Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,841 - 1,860 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.14s Refine Results
  1. 1841

    Lessons from Henrietta Lacks inform a transparency framework to catalyze generative artificial intelligence in medicine by Tej D. Azad, Anmol Warman, Deven McGraw, Suchi Saria

    Published 2025-05-01
    “…The integration of generative artificial intelligence (AI) tools into healthcare poses significant challenges concerning data privacy and governance. Drawing on the historical vignette of Henrietta Lacks, this perspective examines the implications of using generative AI in clinical settings. …”
    Get full text
    Article
  2. 1842

    Investigating the Key Trends in Applying Artificial Intelligence to Health Technologies: A Scoping Review. by Tawil Samah, Merhi Samar

    Published 2025-01-01
    “…<h4>Background</h4>The use of Artificial Intelligence (AI) is exponentially rising in the healthcare sector. …”
    Get full text
    Article
  3. 1843

    Factors leading to the adoption of blockchain technology in financial reporting by Shaiku Shahida Saheb, Venkata Krishna Reddy Chinnapareddy, Divya Devalla, Sirisha Charugulla, Naga Bhavani Chakka, Kunchakara Raja Sekhar

    Published 2025-08-01
    “…This research analyzed accounting professionals’ awareness of information and communication technologies (ICT), data security, data privacy, and training among accounting professionals. …”
    Get full text
    Article
  4. 1844

    Ethical Challenges of Applying Advanced Technologies in Medical Education: A Scoping Review by Shayan Khaje Hosaini, Mahdi Khayatan, Hossein Sadeghi, Feze Ebrahimi

    Published 2025-02-01
    “…The results showed that the most important common ethical challenges in modern technologies such as artificial intelligence, simulators, big data, information technology, and digital social media included privacy protection, bias, and lack of accountability. …”
    Get full text
    Article
  5. 1845

    IoT-enabled real-time health monitoring system for adolescent physical rehabilitation by Jie Yang, Juanjuan Hu, Wenrui Chen

    Published 2025-05-01
    “…To evaluate the system’s performance, experiments were conducted to assess motion pattern recognition accuracy, response time, real-time analysis capabilities, and system stability and capacity. The methods we use and the data we collect are from public datasets, do not involve privacy protection for adolescents, and have been approved by the institutional ethics committee. …”
    Get full text
    Article
  6. 1846

    Navigating the digital transformation: industry 4.0's role in modern healthcare by Phonchai Thongwichian

    Published 2024-07-01
    “…Key findings include the prevalent use of data analytics and AI in enhancing patient care and operational efficiencies, and the emerging challenges related to data privacy and ethical considerations. …”
    Get full text
    Article
  7. 1847

    Development of Energy Demand Profile Based on Non-Historical and Non-Energy Variables: A Headquarters’ Offices Case Study by Juliana Cruz, Isabel Lasierra, Yassine Rqiq, Víctor Ballestín

    Published 2025-01-01
    “…Under the Positive Energy Districts framework, cities authorities must be informed of the energy demand of districts to design tailor-made policies and strategies to promote the deployment of energy efficiency, sharing and transition actions. However, the diverse data sources and long procedures to collect data because of privacy permissions may result in a slow-down of the development of these roadmaps. …”
    Get full text
    Article
  8. 1848

    Systematic Review of Usability Factors, Models, and Frameworks with Blockchain Integration for Secure Mobile Health (mHealth) Applications by Irum Feroz, Nadeem Ahmad

    Published 2024-12-01
    “…Findings from RQ2 highlighted gaps in usability models, such as the lack of age-specific guidance for multimodal interaction, error recovery, and data privacy. These results underscore the need to define a new usability framework and incorporate blockchain to meet the unique needs of older adults in mHealth applications, supporting both secure and accessible healthcare management.…”
    Get full text
    Article
  9. 1849

    An eye for an ‘I:’ a critical assessment of artificial intelligence tools in migration and asylum management by Lucia Nalbandian

    Published 2022-08-01
    “…Abstract The promise of artificial intelligence has been originally to put technology at the service of people utilizing powerful information processors and ‘smart’ algorithms to quickly perform time-consuming data analysis. It soon though became apparent that the capacity of artificial intelligence to scrape and analyze big data would be particularly useful in surveillance policies. …”
    Get full text
    Article
  10. 1850

    Heterogeneity in willingness to share personal health information: a nationwide cluster analysis of 20,000 adults in Japan by Miho Sassa, Akifumi Eguchi, Keiko Maruyama-Sakurai, Takanori Fujita, Yumi Kawamura, Takayuki Kawashima, Yuta Tanoue, Daisuke Yoneoka, Hiroaki Miyata, Takanori Yamashita, Naoki Nakashima, Shuhei Nomura

    Published 2025-04-01
    “…The survey examined willingness to share personal health information with nine types of recipients (healthcare providers, ambulance crew, application providers, family members, local authorities, employers, pharmaceutical companies, government agencies, and research institutions), trust levels in these recipients, and 17 factors influencing sharing decisions across health benefits, convenience, economic incentives, social significance, information details, transparency, and privacy considerations. Clustering analysis using Uniform Manifold Approximation and Projection (UMAP) and Ordering Points to Identify the Clustering Structure (OPTICS) algorithms was performed to identify distinct patterns in sharing preferences. …”
    Get full text
    Article
  11. 1851
  12. 1852

    Key digital health literacy competencies for citizens – A Delphi study by Mika Uitto, Merja Hoffrèn-Mikkola, Leena Paakkari

    Published 2025-07-01
    “…Qualitative and quantitative methods were used to analyse the data. Results A broad list of competencies was produced, and the 17 most important were identified. …”
    Get full text
    Article
  13. 1853

    Exploring Youth Perspectives on Digital Mental Health Platforms: Qualitative Descriptive Study by Sarah Daniel, Lauren Volcko, Emilie Bassi, Julia Hews-Girard, Katherine Bright, Marianne Barker, Lia Norman, Karina Pintson, Geneca Henry, Sumaya Soufi, Chukwudumbiri Efrem Omorotionmwan, Melanie Fersovitch, Leanne Stamp, Karen Moskovic, David W Johnson, Gina Dimitropoulos

    Published 2025-05-01
    “…ResultsParticipants emphasized the importance of privacy, security, and personalization in building trust in the platform, with 72% (28/39) reporting that clear communication about data protection would increase their likelihood of use. …”
    Get full text
    Article
  14. 1854

    Interactive Applications with Artificial Intelligence: The Role of Trust among Digital Assistant Users by Pur Purwanto, Kuswandi Kuswandi, Fatmah Fatmah

    Published 2020-06-01
    “…The purpose of the present study was to analyze the effects of controllability, synchronicity, bidirectionality on perceived performance and user satisfaction with digital assistant applications as moderated by perceived trust. Amos 22.0 was used to analyze a sample of 150 digital assistant users of brands Samsung Bixby, Google Assistant, Apple Siri, and other brands.Results show that bidirectionality is the most worrying feature in terms of perceived performance of digital assistants related to trust and privacy protection issues of personal data, whereas the other two features contribute to perceived performance and digital assistant users’ satisfaction. …”
    Get full text
    Article
  15. 1855

    Evaluating Smart Home Usability and Accessibility in Early Detection and Intervention of Mental Health Challenges Among Older Adults: A Narrative Review and Framework by Mohammad Mahdi Fakhimi, Adriana Hughes, Alisson M. Gustavson

    Published 2025-01-01
    “…In total, 34 relevant studies met the inclusion criteria, and also, a standardized quality assessment tool was used to evaluate the methodological soundness of the included studies. …”
    Get full text
    Article
  16. 1856

    Barriers and sources of information in prostate cancer screening at a South African hospital by Boitumelo M. Komane, Annah Mosalo

    Published 2025-04-01
    “…Methods: A qualitative, exploratory study was conducted with 19 conveniently selected men attending the specific clinic. Data were analysed using thematic analysis. Results: Three themes emerged which were (1) barriers to screening, (2) sources of information regarding prostate cancer and (3) symptoms experienced during screening. …”
    Get full text
    Article
  17. 1857

    Studi Desktiptif: Persepsi Mahasiswa Ilmu Forensik terhadap Konsep Cyberstalking by Ainun Jaryah Bahrir

    Published 2020-05-01
    “…The technique of collecting research data is by distributing closed questionnaires. Research data analysis technique is a descriptive analysis technique, describing data obtained using tables and graphs. …”
    Get full text
    Article
  18. 1858

    Nurses’ perceptions of artificial intelligence (AI) integration into practice: An integrative review by Lester Lora, Paula Fo

    Published 2024-09-01
    “…However, nurses show concerns about ethical implications for data privacy, and the potential deskilling of human expertise. …”
    Get full text
    Article
  19. 1859

    Human activity recognition algorithm based on the spatial feature for WBAN by Chi JIN, Zhijun LI, Dayang SUN, Fengye HU

    Published 2019-09-01
    “…Traditional image-based activity recognition algorithms have some problems,such as high computational cost,numerous blind spots and easy privacy leakage.To solve the problem above,the CCLA (convolution-convolutional long short-term memory-attention) activity recognition algorithm based on the acceleration and gyroscope data was proposed.The convolutional neural network was used to extract spatial features of activity data and got the hidden time series information from the convolutional long short-term memory network.Simulating human brain selecting attention mechanism,attention-encoder was constructed to extract the spatial and temporal features at a higher level.The CCLA algorithm was tested on UCI-HAPT (university of California Irvine-smartphone-based recognition of human activities and postural transitions) public data set,and realized the classification of 12 types of activity with the accuracy of 93.27%.…”
    Get full text
    Article
  20. 1860

    Any Bluetooth device can be hacked. Know how? by Prathibha Muraleedhara, Mary Subaja Christo, Jaya J, Yuvasini  D

    Published 2024-01-01
    “…Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain.…”
    Get full text
    Article