Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 641 - 660 results of 2,784 for search '"\"((((\\"useddds OR \"usedddddds) OR \"useddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.21s Refine Results
  1. 641

    The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles by Emmi Eronen, Alpo Olavi Värri, Miika Järvinen

    Published 2025-05-01
    “…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
    Get full text
    Article
  2. 642

    Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks by Alejandro Martínez-Arce, Alberto Bermejo-Cantarero, Laura Muñoz de Morales-Romero, Víctor Baladrón-González, Natalia Bejarano-Ramírez, Gema Verdugo-Moreno, María Antonia Montero-Gaspar, Francisco Javier Redondo-Calvo

    Published 2024-10-01
    “…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
    Get full text
    Article
  3. 643

    Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method by Shumin Han, Yue Li, Derong Shen, Chuang Wang

    Published 2024-11-01
    “…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
    Get full text
    Article
  4. 644

    Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia by Betül Önay Doğan, Nihal Kocabay Şener, Selçuk Kıran, Hasrina Mustafa

    Published 2022-12-01
    “…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
    Get full text
    Article
  5. 645

    Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study by Yi Xie, Yi Xie, Xinmeng Wang, Huiwen Yang, Huiwen Yang, Jiayao Zhang, Honglin Wang, Zineng Yan, Jiaming Yang, Zhiyuan Yan, Zhiwei Hao, Pengran Liu, Yijie Kuang, Zhewei Ye, Zhewei Ye

    Published 2025-07-01
    “…BackgroundWhile artificial intelligence (AI) has revolutionized medical diagnostics, conventional centralized AI models for medical image analysis raise critical concerns regarding data privacy and security. Swarm learning (SL), a decentralized machine learning framework, addresses these limitations by enabling collaborative model training through secure parameter aggregation while preserving data locality. …”
    Get full text
    Article
  6. 646

    Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning by Yu-Hsiu Lin, Yung-Yao Chen, Shih-Hao Wei

    Published 2025-01-01
    “…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
    Get full text
    Article
  7. 647

    Blockchain oracles for decentralized agricultural insurance using trusted IoT data by Manoj T, Krishnamoorthi Makkithaya, Narendra V. G., Vijaya Murari T

    Published 2025-01-01
    “…Initially, a method for computing the direct reputation score of IoT devices based on behavioral and data reputation is illustrated. Next, a privacy preserved decentralized oracle mechanism is designed and implemented using a masked secret sharing and secure aggregation scheme. …”
    Get full text
    Article
  8. 648
  9. 649
  10. 650

    Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR by Oliver M. Tuazon, Bart Custers, Gerrit-Jan Zwenne

    Published 2025-12-01
    “…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
    Get full text
    Article
  11. 651
  12. 652

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. …”
    Get full text
    Article
  13. 653

    Social Engineering Threat Analysis Using Large-Scale Synthetic Data by Sellappan Palaniappan, Rajasvaran Logeswaran, Shapla Khanam, Pulasthi Gunawardhana

    Published 2025-02-01
    “…Our model achieved an accuracy of 0.8984 and an F1 score of 0.9253, demonstrating its effectiveness in detecting social engineering attacks. The use of synthetic data overcomes the problem of lack of availability of real-world data due to privacy issues, and is demonstrated in this work to be safe, scalable, ethics friendly and effective.…”
    Get full text
    Article
  14. 654

    Automatisk Nummerpladegenkendelse (ANPG) by Tanja Kammersgaard Christensen

    Published 2022-04-01
    “…The wider scope of personal data used in investigations increasingly threatens the right to privacy. …”
    Get full text
    Article
  15. 655

    Data Protection in Employment: Implications of the Personal Data Protection Act in Tanzania by Mark Malekela, Aliko Simon

    Published 2025-07-01
    “…Innovations in technology, their varied uses, and the widespread use of social media have all advanced more quickly than in the past, both globally and in the workplace, where employee and customer data is constantly being collected and digitally documented. …”
    Get full text
    Article
  16. 656

    Risk assessment of data protection in the maritime industry using system-theoretic process analysis by Sutthipong Yungratog, Hyungju Kim, Wonsiri Punurai, Sotarat Thammaboosadee

    Published 2025-06-01
    “…Data protection assessment is a significant issue to security and privacy enhancement. …”
    Get full text
    Article
  17. 657

    Architectural Design for Data Security in Cloud-based Big Data Systems by Mujeeb-ur-Rehman Jamali, Najma Imtiaz Ali, Abdul Ghafoor Memon, Mujeeb-u-Rehman Maree, Aadil Jamali

    Published 2024-09-01
    “…The architectural style and structure chosen for a system should be based on the non-functional system requirements. Big Data technologies are used to store handles huge amounts of operational data in the public domain. …”
    Get full text
    Article
  18. 658

    Islands of data: cultivating an open data landscape for sustainable development in the Caribbean by Ian R. Hambleton, Selvi Jeyaseelan

    Published 2024-12-01
    “…Efforts made towards data-sharing must consider privacy, security and the ethical use of information, and the tension between data as a social good and data for commercial gain can be a determinant of data-sharing decisions. …”
    Get full text
    Article
  19. 659
  20. 660

    How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries by Nicki Tiffin, Asha George, Amnesty Elizabeth LeFevre

    Published 2019-03-01
    “…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
    Get full text
    Article