Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,561 - 1,580 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.15s Refine Results
  1. 1561

    Recommendations for reporting regression-based norms and the development of free-access tools to implement them in practice. by Rok Blagus, Bojan Leskošek, Francisco B Ortega, Grant Tomkinson, Gregor Jurak

    Published 2025-01-01
    “…Following our recommendations, any user can access the underlying models while data privacy is maintained. This approach ensures broad accessibility and practical application of norms, allowing other researchers to accurately interpret their individual data against such norms.…”
    Get full text
    Article
  2. 1562
  3. 1563

    MEDIA IN AN ERA OF DIGITAL GLOBALIZATION: THE ETHICAL PERSPECTIVES by GABRIEL T. NYITSE, STEPHEN WANG

    Published 2024-07-01
    “…It addresses issues related to media ethics, social media use, data privacy, and the impact of legislation on digital citizenship. …”
    Get full text
    Article
  4. 1564

    Trust, Performance, and Value: Predicting Student Intentions to Adopt Digital Record Applications by Mohammad Rizal Gaffar, Tangguh Dwi Pramono, Mamun Sutisna, Abdul Malik Sayuti, Ari Ani Dyah Setyoningrum

    Published 2024-11-01
    “…These findings suggested that the UTAUT framework, commonly used in technology adoption studies, may need to be adapted to incorporate demographic and contextual factors, especially trust-related variables, in environments where data privacy is critical. …”
    Get full text
    Article
  5. 1565

    Bridging the Gap: Leveraging AI to Address Talent Shortages in Organizations by Muhammad ZEESHAN, Umar ALI, Sameer ALI

    Published 2025-06-01
    “…However, it also reveals ongoing challenges with AI biases, ethical concerns, and data privacy. These issues necessitate transparency, regular audits, and comprehensive training for HR professionals to ensure the responsible and effective use of AI. …”
    Get full text
    Article
  6. 1566

    brain2print AI powered web tool for creating 3D printable brain models by Christopher Rorden, Matthew McCormick, Taylor Hanayik, Mohamed Masoud, Sergey M. Plis

    Published 2025-05-01
    “…This approach not only simplifies the process but also safeguards user privacy by keeping all data on local hardware.…”
    Get full text
    Article
  7. 1567

    Model interpretability on private-safe oriented student dropout prediction. by Helai Liu, Mao Mao, Xia Li, Jia Gao

    Published 2025-01-01
    “…To address these two issues, we introduced for the first time a modified Preprocessed Kernel Inducing Points data distillation technique (PP-KIPDD), specializing in distilling tabular structured dataset, and innovatively employed the PP-KIPDD to reconstruct new samples that serve as qualified training sets simulating student information distributions, thereby preventing student privacy information leakage, which showed better performance and efficiency compared to traditional data synthesis techniques such as the Conditional Generative Adversarial Networks. …”
    Get full text
    Article
  8. 1568

    A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning by Sun Rui

    Published 2025-01-01
    “…FL facilitates decentralized training of models using local data, ensuring privacy, crucial for handling sensitive financial data. …”
    Get full text
    Article
  9. 1569

    Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components by Anastasios Fragopoulos, John Gialelis, Dimitrios Serpanos

    Published 2009-01-01
    “…In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.…”
    Get full text
    Article
  10. 1570

    FedITD: A Federated Parameter-Efficient Tuning With Pre-Trained Large Language Models and Transfer Learning Framework for Insider Threat Detection by Zhi Qiang Wang, Haopeng Wang, Abdulmotaleb El Saddik

    Published 2024-01-01
    “…However, there exist challenges: 1) Security and privacy concerns prevent data sharing, making it difficult to train robust models and identify new attacks. 2) The diversity and uniqueness of organizations require localized models, as a universal solution could be more effective. 3) High resource costs, delays, and data security concerns complicate building effective detection systems. …”
    Get full text
    Article
  11. 1571

    Exploring opportunities to enhance the quality of pharmacy-based contraceptive service delivery for adolescents and young women in Kenya: a multimethod qualitative study by Tessa Fujisaki, Dismas Congo Ouma, Merceline Awuor, Cellestine Aoko, Syovata Kimanthi, Elizabeth A. Bukusi, Elizabeth K. Harrington

    Published 2025-06-01
    “…Conclusions Our data suggest multiple avenues to improve contraceptive care quality through efforts to enhance privacy and counseling, with the potential for improved reach, person-centeredness, and ultimately reproductive health outcomes for youth. …”
    Get full text
    Article
  12. 1572

    Identifying High-Priority Ethical Challenges for Precision Emergency Medicine: Nominal Group Study by Christian Rose, Emily Shearer, Isabela Woller, Ashley Foster, Nicholas Ashenburg, Ireh Kim, Jennifer Newberry

    Published 2025-02-01
    “…These challenges were organized into a framework with 3 themes: values, privacy, and justice. The framework identified the need to address these themes across 3 time points of the precision medicine process: acquisition of data, actualization in the care setting, and the after effects of its use. …”
    Get full text
    Article
  13. 1573

    The impact of information technology applications on the quality of life of disabled older adults in nursing homes in China: a qualitative study by Hong Zhang, Xiaoyan Liao, Shuang Liang, Lifang Tong, Jun Shen, Bin Peng, Lin Wu, Lu Gao, Qianying Jia, Liu Ren, Lanyue Luo, Yixin Wang, Xiaoli Zhang

    Published 2025-04-01
    “…Semi-structured interviews were conducted with 14 disabled older adults, and the data were analyzed using Van Manen’s phenomenology of practice method.ResultsFour main themes and 16 sub-themes were identified: Physical Health and Functional Capacity: subjective health perception, physical functioning, chronic disease management, sleep quality, and nutritional status; Psychological Wellbeing and Emotional Support: attitudes toward aging, negative emotions, emotional companionship, and sense of meaning in life; Social Relationships and Social Engagement: interactions with family and friends, participation in social activities, social roles, and social support; and Environmental Adaptation and Digital Challenges: safety and comfort of the living environment, ease of independent mobility, the ‘digital divide’, and protection of personal privacy and data.ConclusionThe application of information technology in nursing homes in China has partially resolved longstanding issues in traditional older adults care, such as inaccurate health management, lack of personalized and diverse services, and inefficient resource allocation. …”
    Get full text
    Article
  14. 1574

    Zero Knowledge Proof Solutions to Linkability Problems in Blockchain-Based Collaboration Systems by Chibuzor Udokwu

    Published 2025-07-01
    “…Some privacy-preserving mechanisms have been adopted to reduce linkability problems through the integration of access control systems to smart contracts, off-chain data storage, usage of permissioned blockchain, etc. …”
    Get full text
    Article
  15. 1575

    Enhancing Smart Home Security: Blockchain-Enabled Federated Learning with Knowledge Distillation for Intrusion Detection by Mohammed Shalan, Md Rakibul Hasan, Yan Bai, Juan Li

    Published 2025-02-01
    “…The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. …”
    Get full text
    Article
  16. 1576

    ASKfm: Motives of Self-Disclosure to Anonymous Questions by Pheseline Felim, Dindin Dimyati, Mohammad Shihab

    Published 2018-11-01
    “…By using in-depth interview, data were collected from three males and three females aged 18 to 24 years old. …”
    Get full text
    Article
  17. 1577

    Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer by Thomas Lorünser, Sebastian Ramacher, Federico Valbusa

    Published 2025-07-01
    “…Commitment schemes (CSs) are essential to many cryptographic protocols and schemes with applications that include privacy-preserving computation on data, privacy-preserving authentication, and, in particular, oblivious transfer protocols. …”
    Get full text
    Article
  18. 1578

    Prevention and Detection Methods for Enhancing Security in an RFID System by Jing Huey Khor, Widad Ismail, Mohammad Ghulam Rahman

    Published 2012-08-01
    “…Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy threats due to computational constraint. This paper proposes the use of both prevention and detection techniques to solve the security and privacy issues. …”
    Get full text
    Article
  19. 1579

    An Efficient Edge-Based System for Nucleated Oval-Shaped Red Blood Cell Counting by Carlo Centofanti, Daniele Lozzi, Ciro Cococcetta, Andrea Marotta

    Published 2024-01-01
    “…Leveraging Multi-access Edge Computing (MEC) technology, the system ensures efficient data processing, privacy preservation, and ease of use through a user-friendly web interface. …”
    Get full text
    Article
  20. 1580

    Trust in Generative AI Tools: A Comparative Study of Higher Education Students, Teachers, and Researchers by Elena Đerić, Domagoj Frank, Marin Milković

    Published 2025-07-01
    “…Using survey data from 823 participants across different academic roles, this study employs multiple regression analysis to explore the relationship between trust, user characteristics, and behavioral intention. …”
    Get full text
    Article