Search alternatives:
\\"useds » \\"uses (Expand Search)
Showing 2,221 - 2,240 results of 2,784 for search '"\"((((\\"useds OR \"usedddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 2221

    When and Why Adults Abandon Lifestyle Behavior and Mental Health Mobile Apps: Scoping Review by Patrick G Kidman, Rachel G Curtis, Amanda Watson, Carol A Maher

    Published 2024-12-01
    “…ObjectiveWe explored the abandonment of apps used for managing physical activity, diet, alcohol, smoking, and mental health in free-living conditions, examining the duration of app use before abandonment and the underlying reasons. …”
    Get full text
    Article
  2. 2222

    Dynamics of Robo-Advisory Financial Services in Saudi Arabia by Heba Gazzaz

    Published 2025-06-01
    “…The key limitations of adopting Robo-advisory services include algorithmic bias, a lack of trust and transparency, legal and regulatory issues, privacy and data security concerns, and limited financial literacy. …”
    Get full text
    Article
  3. 2223

    Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Han-Chieh Chao

    Published 2024-11-01
    “…Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.…”
    Get full text
    Article
  4. 2224

    Exploring the potential of GenAI for personalised English teaching: Learners' experiences and perceptions by Lucas Kohnke, Di Zou, Fan Su

    Published 2025-06-01
    “…Our results underscore the need for professional development for educators and the establishment of guidelines to address academic integrity and data privacy.…”
    Get full text
    Article
  5. 2225

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  6. 2226

    Pooled Rideshare in the U.S.: An Exploratory Study of User Preferences by Rakesh Gangadharaiah, Johnell Brooks, Lisa Boor, Kristin Kolodge, Haotian Su, Yunyi Jia

    Published 2025-05-01
    “…The study incorporated 77 actionable items developed from the results of the 2021 survey to assess whether addressing specific user-generated topics such as safety, reliability, convenience, and privacy can improve pooled rideshare use. A side-by-side comparison of the 2021 and 2025 data revealed shifts in transportation behavior, with personal rideshare usage increasing from 22% to 28%, public transportation from 21% to 27%, and pooled rideshare from 6% to 8%, while personal vehicle (79%) use remained dominant. …”
    Get full text
    Article
  7. 2227

    Towards AI-Powered Applications: The Development of a Personalised LLM for HRI and HCI by Khashayar Ghamati, Maryam Banitalebi Dehkordi, Abolfazl Zaraki

    Published 2025-03-01
    “…Furthermore, this study engages with the broader ethical dimensions of PLLM, critically discussing issues of generalisability and data privacy concerns in AI research. Our findings demonstrate the usability of using the PLLM in a human–robot interaction scenario in real-world settings, highlighting its applicability across diverse domains, including healthcare, education, and assistive technologies. …”
    Get full text
    Article
  8. 2228

    Role of digital technology in epidemic control: a scoping review on COVID-19 and Ebola by Amanuel Adugna, Gossa Fetene Abebe, Desalegn Girma, Melsew Setegn Alie, Tewodros Yosef, Daniel Asmelash, Dorka Dessalegn

    Published 2025-01-01
    “…Five main themes emerged: digital epidemiological surveillance (using data visualisation tools and online sources for early disease detection), rapid case identification, community transmission prevention (via digital contact tracing and assessing interventions with mobility data), public education messages and clinical care. …”
    Get full text
    Article
  9. 2229

    Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks by ALEKSANDAR JEVREMOVIC, Zona Kostic, Ivan Chorbev, Dragan Perakovic, Andrii Shalaginov, Ivan Cvitic

    Published 2025-01-01
    “…The ability to process data locally using complex algorithms is becoming increasingly important in Internet of Things (IoT) contexts. …”
    Get full text
    Article
  10. 2230

    Integrating Model‐Informed Drug Development With AI: A Synergistic Approach to Accelerating Pharmaceutical Innovation by Karthik Raman, Rukmini Kumar, Cynthia J. Musante, Subha Madhavan

    Published 2025-01-01
    “…However, several challenges, including the availability of relevant, labeled, high‐quality datasets, data privacy concerns, model interpretability, and algorithmic bias, must be carefully managed. …”
    Get full text
    Article
  11. 2231

    AI-driven multimodal colorimetric analytics for biomedical and behavioral health diagnostics by Desta Haileselassie Hagos, Saurav Keshari Aryal, Patrick Ymele-Leki, Legand L. Burge

    Published 2025-01-01
    “…In addition, we highlight the need for robust data management systems and interpretable AI/ML models to ensure security, privacy, and reliability in biomedical and behavioral research. …”
    Get full text
    Article
  12. 2232

    Revolutionizing e-health: the transformative role of AI-powered hybrid chatbots in healthcare solutions by Jack Ng Kok Wah

    Published 2025-02-01
    “…After screening 116 studies, 29 met the criteria for inclusion. Data was extracted using a structured template, capturing study objectives, methodologies, findings, and challenges. …”
    Get full text
    Article
  13. 2233

    Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis by Lana V Ivanitskaya, Dimitrios Zikos, Elina Erzikova

    Published 2025-06-01
    “…Researchers’ concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. …”
    Get full text
    Article
  14. 2234

    Mobile Apps and Wearable Devices for Cardiovascular Health: Narrative Review by Gauri Kumari Chauhan, Patrick Vavken, Christine Jacob

    Published 2025-04-01
    “…While 20% (4/20) of the included apps had clinical integration features such as clinician dashboards, only 10% (2/20) had the potential to effectively enhance clinician workflows. Privacy policies were present in 95% (19/20) of the apps, with 75% (15/20) adhering to General Data Protection Regulation (GDPR) regulations; 1 app had no data protection policy. …”
    Get full text
    Article
  15. 2235

    AI-Driven Framework for Secure and Efficient Load Management in Multi-Station EV Charging Networks by Md Sabbir Hossen, Md Tanjil Sarker, Marran Al Qwaid, Gobbi Ramasamy, Ngu Eng Eng

    Published 2025-07-01
    “…The framework uses federated learning (FL) to protect data privacy and make decisions in a decentralized way, which lowers the risks that come with centralizing data. …”
    Get full text
    Article
  16. 2236

    Healthcare professionals’ perspectives on artificial intelligence (AI)-based mobile applications (apps) for diabetes education and behavioural management by Phei-Ching Lim, Yung-Wey Chong, Qiu-Ting Chie, Hadzliana Zainal, Kok-Lim Alvin Yau, Soo-Huat Teoh

    Published 2025-03-01
    “…However, significant concerns were raised about accessibility for older adults, data privacy, and the apps’ ability to modify entrenched behaviours without human intervention. …”
    Get full text
    Article
  17. 2237

    Redefining Urban Traffic Dynamics With TCN-FL Driven Traffic Prediction and Control Strategies by K. M. Karthick Raghunath, C. Rohith Bhat, Venkatesan Vinoth Kumar, Velmurugan Athiyoor Kannan, T. R. Mahesh, K. Manikandan, N. Krishnamoorthy

    Published 2024-01-01
    “…The system guarantees data privacy and utilizes decentralized information analysis using Federated Learning. …”
    Get full text
    Article
  18. 2238

    Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3 by Merryana Lestari, Hindriyanto Dwi Purnomo, Irwan Sembiring

    Published 2021-10-01
    “…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
    Get full text
    Article
  19. 2239

    Generative Artificial Intelligence Tools in Medical Research (GAMER): Protocol for a Scoping Review and Development of Reporting Guidelines by Xufei Luo, Yih Chung Tham, Mohammad Daher, Zhaoxiang Bian, Yaolong Chen, Janne Estill

    Published 2025-08-01
    “…However, the increasing use of GenAI tools in medical research presents challenges, including ethical concerns, data privacy issues, and the potential for generating false content. …”
    Get full text
    Article
  20. 2240

    Barriers to access to care in the implementation of telemedicine in public hospitals in Southern Ethiopia: A phenomenological qualitative study. by Getachew Nigussie Bolado, Bizuayehu Atinafu Ataro, Christian Kebede Gadabo, Tamirat Ersino Kebamo, Worku Mimanu Minuta, Abenezer Duta Wolde

    Published 2025-01-01
    “…The data analysis was conducted using OpenCode 4.02 software, and a content thematic analysis was executed following Colaizzi's 7-step method.…”
    Get full text
    Article