Search alternatives:
\\"useds » \\"uses (Expand Search)
Showing 2,181 - 2,200 results of 2,784 for search '"\"((((\\"useds OR \"usedddddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.22s Refine Results
  1. 2181

    The Interdependence of Competition Policy, Consumer Policy and Regulation in Introducing and Safeguarding Effective Competition in the EU Telecommunications Market by Andreas Bartels, Doru Alexandru Pleșea, Michael Studeny, Vanessa Just

    Published 2017-05-01
    “…In the case of telecommunications, several initiatives of the European Commission and of national regulatory authorities to falls in prices and forced operators to implement customer friendly rules and to protect customer data and privacy. The authors consider that the European Commission has tried to establish and harmonise rules across all member states in order to protect the interests and rights of consumers on the telecommunication market. …”
    Get full text
    Article
  2. 2182

    BACP-LRS: Blockchain and IPFS-based Land Record System by Insaf Boumezbeur, Abdelhalim Benoughidene, Imane Harkat, Farah Boutouatou, Dounia Keddari, Karim Zarour

    Published 2025-01-01
    “…Objective: The purpose of the present work is to propose an architecture for blockchain-based access control for distribution, ensuring information privacy. We take advantage of the benefits of blockchain technology in improving land record management while granting access to electronic data through user permissions. …”
    Get full text
    Article
  3. 2183

    Ethical considerations in artificial intelligence-driven environments for higher education by Phumzile D. Mogoale, Agnieta Pretorius, Refilwe C. Mogase, Mmatshuene A. Segooa

    Published 2025-07-01
    “…The IEEE Xplore Digital Library database was used, with keywords such as ‘artificial intelligence OR AI’ AND ‘education’ AND/OR ‘ethics’. …”
    Get full text
    Article
  4. 2184

    Views on the incorporation of Geolocation Devices in Field Trips by Marta Magallón, Cristina Mercader

    Published 2022-01-01
    “…Geolocation in field trips has great potential, but it is an understudied field that needs more research and discussion to ensure data privacy.…”
    Get full text
    Article
  5. 2185

    On-Device System for Device Directed Speech Detection for Improving Human Computer Interaction by Abhishek Singh, Rituraj Kabra, Rahul Kumar, Manjunath Belgod Lokanath, Reetika Gupta, Sumit Kumar Shekhar

    Published 2021-01-01
    “…To solve this, we propose an On-Device solution that listens to the user continuously for <bold>only</bold> predefined period and classifies the utterance into device-directed or non-device-directed using a deep learning-based model. Since our solution is On-Device, the privacy of the user is maintained. …”
    Get full text
    Article
  6. 2186

    Health system bottlenecks hindering provision of supportive and dignified maternity care in public health facilities. by Waqas Hameed, Bushra Khan, Sameen Siddiqi, Muhammad Asim, Bilal Iqbal Avan

    Published 2022-01-01
    “…A combination of inductive and deductive approach was used for data analyses. Our study identified range of bottlenecks impeding provision of RMC. …”
    Get full text
    Article
  7. 2187

    Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem by Saša Malešević, Michael Lustenberger, Florian Spychiger

    Published 2020-12-01
    “…Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. …”
    Get full text
    Article
  8. 2188

    An intelligent conversational agent for querying satellite manoeuvre detections: a case study by Wathsala Karunarathne, David P Shorten, Matthew Roughan

    Published 2025-06-01
    “…Moreover, our system can handle sensitive and confidential data without breaching privacy. This paper presents the results of deploying SatChat in conjunction with a particle filter based manoeuvre detection system.…”
    Get full text
    Article
  9. 2189

    IoT-driven smart grid monitoring with enhanced energy routing and advanced encryption techniques by K. Perachi, S. Balaji

    Published 2025-11-01
    “…The proposed work incorporates Improved Paillier Homomorphic (IPH) based encryption scheme, which assures integrity and confidentiality of data transmitted. The outcomes of proposed smart grid system using MATLAB and FPGA controller demonstrate significant improvements by providing enhanced security and optimal routing. …”
    Get full text
    Article
  10. 2190

    Revolutionizing Midwifery Education : A Scoping Review of Artificial Intelligence Methods by Harridhil Silmi, Ari Indra Susanti

    Published 2025-04-01
    “…Despite these advancements, challenges such as ethical concerns (algorithmic bias, privacy issues), poor data quality, limited AI expertise among educators, and resistance to change in traditional learning environments were noted. …”
    Get full text
    Article
  11. 2191

    DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems by Yucong Duan, Zhendong Guo

    Published 2025-07-01
    “…The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. …”
    Get full text
    Article
  12. 2192

    THE IMPACT OF AI ON FUNDAMENTAL HUMAN RIGHTS IN EU COUNTRIES. EXAMINATION OF ACADEMIC STUDIES AND THE POSITIONS OF NON-GOVERNMENTAL ORGANIZATIONS REGARDING THE ETHICAL AND AI LEGAL... by Doina Ljungholm POPESCU, Carmina-Elena TOLBARU

    Published 2025-05-01
    “…In the European Union, the development and use of AI pose significant challenges regarding the protection of fundamental human rights, such as the right to privacy, equality, and access to justice. …”
    Get full text
    Article
  13. 2193

    Lived experiences of women with spontaneous abortion at a district hospital, South Africa by Marshall Lockett, Robert J. Mash

    Published 2024-04-01
    “…Atlas-ti (version 22) software assisted with data analysis using the framework method. Results: A total of nine participants were interviewed. …”
    Get full text
    Article
  14. 2194

    Messenger-based assessment of empathic accuracy in couples’ smartphone communication by Philipp Steinebach, Miriam Stein, Knut Schnell

    Published 2025-02-01
    “…Methods Data from N = 102 participants (51 couples) was used to investigate how accurate judgments of partners’ affect map their partners’ actual affect. …”
    Get full text
    Article
  15. 2195

    Optimising resources allocation in implementing school counselling programme at schools in the Ohangwena region by Anna Niitembu Hako, Olaniyi Bojuwoye

    Published 2024-09-01
    “…In-depth semi-structured interviews and focus group discussions were used to gather data. Thematic results revealed that teacher-counsellors had no counselling rooms to conduct individual counselling, no separate budget for school counselling programme, and that file cabinets and display boards were only available in very few schools and were inadequate school-counsellor in schools. …”
    Get full text
    Article
  16. 2196

    Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing by Yun-Yi Fan, Chit-Jie Chew, Jung-San Lee

    Published 2025-05-01
    “…Furthermore, the lack of transparency and credibility in intelligence sources has negatively impacted the quality and trustworthiness of shared data. To address these issues, authors aim to leverage blockchain technology, utilizing its decentralized and tamper-proof properties to ensure corporate privacy and the reliability of intelligence sources. …”
    Get full text
    Article
  17. 2197

    Lightweight Authentication for Devices in Internet of Thing Environment: A Survey by Sameera Abbas Fadhel, Ahmed Sami Nori

    Published 2023-12-01
    “…The extremely large number of associated devices together through different protocols make it vulnerable to be threatened by several types of attacks, such as; Unauthorized Access and Authentication Attacks, Network Attacks, Data Privacy and Integrity Attacks, and Supply Chain Attacks. …”
    Get full text
    Article
  18. 2198

    Customer’s Satisfaction via Online Shopping Environment: The Case of China by GholamReza Zandi, Rezvan Torabi, Mohammad Amin Mohammad, Xu Yi Dan

    Published 2021-07-01
    “…The philosophy of positivism was used to evaluate the online shopping behaviour in a Chinese context. …”
    Get full text
    Article
  19. 2199

    Availability and utilization of sexual and reproductive health services among adolescents of Godawari Municipality, Nepal: A cross-sectional study. by Laxmi Gautam, Aastha Maharjan, Harikrishna Bhattarai, Sujan Gautam

    Published 2025-01-01
    “…Only 13.22% of them had ever used ASRH services, and the reasons for not using services were the lack of realization of the need for services (60.39%), while 14.55% of them felt that privacy was not maintained at all. …”
    Get full text
    Article
  20. 2200

    Analisis Pengaruh Kualitas Layanan Terhadap Kepuasan Pelanggan dan Loyalitas Pengguna Aplikasi Jenius Menggunakan Model E-S- Qual dan E- Recs- QUal (Studi Kasus: Pengguna Aplikasi... by Alfansya Achmad Mulyadi, Satrio Hadi Wijoyo, Hanifah Muslimah Az-Zahra

    Published 2022-12-01
    “…This study involved 100 samples of Jenius application users in Malang City. This research uses purposive sampling as a sampling technique and multiple and simple linear regression analysis as a technique in data analysis. …”
    Get full text
    Article