Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,741 - 1,760 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.12s Refine Results
  1. 1741

    Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT by Kisung Park, Myeonghyun Kim, Youngho Park

    Published 2025-01-01
    “…Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. …”
    Get full text
    Article
  2. 1742

    Knowledge and Attitudes Related to Telemedicine among Nursing Staff at the Selected Tertiary Care Hospital, Karnataka, India by Gavi Salimath, Shubham Dayanand Narayankar, Sanjeev Chougule

    Published 2025-04-01
    “…Methodology: The cross-sectional study was conducted among 201 staff nurses. The data were collected using a self-structured questionnaire after thorough review of the literature. …”
    Get full text
    Article
  3. 1743

    Machine Learning Threatens 5G Security by Jani Suomalainen, Arto Juhola, Shahriar Shahabuddin, Aarne Mammela, Ijaz Ahmad

    Published 2020-01-01
    “…Scrutinizing the data, on the other hand, opens privacy challenges. …”
    Get full text
    Article
  4. 1744

    The role of cognitive computing in NLP by Laura Orynbay, Gulmira Bekmanova, Banu Yergesh, Assel Omarbekova, Ayaulym Sairanbekova, Altynbek Sharipbay

    Published 2025-01-01
    “…Ethical concerns, including biases in AI, data privacy and societal impact, are critical to address for responsible deployment. …”
    Get full text
    Article
  5. 1745

    Backdoor Attack Against Dataset Distillation in Natural Language Processing by Yuhao Chen, Weida Xu, Sicong Zhang, Yang Xu

    Published 2024-12-01
    “…We introduce malicious triggers into synthetic data during the distillation phase to execute a backdoor attack on downstream models trained with these data. …”
    Get full text
    Article
  6. 1746

    Maintaining research integrity in the age of GenAI: an analysis of ethical challenges and recommendations to researchers by Sonja Bjelobaba, Lorna Waddington, Mike Perkins, Tomáš Foltýnek, Sabuj Bhattacharyya, Debora Weber-Wulff

    Published 2025-07-01
    “…Results The analysis revealed several ethical concerns, including a lack of transparency, bias, censorship, fabrication (e.g. hallucinations and false data generation), copyright violations, and privacy issues. …”
    Get full text
    Article
  7. 1747

    Human rights, vulnerability and artificial intelligence: an analysis in constitutional perspective by Jorge Castellanos Claramunt

    Published 2024-12-01
    “…It also highlights the risk of algorithmic biases in the processing of personal data, highlighting the need to protect the privacy and data of individuals as fundamental elements to ensure an AI that respects human rights. …”
    Get full text
    Article
  8. 1748

    Challenges and opportunities with ChatGPT in oral oncology: The journey ahead by Ribwar Arsalan Mohammed, Sirwan Khalid Ahmed

    Published 2024-06-01
    “…However, challenges such as ethical considerations regarding patient privacy, data security, and biases in AI algorithms require careful attention. …”
    Get full text
    Article
  9. 1749

    The Parla-CLARIN Recommendations for Encoding Corpora of Parliamentary Proceedings by Tomaž Erjavec, Andrej Pančur

    Published 2022-04-01
    “…Parliamentary proceedings are a rich source of data that can be used by scholars in various humanities and social sciences disciplines. …”
    Get full text
    Article
  10. 1750

    AI-Augmented Netnography: Ethical and Methodological Frameworks for Responsible Digital Research by Chee Wei Cheah

    Published 2025-04-01
    “…Although AI provides improved data processing abilities, it also introduces ethical and methodological concerns about privacy, transparency, authenticity, and possible bias. …”
    Get full text
    Article
  11. 1751

    LEGAL LABYRINTH OF CYBERSPACE – A MAP FOR THE RESPONSIBLE USER by Kamil Martyniak

    Published 2024-12-01
    “…On the one hand, the Internet provides unlimited possibilities of freedom, access to the source of all information, but on the other hand it can be perceived as a source of threats to the accepted social order and legal order. Attacks using it are directed, among others, at systems, data and computer programs, user privacy and intellectual property. …”
    Get full text
    Article
  12. 1752

    MOVILIDAD Y TRANSPORTE INTELIGENTE: UNA REVISIÓN DE APLICACIONES Y TECNOLOGÍAS EMERGENTES EN EL CONTEXTO DE UNA CIUDAD INTELIGENTE by José Alejandro Franco Calderon, Enrique Estupiñan Escalante

    Published 2023-07-01
    “…Furthermore, the article highlights the importance of collectingand analyzing large volumes of data in real time to improve decision-making in intelligent transportation, addressingissues related to data privacy and security in this context, thus, the transformative role of applications and technologiesin transportation, and their proper implementation can contribute to the construction of smarter, more connected andsustainable cities in the future.…”
    Get full text
    Article
  13. 1753

    Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing by Shreya Girish Savadatti, Shruthi Krishnamoorthy, Radhakrishnan Delhibabu

    Published 2025-01-01
    “…It also delves into DLT’s regulatory landscape, addressing compliance, data privacy and governance, while assessing the potential for regulatory clarity and international cooperation. …”
    Get full text
    Article
  14. 1754

    FedDL: personalized federated deep learning for enhanced detection and classification of diabetic retinopathy by Dasari Bhulakshmi, Dharmendra Singh Rajput

    Published 2024-12-01
    “…Our primary goal is to develop a system that can monitor various medical facilities while ensuring privacy during the training of DL models. This is made possible through federated learning (FL), which allows for the sharing of parameters instead of actual data, employing a decentralized training approach. …”
    Get full text
    Article
  15. 1755

    Internet of Things in healthcare: An adaptive ethical framework for IoT in digital health by Abubakar Wakili, Sara Bakkali

    Published 2024-12-01
    “…This approach was employed to validate and refine the AEFIDH, ensuring it encapsulates critical ethical dimensions, including data privacy, informed consent, user autonomy, algorithmic fairness, regulatory compliance, ethical design, and equitable access to healthcare services. …”
    Get full text
    Article
  16. 1756

    From motion to meaning: understanding students’ seating preferences in libraries through PIR-enabled machine learning and explainable AI by Gizem Izmir Tunahan, Goksu Tuysuzoglu, Hector Altamirano

    Published 2025-07-01
    “…This study presents a comprehensive, data-driven investigation into students’ seating preferences within academic library environments, aiming to inform user-centered spatial design. …”
    Get full text
    Article
  17. 1757

    Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks by Mohammed El-Hajj

    Published 2025-05-01
    “…To mitigate these, we design a Zero-Trust Architecture (ZTA) enforcing continuous authentication and micro-segmentation for RIC components, coupled with an FL framework that enables collaborative ML training across operators without exposing raw network data. A differential privacy mechanism is applied to global model updates to prevent inference attacks. …”
    Get full text
    Article
  18. 1758

    Challenges Faced By Female Counselors in Providing HIV Testing and Counseling Services in Kashmir: A Qualitative Interpretive Inquiry by Mariya Amin Qurieshi, Inaamul Haq, Khalid Bashir, S. Mohammad Salim Khan, Samir Mattoo, Irfan Farooq Bhat, Imran Ahmad Rather

    Published 2025-04-01
    “…One interview with a counselor from Leh was conducted via Zoom. Data were transcribed and analyzed using IPA to identify the key themes. …”
    Get full text
    Article
  19. 1759

    Impact of e-banking service quality on e-loyalty in pandemic times through interplay of e-satisfaction by Inzamam Ul Haq, Tahir Mumtaz Awan

    Published 2020-12-01
    “…Design/methodology/approach – The data was collected through an adapted questionnaire by using emails and messaging applications. …”
    Get full text
    Article
  20. 1760

    ESMART: Energy-Efficient Slice-Mix-Aggregate for Wireless Sensor Network by Chaoran Li, Yun Liu

    Published 2013-12-01
    “…The proposed scheme performs secure data aggregation in a more efficient way while keeping a good performance of privacy preservation. …”
    Get full text
    Article