Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 761 - 780 results of 2,784 for search '"\"((((\\"useds OR \"useddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 761

    Personalized Federated Learning for Heterogeneous Residential Load Forecasting by Xiaodong Qu, Chengcheng Guan, Gang Xie, Zhiyi Tian, Keshav Sood, Chaoli Sun, Lei Cui

    Published 2023-12-01
    “…However, the deep prediction model requires users to provide a large amount of private electricity consumption data, which has potential privacy risks. Edge nodes can federally train a global model through aggregation using federated learning (FL). …”
    Get full text
    Article
  2. 762

    Relative Applicability of Diverse Automatic Speech Recognition Platforms for Transcription of Psychiatric Treatment Sessions by Rana Zeeshan, John Bogue, Mamoona Naveed Asghar

    Published 2025-01-01
    “…Although such models are good enough for most use cases, storing audio recordings in psychiatry complicates the data handling and adoption of ASR platforms in mental healthcare. …”
    Get full text
    Article
  3. 763

    Sexting in young adults’ social networks in Brazil: an exploratory study on the circulation of nudes by Aroldo de Lara Cardoso Júnior, Liliana Liviano Wahba

    Published 2025-06-01
    “…Results A negative statistical correlation between Problematic Internet Use and body satisfaction was found, with 4 thematic categories emerging in qualitative data: (1) feeling of being pressured, (2) nudes as a condition for further social contact, (3) conformity to body standards and (4) fear of undue exposure and loss of control. …”
    Get full text
    Article
  4. 764

    The Risk of Linked Census Data to Transgender Youth by Abraham Flaxman, Os Keyes

    Published 2025-03-01
    “…Our simulation found that the TopDown configuration attains the maximum achievable level of privacy protection against such an attack. Our results demonstrate the importance of disclosure avoidance for census data and suggest that the TopDown approach used by the Census Bureau is a substantial improvement compared to the previous approach, achieving the maximum level of privacy protection possible against such a linkage attack. …”
    Get full text
    Article
  5. 765

    Photography in the Age of Surveillance: Ethics and the Photographer’s Responsibility by Çeyiz MAKAL FAIRCLOUGH

    Published 2025-04-01
    “…This paper explores how certain photographers, including Hasan Elahi and Trevor Paglen, have responded to the dominance of surveillance culture by using their work to critique and resist its normalisation. …”
    Get full text
    Article
  6. 766

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…However, the vulnerabilities in the underlying smart city technologies, interconnection of heterogeneous devices, and transfer of data over the open public channels expose these networks to a myriad of security and privacy threats. …”
    Get full text
    Article
  7. 767

    FedSW-TSAD: SWGAN-Based Federated Time Series Anomaly Detection by Xiuxian Zhang, Hongwei Zhao, Weishan Zhang, Shaohua Cao, Haoyun Sun, Baoyu Zhang

    Published 2025-06-01
    “…As distributed sensing technologies evolve, the collection of time series data is becoming increasingly decentralized, which introduces serious challenges for both model training and data privacy protection. …”
    Get full text
    Article
  8. 768

    Synthetic Financial Data: A Case Study Regarding Polish Limited Liability Companies Data by Aleksandra Szymura

    Published 2024-07-01
    “…Due to the statistical similarity with real data, they can be used instead of them. This action allows data to be shared externally while guaranteeing their privacy. …”
    Get full text
    Article
  9. 769

    It’s Fine If Others Do It Too: Privacy Concerns, Social Influence, and Political Expression on Facebook in Canada, France, Germany, the United Kingdom, and the United States by Christian Pieter Hoffmann, Shelley Boulianne

    Published 2024-10-01
    “…We use survey data gathered in 2023 from Canada, France, Germany, the United Kingdom, and the United States ( n  = 5,936). …”
    Get full text
    Article
  10. 770

    Predicting digital contact tracing tool adoption during COVID-19 from the perspective of TAM: The role of trust, fear, privacy, anxiety, and social media by Adi Alsyouf, Ala’a M Al-Momani, Nizar Alsubahi, Abdalwali Lutfi, Khalid Anwer Al-Mugheed, Mohammed Amin Almaiah, Rami J Anshasi, Main Naser Alolayyan, Abdallah Alsaad, Mahmaod Alrawad

    Published 2025-05-01
    “…This study investigates the key determinants of DCT adoption and acceptance by integrating the Technology Acceptance Model (TAM) with psychological, social, and regulatory factors related to the context of the study. Methods Using a quantitative, cross-sectional design, data were collected from Saudi participants through an online survey and analysed using Structural Equation Modeling (SEM) with SmartPLS4. …”
    Get full text
    Article
  11. 771

    Strong Association of Perceived Chronic Stress with Leadership Quality, Work–Privacy Conflict and Quantitative Work Demands: Results of the IMPROVE<i>job</i> Study by Julian Göbel, Lukas Degen, Karen Minder, Monika A. Rieger, Birgitta M. Weltermann

    Published 2025-05-01
    “…The factors associated with lower perceived chronic stress were identified using a multilevel regression model approach. The model showed a significant association with less work–privacy conflict (<i>p</i> < 0.001, <i>β</i> = 0.31), lower quantitative work demands (<i>p</i> < 0.001, <i>β</i> = 0.28), and good leadership quality (<i>p</i> < 0.001, <i>β</i> = −0.22). …”
    Get full text
    Article
  12. 772

    Big data, big responsibilities by Primavera De Filippi

    Published 2014-01-01
    “…With the advent of cloud computing, specialised data centres with powerful computational hardware and software resources can be used for processing and analysing a humongous amount of aggregated data coming from a variety of different sources. …”
    Get full text
    Article
  13. 773

    A data flow process for confidential data and its application in a health research project. by Samantha S R Crossfield, Kieran Zucker, Paul Baxter, Penny Wright, Jon Fistein, Alex F Markham, Mark Birkin, Adam W Glaser, Geoff Hall

    Published 2022-01-01
    “…However, using healthcare data for secondary purposes raises legal and ethical concerns relating to confidentiality, privacy and data protection rights. …”
    Get full text
    Article
  14. 774

    Rich Data Versus Quantity of Data in Code Generation AI: A Paradigm Shift for Healthcare by Muthu Ramachandran, Steven Fouracre

    Published 2025-06-01
    “…Using Self-Evolving Software (SES) as a case study, the research contrasts outcomes from both paradigms and proposes a weighted matrix for data selection in Code Gen AI systems. …”
    Get full text
    Article
  15. 775
  16. 776

    A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks by Min Yoon, Miyoung Jang, Hyeong-Il Kim, Jae-Woo Chang

    Published 2014-01-01
    “…To support privacy-preserving data aggregation and integrity checking, our technique makes use of the additive property of complex numbers. …”
    Get full text
    Article
  17. 777

    THE USE OF SOCIAL MEDIA FOR LEARNING ENGLISH: STUDENTS PERSPECTIVE by Muetia Safitri, Atik Yuliyani, Farida Hamid, Aminah Suriaman

    Published 2022-07-01
    “…Basic statistical analysis was used to analyze data from the questionnaire, and the data from interviews were analyzed using the flow model by Miles and Huberman. …”
    Get full text
    Article
  18. 778

    Chatbots in medicine: certification process and applied use case by Mayssam Nehme, Franck Schneider, Esther Amruthalingam, Elio Schnarrenberger, Raphaël Trëmeaud, Idris Guessous

    Published 2024-10-01
    “…However, their application in medicine and healthcare has been limited due to concerns over data privacy, ther risk of providing medical diagnoses, and ensuring regulatory and legal compliance. …”
    Get full text
    Article
  19. 779

    Patient Perspective on Use of an Interactive Website for Sleep Apnea by Carl Stepnowsky, Christine Edwards, Tania Zamora, Robert Barker, Zia Agha

    Published 2013-01-01
    “…The goal of this paper is to report on CPAP adherence, internet use, privacy concerns and user satisfaction in using the website. …”
    Get full text
    Article
  20. 780

    Investigating Sensitive Issues in Class Through Randomized Response Polling by Christian Genest, James A. Hanley, Sahir R. Bhatnagar

    Published 2024-10-01
    “…This article provides an introduction to randomized response polling, a technique which was designed to allow for questioning on sensitive issues while protecting the respondent’s privacy and avoiding social desirability bias. It is described in terms that are suitable for presentation and use in any classroom environment. …”
    Get full text
    Article