Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
861
Patient Confidentiality of Electronic Health Records: A Recent Review of the Saudi Literature
Published 2022-07-01“…Background Health systems harbor lucrative data that can be targeted for illegal access, thus posing a serious privacy breach. …”
Get full text
Article -
862
Modelling Users` Trust in Online Social Networks
Published 2014-02-01“…We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS) based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks) explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. …”
Get full text
Article -
863
Advancing personalized diagnosis and treatment using deep learning architecture
Published 2025-03-01Get full text
Article -
864
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
Get full text
Article -
865
Unveiling Digital Wallets Adoption in Developing countries: A Dual-Factor Approach of Enablers and Inhibitors Impacting User Intentions
Published 2025-06-01“…Structural Equation Modeling (SEM) was employed for data analysis using AMOS software. The findings indicate that performance expectancy, effort expectancy, social influence, perceived privacy, perceived security, and trust all have a significant impact on the intention regarding the adoption of digital wallets.…”
Get full text
Article -
866
Attribute-based encryption schema with group signatures
Published 2019-02-01“…Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.…”
Get full text
Article -
867
Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges
Published 2020-01-01“…The term does take into account various other sensitive issues, like, security, privacy, threats, cyber-attacks, etc. This is important to note that the development of FinTech is indebted to the mutual integration of different state of the art technologies, for example, technologies related to a mobile embedded system, mobile networks, mobile cloud computing, big data, data analytics techniques, and cloud computing etc. …”
Get full text
Article -
868
Explanations of news personalisation across countries and media types
Published 2020-10-01“…Yet, the technical implementation of news personalisation systems, in particular the one relying on algorithmic news recommenders (ANRs) and tailoring individual news suggestions with the help of user data, often remains opaque. In our article, we examine how news personalisation is used by quality and popular media in three countries with different media accountability infrastructures - Brazil, the Netherlands, and Russia - and investigate how information about personalisation usage is communicated to the news readers via privacy policies. …”
Get full text
Article -
869
User consultation and the design of healing architecture in a cardiology department – ways to improve care for and well-being of patients and their relatives
Published 2020-01-01“…Design: A mixed-method approach was used, based on user consultation, in order to inform the redecoration and redesign of the observation room. …”
Get full text
Article -
870
A Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System
Published 2025-05-01“…We have used dual-blockchain, which separates public and private information, which can enhance both efficiency and privacy. …”
Get full text
Article -
871
A survey on membership inference attacks and defenses in machine learning
Published 2024-09-01“…Membership inference (MI) attacks mainly aim to infer whether a data record was used to train a target model or not. …”
Get full text
Article -
872
Framework for Addressing Imbalanced Data in Aviation with Federated Learning
Published 2025-02-01“…The proposed framework provides a scalable and practical solution for using distributed aviation data while addressing both class imbalance and privacy concerns, contributing to improved safety and operational efficiency in the aviation industry.…”
Get full text
Article -
873
Dying in Darkness: Deviations From Data Sharing Ethics in the US Public Health System and the Data Genocide of American Indian and Alaska Native Communities
Published 2025-03-01“…Good governance practices like transparent data practices and the establishment of a social license (ie, the informal permission of a community to collect and use data) is essential to ethically balancing collective well-being with individual privacy in public health.…”
Get full text
Article -
874
Reflection on High-Quality Development of Smart Health Data
Published 2024-12-01“…The development of smart geriatric care data in China now faces challenges regarding fusion of multi-source heterogeneous data, data security and privacy, and data use ethics. …”
Get full text
Article -
875
Applications of blockchain technology in long-term care: use cases, potentials, and barriers
Published 2024-10-01“…Abstract Background Digitalization in long-term care (LTC) is being discussed as a means of easing pressures on care service delivery, optimizing care coordination and planning processes, and improving service quality. With its advanced data protection and process automation features, blockchain technology could help solve data security and privacy issues, especially for the implementation of assistive technologies. …”
Get full text
Article -
876
Data Governance Navigation for Advanced Operations in Healthcare Excellence
Published 2024-08-01“…Developments in medical data analysis bring important social benefits but also challenge privacy and other ethical values. …”
Get full text
Article -
877
Sharing health data for research purposes: results of a population survey in Germany
Published 2025-05-01“…Abstract Background Increased use of health data has the potential to improve both health care and health policies. …”
Get full text
Article -
878
THE SECURITY OF PERSONAL DATA IN EUROPEAN UNION SINCE 2018
Published 2019-07-01“…Intensive development of information technology in the early 21st century means that citizens’ personal data is constantly processed using increasingly advanced digital technologies. …”
Get full text
Article -
879
Teachers’ digital literacy competencies according to their age status and their level of use in classes
Published 2024-01-01“…Digital literacy means that individuals know how to properly use digital platforms/tools both for their personal development and for solving everyday problems, mastering information technologies and being aware of issues such as legal responsibility, data protection, security and ethics. …”
Get full text
Article -
880
The Use of ChatGPT in English Language Learning: A Systematic Literature Review
Published 2025-03-01“…Following PRISMA guidelines, this review analyzes data from Scopus, ERIC, and Google Scholar using thematic analysis to identify key themes. …”
Get full text
Article