Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 681 - 700 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"usedds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.17s Refine Results
  1. 681

    Exploring the Use of AI in Qualitative Data Analysis: Comparing Manual Processing with Avidnote for Theme Generation by S. M. Akramul Kabir, Fareeha Ali, Rana Lotfy Ahmed, Ruqayya Sulaiman-Hill

    Published 2025-04-01
    “…However, fundamental concerns persist regarding the robustness, generalisability, credibility, reliability and trustworthiness of qualitative research when using AI technologies. Ethical considerations, such as data security and privacy, also need to be addressed in research settings. …”
    Get full text
    Article
  2. 682

    Personalized Federated Learning for Heterogeneous Residential Load Forecasting by Xiaodong Qu, Chengcheng Guan, Gang Xie, Zhiyi Tian, Keshav Sood, Chaoli Sun, Lei Cui

    Published 2023-12-01
    “…However, the deep prediction model requires users to provide a large amount of private electricity consumption data, which has potential privacy risks. Edge nodes can federally train a global model through aggregation using federated learning (FL). …”
    Get full text
    Article
  3. 683

    Navigating ethics in HIV data and biomaterial management within Black, African, and Caribbean communities in Canada by Rusty Souleymanov, Bolaji Akinyele-Akanbi, Chinyere Njeze, Patricia Ukoli, Paula Migliardi, Linda Larcombe, Gayle Restall, Laurie Ringaert, Michael Payne, John Kim, Wangari Tharao, Ayn Wilcox

    Published 2025-01-01
    “…Abstract Background This study explored the ethical issues associated with community-based HIV testing among African, Caribbean, and Black (ACB) populations in Canada, focusing on their perceptions of consent, privacy, and the management of HIV-related data and bio-samples. …”
    Get full text
    Article
  4. 684

    Relative Applicability of Diverse Automatic Speech Recognition Platforms for Transcription of Psychiatric Treatment Sessions by Rana Zeeshan, John Bogue, Mamoona Naveed Asghar

    Published 2025-01-01
    “…Although such models are good enough for most use cases, storing audio recordings in psychiatry complicates the data handling and adoption of ASR platforms in mental healthcare. …”
    Get full text
    Article
  5. 685

    Sexting in young adults’ social networks in Brazil: an exploratory study on the circulation of nudes by Aroldo de Lara Cardoso Júnior, Liliana Liviano Wahba

    Published 2025-06-01
    “…Results A negative statistical correlation between Problematic Internet Use and body satisfaction was found, with 4 thematic categories emerging in qualitative data: (1) feeling of being pressured, (2) nudes as a condition for further social contact, (3) conformity to body standards and (4) fear of undue exposure and loss of control. …”
    Get full text
    Article
  6. 686

    The Risk of Linked Census Data to Transgender Youth by Abraham Flaxman, Os Keyes

    Published 2025-03-01
    “…Our simulation found that the TopDown configuration attains the maximum achievable level of privacy protection against such an attack. Our results demonstrate the importance of disclosure avoidance for census data and suggest that the TopDown approach used by the Census Bureau is a substantial improvement compared to the previous approach, achieving the maximum level of privacy protection possible against such a linkage attack. …”
    Get full text
    Article
  7. 687

    Time Series Classification Using Federated Convolutional Neural Networks and Image-Based Representations by Felipe A. R. Silva, Omid Orang, Fabricio Javier Erazo-Costa, Petronio C. L. Silva, Pedro H. Barros, Ricardo P. M. Ferreira, Frederico Gadelha Guimaraes

    Published 2025-01-01
    “…Federated Learning (FL) enables collaborative training across distributed clients while ensuring data privacy. The method’s effectiveness is evaluated using 40 datasets from the UCR Archive. …”
    Get full text
    Article
  8. 688

    Photography in the Age of Surveillance: Ethics and the Photographer’s Responsibility by Çeyiz MAKAL FAIRCLOUGH

    Published 2025-04-01
    “…It addresses key issues of privacy, ethics and the limits of photographic practice, particularly in relation to the potential for exploitation and voyeurism. …”
    Get full text
    Article
  9. 689

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…However, the vulnerabilities in the underlying smart city technologies, interconnection of heterogeneous devices, and transfer of data over the open public channels expose these networks to a myriad of security and privacy threats. …”
    Get full text
    Article
  10. 690

    FedSW-TSAD: SWGAN-Based Federated Time Series Anomaly Detection by Xiuxian Zhang, Hongwei Zhao, Weishan Zhang, Shaohua Cao, Haoyun Sun, Baoyu Zhang

    Published 2025-06-01
    “…As distributed sensing technologies evolve, the collection of time series data is becoming increasingly decentralized, which introduces serious challenges for both model training and data privacy protection. …”
    Get full text
    Article
  11. 691

    Federated target trial emulation using distributed observational data for treatment effect estimation by Haoyang Li, Chengxi Zang, Zhenxing Xu, Weishen Pan, Suraj Rajendran, Yong Chen, Fei Wang

    Published 2025-07-01
    “…Abstract Target trial emulation (TTE) aims to estimate treatment effects by simulating randomized controlled trials using real-world observational data. Applying TTE across distributed datasets shows great promise in improving generalizability and power but is always infeasible due to privacy and data-sharing constraints. …”
    Get full text
    Article
  12. 692

    Generating unseen diseases patient data using ontology enhanced generative adversarial networks by Chang Sun, Michel Dumontier

    Published 2025-01-01
    “…Abstract Generating realistic synthetic health data (e.g., electronic health records), holds promise for fundamental research, AI model development, and enhancing data privacy safeguards. …”
    Get full text
    Article
  13. 693

    Predicting financial default risks: A machine learning approach using smartphone data by Shinta Palupi, Gunawan, Ririn Kusdyawati, Richki Hardi, Rana Zabrina

    Published 2024-11-01
    “…This study leverages machine learning (ML) techniques to predict financial default risks using smartphone data, providing a novel approach to financial risk assessment. …”
    Get full text
    Article
  14. 694

    Sample selection using multi-task autoencoders in federated learning with non-IID data by Emre Ardıç, Yakup Genç

    Published 2025-01-01
    “…Federated learning is a machine learning paradigm in which multiple devices collaboratively train a model under the supervision of a central server while ensuring data privacy. However, its performance is often hindered by redundant, malicious, or abnormal samples, leading to model degradation and inefficiency. …”
    Get full text
    Article
  15. 695

    Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing by Paromita Goswami, Neetu Faujdar, Ghanshyam Singh, Kanta Prasad Sharma, Ajoy Kumar Khan, Somen Debnath

    Published 2024-01-01
    “…To address these issues, we suggest proposing a partial signature-based data auditing system so that both privacy and accuracy can be fortified while reducing the computational cost associated with auditing processes significantly. …”
    Get full text
    Article
  16. 696

    Synthetic Financial Data: A Case Study Regarding Polish Limited Liability Companies Data by Aleksandra Szymura

    Published 2024-07-01
    “…Due to the statistical similarity with real data, they can be used instead of them. This action allows data to be shared externally while guaranteeing their privacy. …”
    Get full text
    Article
  17. 697

    It’s Fine If Others Do It Too: Privacy Concerns, Social Influence, and Political Expression on Facebook in Canada, France, Germany, the United Kingdom, and the United States by Christian Pieter Hoffmann, Shelley Boulianne

    Published 2024-10-01
    “…We use survey data gathered in 2023 from Canada, France, Germany, the United Kingdom, and the United States ( n  = 5,936). …”
    Get full text
    Article
  18. 698

    Predicting digital contact tracing tool adoption during COVID-19 from the perspective of TAM: The role of trust, fear, privacy, anxiety, and social media by Adi Alsyouf, Ala’a M Al-Momani, Nizar Alsubahi, Abdalwali Lutfi, Khalid Anwer Al-Mugheed, Mohammed Amin Almaiah, Rami J Anshasi, Main Naser Alolayyan, Abdallah Alsaad, Mahmaod Alrawad

    Published 2025-05-01
    “…This study investigates the key determinants of DCT adoption and acceptance by integrating the Technology Acceptance Model (TAM) with psychological, social, and regulatory factors related to the context of the study. Methods Using a quantitative, cross-sectional design, data were collected from Saudi participants through an online survey and analysed using Structural Equation Modeling (SEM) with SmartPLS4. …”
    Get full text
    Article
  19. 699

    Strong Association of Perceived Chronic Stress with Leadership Quality, Work–Privacy Conflict and Quantitative Work Demands: Results of the IMPROVE<i>job</i> Study by Julian Göbel, Lukas Degen, Karen Minder, Monika A. Rieger, Birgitta M. Weltermann

    Published 2025-05-01
    “…The factors associated with lower perceived chronic stress were identified using a multilevel regression model approach. The model showed a significant association with less work–privacy conflict (<i>p</i> < 0.001, <i>β</i> = 0.31), lower quantitative work demands (<i>p</i> < 0.001, <i>β</i> = 0.28), and good leadership quality (<i>p</i> < 0.001, <i>β</i> = −0.22). …”
    Get full text
    Article
  20. 700

    Big data, big responsibilities by Primavera De Filippi

    Published 2014-01-01
    “…With the advent of cloud computing, specialised data centres with powerful computational hardware and software resources can be used for processing and analysing a humongous amount of aggregated data coming from a variety of different sources. …”
    Get full text
    Article