Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 881 - 900 results of 2,784 for search '"\"((((\\"useds OR \"usedddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.21s Refine Results
  1. 881
  2. 882

    The use of micromobility riding simulators in road safety research: a systematic review by Charitha Dias, Qinaat Hussain, Muhammad Abdullah

    Published 2025-09-01
    “…Collecting real-world and field data involves numerous challenges due to ethical, privacy, and safety concerns. …”
    Get full text
    Article
  3. 883
  4. 884

    A review of the use of technology in sport coaching: current trends and future directions by Fadli Ihsan, Ahmad Nasrulloh, Sigit Nugroho, Rina Yuniana

    Published 2025-03-01
    “…Various technological tools and applications have been developed to help coaches analyze athlete performance, monitor physical condition, provide feedback, and make decisions based on objective, real-time data. Conclusion The use of technology in sports training offers promising benefits but also presents challenges. …”
    Get full text
    Article
  5. 885

    Use of ChatGPT in Education: Future Strategic Road Map with SWOT Analysis by Mustafa Taktak , Mehmet Şükrü Bellibaş , Mustafa Özgenel

    Published 2024-10-01
    “…However, concerns have been raised regarding ethical issues such as data privacy, security, plagiarism, bias, and the potential for commercial exploitation, as well as negative psychological impacts on users. …”
    Get full text
    Article
  6. 886

    Comparison of Personal Data Protection Laws Indonesia and Thailand by wardah yuspin, Miranti Kusretno Tampawestri, Ridho Bawana Jati

    Published 2025-06-01
    “…The emergence the leakage of personal data realizes the protection of personal data is very important because it involves the concept of one’s privacy. …”
    Get full text
    Article
  7. 887

    Enhanced federated learning for secure medical data collaboration by Benjamin Appiah, Isaac Osei, Bill K. Frimpong, Daniel Commey, Kwabena Owusu-Agymang, Gabriel Assamah

    Published 2025-04-01
    “…Abstract Federated learning (FL) enables collaborative model training across multiple institutions while preserving data privacy. However, conventional encryption techniques used in FL remain vulnerable to quantum attacks, raising concerns about the security of model update transmissions. …”
    Get full text
    Article
  8. 888

    Balancing Risks and Opportunities: Data-Empowered-Health Ecosystems by Lan Li, Emma Back, Suna Lee, Rebecca Shipley, Néo Mapitse, Stefan Elbe, Melanie Smallman, James Wilson, Ifat Yasin, Geraint Rees, Ben Gordon, Virginia Murray, Stephen L Roberts, Anna Cupani, Patty Kostkova

    Published 2025-03-01
    “…This paper argues that reframing health care data as a common good, improving the transparency of data acquisition and processing, and promoting the use of application programming interfaces (APIs) for real-time data access are essential to overcoming these challenges. …”
    Get full text
    Article
  9. 889

    Use of AI in Mental Health Care: Community and Mental Health Professionals Survey by Shane Cross, Imogen Bell, Jennifer Nicholas, Lee Valentine, Shaminka Mangelsdorf, Simon Baker, Nick Titov, Mario Alvarez-Jimenez

    Published 2024-10-01
    “…The surveys collected data on demographics, technology comfort, attitudes toward AI, specific AI use cases, and experiences of benefits and harms from AI use. …”
    Get full text
    Article
  10. 890

    Healthcare Providers’ Perspective about the Use of Telemedicine in Egypt: A National Survey by Mohamed Alboraie, Mohammad Abdalgaber, Naglaa Youssef, Inas Moaz, Nermeen Abdeen, Hazem Maarouf Abosheaishaa, Mina Tharwat Shokry, Fathiya El-Raey, Sabry Shaaban Asfour, Waleed A. Abdeldayem, Adel Ahmed Hassan, Essam Eldeen M.o. Mahran, Mohammed Tag-Adeen, Omar Elshaarawy, Mohamed Ibrahim Radwan, Ahmed Altonbary, Yasser Fouad

    Published 2022-01-01
    “…Participants assumed that the use of telemedicine might not have a negative effect on the doctor-patient relationship but raised some concerns regarding the privacy and security of patients’ data. …”
    Get full text
    Article
  11. 891

    Private Data Leakage in Federated Contrastive Learning Networks by Kongyang Chen, Wenfeng Wang, Zixin Wang, Yao Huang, Yatie Xiao, Wangjun Zhang, Zhipeng Li, Zhefei Guo, Zhucheng Luo, Lin Yin, Haiyan Mai, Xiaoying Wang, Qintai Yang

    Published 2025-01-01
    “…Generally, Federated Contrastive Learning (FCL) represents an emerging approach for learning from decentralized unlabeled data while upholding data privacy. In FCL, participant clients collaborate in learning a global encoder using unlabeled data, which can serve as a versatile feature extractor for diverse downstream tasks. …”
    Get full text
    Article
  12. 892

    Promoting Awareness of Data Confidentiality and Security During the COVID-19 Pandemic in a Low-Income Country—Sierra Leone by Joseph Sam Kanu, Mohamed A. Vandi, Brima Bangura, Katherine Draper, Yelena Gorina, Monique A. Foster, Jadnah D. Harding, Eric N. Ikoona, Amara Jambai, Mohamed A. M. Kamara, Daniel Kaitibi, Daphne B. Moffett, Tushar Singh, John T. Redd

    Published 2024-11-01
    “…ObjectivesWorld Health Organization issued Joint Statement on Data Protection and Privacy in the COVID-19 Response stating that collection of vast amounts of personal data may potentially lead to the infringement of fundamental human rights and freedoms. …”
    Get full text
    Article
  13. 893
  14. 894

    Emotional Design of Interior Spaces: Exploring Challenges and Opportunities by Liang Rui, Muhammad Firzan

    Published 2025-01-01
    “…For this purpose, the data is gathered in two phases. In phase I, semi-structured interviews were utilized to collect data from 5 interior designers. …”
    Get full text
    Article
  15. 895

    Anonymization in web auctions using Zero-Knowledge Proof in Blockchain technology by Marlena Broniszewska, Wiktor B. Daszczuk, Denny B. Czejdo

    Published 2025-06-01
    “…However, the centralized nature of traditional e-commerce platforms raises concerns about data control, privacy, and potential single points of failure. …”
    Get full text
    Article
  16. 896

    Fingernail analysis management system using microscopy sensor and blockchain technology by Shih Hsiung Lee, Chu Sing Yang

    Published 2018-03-01
    “…This work uses the highly anonymous blockchain technology to effectively protect data privacy and manage each user’s data through the blockchain, in which any change or manipulation can be recorded and tracked, and the data security is improved. …”
    Get full text
    Article
  17. 897

    Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution by Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai

    Published 2025-05-01
    “…By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
    Get full text
    Article
  18. 898

    Trends and pattern of contraceptive use among women attending a family planning clinic at a tertiary health facility in Ibadan, Nigeria by A. O. Atoyebi, S. O. Olaoye, M. A. Okunlola, M. E. Palamuleni, A. S. Adebowale

    Published 2025-06-01
    “…Data were analysed using a logistic regression model (α0.05), and thematic analysis was used for the qualitative part of the study. …”
    Get full text
    Article
  19. 899

    Understanding user acceptance of mobility-as-a-service in Jakarta Metropolitan Area (JMA): Influencing factors and behavioural insights by Yos Sunitiyoso, Prawira Fajarindra Belgiawan, Muhamad Rizki, Valid Hasyimi

    Published 2025-07-01
    “…Driven by theoretical constructs of the technology acceptance model, a set of motivational factors and choice scenarios, a behavioural model is conceptualised to explore individuals’ willingness to adopt MaaS in the JMA. Using data from 1,005 respondents collected in a survey, structural equation modelling (SEM), cluster analysis and choice modelling were conducted. …”
    Get full text
    Article
  20. 900

    Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector by Germán Rodríguez-Galán, Eduardo Benavides-Astudillo, Daniel Nuñez-Agurto, Pablo Puente-Ponce, Sonia Cárdenas-Delgado, Mauricio Loachamín-Valencia

    Published 2025-06-01
    “…Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple platforms. …”
    Get full text
    Article