Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,941 - 1,960 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 1941

    The potential of machine learning in diagnosing neurological and psychiatric diseases: a review by Claudia Ricetti, Luca Carrara, Davide La Torre

    Published 2025-06-01
    “…However, certain challenges persist, including concerns about data quality, patient privacy and the ethical implications of algorithmic decisions. …”
    Get full text
    Article
  2. 1942

    Generalization challenges in video deepfake detection: methods, obstacles, and technological advances by LI Junjie, WANG Jianzong, ZHANG Xulong, QU Xiaoyang

    Published 2025-01-01
    “…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
    Get full text
    Article
  3. 1943

    Role of artificial intelligence in human resource management for optimizing employee productivity by Veshne Nupur, Jamnani Jyoti

    Published 2024-01-01
    “…Recruitments can be modernized by using catboats, predictive analysis helps in offering data-driven insights that can be used to find skill gaps and people management planning. …”
    Get full text
    Article
  4. 1944

    The Impact of Banking Digitalization on Customer Satisfaction and Loyalty in BPRs: Systematic Literature Review by Maulana Yusup

    Published 2025-07-01
    “…Conclusion: The study highlights that the main challenge in rural areas is resistance to digitalization due to low digital literacy and concerns over data privacy. It recommends that BPRs prioritize digital literacy programs, ensure system transparency and security, and combine physical and digital services. …”
    Get full text
    Article
  5. 1945

    Electronic medical records sharing solution based on Hyperledger Fabric by CHEN Jiali, MA Ziqiang, MIAO Li, LI Bingyu, YUE Xiaolin

    Published 2024-10-01
    “…Simultaneously, parties involved in secret sharing collaborate to recover keys and decrypt the records.The document comprehensively discusses the security aspects of this solution, ensuring that EMR can withstand various attacks during storage and sharing, thus guaranteeing data integrity and privacy. Compared to other secret sharing schemes, this solution demonstrates better theoretical time complexity, providing an efficient and reliable solution for secure storage and multi-party sharing of EMR.…”
    Get full text
    Article
  6. 1946

    Personalized Mobile Health for Elderly Home Care: A Systematic Review of Benefits and Challenges by Shahrbanoo Pahlevanynejad, Sharareh R. Niakan Kalhori, Meysam Rahmani Katigari, Rahil Hosseini Eshpala

    Published 2023-01-01
    “…The results indicated that 25% of the challenges were related to privacy, cybersecurity, and data ownership (10%), technology (7.5%), and implementation (7.5%). …”
    Get full text
    Article
  7. 1947

    E-HAILING SERVICES IN MALAYSIAâ€: A SNAPSHOT OF LEGAL ISSUES AND RISKS

    Published 2024-01-01
    “…The data were structured using theme analysis to generate a discussion narrative regarding e-hailing services in Malaysia, taking into consideration multiple viewpoints on the regulatory framework, legal concerns, and risks of this industry. …”
    Get full text
    Article
  8. 1948

    Reinventing Cybersecurity Internships During the COVID-19 Pandemic by Lori L. Sussman

    Published 2023-01-01
    “…The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. …”
    Get full text
    Article
  9. 1949

    Generalization challenges in video deepfake detection: methods, obstacles, and technological advances by LI Junjie, WANG Jianzong, ZHANG Xulong, QU Xiaoyang

    Published 2025-01-01
    “…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
    Get full text
    Article
  10. 1950

    Learning Sensor Based Risk Map Augmentation for Risk Aware UAS Operation by Bhaskar Trivedi, Manfred Huber

    Published 2023-05-01
    “…This paper presents an approach to risk map augmentation that uses learned risk identification from aerial pictures to fuse additional information with prior data into a dynamically changing risk map that allows effective re-planning of navigation strategies.…”
    Get full text
    Article
  11. 1951

    Application of Artificial Intelligence in the Tourism Sector: Benefits and Challenges of AI-Based Digital Tools in Tourism Organizations of Lithuania, Latvia, and Sweden by Gita Šakytė-Statnickė, Laurencija Budrytė-Ausiejienė

    Published 2025-04-01
    “…Tourism organizations implementing or already using artificial intelligence in their activities are usually faced with the challenge of ensuring data privacy and security, the high costs of implementing artificial intelligence systems, etc.…”
    Get full text
    Article
  12. 1952

    Enhancing medical image classification via federated learning and pre-trained model by Parvathaneni Naga Srinivasu, G. Jaya Lakshmi, Sujatha Canavoy Narahari, Jana Shafi, Jaeyoung Choi, Muhammad Fazal Ijaz

    Published 2024-09-01
    “…Federated learning (FL) offers a promising method for collaborative training on distributed data held by various entities, ensuring the privacy of patient information. …”
    Get full text
    Article
  13. 1953
  14. 1954

    Customer Satisfaction on Digital Banking Services: Evidence from Islamic Financial Institutions in Sri Lanka by Hayathu Mohamed Ahamed Hilmy, Iqbal Saujan

    Published 2025-02-01
    “…For clarity, the results were displayed in bar graphs and pie charts using Microsoft Excel. The study evaluated service quality factors using Pearson correlation to examine the relationship between customer satisfaction (dependent variable) and independent variables (Efficiency, system availability, Ease of use, privacy, responsiveness).…”
    Get full text
    Article
  15. 1955

    Parents’ information needs and perceptions of chatbots regarding self medicating their children by Xueyi Wei, Xiuwen Chen, Liqing Yue, Peng Liao

    Published 2025-08-01
    “…Semi-structured interviews were conducted from October 2023 to December 2023. The interview data were analysed using a thematic analysis method. …”
    Get full text
    Article
  16. 1956

    Decision-making model in digital commerce: electronic trust-based purchasing intention through online food delivery applications (OFDAs) by Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Laszlo Barna Iantovics, Maryam Manzoor, Muhammad Ali Raza, Zoia Khan

    Published 2024-09-01
    “…Design/methodology/approach – Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. …”
    Get full text
    Article
  17. 1957
  18. 1958

    Decentralized Distributed Sequential Neural Networks Inference on Low-Power Microcontrollers in Wireless Sensor Networks: A Predictive Maintenance Case Study by Yernazar Bolat, Iain Murray, Yifei Ren, Nasim Ferdosian

    Published 2025-07-01
    “…The growing adoption of IoT applications has led to increased use of low-power microcontroller units (MCUs) for energy-efficient, local data processing. …”
    Get full text
    Article
  19. 1959

    Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences by Mohamed H. Shahin, Srijib Goswami, Sebastian Lobentanzer, Brian W. Corrigan

    Published 2025-03-01
    “…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
    Get full text
    Article
  20. 1960

    Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers by Idham Qrida Nusa, Bambang Sugiri, Yuliati Yuliati, Faizin Sulistio

    Published 2025-06-01
    “…The analysis highlights the use of cloud storage as a media to store the proceeds of crime, in the form of data privacy. …”
    Get full text
    Article