Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
2021
Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors
Published 2025-04-01“…This study explores the factors influencing college students’ acceptance and resistance toward generative AI technologies by integrating three theoretical frameworks: the Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Social Exchange Theory (SET). Using data from 407 respondents collected through a structured survey, the study employed Structural Equation Modeling (SEM) to examine how functional factors (perceived usefulness, ease of use, and reliability), risk factors (privacy concerns, data security, and ethical issues), and sociolegal factors (trust in governance and regulatory frameworks) impact user attitudes. …”
Get full text
Article -
2022
Multimodal Detection of Agitation in People With Dementia in Clinical Settings: Observational Pilot Study
Published 2025-07-01“…ObjectiveThis study proposes a novel, multimodal system for predicting AA episodes in individuals with severe dementia, integrating wearable sensor data and privacy-preserving video analytics. …”
Get full text
Article -
2023
Toward Secure and Transparent Global Authentication: A Blockchain-Based System Integrating Biometrics and Subscriber Identification Module
Published 2025-01-01“…This approach safeguards user privacy and data security. By employing blockchain technology, B2-GAS eliminates SPOFs, ensures tamper-proof transaction storage, and guarantees transparency. …”
Get full text
Article -
2024
Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme
Published 2025-03-01“…With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. …”
Get full text
Article -
2025
Revolutionizing Imaging Design Content With AIGC: User-Centered Challenges, Opportunities, and Workflow Evolution
Published 2025-01-01“…Technological maturity and public acceptance serve as key adoption drivers, while social construction and innovation underscore AI’s capacity to foster creativity and design diversity. Ethics and privacy reflect user concerns over data security, whereas learning costs negatively affect adoption due to perceived complexity. …”
Get full text
Article -
2026
Fine-Tuned YOLO Model for Monitoring Children Across Medical Scenes Based on a Large-Scale Real-World Dataset for Children Detection
Published 2025-01-01“…Accurate detection and monitoring of children in medical settings using computer vision systems present unique challenges due to anatomical differences, environmental complexity, and stringent privacy constraints. …”
Get full text
Article -
2027
The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers
Published 2022-06-01“… Dynamic navigation devices like Global Positioning Systems (GPSs) are deployed for various purposes in different areas and these devices are usually the central point of interest of various groups like hackers to exploit the data sent and received by GPS systems. The GPS data is usually manipulated using spoofing attacks. …”
Get full text
Article -
2028
Multiscale network alignment model based on convolution of homogeneous multilayer graphs
Published 2024-12-01“…In terms of node characteristics, the K-nearest neighbor algorithm was used to aggregate node neighborhood information to model the deep network structure, so as to enhance the data. …”
Get full text
Article -
2029
The IoT and AI in Agriculture: The Time Is Now—A Systematic Review of Smart Sensing Technologies
Published 2025-06-01“…However, this review also identifies critical challenges, including high infrastructure costs, limited interoperability, connectivity constraints in rural areas, and ethical concerns regarding transparency and data privacy. To address these barriers, recent innovations have emphasized the potential of Edge AI for local inference, blockchain systems for decentralized data governance, and autonomous platforms for field-level automation. …”
Get full text
Article -
2030
Investigating the impact of publicly announced information security breaches on corporate risk factor disclosure tendencies
Published 2019-01-01“…We pay particular attention to organizations that have suffered a data breach, as determined by the Privacy Rights Clearinghouse (PRC). …”
Get full text
Article -
2031
Blockchain in maritime: applications, effects and challenges
Published 2025-07-01“…To prevent issues such as information concealment and privacy breaches, these stakeholders often establish complex and multi-layered data exchange processes, which significantly reduce the operational efficiency of the shipping market. …”
Get full text
Article -
2032
Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
Published 2024-09-01“…The architecture, implemented on a private Ethereum network using Hyperledger Besu and Tessera, ensures secure and transparent transactions, robust dispute resolution, and fraud prevention mechanisms. …”
Get full text
Article -
2033
Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting
Published 2025-01-01“…Artificial Intelligence tools, using natural language processing and machine learning, streamline data extraction. - Despite their benefits, organizations face challenges in selecting the right Artificial Intelligence-driven Knowledge Management software due to a lack of standardized evaluation frameworks. …”
Get full text
Article -
2034
BSLISE directory: innovating global mapping and organization of LIS schools
Published 2025-03-01“…Evolving from the MAP project, the BSLISE directory consolidates and adapts data into a new framework using open-source software. …”
Get full text
Article -
2035
Integrating an AI platform into clinical IT: BPMN processes for clinical AI model development
Published 2025-07-01“…To facilitate the architecture of the AI platform, BPMN diagrams of all the identified processes are created. Clinical use cases are used to evaluate the processes using the FEDS framework. …”
Get full text
Article -
2036
Who are MaaS avoiders, wanderers or enthusiasts and what drives their intentions to adopt MaaS?
Published 2025-12-01“…This study integrates the Unified Theory of Technology Acceptance and Use (UTAUT) and Status Quo Bias (SQB) theories and draws on survey data covering nine dimensions: performance expectancy, effort expectancy, social influence, individual innovation, transition costs, sunk costs, inertia and resistance to use. …”
Get full text
Article -
2037
New secure distributed secret sharing scheme of n product
Published 2014-11-01“…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
Get full text
Article -
2038
Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China
Published 2025-02-01“…The findings revealed that students demonstrated moderate familiarity with AI tools, particularly ChatGPT and willingness to use them in coursework. Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
Get full text
Article -
2039
Clinicians’ perspectives on the adoption and implementation of EMR-integrated clinical decision support tools in primary care
Published 2025-04-01“…There are many concerns with the use of EMR-integrated CDS tools in primary care that should be considered including evidence of the tool's effectiveness, data security and privacy protocols, workflow integration, and clinician burden.…”
Get full text
Article -
2040
Phenomena of Malaysian, and Japanese Languages from an Intercultural Communication Perspective
Published 2024-01-01“…Employing a qualitative method, supplemented with an ethnographic approach tailored to how researchers gather data, this study examined Japanese language phenomena and language phenomena used in the Malayan Peninsula region (Singapore and Malaysia) over five days. …”
Get full text
Article