Showing 2,301 - 2,320 results of 2,784 for search '"\"((\\"use privacy data\\") OR (((\"useds OR \"uses) OR \"used) privacy data\\"))~\""', query time: 0.23s Refine Results
  1. 2301

    Human-centred SME factories: the future of work in SMEs under industry 5.0 by Philani Nduna Zincume, Maria Maier

    Published 2025-06-01
    “…These include regional challenges like data privacy in Europe and skills deficits in South Africa. …”
    Get full text
    Article
  2. 2302

    Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital by Daniel, Nabimanya, Sembatya, Richard, Ambrose, Atuhaire, Phelix, Businge Mbabazi

    Published 2021
    “…The researcher interviewed fifty (50) Interviewees and data was analyzed using NVIVO version 11.The findings revealed that 88% of the total interviewees express the need for their information to be kept secret from untrusted parties while 12% of the total interviewees didn’t express the need for their information secrecy from untrusted parties. …”
    Get full text
    Article
  3. 2303

    A Review of Deep Learning Techniques for Leukemia Cancer Classification Based on Blood Smear Images by Rakhmonalieva Farangis Oybek Kizi, Tagne Poupi Theodore Armand, Hee-Cheol Kim

    Published 2025-02-01
    “…Despite these advancements, challenges such as dataset limitations, the lack of model interpretability, and ethical concerns regarding data privacy and bias remain critical barriers to widespread adoption. …”
    Get full text
    Article
  4. 2304

    Asynchronous blockchain‐based federated learning for tokenized smart power contract of heterogeneous networked microgrid system by Desh Deepak Sharma

    Published 2024-12-01
    “…For simulation purposes, MATLAB and python programming have been used with real‐time data of microgrids.…”
    Get full text
    Article
  5. 2305

    A Survey on the Effectiveness of Existing Smart Home Cyber Attacks Detection Solution: A Broadband Service Providers’ Perspective by Md Mizanur Rahman, Faycal Bouhafs, Frank den Hartog

    Published 2025-01-01
    “…We also discuss future research directions, emphasising scalable and data-efficient methods to reduce storage requirements, costs, and privacy concerns, which will enable BSPs to manage millions of customer networks more effectively.…”
    Get full text
    Article
  6. 2306

    Exploring mHealth app utilization for diabetes self-management: survey insights from a northern district in Malaysia by Premaa Supramaniam, Ying-Shan Beh, Suria Junus, Philip Rajan Devesahayam

    Published 2024-12-01
    “…Users perceived the mHealth app as useful (97.5%), yet faced challenges over the app initiation, charges and data security. …”
    Get full text
    Article
  7. 2307

    Community PrEP delivery for adolescent girls and young women: insights from the DREAMS PrEP Choice Study in Johannesburg, South Africa by Nicolette Prea Naidoo, Nqaba Mthimkulu, Ngcwalisa Jama, Glory Chidumwa, Brison Chabalala, Tafadza Mhakakora, Lauren Parmley, Saiqa Mullick

    Published 2025-04-01
    “…Quantitative data are presented descriptively whilst qualitative data were analyzed using content and thematic analyses.ResultsBetween October 2023 and April 2024, 657 participants were enrolled and offered PrEP choice. …”
    Get full text
    Article
  8. 2308

    Navigating digital frontiers in UAE healthcare: A qualitative exploration of healthcare professionals' and patients' experiences with AI and telemedicine. by Azza Alkaabi, Deena Elsori

    Published 2025-04-01
    “…The results highlight the need to address such limitations, adequately train healthcare professionals, and enhance data privacy. The study also lays a foundation for further research into contextual challenges hindering the effective adoption and implementation of AI and telemedicine in different healthcare settings in order to develop a generic, context-specific framework that will guide the adoption of such emerging technologies in the global healthcare industry.…”
    Get full text
    Article
  9. 2309

    Examining Healthcare Practitioners’ Perceptions of Virtual Physicians, mHealth Applications, and Barriers to Adoption: Insights for Improving Patient Care and Digital Health... by Alzghaibi H

    Published 2025-04-01
    “…It further aims to provide recommendations for enhancing usability, accessibility, and integration within existing healthcare infrastructures.Methods: A cross-sectional study was conducted among 574 secondary healthcare practitioners (SHCPs), including physicians, nurses, and administrative staff, working in secondary healthcare centres across Saudi Arabia. Data were collected using a structured questionnaire assessing ten primary barriers to mHealth adoption, including technical, usability, training, integration, privacy, organisational, communication, financial, and productivity-related challenges. …”
    Get full text
    Article
  10. 2310

    Information Technology in Nursing Practice: A Scoping Review of Assessment Tools for Evaluating Nurses’ Competencies by Cachata D, Costa M, Magalhães T, Lucas P, Gaspar F

    Published 2025-05-01
    “…This has driven the need to develop specific competencies and maintain a balance between ethical aspects, social and legal challenges related to privacy and data security, as well as the challenge of ensuring person-centered care practice. …”
    Get full text
    Article
  11. 2311

    The Experience of Intimacy and Sexuality in Persons with Mental Illness: A Metasynthesis by Reshma Antony, Manjula Munivenkatappa, Geetha Desai

    Published 2025-01-01
    “…ATLAS.ti software was used to code the primary and secondary data to generate 83 descriptive themes and 17 composite themes, which were further synthesised to create seven interpretive themes. …”
    Get full text
    Article
  12. 2312

    ChatGPT’s Integration in GCC Higher Education: Bibliometric Analysis of Trends by Tosin Ekundayo , Zafarullah Khan , Shahid Ali Chaudhry

    Published 2024-10-01
    “…Key findings include the positive impact of ChatGPT on personalized learning and student engagement, as well as the growing focus on ethical concerns such as data privacy and bias. The study also identified strong interdisciplinary connections, with AI research in education intersecting with fields such as computer science, linguistics, and cognitive science. …”
    Get full text
    Article
  13. 2313

    Technology-enabled CONTACT tracing in care homes in the COVID-19 pandemic: the CONTACT non-randomised mixed-methods feasibility study by Carl A Thompson, Thomas A Willis, Amanda Farrin, Adam Gordon, Amrit Daffu-O’Reilly, Catherine Noakes, Kishwer Khaliq, Andrew Kemp, Tom Hall, Chris Bojke, Karen Spilsbury

    Published 2025-05-01
    “…Quantitative data were analysed using descriptive statistical methods, and qualitative data were thematically analysed using normalisation process theory. …”
    Get full text
    Article
  14. 2314

    The Application of Digital Intelligence Technology in the Management of Non-Hospitalized Patients with Rare Diseases by YAO Yiyang, GAO Yi, GUO Yixuan, QIN Zhuoyue, ZHANG Yaofang, JING Jiaqi, XIE Jing, GUO Jian, ZHANG Shuyang

    Published 2025-01-01
    “…Methods We designed the search strategy and used the words " rare diseases"" patient management"" non-hospitalized management"" community management"" digital intelligence"" big data"" telemedicine" as MESH terms or free words. …”
    Get full text
    Article
  15. 2315

    Predicting Student Dropout Through Text and Media Content Analysis of VKontakte Profiles by Sergei S. Gorshkov, Dmitry I. Ignatov, Anastasia Yu. Chernysheva

    Published 2025-01-01
    “…While this approach depends on publicly available VK data and may be limited by privacy settings, it still provides useful insights. …”
    Get full text
    Article
  16. 2316

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
    Get full text
    Article
  17. 2317

    Bitcoin Mining in Turkey as an Example of Speculative Entrepreneurship by Ali Osman Uymaz, Ali Rıza Esmen

    Published 2022-10-01
    “…The collected data thus was analyzed and coded thorough thematic analysis. …”
    Get full text
    Article
  18. 2318

    Exploration of the Efficiency of SLM-Enabled Platforms for Everyday Tasks by Volodymyr Rusinov, Nikita Basenko

    Published 2025-04-01
    “…With growing concerns around data privacy and the resource-intensiveness of large models, SLMs present a promising solution for research and applications requiring fast, cost-effective, and locally deployable models. …”
    Get full text
    Article
  19. 2319

    EXPLORING BIBLIOSHINY FOR MAPPING ARTIFICIAL INTELLIGENCE RESEARCH IN EDUCATION by Hanifah Indah Rahmawati, Zenita Sabitri, Mutiara Nabila Azmi, Danny Meirawan

    Published 2025-05-01
    “… This study critically analyzes the development of artificial intelligence (AI) research in education using a bibliometric approach, leveraging data from 191 Scopus-indexed documents during the 2015-2024 period. …”
    Get full text
    Article
  20. 2320