Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddddds » \"usedddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 801 - 820 results of 2,784 for search '"\"((((\\"useds OR \"useddddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.21s Refine Results
  1. 801

    Determinants of Attitude and Intention to Use Virtual Credit Cards in Indonesia by Budi Hartono, Suci Nasehati Sunaningsih, Mumpuni Wahyudiarti Sitoresmi

    Published 2025-03-01
    “…Data analysis was conducted using path analysis, revealing that all variables significantly influence trust and perceived risk, with t-statistics below 0.05 and 0.01. …”
    Get full text
    Article
  2. 802
  3. 803

    The Use of Artificial Intelligence in Medical Diagnostics: Opportunities, Prospects and Risks by Nataliia Sheliemina

    Published 2024-07-01
    “…The AI integration in healthcare can revolutionise the industry by improving patient outcomes, optimising resource allocation, and reducing operational costs. However, the AI use in medicine carries certain risks related to ethics and data privacy, shortcomings in the quality of data for training algorithms, and importance of protecting against cyberthreats. …”
    Get full text
    Article
  4. 804

    HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers by Opeyemi Lateef Usman, Ravie Chandren Muniyandi, Khairuddin Omar, Mazlyfarina Mohamad, Ayoade Akeem Owoade, Morufat Adebola Kareem

    Published 2025-04-01
    “…Although, fully homomorphic encryption (FHE)-based methods have been proposed to maintain data confidentiality and privacy, however, existing FHE deep convolutional neural network (CNN) models still face some issues such as low accuracy, high encryption/decryption latency, energy inefficiency, long feature extraction times, and significant cipher-image expansion. …”
    Get full text
    Article
  5. 805

    Ethical aspects of the use of social networks during the employment process by Branislav Sančanin

    Published 2022-01-01
    “…On the other hand, candidates applying for a vacant position have the opportunity to get to know an organization's employers and employees in more detail, and to gather more information that can often be decisive when making the final decision on whether or not to send in a job application. Most employers today use social media during the process of collecting data on job candidates. …”
    Get full text
    Article
  6. 806

    Multifaceted Assessment of Responsible Use and Bias in Language Models for Education by Ishrat Ahmed, Wenxing Liu, Rod D. Roscoe, Elizabeth Reilley, Danielle S. McNamara

    Published 2025-03-01
    “…This study proposes a framework for the automatic detection of biases and violations of responsible use using a synthetic question-based dataset mimicking student–chatbot interactions. …”
    Get full text
    Article
  7. 807

    An Evaluation on the Potential of Large Language Models for Use in Trauma Triage by Kelvin Le, Jiahang Chen, Deon Mai, Khang Duy Ricky Le

    Published 2024-10-01
    “…Overall, the literature highlights multifaceted applications of LLMs, especially in emergency trauma settings, albeit with clear limitations and ethical considerations, such as artificial hallucinations, biased outputs and data privacy issues. There remains room for more rigorous research into refining the consistency and capabilities of LLMs, ensuring their effective integration in real-world trauma triaging to improve patient outcomes and resource utilisation.…”
    Get full text
    Article
  8. 808

    The ICE–Lexis nexus: An argument against use of commercial databases in immigration enforcement by Jessica P. Needle, Alan Rubel

    Published 2025-09-01
    “…The plaintiffs allege that use of Accurint (the product Lexis sells to U.S. …”
    Get full text
    Article
  9. 809
  10. 810

    COVID-19 detection using federated machine learning. by Mustafa Abdul Salam, Sanaa Taha, Mohamed Ramadan

    Published 2021-01-01
    “…AI plays an essential role in COVID-19 case classification as we can apply machine learning models on COVID-19 case data to predict infectious cases and recovery rates using chest x-ray. …”
    Get full text
    Article
  11. 811

    Neuroethical issues in adopting brain imaging for personalized chronic pain management: Attitudes of people with lived experience of chronic pain by Karen Deborah Davis, Monica de Oliveira, Ariana Besik, Daniel Z. Buchman

    Published 2024-05-01
    “…However, they worried that brain scans could be used to dismiss their pain self-report. Most respondents felt there were policies to protect their brain data, but 40% were concerned about privacy and brain scan use against them by their employers/insurers. …”
    Get full text
    Article
  12. 812

    Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks by Lijing Ren, Denghui Zhang

    Published 2025-04-01
    “…This prevalence poses challenges for secure image forwarding, as it is susceptible to privacy leaks when sharing data. While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. …”
    Get full text
    Article
  13. 813

    Barriers to contraceptive access and use among youths (15–24 Years) living in informal urban settlements of Kigali, Rwanda: a qualitative study by Emmanuel Okiror Okello, Alexandre Edgard Murinzi, Colyse Nduwimana, Rashidah Nambaziira

    Published 2025-08-01
    “…Abstract Background Contraceptive use among youths below 19 years in Rwanda is still very low, as low as 3.7%, yet their level of sexual activity is high. …”
    Get full text
    Article
  14. 814

    Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic by Vilić Vida

    Published 2022-01-01
    “…The positive aspects of this kind of communication are undoubtedly obvious and necessary, but they also created new forms of victimization due to insecure protocols for sending e-mails, inadequate level of privacy protection, insufficient information security, the existence of so-called security holes and the use of the same devices and digital services for professional and private purposes. …”
    Get full text
    Article
  15. 815

    A technological and legal investigation into how smart states deploy collective intelligence for security and surveillance purposes by Diana M. POPA

    Published 2025-03-01
    “…The article debates the relation between data protection and public and national security in democratic states and shows how the evolving threat landscape influences both the practice and the legislative process around personal data protection and deployment of emerging technologies and use of collective intelligence for security purposes. …”
    Get full text
    Article
  16. 816

    Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing by Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, Madiha Haider Syed, Axel Jantsch, Semeen Rehman

    Published 2024-01-01
    “…However, in the Industrial Internet of Things (IIoT), the sharing of data has bandwidth, computational, and privacy issues. …”
    Get full text
    Article
  17. 817

    Decades in the Making: The Evolution of Digital Health Research Infrastructure Through Synthetic Data, Common Data Models, and Federated Learning by Jodie A Austin, Elton H Lobo, Mahnaz Samadbeik, Teyl Engstrom, Reji Philip, Jason D Pole, Clair M Sullivan

    Published 2024-12-01
    “…The same way that drug trials require infrastructure to support their conduct, digital health also necessitates new and disruptive research data infrastructure. Novel methods such as common data models, federated learning, and synthetic data generation are emerging to enhance the utility of research using RWD, which are often siloed across health systems. …”
    Get full text
    Article
  18. 818

    Using Federated Learning for Collaborative Intrusion Detection Systems by Matteo Rizzato, Youssef Laarouchi, Christophe Geissler

    Published 2023-06-01
    “…Traditional implementations provide fast and accurate predictions, but require centralised storage of labelled historical data for training. This solution is not always suitable for real-world applications, where regulatory constraints and privacy concerns hamper the collection of sensitive data into a single server. …”
    Get full text
    Article
  19. 819

    Normative framework for the protection against genetic discrimination in Serbia by Petrušić Nevena

    Published 2015-01-01
    “…The analysis has shown that the rules on protection of the genetic data and the use of genetic samples, which are crucially important for prevention of genetic discrimination, have not been harmonized with contemporary ethical and legal standards. …”
    Get full text
    Article
  20. 820

    Characterizing user mobility using mobile sensing systems by Sébastien Faye, Walter Bronzi, Ibrahim Tahirou, Thomas Engel

    Published 2017-08-01
    “…Furthermore, we detail the need to use methods that respect the privacy of users and investigate the possibilities offered by network traces, including Wi-Fi and Bluetooth communication technologies. …”
    Get full text
    Article