Showing 421 - 440 results of 2,784 for search '"\"((((\\"usedds OR \"useddddddddds) OR \"uses) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 421
  2. 422
  3. 423

    THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS by Thi Thu Huong Hoang, Hoang Nam Vu, Thi Khanh Chi Nguyen

    Published 2023-04-01
    “…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
    Get full text
    Article
  4. 424

    A Qualitative Study of Researchers Perspective on the Use and Risks of Open Government Data by Emigawaty Emigawaty, Dinda Sukmaningrum, Wiji Nurastuti

    Published 2025-06-01
    “…This study aims to review the potential risks of data openness on government data portals from the perspective of researchers as one of the important actors who use data. …”
    Get full text
    Article
  5. 425

    Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems by Firdous Kausar, Sambrdhi Deo, Sajid Hussain, Zia Ul Haque

    Published 2024-10-01
    “…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
    Get full text
    Article
  6. 426

    Human Behavior Analysis Using Radar Data: A Survey by Patrycja Miazek, Alicja Zmudzinska, Pawel karczmarek, Adam Kiersztyn

    Published 2024-01-01
    “…In this study, we focus not only on the analysis of human behavior using radar but also on video observations. We review methods of human activity recognition using LiDAR. …”
    Get full text
    Article
  7. 427

    Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice by Zhilong Guo

    Published 2025-06-01
    “…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
    Get full text
    Article
  8. 428
  9. 429

    A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption by Linh Nguyen, Quoc Bao Phan, Lan Zhang, Tuy Tan Nguyen

    Published 2025-01-01
    “…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
    Get full text
    Article
  10. 430

    Anomaly detection in encrypted network traffic using self-supervised learning by Sadaf Sattar, Shumaila Khan, Muhammad Ismail Khan, Ainur Akhmediyarova, Orken Mamyrbayev, Dinara Kassymova, Dina Oralbekova, Janna Alimkulova

    Published 2025-07-01
    “…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
    Get full text
    Article
  11. 431
  12. 432
  13. 433
  14. 434

    Legal grounds for police officers' body-worn cameras by Milidragović Dragan, Milić Nenad, Petrović Zlatko

    Published 2025-01-01
    “…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
    Get full text
    Article
  15. 435
  16. 436

    Social Implications of Technological Advancements in Sentiment Analysis: A Literature Review on Potential and Consequences over the Next 20 Years by Daryanto, Ika Safitri Windiarti, Bagus Setya Rintyarna

    Published 2025-02-01
    “…It enables more responsive policy design by understanding public emotions in political and social contexts. However, data privacy, misinformation, and diminished critical thinking persist. …”
    Get full text
    Article
  17. 437

    Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection by Răzvan Rughiniş, Simona-Nicoleta Vulpe, Dinu Ţurcanu, Daniel Rosner

    Published 2025-01-01
    “…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
    Get full text
    Article
  18. 438

    COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App by Mona Naomi Lintvedt

    Published 2021-12-01
    “…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
    Get full text
    Article
  19. 439

    Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population by Aaro Tupasela, Juanita Devis Clavijo, Marjut Salokannel, Christoph Fink

    Published 2023-03-01
    “…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
    Get full text
    Article
  20. 440