Suggested Topics within your search.
Suggested Topics within your search.
-
2261
Pooled Rideshare in the U.S.: An Exploratory Study of User Preferences
Published 2025-05-01“…The study incorporated 77 actionable items developed from the results of the 2021 survey to assess whether addressing specific user-generated topics such as safety, reliability, convenience, and privacy can improve pooled rideshare use. A side-by-side comparison of the 2021 and 2025 data revealed shifts in transportation behavior, with personal rideshare usage increasing from 22% to 28%, public transportation from 21% to 27%, and pooled rideshare from 6% to 8%, while personal vehicle (79%) use remained dominant. …”
Get full text
Article -
2262
Towards AI-Powered Applications: The Development of a Personalised LLM for HRI and HCI
Published 2025-03-01“…Furthermore, this study engages with the broader ethical dimensions of PLLM, critically discussing issues of generalisability and data privacy concerns in AI research. Our findings demonstrate the usability of using the PLLM in a human–robot interaction scenario in real-world settings, highlighting its applicability across diverse domains, including healthcare, education, and assistive technologies. …”
Get full text
Article -
2263
Empowerment in structures. Practical-ethical considerations of the preconditions for technology-assisted dementia care in Germany based on an expert-interview study
Published 2025-01-01“…Thematic content analysis was used to analyze the data.FindingsThe experts’ assessments of the current preconditions for TADC in Germany were starkly ambivalent. …”
Get full text
Article -
2264
A review of machine learning and internet-of-things on the water quality assessment: Methods, applications and future trends
Published 2025-06-01“…While IoT significantly improves real-time contamination detection, persistent challenges remain in sensor fouling, data continuity, data privacy, network reliability, and cybersecurity. …”
Get full text
Article -
2265
Role of digital technology in epidemic control: a scoping review on COVID-19 and Ebola
Published 2025-01-01“…Objective To synthesise the role of digital technologies in epidemic control and prevention, focussing on Ebola and COVID-19.Design A scoping review.Data sources A systematic search was done on PubMed, HINARI, Web of Science, Google Scholar and a direct Google search until 10 September 2024.Eligibility criteria We included all qualitative and quantitative studies, conference papers or abstracts, anonymous reports, editorial reports and viewpoints published in English.Data extraction and synthesis The Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews checklist was used to select the included study. …”
Get full text
Article -
2266
Dynamics of Robo-Advisory Financial Services in Saudi Arabia
Published 2025-06-01“…The key limitations of adopting Robo-advisory services include algorithmic bias, a lack of trust and transparency, legal and regulatory issues, privacy and data security concerns, and limited financial literacy. …”
Get full text
Article -
2267
Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks
Published 2024-11-01“…Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.…”
Get full text
Article -
2268
Pengaruh E-Payment Trust terhadap Minat Transaksi pada E-Marketplace Menggunakan Framework Technology Acceptance Model (TAM) 3
Published 2021-10-01“…Often users have their own concerns in making payment transactions using e-Payment, one of the most basic concerns is about guaranteeing data security integrity and customer data privacy. …”
Get full text
Article -
2269
Healthcare professionals’ perspectives on artificial intelligence (AI)-based mobile applications (apps) for diabetes education and behavioural management
Published 2025-03-01“…However, significant concerns were raised about accessibility for older adults, data privacy, and the apps’ ability to modify entrenched behaviours without human intervention. …”
Get full text
Article -
2270
Redefining Urban Traffic Dynamics With TCN-FL Driven Traffic Prediction and Control Strategies
Published 2024-01-01“…The system guarantees data privacy and utilizes decentralized information analysis using Federated Learning. …”
Get full text
Article -
2271
Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks
Published 2025-01-01“…The ability to process data locally using complex algorithms is becoming increasingly important in Internet of Things (IoT) contexts. …”
Get full text
Article -
2272
Generative Artificial Intelligence Tools in Medical Research (GAMER): Protocol for a Scoping Review and Development of Reporting Guidelines
Published 2025-08-01“…However, the increasing use of GenAI tools in medical research presents challenges, including ethical concerns, data privacy issues, and the potential for generating false content. …”
Get full text
Article -
2273
Revolutionizing e-health: the transformative role of AI-powered hybrid chatbots in healthcare solutions
Published 2025-02-01“…After screening 116 studies, 29 met the criteria for inclusion. Data was extracted using a structured template, capturing study objectives, methodologies, findings, and challenges. …”
Get full text
Article -
2274
Barriers to access to care in the implementation of telemedicine in public hospitals in Southern Ethiopia: A phenomenological qualitative study.
Published 2025-01-01“…The data analysis was conducted using OpenCode 4.02 software, and a content thematic analysis was executed following Colaizzi's 7-step method.…”
Get full text
Article -
2275
Human centered design of AI-powered Digital Therapeutics for stress prevention: Perspectives from multi-stakeholders' workshops about the SHIVA solution
Published 2024-12-01“…Results: Stakeholders perceived AI-based data processing as beneficial for personalized treatment in a secure, privacy-preserving environment. …”
Get full text
Article -
2276
Analyzing the trend of government support for cloud computing usage in e-government architecture
Published 2025-02-01“…Overall, challenges persist, spanning from concerns regarding data safekeeping and privacy, but it also signifies a strategic transition towards harnessing digital technologies to provide more agile, citizen-focused public services.…”
Get full text
Article -
2277
Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis
Published 2025-06-01“…Researchers’ concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. …”
Get full text
Article -
2278
Mobile Apps and Wearable Devices for Cardiovascular Health: Narrative Review
Published 2025-04-01“…While 20% (4/20) of the included apps had clinical integration features such as clinician dashboards, only 10% (2/20) had the potential to effectively enhance clinician workflows. Privacy policies were present in 95% (19/20) of the apps, with 75% (15/20) adhering to General Data Protection Regulation (GDPR) regulations; 1 app had no data protection policy. …”
Get full text
Article -
2279
Bi-Modal Multiperspective Percussive (BiMP) Dataset for Visual and Audio Human Fall Detection
Published 2025-01-01“…Typical fall detection systems classify a fall event using either inertial- or vision-based data. Aside from these two modes of input for fall detection, sparse human fall audio data is available. …”
Get full text
Article -
2280
Research on intrusion detection method for edge networks based on federated reinforcement learning
Published 2024-12-01“…However, as public awareness of privacy grows, many datasets are no longer shared, leading to the emergence of data silos, which hinders the improvement of IoT security. …”
Get full text
Article