Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
801
Determinants of Attitude and Intention to Use Virtual Credit Cards in Indonesia
Published 2025-03-01“…Data analysis was conducted using path analysis, revealing that all variables significantly influence trust and perceived risk, with t-statistics below 0.05 and 0.01. …”
Get full text
Article -
802
Establishing and evaluating trustworthy AI: overview and research challenges
Published 2024-11-01Get full text
Article -
803
The Use of Artificial Intelligence in Medical Diagnostics: Opportunities, Prospects and Risks
Published 2024-07-01“…The AI integration in healthcare can revolutionise the industry by improving patient outcomes, optimising resource allocation, and reducing operational costs. However, the AI use in medicine carries certain risks related to ethics and data privacy, shortcomings in the quality of data for training algorithms, and importance of protecting against cyberthreats. …”
Get full text
Article -
804
HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers
Published 2025-04-01“…Although, fully homomorphic encryption (FHE)-based methods have been proposed to maintain data confidentiality and privacy, however, existing FHE deep convolutional neural network (CNN) models still face some issues such as low accuracy, high encryption/decryption latency, energy inefficiency, long feature extraction times, and significant cipher-image expansion. …”
Get full text
Article -
805
Ethical aspects of the use of social networks during the employment process
Published 2022-01-01“…On the other hand, candidates applying for a vacant position have the opportunity to get to know an organization's employers and employees in more detail, and to gather more information that can often be decisive when making the final decision on whether or not to send in a job application. Most employers today use social media during the process of collecting data on job candidates. …”
Get full text
Article -
806
Multifaceted Assessment of Responsible Use and Bias in Language Models for Education
Published 2025-03-01“…This study proposes a framework for the automatic detection of biases and violations of responsible use using a synthetic question-based dataset mimicking student–chatbot interactions. …”
Get full text
Article -
807
An Evaluation on the Potential of Large Language Models for Use in Trauma Triage
Published 2024-10-01“…Overall, the literature highlights multifaceted applications of LLMs, especially in emergency trauma settings, albeit with clear limitations and ethical considerations, such as artificial hallucinations, biased outputs and data privacy issues. There remains room for more rigorous research into refining the consistency and capabilities of LLMs, ensuring their effective integration in real-world trauma triaging to improve patient outcomes and resource utilisation.…”
Get full text
Article -
808
The ICE–Lexis nexus: An argument against use of commercial databases in immigration enforcement
Published 2025-09-01“…The plaintiffs allege that use of Accurint (the product Lexis sells to U.S. …”
Get full text
Article -
809
Legal Challenges of Marine Insurance Laws in the Use of Unmanned Ships
Published 2025-03-01Get full text
Article -
810
COVID-19 detection using federated machine learning.
Published 2021-01-01“…AI plays an essential role in COVID-19 case classification as we can apply machine learning models on COVID-19 case data to predict infectious cases and recovery rates using chest x-ray. …”
Get full text
Article -
811
Neuroethical issues in adopting brain imaging for personalized chronic pain management: Attitudes of people with lived experience of chronic pain
Published 2024-05-01“…However, they worried that brain scans could be used to dismiss their pain self-report. Most respondents felt there were policies to protect their brain data, but 40% were concerned about privacy and brain scan use against them by their employers/insurers. …”
Get full text
Article -
812
Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks
Published 2025-04-01“…This prevalence poses challenges for secure image forwarding, as it is susceptible to privacy leaks when sharing data. While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. …”
Get full text
Article -
813
Barriers to contraceptive access and use among youths (15–24 Years) living in informal urban settlements of Kigali, Rwanda: a qualitative study
Published 2025-08-01“…Abstract Background Contraceptive use among youths below 19 years in Rwanda is still very low, as low as 3.7%, yet their level of sexual activity is high. …”
Get full text
Article -
814
Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic
Published 2022-01-01“…The positive aspects of this kind of communication are undoubtedly obvious and necessary, but they also created new forms of victimization due to insecure protocols for sending e-mails, inadequate level of privacy protection, insufficient information security, the existence of so-called security holes and the use of the same devices and digital services for professional and private purposes. …”
Get full text
Article -
815
A technological and legal investigation into how smart states deploy collective intelligence for security and surveillance purposes
Published 2025-03-01“…The article debates the relation between data protection and public and national security in democratic states and shows how the evolving threat landscape influences both the practice and the legislative process around personal data protection and deployment of emerging technologies and use of collective intelligence for security purposes. …”
Get full text
Article -
816
Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing
Published 2024-01-01“…However, in the Industrial Internet of Things (IIoT), the sharing of data has bandwidth, computational, and privacy issues. …”
Get full text
Article -
817
Decades in the Making: The Evolution of Digital Health Research Infrastructure Through Synthetic Data, Common Data Models, and Federated Learning
Published 2024-12-01“…The same way that drug trials require infrastructure to support their conduct, digital health also necessitates new and disruptive research data infrastructure. Novel methods such as common data models, federated learning, and synthetic data generation are emerging to enhance the utility of research using RWD, which are often siloed across health systems. …”
Get full text
Article -
818
Using Federated Learning for Collaborative Intrusion Detection Systems
Published 2023-06-01“…Traditional implementations provide fast and accurate predictions, but require centralised storage of labelled historical data for training. This solution is not always suitable for real-world applications, where regulatory constraints and privacy concerns hamper the collection of sensitive data into a single server. …”
Get full text
Article -
819
Normative framework for the protection against genetic discrimination in Serbia
Published 2015-01-01“…The analysis has shown that the rules on protection of the genetic data and the use of genetic samples, which are crucially important for prevention of genetic discrimination, have not been harmonized with contemporary ethical and legal standards. …”
Get full text
Article -
820
Characterizing user mobility using mobile sensing systems
Published 2017-08-01“…Furthermore, we detail the need to use methods that respect the privacy of users and investigate the possibilities offered by network traces, including Wi-Fi and Bluetooth communication technologies. …”
Get full text
Article