Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,121 - 1,140 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.17s Refine Results
  1. 1121

    Utilizing Artificial neural networks (ANN) to regulate Smart cities for sustainable Urban Development and Safeguarding Citizen rights by Zhen Kuang, Junyu Su, Ahmad Latifian, Sanli Eshraghi, Alireza Ghafari

    Published 2024-12-01
    “…However, as cities become increasingly interconnected and data-dependent, concerns related to data privacy and security, as well as citizen participation and representation, have surfaced. …”
    Get full text
    Article
  2. 1122

    Controlled quantum authentication confidential communication protocol for smart healthcare by Yefeng He, Jiaqiang Fan, Yichi Zhang

    Published 2025-05-01
    “…In this process, it is essential to ensure the legal identity of both parties to the communication and to protect patient privacy data from unlawful interception and tampering. …”
    Get full text
    Article
  3. 1123

    A scoping review by I Gusti Ayu Tirtayani, I Made Wardana, Putu Yudi Setiawan, I Gst. Ngr. Jaya Agung Widagda K

    Published 2024-11-01
    “…However, challenges such as data privacy concerns, algorithmic biases, and the need for greater transparency are also noted. …”
    Get full text
    Article
  4. 1124

    This Person Does Exist by Matthias Schäfer

    Published 2021-07-01
    “…Finally, I argue that this artistic practice is a legitimate way of opening up a larger public discourse, although artists working with human data must be aware of ethical issues and responsibilities regarding privacy and consent. …”
    Get full text
    Article
  5. 1125

    Challenges in Adopting Artificial Intelligence Technologies in Supply Chain Management in Romanian Companies by Radu RUGIUBEI, Valentin STOICA

    Published 2025-03-01
    “…Key challenges identified include high implementation costs, data quality issues, and ethical concerns related to data privacy and algorithmic transparency. …”
    Get full text
    Article
  6. 1126

    The impact of artificial intelligence on research efficiency by Mitra Madanchian, Hamed Taherdoost

    Published 2025-06-01
    “…However, challenges such as bias in algorithms, concerns about data privacy, and deficiencies in the infrastructure impede wide-scale application. …”
    Get full text
    Article
  7. 1127

    Artificial Intelligence in Thoracic Surgery: Transforming Diagnostics, Treatment, and Patient Outcomes by Sara Lopes, Miguel Mascarenhas, João Fonseca, Maria Gabriela O. Fernandes, Adelino F. Leite-Moreira

    Published 2025-07-01
    “…AI-based tools can be employed in medicine, and by extracting useful information from big data, they allow for the early diagnosis of diseases like lung cancer. …”
    Get full text
    Article
  8. 1128

    Medical Photography in Dermatology: Quality and Safety in the Referral Process to Secondary Healthcare by Eduarda Castro Almeida, João Rocha-Neves, Ana Filipa Pedrosa, José Paulo Andrade

    Published 2025-06-01
    “…<b>Background:</b> Medical photography is widely used in dermatology referrals to secondary healthcare, yet concerns exist regarding image quality and data security. …”
    Get full text
    Article
  9. 1129

    Edge-Assisted Label-Flipping Attack Detection in Federated Learning by Nourah S. AlOtaibi, Muhamad Felemban, Sajjad Mahmood

    Published 2024-01-01
    “…Federated Learning (FL) has transformed machine learning by facilitating decentralized, privacy-focused data processing. Despite its advantages, FL remains vulnerable to data poisoning attacks, particularly Label-Flipping Attacks (LFA). …”
    Get full text
    Article
  10. 1130

    How do we measure the costs, benefits, and harms of sharing data from biomedical studies? A protocol for a scoping review [version 2; peer review: 2 approved] by Lauren Maxwell, Ankur Krishnan, Priya Shreedhar

    Published 2025-01-01
    “…In this scoping review, we will identify and summarize existing evidence on the positive and negative impacts and costs of data sharing and how they are measured. Methods and analysis Eligible studies will report on qualitative or quantitative approaches for measuring the cost of data sharing or its impact on participant privacy, individual or public health, researcher’s careers, clinical or public health practice, or research or development. …”
    Get full text
    Article
  11. 1131

    Revolutionizing Education: Harnessing Machine Learning and Deep Learning for Digital Examination Transformation by Shilpi Gautam, Asadi Srinivasulu

    Published 2023-12-01
    “…Furthermore, substantial concerns revolve around data security and privacy. The digital examination process entails the collection and secure storage of sensitive student data, raising worries about potential data security breaches and violations of privacy. …”
    Get full text
    Article
  12. 1132

    Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence by Jia LIU

    Published 2024-07-01
    “…Technical risks include data security vulnerabilities and model bias, while ethical risks focus on the issues surrounding user privacy, misinformation, and intellectual property rights. …”
    Get full text
    Article
  13. 1133

    Enhancing retinal disease diagnosis through AI: Evaluating performance, ethical considerations, and clinical implementation by Maryam Fatima, Praveen Pachauri, Wasim Akram, Mohd Parvez, Shadab Ahmad, Zeinebou Yahya

    Published 2024-09-01
    “…However, several studies highlighted concerns about algorithmic bias, data privacy, and the need for diverse and representative datasets to ensure generalizability across different populations. …”
    Get full text
    Article
  14. 1134

    CogTrack: A Proof of Concept for Cognition Tracker by Yesoda Bhargava, Kanthi Kumar Kattupalli, Veeky Baths

    Published 2024-01-01
    “…Additionally, we discuss how CogTrack may be advanced in the future and reflect on critical issues related to data privacy, confidentiality, ethics, scalability, and socio-medical factors which influence CogTrack adoption and acceptability. …”
    Get full text
    Article
  15. 1135

    Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ by Stefanus Eko Prasetyo, Haeruddin, Tiara

    Published 2024-12-01
    “… This study aims to analyze and evaluate the vulnerability of Insecure Direct Object Reference (IDOR) in the thesis registration web application at XYZ University, as well as to provide improvement recommendations to enhance the security of students' personal data. The IDOR vulnerability allows unauthorized access to students' personal documents, which can jeopardize privacy and information security. …”
    Get full text
    Article
  16. 1136
  17. 1137

    Tree-to-Me: Standards-Driven Traceability for Farm-Level Visibility by Ya Cho, Arbind Agrahari Baniya, Kieran Murphy

    Published 2025-04-01
    “…These systems also fail to standardise and integrate diverse data sources, ensure data privacy, and scale effectively to meet the demands of modern agriculture. …”
    Get full text
    Article
  18. 1138

    Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks by Salah T. Alshammari, Muna Al-Razgan, Taha Alfakih, Khalid A. AlGhamdi

    Published 2024-01-01
    “…A significant concern in the field of cloud computing is the security and confidentiality of data. A cryptographic access control technique can be used to guarantee data privacy, which prevents unauthorized access and allows only authorized users to access the data. …”
    Get full text
    Article
  19. 1139

    SimProx: A Similarity-Based Aggregation in Federated Learning With Client Weight Optimization by Ayoub El-Niss, Ahmad Alzu'Bi, Abdelrahman Abuarqoub, Mohammad Hammoudeh, Ammar Muthanna

    Published 2024-01-01
    “…Federated Learning (FL) enables decentralized training of machine learning models across multiple clients, preserving data privacy by aggregating locally trained models without sharing raw data. …”
    Get full text
    Article
  20. 1140