Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 2,001 - 2,020 results of 2,784 for search '"\"((((\\"usedddds OR \"useddddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 2001

    AI-driven assistive technologies in inclusive education: benefits, challenges, and policy recommendations by Chokri Kooli, Rim Chakraoui

    Published 2025-12-01
    “…Additionally, the paper highlights limitations related to accuracy, infrastructure needs, educator readiness, and ethical concerns such as data privacy and algorithmic bias.To address these challenges, the study proposes policy recommendations and practical strategies for equitable and responsible AI adoption in education, including targeted educator training, funding for inclusive infrastructure, and development of ethical and technical standards. …”
    Get full text
    Article
  2. 2002

    Identifying latent mobility as a service preference segments among college students by Willy Kriswardhana, Domokos Esztergár-Kiss

    Published 2025-04-01
    “…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
    Get full text
    Article
  3. 2003

    Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks by Dheyaa Marjan Hussein Almuntifeky, Basim K. J. Al-shammari

    Published 2024-08-01
    “…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
    Get full text
    Article
  4. 2004

    Exploring the effects of artificial intelligence on student and academic well-being in higher education: a mini-review by Blanka Klimova, Marcel Pikhart

    Published 2025-02-01
    “…Furthermore, issues such as data privacy and job displacement emerge as AI technologies permeate educational environments. …”
    Get full text
    Article
  5. 2005

    Enhancing Public Service Delivery Efficiency through AI: Current Initiatives and Future Prospects in Bangladesh by Niaz Makhdum

    Published 2024-12-01
    “…Some major challenges are infrastructure deficits, data privacy breaches, lack of digital literacy, and unpreparedness of the workforce. …”
    Get full text
    Article
  6. 2006

    Leveraging Agent-Based Modeling and IoT for Enhanced E-Commerce Strategies by Mohamed Shili, Sajid Anwar

    Published 2024-10-01
    “…The effectiveness of this model is validated through simulations and case studies, demonstrating its capacity to handle large data volumes, ensure security and privacy, and maintain seamless interoperability among a variety of IoT devices and e-commerce platforms. …”
    Get full text
    Article
  7. 2007

    Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors by Emel Ay, Menekşe Nazlı Aker

    Published 2025-03-01
    “…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
    Get full text
    Article
  8. 2008

    Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications by Juan E. Tapia, Maximilian Russo, Christoph Busch

    Published 2025-01-01
    “…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
    Get full text
    Article
  9. 2009

    Encouraging gender-inclusive acceptance of multipurpose national-identity smart cards. by Yuen Yee Yen, P H P Yeow, Loo Wee Hong

    Published 2022-01-01
    “…The data was collected through five hundred questionnaires from Malaysia (the MNIS pioneer) and analyzed using structural equation modeling.…”
    Get full text
    Article
  10. 2010

    A systematic review of consumers’ and healthcare professionals’ trust in digital healthcare by Soraia de Camargo Catapan, Hannah Sazon, Sophie Zheng, Victor Gallegos-Rejas, Roshni Mendis, Pedro H. R. Santiago, Jaimon T. Kelly

    Published 2025-02-01
    “…Trust in digital healthcare is complex and, from a consumers’ perspective, can influence digital healthcare use, adoption, acceptance, and usefulness. Consumers’ trust can be affected by the degree of human interaction in automated interventions, perceived risks, privacy concerns, data accuracy, digital literacy, quality of the digital healthcare intervention, satisfaction, education, and income. …”
    Get full text
    Article
  11. 2011

    Clinicians’ perspectives on the adoption and implementation of EMR-integrated clinical decision support tools in primary care by Debora Goetz Goldberg, Tulay G Soylu, Carolyn Faith Hoffman, Rachel E Kishton, Peter F Cronholm

    Published 2025-04-01
    “…There are many concerns with the use of EMR-integrated CDS tools in primary care that should be considered including evidence of the tool's effectiveness, data security and privacy protocols, workflow integration, and clinician burden.…”
    Get full text
    Article
  12. 2012

    A Qualitative Study of HIV Testing Experiences and HIV Self-Testing Perspectives among Men in Northern Nigeria by Zubairu Iliyasu, Zikrillahi A. Haladu, Bilkisu Z. Iliyasu, Aminatu A. Kwaku, Nafisa S. Nass, Taiwo G. Amole, Hadiza M. Abdullahi, Amina U. Abdullahi, Fatimah I. Tsiga-Ahmed, Auwal Abdullahi, Humayra A. Bashir, Hamisu M. Salihu, Muktar H. Aliyu

    Published 2024-01-01
    “…Thematic analysis was employed to analyze the data, yielding key themes related to prior test experiences, knowledge of self-testing, and perceived ease of use, in addition to motivation for self-testing and concerns about reliability and counseling support. …”
    Get full text
    Article
  13. 2013

    Access to information in the context of virtual space in the legal system of Iran and United States by Hedieh sadat Mirtorabi, Mojtaba Ansarian

    Published 2025-03-01
    “…In Iran, restrictions on access to information may reduce the spread of ideas and thoughts, ban potentially useful information, and cause problems in cultural development. …”
    Get full text
    Article
  14. 2014

    Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption by Min Hou, Yue Wu

    Published 2025-01-01
    “…The participants’ private data are encoded as single photons, which are encrypted using a rotational encryption method. …”
    Get full text
    Article
  15. 2015

    Description and utilization of the United States department of defense serum repository: a review of published studies, 1985-2012. by Christopher L Perdue, Angelia A Eick Cost, Mark V Rubertone, Luther E Lindler, Sharon L Ludwig

    Published 2015-01-01
    “…The Armed Forces Health Surveillance Center (AFHSC) information systems and open (online) sites were used as data sources. Through 2012, the repository contained 54,542,658 serum specimens, of which 228,610 (0.42%) have been accessed for any purpose. …”
    Get full text
    Article
  16. 2016

    Potential benefits and challenges of artificial intelligence in human resource management in public institutions by Kelvin M. Mwita, Felician Andrew Kitole

    Published 2025-05-01
    “…The findings on the perceived benefits of AI in HRM show that increased efficiency, better decision-making, and cost reduction are the top advantages, while ease of use ranks the lowest. However, challenges such as lack of expertise, data privacy concerns, high costs, and resistance to change remain significant barriers. …”
    Get full text
    Article
  17. 2017

    Opportunities, challenges and development areas of chartered accountants in the Fourth Industrial Revolution by Chené Brands, Claude-Hélène Mayer, Rudolf M. Oosthuizen

    Published 2024-12-01
    “…Research approach/design and method: The research followed a qualitative approach to data collection and obtained the data through 14 semi-structured interviews. …”
    Get full text
    Article
  18. 2018

    Perceptions, Attitudes, and Concerns on Artificial Intelligence Applications in Patients with Cancer by Enes Erul MD, Yusuf Aktekin MD, Furkan Berk Danışman BSc, Şükrü Armanç Gümüştaş, Büşra Saraç Aktekin MD, Emre Yekedüz MD, Yüksel Ürün MD

    Published 2025-05-01
    “…The survey included three distinct sections: (1) Perceptions: Patients’ general views on AI’s impact in oncology; (2) Attitudes: Comfort level with AI performing medical tasks; (3) Concerns: Specific fears related to AI implementation (eg, diagnostic errors, data privacy, healthcare costs). Survey responses were summarized descriptively, and differences by age, gender, and education were analyzed using chi-square tests. …”
    Get full text
    Article
  19. 2019

    Generative adversarial networks (GANS) for generating face images by Dolly Indra, Muh Wahyu Hidayat, Fitriyani Umar

    Published 2025-07-01
    “…However, the use of public facial datasets such as CelebA and FFHQ faces limitations in representing global demographic diversity and raises privacy concerns. …”
    Get full text
    Article
  20. 2020

    Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things by P. S. Klimushyn

    Published 2025-06-01
    “…It is noted that the analysis of the security of IoT communication technologies using specialised communication protocols across networks with different topologies, communication ranges and bandwidths is a pressing issue, as the number of security and privacy breaches in the IoT ecosystem is growing, which is constantly expanding in various sectors of the economy and human life with the introduction of billions of heterogeneous smart devices. …”
    Get full text
    Article