najma Imtiaz Ali, Abdul Ghafoor Memon, Mujeeb-u-Rehman Maree, Aadil Jamali

    Published 2024-09-01
    “…The architectural style and structure chosen for a system should be based on the non-functional system requirements. Big Data technologies are used to store handles huge amounts of operational data in the public domain. …”
    Get full text
    Article
  2. 722

    Islands of data: cultivating an open data landscape for sustainable development in the Caribbean by Ian R. Hambleton, Selvi Jeyaseelan

    Published 2024-12-01
    “…Efforts made towards data-sharing must consider privacy, security and the ethical use of information, and the tension between data as a social good and data for commercial gain can be a determinant of data-sharing decisions. …”
    Get full text
    Article
  3. 723

    Personal Information Sharing Behavior Using Social Media by Ashraf Sharif, Shafiq Ur Rehman, Khalid Mahmood

    Published 2025-06-01
    “…The three-factor (keywords, countries and sources) revealed that the researchers of top countries used mostly six keywords (self-disclosure, social media, privacy, Facebook, social networking sites, and social support) and they preferably published in two major sources. …”
    Get full text
    Article
  4. 724

    Hybrid-chain-based supervision scheme for privacypreserving trading system by Xuedan JIA, Longxia HUANG, Pujie JING, Liangmin WANG, Xiangmei SONG

    Published 2023-12-01
    “…Due to its characteristics of decentralization, transparency, and security, blockchain technology is widely used in finance, the Internet of Things, and supply chain.However, along with the opportunities it brings, the application of blockchain technology also presents new challenges.On one hand, traditional centralized regulatory methods can undermine the decentralized and autonomous nature of blockchain, creating regulatory dilemmas.On the other hand, blockchain-based systems require privacy protection as transactions often contain sensitive information beyond currency amounts.Failure to protect privacy can result in information leakage and make it difficult for authorities to monitor transactions.To address these challenges and enable regulation in privacy-preserving blockchain-based trading systems, a hybrid chain framework was proposed.This framework incorporated a multiple committee-based approach for general cross-chain regulation.Separate committees were established for the supervision chain and service chain.The service chain committee handled service chain data, generating and sending proofs to the supervision chain to achieve private supervision.In addition to single-chain regulation, cross-chain communication committees and supervision committees collaborated to achieve cross-chain transaction supervision among different service chains.Through a security analysis, it is proven that the proposed scheme is secure when each module meets its security requirements.Experimental evaluations have been conducted to demonstrate the feasibility of the proposed scheme, showing that it achieves cross-chain supervision at a low cost and is scalable.…”
    Get full text
    Article
  5. 725

    Ethical and legal considerations governing use of health data for quality improvement and performance management: a scoping review of the perspectives of health professionals and a... by Tim Shaw, Kevin Leow, Ian Kerridge, Cameron Stewart, Anna Janssen, Kavisha Shah

    Published 2025-04-01
    “…Health administrators additionally emphasised the importance of good governance and data stewardship to improving professional engagement with performance data, but privacy remains a key barrier.Conclusions The growing interest in using health data for quality improvement and performance management requires health services to address barriers to utilisation of performance data. …”
    Get full text
    Article
  6. 726

    Social media applications through the lens of DeLone and McLean’s information system success model: does perceived privacy matter? by Isyaku Salisu, Mazlan Mohd Sappri, Mohd Faizal Omar, Aemin Nasir, Sarmad Ejaz, Md Billal Hossain

    Published 2025-07-01
    “…Therefore, this study explores the impact of perceived privacy on the relationship between tripartite quality constructs, user satisfaction, and continual usage using DeLone and McLean’s information system success (ISS) model. …”
    Get full text
    Article
  7. 727

    Generative AI-Based Judicial Ruling Disclosure System Innovation: A Legal and Technological Approach to Balancing Privacy Protection and the Right to Information by Eul Young Lim, MinSung Hyun

    Published 2025-06-01
    “…Using actual court data, we compared the performance of fine-tuned sLLMs with that of few-shot Large Language Models (LLMs, e.g., GPT-4o). …”
    Get full text
    Article
  8. 728

    The effect of social grooming via live photo-sharing on well-being: the mediating role of social capital and moderating role of the need for privacy by Fei Wang, Xin Wang

    Published 2025-07-01
    “…However, the spontaneous nature of live photos may unintentionally reveal audio or visual details, raising privacy concerns. Previous research has not fully explored why users share live photos despite these risks, nor how live photo sharing affects users’ well-being from a social grooming perspective.MethodsWe surveyed 266 users of WeChat Moments and analyzed the data using a moderated mediation model. …”
    Get full text
    Article
  9. 729

    Privacy Concerns Versus Personalized Health Content—Pregnant Individuals’ Willingness to Share Personal Health Information on Social Media: Survey Study by Haijing Hao, Yang W Lee, Marianne Sharko, Qilu Li, Yiye Zhang

    Published 2025-02-01
    “…MethodsWe designed and deployed an electronic survey to pregnant individuals worldwide electronically in 2023. We used the classical Internet Users’ Information Privacy Concerns (IUIPC) model to examine how privacy concerns modulate pregnant individuals’ behaviors and beliefs regarding risk and trust when using social media for health purposes. …”
    Get full text
    Article
  10. 730

    Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users by Anthony James Goodings, Kayode Philip Fadahunsi, Derjung M Tarn, Jennifer Lutomski, Allison Chhor, Frances Shiely, Patrick Henn, John O'Donoghue

    Published 2025-08-01
    “…Wilcoxon signed-rank tests were used to analyze user comfort in sharing data, comparing noninternet- versus internet-based sharing methods and fully versus partially anonymized data. …”
    Get full text
    Article
  11. 731

    Ethical Considerations in Emotion Recognition Research by Darlene Barker, Mukesh Kumar Reddy Tippireddy, Ali Farhan, Bilal Ahmed

    Published 2025-05-01
    “…The development of real-time feedback loops for user awareness should be combined with clear disclosures about data use and participatory design practices. The successful oversight of these systems requires interdisciplinary work between researchers, policymakers, designers, and ethicists. …”
    Get full text
    Article
  12. 732

    Secure and Reversible Face De-Identification With Format-Preserving Encryption by Heehwan Kim, Sungjune Park, Daeseon Choi

    Published 2025-01-01
    “…In conclusion, the proposed method provides a robust privacy-preserving solution for facial data in digital environments, balancing security and utility while supporting lawful restoration.…”
    Get full text
    Article
  13. 733

    Advancing Early Detection of Major Depressive Disorder Using Multisite Functional Magnetic Resonance Imaging Data: Comparative Analysis of AI Models by Masab Mansoor, Kashif Ansari

    Published 2025-07-01
    “…MethodsWe used functional magnetic resonance imaging data from 1200 participants (600 with early-stage MDD and 600 healthy controls) across 3 public datasets. …”
    Get full text
    Article
  14. 734
  15. 735

    ChildDiffusion: Unlocking the Potential of Generative AI and Controllable Augmentations for Child Facial Data Using Stable Diffusion and Large Language Models by Muhammad Ali Farooq, Wang Yao, Peter Corcoran

    Published 2025-01-01
    “…In this research, we propose the ChildDiffusion framework, designed to generate photorealistic child facial data using diffusion models. The framework integrates intelligent augmentations via short text prompts, employs various image samplers, and leverages ControlNet for enhanced model conditioning. …”
    Get full text
    Article
  16. 736

    De novo non-canonical nanopore basecalling enables private communication using heavily-modified DNA data at single-molecule level by Qingyuan Fan, Xuyang Zhao, Junyao Li, Ronghui Liu, Ming Liu, Qishun Feng, Yanping Long, Yang Fu, Jixian Zhai, Qing Pan, Yi Li

    Published 2025-05-01
    “…Abstract Hidden messages in DNA molecules by employing chemical modifications has been suggested for private data storage and transmission at high information density. …”
    Get full text
    Article
  17. 737

    Deriving and validating a risk prediction model for long COVID-19: protocol for an observational cohort study using linked Scottish data by Jennifer K Quint, Aziz Sheikh, Chris Robertson, Srinivasa Vittal Katikireddi, Emily Moore, Colin R Simpson, Luke Daines, Eleftheria Vasileiou, Syed Ahmar Shah, Rachel H Mulholland, Vicky Hammersley, Steven Kerr, Ting Shi, David Weatherill, Elisa Pesenti

    Published 2022-07-01
    “…In this protocol, we describe plans to develop a prediction model to identify individuals at risk of developing long-COVID.Methods and analysis We will use the national Early Pandemic Evaluation and Enhanced Surveillance of COVID-19 (EAVE II) platform, a population-level linked dataset of routine electronic healthcare data from 5.4 million individuals in Scotland. …”
    Get full text
    Article
  18. 738

    Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation by Saja Kareem Ismael, Mohamed Ibrahim Shujaa, Ahmed Bahaaulddin A. Alwahhab

    Published 2025-03-01
    “…Furthermore, this study examines the double-layer encryption architecture used to secure data in at rest and during transmission from a sensor’s gathering location to long-term storage. …”
    Get full text
    Article
  19. 739

    MANAJEMEN PRIVASI KOMUNIKASI MEDIA SOSIAL TWITTER OLEH MAHASISWA UNY COMMUNICATION PRIVACY MANAGEMENT OF SOCIAL MEDIA TWITTER BY UNY COLLEGE STUDENT by Yoga Rinestu, Wuri Handayani

    Published 2023-03-01
    “…The process of collecting data using the interview method. Test the validity of the data using source triangulation techniques, as well as four stages of data analysis: collection, reduction, presentation, and drawing conclusions. …”
    Get full text
    Article
  20. 740

    CPS-IIoT-P2Attention: Explainable Privacy-Preserving With Scaled Dot-Product Attention in Cyber-Physical System-Industrial IoT Network by Yakub Kayode Saheed, Joshua Ebere Chukwuere

    Published 2025-01-01
    “…The findings revealed that the scaled dot product attention mechanism dramatically boosts model performance, while Pearson correlation and agglomerative clustering safeguard data privacy in CPS-IIoT, surpassing the performance of existing state-of-the-art (SOTA) models. …”
    Get full text
    Article