Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,081 - 1,100 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"usedds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 1081

    How participation in deliberative engagement affects awareness of, and attitudes towards, genomics research and data sharing: evidence from rural Ghana by Irene Honam Tsey, Pamela Emefa Selormey, John Ganle, Patricia Akweongo, Paulina Tindana

    Published 2025-07-01
    “…Using a quasi-experimental one-group pretest-posttest design, 66 participants completed a baseline survey assessing awareness of genomic research and attitudes toward data sharing. …”
    Get full text
    Article
  2. 1082

    Is Anonymization Through Discretization Reliable? Modeling Latent Probability Distributions for Ordinal Data as a Solution to the Small Sample Size Problem by Stefan Michael Stroka, Christian Heumann

    Published 2024-10-01
    “…The growing interest in data privacy and anonymization presents challenges, as traditional methods such as ordinal discretization often result in information loss by coarsening metric data. …”
    Get full text
    Article
  3. 1083

    Tanggung Jawab Perusahaan Terhadap Kebocoran Data Pribadi Dari Penggunaan Teknologi Robotic Process Automation (RPA) Menurut Hukum Positif di Indonesia by Yuni Zakira, Busyra Azheri, Anton Rosari

    Published 2025-08-01
    “…This research uses a normative juridical research type. The data used in this research are secondary data consisting of primary legal materials and secondary legal materials. …”
    Get full text
    Article
  4. 1084
  5. 1085

    FLPneXAINet: Federated deep learning and explainable AI for improved pneumonia prediction utilizing GAN-augmented chest X-ray data. by Shuvo Biswas, Rafid Mostafiz, Mohammad Shorif Uddin, Muhammad Shahin Uddin

    Published 2025-01-01
    “…Additionally, the need to protect patient privacy complicates the sharing of sensitive clinical data. …”
    Get full text
    Article
  6. 1086

    Harnessing Moderate-Sized Language Models for Reliable Patient Data Deidentification in Emergency Department Records: Algorithm Development, Validation, and Implementation Study by Océane Dorémus, Dylan Russon, Benjamin Contrand, Ariel Guerra-Adames, Marta Avalos-Fernandez, Cédric Gil-Jardiné, Emmanuel Lagarde

    Published 2025-04-01
    “… Abstract BackgroundThe digitization of health care, facilitated by the adoption of electronic health records systems, has revolutionized data-driven medical research and patient care. While this digital transformation offers substantial benefits in health care efficiency and accessibility, it concurrently raises significant concerns over privacy and data security. …”
    Get full text
    Article
  7. 1087

    Exploring Current Practices and Challenges of HIPAA Compliance in Software Engineering: Scoping Review by Farah Elkourdi, Chenhao Wei, LU Xiao, Zhongyuan YU, Onur Asan

    Published 2024-01-01
    “…Healthcare systems and applications are increasingly used to improve patient care. However, these applications face data security, privacy, and regulatory compliance challenges. …”
    Get full text
    Article
  8. 1088

    Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration by Ziyuan Zhou, Long Chen, Yekang Zhao, Xinyi Yang, Zhaoyang Han, Zheng He

    Published 2024-11-01
    “…The mechanism uses the cuckoo filter technology to effectively reduce the computational complexity and ensures the authenticity and integrity of data transmission and use through data retrieval integrity verification. …”
    Get full text
    Article
  9. 1089

    Ethical Design of Data-Driven Decision Support Tools for Improving Cancer Care: Embedded Ethics Review of the 4D PICTURE Project by Marieke Bak, Laura Hartman, Charlotte Graafland, Ida J Korfage, Alena Buyx, Maartje Schermer

    Published 2025-04-01
    “…There are myriad ethical issues to consider as the project will create data-driven prognostic models and develop conversation tools using artificial intelligence while including patient perspectives by setting up boards of experiential experts in 8 different countries. …”
    Get full text
    Article
  10. 1090

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  11. 1091

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  12. 1092

    FedCVG: a two-stage robust federated learning optimization algorithm by Runze Zhang, Yang Zhang, Yating Zhao, Bin Jia, Wenjuan Lian

    Published 2025-05-01
    “…Abstract Federated learning provides an effective solution to the data privacy issue in distributed machine learning. …”
    Get full text
    Article
  13. 1093

    Big Data Analytics for Mental Health Education: A New Framework for University-Level Evaluation under Linguistic Confidence Interval Neutrosophic Numbers by Hong Zhu

    Published 2025-05-01
    “…Ten criteria—including accessibility, awareness, analytics integration, and data ethics—are used to evaluate a diverse set of intervention alternatives ranging from AI-based detection systems to immersive VR training. …”
    Get full text
    Article
  14. 1094

    Characterizing the neighborhood risk environment in multisite clinic-based cohort studies: A practical geocoding and data linkages protocol for protected health information. by Ariann Nassel, Marta G Wilson-Barthes, Chanelle J Howe, Sonia Napravnik, Michael J Mugavero, Deana Agil, Akilah J Dulin

    Published 2022-01-01
    “…<h4>Background</h4>Maintaining patient privacy when geocoding and linking residential address information with neighborhood-level data can create challenges during research. …”
    Get full text
    Article
  15. 1095

    Automatic Traffic Data Collection under Varying Lighting and Temperature Conditions in Multimodal Environments: Thermal versus Visible Spectrum Video-Based Systems by Ting Fu, Joshua Stipancic, Sohail Zangenehpour, Luis Miranda-Moreno, Nicolas Saunier

    Published 2017-01-01
    “…Vision-based monitoring systems using visible spectrum (regular) video cameras can complement or substitute conventional sensors and provide rich positional and classification data. …”
    Get full text
    Article
  16. 1096
  17. 1097

    ChatGPT and Artificial Intelligence in Hospital Level Research: Potential, Precautions, and Prospects by Hassaan B. Arshad, Sara A. Butt, Safi U. Khan, Zulqarnain Javed, Khurram Nasir

    Published 2023-11-01
    “…Furthermore, the review discusses the ethical considerations that arise with AI use in health care, including data privacy, AI interpretability, and the risk of AI-induced disparities. …”
    Get full text
    Article
  18. 1098

    Private information in public spaces: Facial recognition in the times of smart urban governance by Juliana NOVAES

    Published 2021-02-01
    “…Prior work:  In order to accomplish so, this article analyzes this phenomenon from a capitalism surveillance framework perspective, in light of international data protection standards and with a primary focus on the analysis of the processing of citizens' data in the provision of public services Approach: The main approaches used are literature review and case studies. …”
    Get full text
    Article
  19. 1099
  20. 1100

    Opportunities, challenges, and interventions for agriculture 4.0 adoption by Shanmugam Vijayakumar, Varunseelan Murugaiyan, S. Ilakkiya, Virender Kumar, Raman Meenakshi Sundaram, Rapolu Mahender Kumar

    Published 2025-08-01
    “…Major obstacles include high initial investment costs, fragmented land holdings, diverse cropping systems, limited farmer awareness, lack of technical skills, inadequate digital literacy, complex AI algorithms, unreliable infrastructure, insufficient high-quality training data, poor internet connectivity, data privacy concerns, and a lack of supportive government policies. …”
    Get full text
    Article