Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 981 - 1,000 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"usedddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.23s Refine Results
  1. 981

    Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources by Hatoon Alharbi, Ali Hur, Hasan Alkahtani, Hafiz Farooq Ahmad

    Published 2025-04-01
    “…In our research, we construct a cybersecurity knowledge graph (CKG) autonomously using heterogeneous data sources. We further enhance the CKG by applying logical rules and employing graph analytic algorithms. …”
    Get full text
    Article
  2. 982

    Perlindungan Data Pribadi Konsumen Oleh Penyelenggara Sistem Elektronik Dalam Transaksi Digital by Rista Maharani, Andria Luhur Prakoso

    Published 2024-03-01
    “…In the field of digital economic transactions, the significance of personal data is increasing, driven by the widespread use of big data. …”
    Get full text
    Article
  3. 983

    Big Data and AI Algorithms for Sustainable Development Goals: A Topic Modeling Analysis by Prema Nedungadi, Simi Surendran, Kai-Yu Tang, Raghu Raman

    Published 2024-01-01
    “…Using BERTopic modeling, a machine learning technique, this research systematically analyzes literature from 2013 to 2024, providing an overview of AI and big data applications mapped to SDGs which is a first. …”
    Get full text
    Article
  4. 984

    Big Data–Driven Health Portraits for Personalized Management in Noncommunicable Diseases: Scoping Review by Haoyang Du, Jianing Yu, Dandan Chen, Jingjie Wu, Erxu Xue, Yufeng Zhou, Xiaohua Pan, Jing Shao, Zhihong Ye

    Published 2025-06-01
    “…In terms of volume, structured data were widely used (64.29%-100% depending on portrait type), while unstructured data usage varied significantly (19.05%-93.33%). …”
    Get full text
    Article
  5. 985

    Design of an improved graph-based model for real-time anomaly detection in healthcare using hybrid CNN-LSTM and federated learning by G Muni Nagamani, Chanumolu Kiran Kumar

    Published 2024-12-01
    “…This system processes over 100,000 messages per second with less than 50 ms of inference latency to enable the prompting of clinical responses. We use Federated Learning combined with Differential Privacy to solve our data security and privacy tasks. …”
    Get full text
    Article
  6. 986

    Contribution and legacy: a qualitative study of older people’s attitudes about sharing their routinely collected health data for research purposes in New Zealand by Engelina Groenewald, Jasmine Appleton, Brendan Hallam, Cristian Gonzalez-Prieto, Susan Yates, Daniel Wilson, Gillian Dobbie, Rosie Dobson, Sarah Cullum

    Published 2025-05-01
    “…Data were analysed using thematic analysis. Results Themes identified were: 1) Benefits: participants believed that there were benefits to sharing their health data such as helping others, improving health services, advancing scientific knowledge, and giving back to the health system; sharing health data was also seen as a reflection of good character, and people felt that their pre-existing views about whether they wished to share health data should be respected even if they were no longer able to consent. 2) Concerns: participants had concerns about sharing data with private companies, the use of inaccurate data, and the potential personal and societal consequences of sharing health data. 3) Expectations: participants encouraged collaboration between institutions in New Zealand, but expected data privacy to be maintained, processes to be transparent and cultural values around data to be respected; there was an expectation those sharing health data (patients or institutions) should benefit from any private sector gains. …”
    Get full text
    Article
  7. 987

    From intensive care monitors to cloud environments: a structured data pipeline for advanced clinical decision supportResearch in context by Sijm H. Noteboom, Eline Kho, Maria Galanty, Clara I. Sánchez, Frans C.P. ten Bookum, Denise P. Veelo, Alexander P.J. Vlaar, Björn J.P. van der Ster

    Published 2025-01-01
    “…The feasibility of the pipeline will be demonstrated with the available data through research and clinical use cases. Furthermore, privacy, safety, data quality, and environmental impact are carefully considered in the cloud storage transition. …”
    Get full text
    Article
  8. 988
  9. 989

    Barriers impeding research data sharing on chronic disease prevention among the older adults in low-and middle-income countries: a systematic review by Neema Florence Vincent Mosha, Patrick Ngulube

    Published 2024-11-01
    “…A PRISMA flow chart was used to map out the number of studies that were identified, included, and excluded.ResultsFive main barriers were consistently highlighted, including a lack of necessary resources (9, 69%), dealing with complex and sensitive research data (2,15%), lack of policies, procedures, guidelines (5,38%), medical big data processing and integration (2,15%), and inadequate ethical considerations, legal compliance, and privacy protection (6,46%). …”
    Get full text
    Article
  10. 990
  11. 991
  12. 992

    SHARED DECISION MAKING AND AI ROLE IN NON-FINANCIAL PERFORMANCE: EXPLORING MODERATING ROLE OF TOP MANAGEMENT SUPPORT AND SECURITY by Mohammed A. Al-Doghan, Shaxnoza Abdulhaeva

    Published 2025-03-01
    “… This research investigates the effect of shared decision-making on non-financial performance, with specific attention to the mediating effect of using AI and the moderation effects of security and privacy concerns and top management support. …”
    Get full text
    Article
  13. 993

    Data stewardship and curation practices in AI-based genomics and automated microscopy image analysis for high-throughput screening studies: promoting robust and ethical AI applicat... by Asefa Adimasu Taddese, Assefa Chekole Addis, Bjorn T. Tam

    Published 2025-02-01
    “…However, these advancements generate vast datasets requiring effective data stewardship and curation practices to maintain data integrity, privacy, and accessibility. …”
    Get full text
    Article
  14. 994

    SHARED DECISION MAKING AND AI ROLE IN NON-FINANCIAL PERFORMANCE: EXPLORING MODERATING ROLE OF TOP MANAGEMENT SUPPORT AND SECURITY by Mohammed A. Al-Doghan, Shaxnoza Abdulhaeva

    Published 2025-03-01
    “… This research investigates the effect of shared decision-making on non-financial performance, with specific attention to the mediating effect of using AI and the moderation effects of security and privacy concerns and top management support. …”
    Get full text
    Article
  15. 995

    A practical guide to apply AI in childhood cancer: Data collection and AI model implementation by Shuping Wen, Stefan Theobald, Pilar Gangas, Karina C. Borja Jiménez, Johannes H.M. Merks, Reineke A. Schoot, Marcel Meyerheim, Norbert Graf

    Published 2024-12-01
    “…This review also outlines the rules and criteria for collecting, processing, and sharing these data. Informed consent and re-consent are required for data collection and re-use, and data quality, privacy, and security as well as data standardisation, harmonisation and interoperability are important for data processing. …”
    Get full text
    Article
  16. 996

    Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs by Altaf Hussain, Shuaiyong Li, Tariq Hussain, Razaz Waheeb Attar, Ahmed Alhomoud, Reem Alsagri, Ahmad Ali Alzubi

    Published 2025-04-01
    “…Using blockchain ensures secure and trustworthy communication, transparency in data sharing, maintenance of trust among nodes, and protection of user privacy. …”
    Get full text
    Article
  17. 997
  18. 998

    Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm. by Yonggang Huang, Teng Teng, Yuanyuan Li, Minghao Zhang

    Published 2025-01-01
    “…However, when dealing with high-dimensional medical data, the inherent transparency of blockchain conflicts with the necessity of protecting patient privacy. …”
    Get full text
    Article
  19. 999
  20. 1000

    An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios by Jun-Feng Tian, Hao-Ning Wang

    Published 2020-05-01
    “…With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. …”
    Get full text
    Article