Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
281
Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property
Published 2024-12-01“…However, a comprehensive and multidimensional examination of the research landscape is still required to better understand its structure and evolution. Using CiteSpace software, this study conducts a bibliometric analysis, revealing key trends and patterns in collaboration, co-citation, and keyword co-occurrence in the field of data-based intellectual property. …”
Get full text
Article -
282
NFTs enabled federated digital identity data representation and management
Published 2025-05-01“…The idea of using NFTs to represent digital identities and their associated data is promising, but it also raises significant concerns regarding data privacy and compliance. …”
Get full text
Article -
283
Las tecnologías de la información; derecho a la privacidad, tratamiento de datos y tercera edad
Published 2011-09-01Get full text
Article -
284
TAPS Responsibility matrix: a tool for responsible data science by design
Published 2024-12-01“…We map TAPS-RM to well-known initiatives for open-data (FACT/FAIR and Datasheets for datasets). We conclude that TAPS-RM is a tool to reflect on responsibilities at a data science project level and can be used to advance responsible data science by design.…”
Get full text
Article -
285
Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications
Published 2022-01-01“…The aim of this study is that Medical Applications claims no data is transferred, thereby protecting privacy. …”
Get full text
Article -
286
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01“…Data security and privacy are crucial for the Internet of Medical Things (IoMT) and the digitization of healthcare systems. …”
Get full text
Article -
287
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
Published 2025-05-01“…Experimental results indicate that the proposed solution offers robust resistance to various attacks, including replay attacks and data exposure, providing a robust and privacy‐centric solution for carpooling services.…”
Get full text
Article -
288
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
Published 2025-08-01“…To address these issues, this paper proposes a system that ensures patient anonymity through secure credentials and advanced fraud detection mechanisms. Privacy is preserved using cryptographic techniques such as secure hashing and anonymous credentials, which ensure that sensitive patient information remains confidential throughout the claim process. …”
Get full text
Article -
289
High-Order Vehicular Pattern Learning and Privacy-Preserving and Unsupervised GAN for Privacy Protection Toward Vehicular Parts Detection
Published 2025-01-01“…To preserve data privacy, we use the PPUP-GAN to create massive-scale vehicular data that well mimics real data. …”
Get full text
Article -
290
Challenges and Ethical Considerations in Implementing Assistive Technologies in Healthcare
Published 2025-01-01“…As AI-powered solutions become more widely used, we discovered that stronger legal frameworks and robust data security standards are required. …”
Get full text
Article -
291
-
292
Applying usability recommendations when developing mobile instant messaging applications
Published 2022-02-01Get full text
Article -
293
Protection of Public Services Personal Data in The Delivery of Public Services: Comparative Study in Indonesia and Malaysia
Published 2025-03-01“…However, the exposure of personal data in public service is worrying, as data breaches have affected the public's privacy. …”
Get full text
Article -
294
Fostering social media user intentions: AI-enabled privacy and intrusiveness concerns
Published 2025-03-01“…Findings – Privacy concerns significantly affect perceived usefulness. …”
Get full text
Article -
295
“By browsing this site, you accept cookies”: Research on the cookie usage permissions of news sites in Türkiye
Published 2023-06-01“…Particularly in recent years, increasing awareness levels about personal data, digital privacy studies, and legal regulations have raised concerns about the use of cookies. …”
Get full text
Article -
296
Prexion: Probabilistic Matching-Based Compression to Mitigate Compression Side Channel Attacks Against HTTPS
Published 2025-01-01“…Web servers typically use data compression and encryption to optimize data transmission and protect user privacy. …”
Get full text
Article -
297
On the edge of glory (…or catastrophe): regulation, transparency and party democracy in data-driven campaigning in Québec
Published 2019-12-01“…They have all massively integrated data-driven campaigning practices. This article identifies factors that could explain the increasing pressure to regulate Québec’s political parties’ uses of large sets of digital voter information. …”
Get full text
Article -
298
PERSONAL DATA PROTECTION ISSUE REFLECTED IN THE CASE-LAW OF THE CONSTITUTIONAL COURT OF ROMANIA
Published 2019-05-01“…Over the past few years, data privacy became more and more an issue that stirred on European level lots of debates and determined the adoption of a new set of rules, imposed with the compulsory force of a European regulation. …”
Get full text
Article -
299
-
300
A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum
Published 2024-12-01“…The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. …”
Get full text
Article