Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 421 - 440 results of 2,784 for search '"\"((((\\"useds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 421
  2. 422
  3. 423

    THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS by Thi Thu Huong Hoang, Hoang Nam Vu, Thi Khanh Chi Nguyen

    Published 2023-04-01
    “…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
    Get full text
    Article
  4. 424

    A Qualitative Study of Researchers Perspective on the Use and Risks of Open Government Data by Emigawaty Emigawaty, Dinda Sukmaningrum, Wiji Nurastuti

    Published 2025-06-01
    “…This study aims to review the potential risks of data openness on government data portals from the perspective of researchers as one of the important actors who use data. …”
    Get full text
    Article
  5. 425

    Human Behavior Analysis Using Radar Data: A Survey by Patrycja Miazek, Alicja Zmudzinska, Pawel karczmarek, Adam Kiersztyn

    Published 2024-01-01
    “…In this study, we focus not only on the analysis of human behavior using radar but also on video observations. We review methods of human activity recognition using LiDAR. …”
    Get full text
    Article
  6. 426

    Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice by Zhilong Guo

    Published 2025-06-01
    “…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
    Get full text
    Article
  7. 427
  8. 428

    Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems by Firdous Kausar, Sambrdhi Deo, Sajid Hussain, Zia Ul Haque

    Published 2024-10-01
    “…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
    Get full text
    Article
  9. 429

    A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption by Linh Nguyen, Quoc Bao Phan, Lan Zhang, Tuy Tan Nguyen

    Published 2025-01-01
    “…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
    Get full text
    Article
  10. 430

    Anomaly detection in encrypted network traffic using self-supervised learning by Sadaf Sattar, Shumaila Khan, Muhammad Ismail Khan, Ainur Akhmediyarova, Orken Mamyrbayev, Dinara Kassymova, Dina Oralbekova, Janna Alimkulova

    Published 2025-07-01
    “…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
    Get full text
    Article
  11. 431
  12. 432
  13. 433

    Legal grounds for police officers' body-worn cameras by Milidragović Dragan, Milić Nenad, Petrović Zlatko

    Published 2025-01-01
    “…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
    Get full text
    Article
  14. 434
  15. 435

    Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection by Răzvan Rughiniş, Simona-Nicoleta Vulpe, Dinu Ţurcanu, Daniel Rosner

    Published 2025-01-01
    “…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
    Get full text
    Article
  16. 436

    COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App by Mona Naomi Lintvedt

    Published 2021-12-01
    “…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
    Get full text
    Article
  17. 437
  18. 438

    Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population by Aaro Tupasela, Juanita Devis Clavijo, Marjut Salokannel, Christoph Fink

    Published 2023-03-01
    “…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
    Get full text
    Article
  19. 439
  20. 440

    Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age by Ahmad Mansour, Khaled Alshaketheep, Hind Al-Ahmed, Ahmad Shajrawi, Arafat Deeb

    Published 2025-06-01
    “…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
    Get full text
    Article