Search alternatives:
\\"useds » \\"uses (Expand Search)
Showing 881 - 900 results of 2,784 for search '"\"((((\\"useds OR \"usedddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.26s Refine Results
  1. 881

    Data Governance Navigation for Advanced Operations in Healthcare Excellence by Vahideh Zarea Gavgani, Aniseh Pourrasmi

    Published 2024-08-01
    “…Developments in medical data analysis bring important social benefits but also challenge privacy and other ethical values. …”
    Get full text
    Article
  2. 882

    THE SECURITY OF PERSONAL DATA IN EUROPEAN UNION SINCE 2018 by Dariusz Brążkiewicz

    Published 2019-07-01
    “…Intensive development of information technology in the early 21st century means that citizens’ personal data is constantly processed using increasingly advanced digital technologies. …”
    Get full text
    Article
  3. 883

    Teachers’ digital literacy competencies according to their age status and their level of use in classes by Gökbulut Burak, Yeniasır Mustafa, Gökbulut Özlem Dağlı

    Published 2024-01-01
    “…Digital literacy means that individuals know how to properly use digital platforms/tools both for their personal development and for solving everyday problems, mastering information technologies and being aware of issues such as legal responsibility, data protection, security and ethics. …”
    Get full text
    Article
  4. 884

    The Use of ChatGPT in English Language Learning: A Systematic Literature Review by Nur Hidayati, Erna Andriyanti, Novasa Adiyani

    Published 2025-03-01
    “…Following PRISMA guidelines, this review analyzes data from Scopus, ERIC, and Google Scholar using thematic analysis to identify key themes. …”
    Get full text
    Article
  5. 885
  6. 886

    Enhanced federated learning for secure medical data collaboration by Benjamin Appiah, Isaac Osei, Bill K. Frimpong, Daniel Commey, Kwabena Owusu-Agymang, Gabriel Assamah

    Published 2025-04-01
    “…Abstract Federated learning (FL) enables collaborative model training across multiple institutions while preserving data privacy. However, conventional encryption techniques used in FL remain vulnerable to quantum attacks, raising concerns about the security of model update transmissions. …”
    Get full text
    Article
  7. 887

    The use of micromobility riding simulators in road safety research: a systematic review by Charitha Dias, Qinaat Hussain, Muhammad Abdullah

    Published 2025-09-01
    “…Collecting real-world and field data involves numerous challenges due to ethical, privacy, and safety concerns. …”
    Get full text
    Article
  8. 888
  9. 889

    A review of the use of technology in sport coaching: current trends and future directions by Fadli Ihsan, Ahmad Nasrulloh, Sigit Nugroho, Rina Yuniana

    Published 2025-03-01
    “…Various technological tools and applications have been developed to help coaches analyze athlete performance, monitor physical condition, provide feedback, and make decisions based on objective, real-time data. Conclusion The use of technology in sports training offers promising benefits but also presents challenges. …”
    Get full text
    Article
  10. 890

    Use of ChatGPT in Education: Future Strategic Road Map with SWOT Analysis by Mustafa Taktak , Mehmet Şükrü Bellibaş , Mustafa Özgenel

    Published 2024-10-01
    “…However, concerns have been raised regarding ethical issues such as data privacy, security, plagiarism, bias, and the potential for commercial exploitation, as well as negative psychological impacts on users. …”
    Get full text
    Article
  11. 891

    Comparison of Personal Data Protection Laws Indonesia and Thailand by wardah yuspin, Miranti Kusretno Tampawestri, Ridho Bawana Jati

    Published 2025-06-01
    “…The emergence the leakage of personal data realizes the protection of personal data is very important because it involves the concept of one’s privacy. …”
    Get full text
    Article
  12. 892

    Balancing Risks and Opportunities: Data-Empowered-Health Ecosystems by Lan Li, Emma Back, Suna Lee, Rebecca Shipley, Néo Mapitse, Stefan Elbe, Melanie Smallman, James Wilson, Ifat Yasin, Geraint Rees, Ben Gordon, Virginia Murray, Stephen L Roberts, Anna Cupani, Patty Kostkova

    Published 2025-03-01
    “…This paper argues that reframing health care data as a common good, improving the transparency of data acquisition and processing, and promoting the use of application programming interfaces (APIs) for real-time data access are essential to overcoming these challenges. …”
    Get full text
    Article
  13. 893

    Use of AI in Mental Health Care: Community and Mental Health Professionals Survey by Shane Cross, Imogen Bell, Jennifer Nicholas, Lee Valentine, Shaminka Mangelsdorf, Simon Baker, Nick Titov, Mario Alvarez-Jimenez

    Published 2024-10-01
    “…The surveys collected data on demographics, technology comfort, attitudes toward AI, specific AI use cases, and experiences of benefits and harms from AI use. …”
    Get full text
    Article
  14. 894

    Healthcare Providers’ Perspective about the Use of Telemedicine in Egypt: A National Survey by Mohamed Alboraie, Mohammad Abdalgaber, Naglaa Youssef, Inas Moaz, Nermeen Abdeen, Hazem Maarouf Abosheaishaa, Mina Tharwat Shokry, Fathiya El-Raey, Sabry Shaaban Asfour, Waleed A. Abdeldayem, Adel Ahmed Hassan, Essam Eldeen M.o. Mahran, Mohammed Tag-Adeen, Omar Elshaarawy, Mohamed Ibrahim Radwan, Ahmed Altonbary, Yasser Fouad

    Published 2022-01-01
    “…Participants assumed that the use of telemedicine might not have a negative effect on the doctor-patient relationship but raised some concerns regarding the privacy and security of patients’ data. …”
    Get full text
    Article
  15. 895

    Promoting Awareness of Data Confidentiality and Security During the COVID-19 Pandemic in a Low-Income Country—Sierra Leone by Joseph Sam Kanu, Mohamed A. Vandi, Brima Bangura, Katherine Draper, Yelena Gorina, Monique A. Foster, Jadnah D. Harding, Eric N. Ikoona, Amara Jambai, Mohamed A. M. Kamara, Daniel Kaitibi, Daphne B. Moffett, Tushar Singh, John T. Redd

    Published 2024-11-01
    “…ObjectivesWorld Health Organization issued Joint Statement on Data Protection and Privacy in the COVID-19 Response stating that collection of vast amounts of personal data may potentially lead to the infringement of fundamental human rights and freedoms. …”
    Get full text
    Article
  16. 896

    Private Data Leakage in Federated Contrastive Learning Networks by Kongyang Chen, Wenfeng Wang, Zixin Wang, Yao Huang, Yatie Xiao, Wangjun Zhang, Zhipeng Li, Zhefei Guo, Zhucheng Luo, Lin Yin, Haiyan Mai, Xiaoying Wang, Qintai Yang

    Published 2025-01-01
    “…Generally, Federated Contrastive Learning (FCL) represents an emerging approach for learning from decentralized unlabeled data while upholding data privacy. In FCL, participant clients collaborate in learning a global encoder using unlabeled data, which can serve as a versatile feature extractor for diverse downstream tasks. …”
    Get full text
    Article
  17. 897
  18. 898

    Emotional Design of Interior Spaces: Exploring Challenges and Opportunities by Liang Rui, Muhammad Firzan

    Published 2025-01-01
    “…Nvivo 12 software was used for conducting a thematic analysis of the collected transcripts within the context of interview strategy. …”
    Get full text
    Article
  19. 899

    Anonymization in web auctions using Zero-Knowledge Proof in Blockchain technology by Marlena Broniszewska, Wiktor B. Daszczuk, Denny B. Czejdo

    Published 2025-06-01
    “…However, the centralized nature of traditional e-commerce platforms raises concerns about data control, privacy, and potential single points of failure. …”
    Get full text
    Article
  20. 900

    Fingernail analysis management system using microscopy sensor and blockchain technology by Shih Hsiung Lee, Chu Sing Yang

    Published 2018-03-01
    “…This work uses the highly anonymous blockchain technology to effectively protect data privacy and manage each user’s data through the blockchain, in which any change or manipulation can be recorded and tracked, and the data security is improved. …”
    Get full text
    Article