Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
-
641
The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles
Published 2025-05-01“…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
Get full text
Article -
642
Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks
Published 2024-10-01“…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
Get full text
Article -
643
Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method
Published 2024-11-01“…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
Get full text
Article -
644
Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia
Published 2022-12-01“…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
Get full text
Article -
645
Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study
Published 2025-07-01“…BackgroundWhile artificial intelligence (AI) has revolutionized medical diagnostics, conventional centralized AI models for medical image analysis raise critical concerns regarding data privacy and security. Swarm learning (SL), a decentralized machine learning framework, addresses these limitations by enabling collaborative model training through secure parameter aggregation while preserving data locality. …”
Get full text
Article -
646
Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning
Published 2025-01-01“…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
Get full text
Article -
647
Blockchain oracles for decentralized agricultural insurance using trusted IoT data
Published 2025-01-01“…Initially, a method for computing the direct reputation score of IoT devices based on behavioral and data reputation is illustrated. Next, a privacy preserved decentralized oracle mechanism is designed and implemented using a masked secret sharing and secure aggregation scheme. …”
Get full text
Article -
648
-
649
-
650
Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR
Published 2025-12-01“…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
Get full text
Article -
651
Privacy Matters: Experiences of Rural and Remote Emergency Department Patients – A Mixed-Methods Research Conducted in Newfoundland and Labrador, Canada
Published 2025-02-01“…Methods: This study used a mixed-methods design, gathering quantitative and qualitative data using a telephone survey and semi-structured interviews. …”
Get full text
Article -
652
Data Security Model Using (AES-LEA) Algorithms for WoT Environment
Published 2025-06-01“…Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. …”
Get full text
Article -
653
Social Engineering Threat Analysis Using Large-Scale Synthetic Data
Published 2025-02-01“…Our model achieved an accuracy of 0.8984 and an F1 score of 0.9253, demonstrating its effectiveness in detecting social engineering attacks. The use of synthetic data overcomes the problem of lack of availability of real-world data due to privacy issues, and is demonstrated in this work to be safe, scalable, ethics friendly and effective.…”
Get full text
Article -
654
Automatisk Nummerpladegenkendelse (ANPG)
Published 2022-04-01“…The wider scope of personal data used in investigations increasingly threatens the right to privacy. …”
Get full text
Article -
655
Data Protection in Employment: Implications of the Personal Data Protection Act in Tanzania
Published 2025-07-01“…Innovations in technology, their varied uses, and the widespread use of social media have all advanced more quickly than in the past, both globally and in the workplace, where employee and customer data is constantly being collected and digitally documented. …”
Get full text
Article -
656
Risk assessment of data protection in the maritime industry using system-theoretic process analysis
Published 2025-06-01“…Data protection assessment is a significant issue to security and privacy enhancement. …”
Get full text
Article -
657
Architectural Design for Data Security in Cloud-based Big Data Systems
Published 2024-09-01“…The architectural style and structure chosen for a system should be based on the non-functional system requirements. Big Data technologies are used to store handles huge amounts of operational data in the public domain. …”
Get full text
Article -
658
Islands of data: cultivating an open data landscape for sustainable development in the Caribbean
Published 2024-12-01“…Efforts made towards data-sharing must consider privacy, security and the ethical use of information, and the tension between data as a social good and data for commercial gain can be a determinant of data-sharing decisions. …”
Get full text
Article -
659
PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach
Published 2025-03-01Get full text
Article -
660
How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries
Published 2019-03-01“…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
Get full text
Article