Showing 2,261 - 2,280 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR (\"uses OR \"used)) privacy data\\"))~\""', query time: 0.25s Refine Results
  1. 2261

    Pooled Rideshare in the U.S.: An Exploratory Study of User Preferences by Rakesh Gangadharaiah, Johnell Brooks, Lisa Boor, Kristin Kolodge, Haotian Su, Yunyi Jia

    Published 2025-05-01
    “…The study incorporated 77 actionable items developed from the results of the 2021 survey to assess whether addressing specific user-generated topics such as safety, reliability, convenience, and privacy can improve pooled rideshare use. A side-by-side comparison of the 2021 and 2025 data revealed shifts in transportation behavior, with personal rideshare usage increasing from 22% to 28%, public transportation from 21% to 27%, and pooled rideshare from 6% to 8%, while personal vehicle (79%) use remained dominant. …”
    Get full text
    Article
  2. 2262

    Towards AI-Powered Applications: The Development of a Personalised LLM for HRI and HCI by Khashayar Ghamati, Maryam Banitalebi Dehkordi, Abolfazl Zaraki

    Published 2025-03-01
    “…Furthermore, this study engages with the broader ethical dimensions of PLLM, critically discussing issues of generalisability and data privacy concerns in AI research. Our findings demonstrate the usability of using the PLLM in a human–robot interaction scenario in real-world settings, highlighting its applicability across diverse domains, including healthcare, education, and assistive technologies. …”
    Get full text
    Article
  3. 2263

    Empowerment in structures. Practical-ethical considerations of the preconditions for technology-assisted dementia care in Germany based on an expert-interview study by Johannes Welsch, Silke Schicktanz

    Published 2025-01-01
    “…Thematic content analysis was used to analyze the data.FindingsThe experts’ assessments of the current preconditions for TADC in Germany were starkly ambivalent. …”
    Get full text
    Article
  4. 2264

    A review of machine learning and internet-of-things on the water quality assessment: Methods, applications and future trends by Gangani Dharmarathne, A.M.S.R. Abekoon, Madhusha Bogahawaththa, Janaka Alawatugoda, D.P.P. Meddage

    Published 2025-06-01
    “…While IoT significantly improves real-time contamination detection, persistent challenges remain in sensor fouling, data continuity, data privacy, network reliability, and cybersecurity. …”
    Get full text
    Article
  5. 2265

    Role of digital technology in epidemic control: a scoping review on COVID-19 and Ebola by Amanuel Adugna, Gossa Fetene Abebe, Desalegn Girma, Melsew Setegn Alie, Tewodros Yosef, Daniel Asmelash, Dorka Dessalegn

    Published 2025-01-01
    “…Objective To synthesise the role of digital technologies in epidemic control and prevention, focussing on Ebola and COVID-19.Design A scoping review.Data sources A systematic search was done on PubMed, HINARI, Web of Science, Google Scholar and a direct Google search until 10 September 2024.Eligibility criteria We included all qualitative and quantitative studies, conference papers or abstracts, anonymous reports, editorial reports and viewpoints published in English.Data extraction and synthesis The Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews checklist was used to select the included study. …”
    Get full text
    Article
  6. 2266

    Dynamics of Robo-Advisory Financial Services in Saudi Arabia by Heba Gazzaz

    Published 2025-06-01
    “…The key limitations of adopting Robo-advisory services include algorithmic bias, a lack of trust and transparency, legal and regulatory issues, privacy and data security concerns, and limited financial literacy. …”
    Get full text
    Article
  7. 2267

    Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Han-Chieh Chao

    Published 2024-11-01
    “…Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.…”
    Get full text
    Article
  8. 2268

    Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3 by Merryana Lestari, Hindriyanto Dwi Purnomo, Irwan Sembiring

    Published 2021-10-01
    “…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
    Get full text
    Article
  9. 2269

    Healthcare professionals’ perspectives on artificial intelligence (AI)-based mobile applications (apps) for diabetes education and behavioural management by Phei-Ching Lim, Yung-Wey Chong, Qiu-Ting Chie, Hadzliana Zainal, Kok-Lim Alvin Yau, Soo-Huat Teoh

    Published 2025-03-01
    “…However, significant concerns were raised about accessibility for older adults, data privacy, and the apps’ ability to modify entrenched behaviours without human intervention. …”
    Get full text
    Article
  10. 2270

    Redefining Urban Traffic Dynamics With TCN-FL Driven Traffic Prediction and Control Strategies by K. M. Karthick Raghunath, C. Rohith Bhat, Venkatesan Vinoth Kumar, Velmurugan Athiyoor Kannan, T. R. Mahesh, K. Manikandan, N. Krishnamoorthy

    Published 2024-01-01
    “…The system guarantees data privacy and utilizes decentralized information analysis using Federated Learning. …”
    Get full text
    Article
  11. 2271

    Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks by ALEKSANDAR JEVREMOVIC, Zona Kostic, Ivan Chorbev, Dragan Perakovic, Andrii Shalaginov, Ivan Cvitic

    Published 2025-01-01
    “…The ability to process data locally using complex algorithms is becoming increasingly important in Internet of Things (IoT) contexts. …”
    Get full text
    Article
  12. 2272

    Generative Artificial Intelligence Tools in Medical Research (GAMER): Protocol for a Scoping Review and Development of Reporting Guidelines by Xufei Luo, Yih Chung Tham, Mohammad Daher, Zhaoxiang Bian, Yaolong Chen, Janne Estill

    Published 2025-08-01
    “…However, the increasing use of GenAI tools in medical research presents challenges, including ethical concerns, data privacy issues, and the potential for generating false content. …”
    Get full text
    Article
  13. 2273

    Revolutionizing e-health: the transformative role of AI-powered hybrid chatbots in healthcare solutions by Jack Ng Kok Wah

    Published 2025-02-01
    “…After screening 116 studies, 29 met the criteria for inclusion. Data was extracted using a structured template, capturing study objectives, methodologies, findings, and challenges. …”
    Get full text
    Article
  14. 2274

    Barriers to access to care in the implementation of telemedicine in public hospitals in Southern Ethiopia: A phenomenological qualitative study. by Getachew Nigussie Bolado, Bizuayehu Atinafu Ataro, Christian Kebede Gadabo, Tamirat Ersino Kebamo, Worku Mimanu Minuta, Abenezer Duta Wolde

    Published 2025-01-01
    “…The data analysis was conducted using OpenCode 4.02 software, and a content thematic analysis was executed following Colaizzi's 7-step method.…”
    Get full text
    Article
  15. 2275

    Human centered design of AI-powered Digital Therapeutics for stress prevention: Perspectives from multi-stakeholders' workshops about the SHIVA solution by Marco Bolpagni, Susanna Pardini, Silvia Gabrielli

    Published 2024-12-01
    “…Results: Stakeholders perceived AI-based data processing as beneficial for personalized treatment in a secure, privacy-preserving environment. …”
    Get full text
    Article
  16. 2276

    Analyzing the trend of government support for cloud computing usage in e-government architecture by Muhammad Younus, Eko Priyo Purnomo, Achmad Nurmandi, Dyah Mutiarin, Halimah Abdul Manaf, Fathiya Mumtaz, Tiara Khairunnisa

    Published 2025-02-01
    “…Overall, challenges persist, spanning from concerns regarding data safekeeping and privacy, but it also signifies a strategic transition towards harnessing digital technologies to provide more agile, citizen-focused public services.…”
    Get full text
    Article
  17. 2277

    Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis by Lana V Ivanitskaya, Dimitrios Zikos, Elina Erzikova

    Published 2025-06-01
    “…Researchers’ concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. …”
    Get full text
    Article
  18. 2278

    Mobile Apps and Wearable Devices for Cardiovascular Health: Narrative Review by Gauri Kumari Chauhan, Patrick Vavken, Christine Jacob

    Published 2025-04-01
    “…While 20% (4/20) of the included apps had clinical integration features such as clinician dashboards, only 10% (2/20) had the potential to effectively enhance clinician workflows. Privacy policies were present in 95% (19/20) of the apps, with 75% (15/20) adhering to General Data Protection Regulation (GDPR) regulations; 1 app had no data protection policy. …”
    Get full text
    Article
  19. 2279

    Bi-Modal Multiperspective Percussive (BiMP) Dataset for Visual and Audio Human Fall Detection by Joe Dibble, Michael C. F. Bazzocchi

    Published 2025-01-01
    “…Typical fall detection systems classify a fall event using either inertial- or vision-based data. Aside from these two modes of input for fall detection, sparse human fall audio data is available. …”
    Get full text
    Article
  20. 2280

    Research on intrusion detection method for edge networks based on federated reinforcement learning by DING Kai, HUANG Yidu, TAO Ming, XIE Renping

    Published 2024-12-01
    “…However, as public awareness of privacy grows, many datasets are no longer shared, leading to the emergence of data silos, which hinders the improvement of IoT security. …”
    Get full text
    Article