Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1561
Recommendations for reporting regression-based norms and the development of free-access tools to implement them in practice.
Published 2025-01-01“…Following our recommendations, any user can access the underlying models while data privacy is maintained. This approach ensures broad accessibility and practical application of norms, allowing other researchers to accurately interpret their individual data against such norms.…”
Get full text
Article -
1562
Telemedicine for HIV care: a cross-sectional survey of people living with HIV receiving care at two federally qualified health centers in Los Angeles during a mature phase of the C...
Published 2024-12-01“…Most had consistent access to privacy (88%, n = 239), and those without privacy noted this as a barrier to the use of telemedicine. …”
Get full text
Article -
1563
MEDIA IN AN ERA OF DIGITAL GLOBALIZATION: THE ETHICAL PERSPECTIVES
Published 2024-07-01“…It addresses issues related to media ethics, social media use, data privacy, and the impact of legislation on digital citizenship. …”
Get full text
Article -
1564
Trust, Performance, and Value: Predicting Student Intentions to Adopt Digital Record Applications
Published 2024-11-01“…These findings suggested that the UTAUT framework, commonly used in technology adoption studies, may need to be adapted to incorporate demographic and contextual factors, especially trust-related variables, in environments where data privacy is critical. …”
Get full text
Article -
1565
Bridging the Gap: Leveraging AI to Address Talent Shortages in Organizations
Published 2025-06-01“…However, it also reveals ongoing challenges with AI biases, ethical concerns, and data privacy. These issues necessitate transparency, regular audits, and comprehensive training for HR professionals to ensure the responsible and effective use of AI. …”
Get full text
Article -
1566
brain2print AI powered web tool for creating 3D printable brain models
Published 2025-05-01“…This approach not only simplifies the process but also safeguards user privacy by keeping all data on local hardware.…”
Get full text
Article -
1567
Model interpretability on private-safe oriented student dropout prediction.
Published 2025-01-01“…To address these two issues, we introduced for the first time a modified Preprocessed Kernel Inducing Points data distillation technique (PP-KIPDD), specializing in distilling tabular structured dataset, and innovatively employed the PP-KIPDD to reconstruct new samples that serve as qualified training sets simulating student information distributions, thereby preventing student privacy information leakage, which showed better performance and efficiency compared to traditional data synthesis techniques such as the Conditional Generative Adversarial Networks. …”
Get full text
Article -
1568
A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning
Published 2025-01-01“…FL facilitates decentralized training of models using local data, ensuring privacy, crucial for handling sensitive financial data. …”
Get full text
Article -
1569
Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components
Published 2009-01-01“…In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.…”
Get full text
Article -
1570
FedITD: A Federated Parameter-Efficient Tuning With Pre-Trained Large Language Models and Transfer Learning Framework for Insider Threat Detection
Published 2024-01-01“…However, there exist challenges: 1) Security and privacy concerns prevent data sharing, making it difficult to train robust models and identify new attacks. 2) The diversity and uniqueness of organizations require localized models, as a universal solution could be more effective. 3) High resource costs, delays, and data security concerns complicate building effective detection systems. …”
Get full text
Article -
1571
Exploring opportunities to enhance the quality of pharmacy-based contraceptive service delivery for adolescents and young women in Kenya: a multimethod qualitative study
Published 2025-06-01“…Conclusions Our data suggest multiple avenues to improve contraceptive care quality through efforts to enhance privacy and counseling, with the potential for improved reach, person-centeredness, and ultimately reproductive health outcomes for youth. …”
Get full text
Article -
1572
Identifying High-Priority Ethical Challenges for Precision Emergency Medicine: Nominal Group Study
Published 2025-02-01“…These challenges were organized into a framework with 3 themes: values, privacy, and justice. The framework identified the need to address these themes across 3 time points of the precision medicine process: acquisition of data, actualization in the care setting, and the after effects of its use. …”
Get full text
Article -
1573
The impact of information technology applications on the quality of life of disabled older adults in nursing homes in China: a qualitative study
Published 2025-04-01“…Semi-structured interviews were conducted with 14 disabled older adults, and the data were analyzed using Van Manen’s phenomenology of practice method.ResultsFour main themes and 16 sub-themes were identified: Physical Health and Functional Capacity: subjective health perception, physical functioning, chronic disease management, sleep quality, and nutritional status; Psychological Wellbeing and Emotional Support: attitudes toward aging, negative emotions, emotional companionship, and sense of meaning in life; Social Relationships and Social Engagement: interactions with family and friends, participation in social activities, social roles, and social support; and Environmental Adaptation and Digital Challenges: safety and comfort of the living environment, ease of independent mobility, the ‘digital divide’, and protection of personal privacy and data.ConclusionThe application of information technology in nursing homes in China has partially resolved longstanding issues in traditional older adults care, such as inaccurate health management, lack of personalized and diverse services, and inefficient resource allocation. …”
Get full text
Article -
1574
Zero Knowledge Proof Solutions to Linkability Problems in Blockchain-Based Collaboration Systems
Published 2025-07-01“…Some privacy-preserving mechanisms have been adopted to reduce linkability problems through the integration of access control systems to smart contracts, off-chain data storage, usage of permissioned blockchain, etc. …”
Get full text
Article -
1575
Enhancing Smart Home Security: Blockchain-Enabled Federated Learning with Knowledge Distillation for Intrusion Detection
Published 2025-02-01“…The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. …”
Get full text
Article -
1576
ASKfm: Motives of Self-Disclosure to Anonymous Questions
Published 2018-11-01“…By using in-depth interview, data were collected from three males and three females aged 18 to 24 years old. …”
Get full text
Article -
1577
Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer
Published 2025-07-01“…Commitment schemes (CSs) are essential to many cryptographic protocols and schemes with applications that include privacy-preserving computation on data, privacy-preserving authentication, and, in particular, oblivious transfer protocols. …”
Get full text
Article -
1578
Prevention and Detection Methods for Enhancing Security in an RFID System
Published 2012-08-01“…Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy threats due to computational constraint. This paper proposes the use of both prevention and detection techniques to solve the security and privacy issues. …”
Get full text
Article -
1579
An Efficient Edge-Based System for Nucleated Oval-Shaped Red Blood Cell Counting
Published 2024-01-01“…Leveraging Multi-access Edge Computing (MEC) technology, the system ensures efficient data processing, privacy preservation, and ease of use through a user-friendly web interface. …”
Get full text
Article -
1580
Trust in Generative AI Tools: A Comparative Study of Higher Education Students, Teachers, and Researchers
Published 2025-07-01“…Using survey data from 823 participants across different academic roles, this study employs multiple regression analysis to explore the relationship between trust, user characteristics, and behavioral intention. …”
Get full text
Article