Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,981 - 2,000 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 1981

    Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors by Priyanka Shrivastava

    Published 2025-04-01
    “…This study explores the factors influencing college students’ acceptance and resistance toward generative AI technologies by integrating three theoretical frameworks: the Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Social Exchange Theory (SET). Using data from 407 respondents collected through a structured survey, the study employed Structural Equation Modeling (SEM) to examine how functional factors (perceived usefulness, ease of use, and reliability), risk factors (privacy concerns, data security, and ethical issues), and sociolegal factors (trust in governance and regulatory frameworks) impact user attitudes. …”
    Get full text
    Article
  2. 1982

    The IoT and AI in Agriculture: The Time Is Now—A Systematic Review of Smart Sensing Technologies by Tymoteusz Miller, Grzegorz Mikiciuk, Irmina Durlik, Małgorzata Mikiciuk, Adrianna Łobodzińska, Marek Śnieg

    Published 2025-06-01
    “…However, this review also identifies critical challenges, including high infrastructure costs, limited interoperability, connectivity constraints in rural areas, and ethical concerns regarding transparency and data privacy. To address these barriers, recent innovations have emphasized the potential of Edge AI for local inference, blockchain systems for decentralized data governance, and autonomous platforms for field-level automation. …”
    Get full text
    Article
  3. 1983

    The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers by Mehrunnisa Saleem jan, Salman Ahmed, Safdar Nawaz Khan Marwat

    Published 2022-06-01
    “… Dynamic navigation devices like Global Positioning Systems (GPSs) are deployed for various purposes in different areas and these devices are usually the central point of interest of various groups like hackers to exploit the data sent and received by GPS systems. The GPS data is usually manipulated using spoofing attacks. …”
    Get full text
    Article
  4. 1984

    Multiscale network alignment model based on convolution of homogeneous multilayer graphs by CUI Jiahao, JIANG Tao, XU Mengyao

    Published 2024-12-01
    “…In terms of node characteristics, the K-nearest neighbor algorithm was used to aggregate node neighborhood information to model the deep network structure, so as to enhance the data. …”
    Get full text
    Article
  5. 1985

    Blockchain in maritime: applications, effects and challenges by Zhao Li, Zhao Li, Yongqiang Sun

    Published 2025-07-01
    “…To prevent issues such as information concealment and privacy breaches, these stakeholders often establish complex and multi-layered data exchange processes, which significantly reduce the operational efficiency of the shipping market. …”
    Get full text
    Article
  6. 1986

    Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies by Abraham Romero, Roberto Hernandez

    Published 2024-09-01
    “…The validation phase demonstrated the model’s efficiency in reducing data redundancy and ensuring the consistency and integrity of policy information. …”
    Get full text
    Article
  7. 1987

    Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting by Bernhard Axmann, Sanket Pujar

    Published 2025-01-01
    “…This research applies a systematic methodology for assessing such software, considering usability, adaptability, cost-effectiveness, and data privacy compliance, specifically tailored to automotive reporting and gives recommendation for software tools.…”
    Get full text
    Article
  8. 1988

    BSLISE directory: innovating global mapping and organization of LIS schools by Tiago Emmanuel Nunes Braga, Josir Cardoso Gomes, Nathaly Cristine Leite Rocha, Fatih Oguz, Chris Cunningham

    Published 2025-03-01
    “…Evolving from the MAP project, the BSLISE directory consolidates and adapts data into a new framework using open-source software. …”
    Get full text
    Article
  9. 1989

    Who are MaaS avoiders, wanderers or enthusiasts and what drives their intentions to adopt MaaS? by Zuoxian Gan, Wentao Li

    Published 2025-12-01
    “…This study integrates the Unified Theory of Technology Acceptance and Use (UTAUT) and Status Quo Bias (SQB) theories and draws on survey data covering nine dimensions: performance expectancy, effort expectancy, social influence, individual innovation, transition costs, sunk costs, inertia and resistance to use. …”
    Get full text
    Article
  10. 1990

    Integrating an AI platform into clinical IT: BPMN processes for clinical AI model development by Kfeel Arshad, Saman Ardalan, Björn Schreiweis, Björn Bergh

    Published 2025-07-01
    “…To facilitate the architecture of the AI platform, BPMN diagrams of all the identified processes are created. Clinical use cases are used to evaluate the processes using the FEDS framework. …”
    Get full text
    Article
  11. 1991

    New secure distributed secret sharing scheme of n product by Zhen-hua CHEN, Shun-dong LI, Bao-cang WANG, Ji-liang LI, Xin LIU

    Published 2014-11-01
    “…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
    Get full text
    Article
  12. 1992

    The Impact of Digital Technologies on the Development of Payment Services by A. Y. Chentsov

    Published 2020-10-01
    “…The problems and ways of protecting user identification, data privacy and money safety when using electronic payment services are investigated. …”
    Get full text
    Article
  13. 1993

    Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review by Y Greeshma Vani, Suma B. Chalapathy, Pallavi Pandey, Shailendra K. Sahu, A Ramesh, Jayashree Sajjanar

    Published 2024-12-01
    “…However, issues such as data privacy, dental professional job displacement, and the necessity for thorough validation and regulation to ensure safety and efficacy remain significant concerns.…”
    Get full text
    Article
  14. 1994

    Digital health tools in juvenile idiopathic arthritis: a systematic literature review by Jordi Anton, María Montoro, Estíbaliz Loza, Teresa Otón, Susan Ramirez, Diego Benavent

    Published 2025-05-01
    “…Tool development and validation processes were poorly or not at all described, and data regarding regulatory compliance, security, or privacy were scarce. …”
    Get full text
    Article
  15. 1995

    Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China by Yifu Li, Nilo Jayoma Castulo, Xiaoyuan Xu, Xiaoyuan Xu

    Published 2025-02-01
    “…The findings revealed that students demonstrated moderate familiarity with AI tools, particularly ChatGPT and willingness to use them in coursework. Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
    Get full text
    Article
  16. 1996

    Users' Perceptions and Trust in AI in Direct-to-Consumer mHealth: Qualitative Interview Study by Katie Ryan, Justin Hogg, Max Kasun, Jane Paik Kim

    Published 2025-05-01
    “…Participants described attitudes toward the impact of AI-mHealth on users’ health and personal data (ie, influences on health awareness and management, value for mental vs physical health use cases, and the inevitability of data sharing), influences on their trust in AI-mHealth (ie, endorsements and guidance from health professionals or health or regulatory organizations, attitudes toward technology companies, and reasonable but not necessarily explainable output), and their preferences relating to the amount and type of information that is shared by AI-mHealth apps (ie, the types of data that are collected, future uses of user data, and the accessibility of information). …”
    Get full text
    Article
  17. 1997

    Occupational therapy in the space of artificial intelligence: Ethical considerations and human-centered efforts by Vera C. Kaelin, Ingeborg Nilsson, Helena Lindgren

    Published 2024-12-01
    “…One way to support future AI technology aligned with OT ethical principles may be through human-centered AI (HCAI), an emerging branch within AI research and developments with a notable overlap of OT values and beliefs.Objective To explore the risks and challenges of AI technology, and how the combined expertise, skills, and knowledge of OT and HCAI can contribute to harnessing its potential and shaping its future, from the perspective of OT’s ethical values and beliefs.Results Opportunities for OT and HCAI collaboration related to future AI technology include ensuring a focus on 1) occupational performance and participation, while taking client-centeredness into account; 2) occupational justice and respect for diversity, and 3) transparency and respect for the privacy of occupational performance and participation data.Conclusion and Significance There is need for OTs to engage and ensure that AI is applied in a way that serves OT and OT clients in a meaningful and ethical way through the use of HCAI.…”
    Get full text
    Article
  18. 1998

    Sybil Attack Detection Based on Signal Clustering in Vehicular Networks by Halit Bugra Tulay, Can Emre Koksal

    Published 2024-01-01
    “…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
    Get full text
    Article
  19. 1999

    Phenomena of Malaysian, and Japanese Languages from an Intercultural Communication Perspective by Machawan Arsyl Elensyah Rhema, Sanjaya Sonda, Zubbir Nadiah Binti

    Published 2024-01-01
    “…Employing a qualitative method, supplemented with an ethnographic approach tailored to how researchers gather data, this study examined Japanese language phenomena and language phenomena used in the Malayan Peninsula region (Singapore and Malaysia) over five days. …”
    Get full text
    Article
  20. 2000

    Leveraging AI-Generated Virtual Speakers to Enhance Multilingual E-Learning Experiences by Sergio Miranda, Rosa Vegliante

    Published 2025-02-01
    “…Future research should focus on addressing ethical considerations, such as data privacy and algorithmic bias, and expanding the user base to include more languages and proficiency levels.…”
    Get full text
    Article