Search alternatives:
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"uses » \"useds (Expand Search)
\"useds » \"usedds (Expand Search)
Showing 2,561 - 2,580 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR (\"uses OR \"useds)) privacy data\\"))~\""', query time: 0.18s Refine Results
  1. 2561

    Bridging Cities and Citizens with Generative AI: Public Readiness and Trust in Urban Planning by Adnan Alshahrani

    Published 2025-07-01
    “…This study explores whether Saudi residents are ready to engage with AI-driven tools in urban planning, how they prefer to interact with them, and what ethical concerns may arise. Using a quantitative, survey-based approach, the study collected data from 232 Saudi residents using non-probability stratified sampling. …”
    Get full text
    Article
  2. 2562

    ChatGPT’s Integration in GCC Higher Education: Bibliometric Analysis of Trends by Tosin Ekundayo , Zafarullah Khan , Shahid Ali Chaudhry

    Published 2024-10-01
    “…Key findings include the positive impact of ChatGPT on personalized learning and student engagement, as well as the growing focus on ethical concerns such as data privacy and bias. The study also identified strong interdisciplinary connections, with AI research in education intersecting with fields such as computer science, linguistics, and cognitive science. …”
    Get full text
    Article
  3. 2563

    A comprehensive systematic review of intrusion detection systems: emerging techniques, challenges, and future research directions by Arjun Kumar Bose Arnob, Rajarshi Roy Chowdhury, Nusrat Alam Chaiti, Sudipta Saha, Ajoy Roy

    Published 2025-05-01
    “…Blockchain and quantum computing technologies are explored to improve data privacy, resilience, and scalability in decentralized and resource-constrained environments. …”
    Get full text
    Article
  4. 2564

    Enhancing IoT Security in 5G Networks by Reem Alzhrani, Mohammed Alliheedi

    Published 2024-12-01
    “…We constructed the 5G network infrastructure using OMNeT++ with the INET and Simu5G frameworks. …”
    Get full text
    Article
  5. 2565

    Contrastive Self-Supervised Learning for Sensor-Based Human Activity Recognition: A Review by Hui Chen, Charles Gouin-Vallerand, Kevin Bouchard, Sebastien Gaboury, Melanie Couture, Nathalie Bier, Sylvain Giroux

    Published 2024-01-01
    “…Next, we comprehensively review data augmentation methods for sensor data and commonly used benchmark datasets for activity recognition. …”
    Get full text
    Article
  6. 2566

    How Gender-Sensitive Disaster Management is Addressed in the Turkish Parliament: A Qualitative Study from Feminist Bioethics Perspective by Fatma Gulsum Onal, Bahar Marangoz

    Published 2025-07-01
    “…The data were systematically retrieved using the keywords “earthquake,” “disaster,” “gender,” “women,” and “health.” …”
    Get full text
    Article
  7. 2567

    Reinforcement Learning With Deep Features: A Dynamic Approach for Intrusion Detection in IoT Networks by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…As IoT devices continue to advance, securing interconnected systems against malicious attacks is essential to ensure data privacy, system integrity, and user safety. …”
    Get full text
    Article
  8. 2568

    Dimensions related to telemedicine and telehealth competencies of health professionals: A scoping review by Jacqueline Ibarra-Peso, Marcela Hechenleitner-Carvallo, Carlos Zúñiga-San Martín, Angelica Avendaño-Veloso, Eileen Sepúlveda-Valenzuela

    Published 2025-03-01
    “…Introduction Telehealth and telemedicine have proven to be useful in complementing face-to-face care, especially when long distances exist or when it is difficult to access specialists. …”
    Get full text
    Article
  9. 2569

    Implementing a chatbot to promote hereditary breast & ovarian cancer genetic screening in women’s health: identifying barriers and facilitators to screening adoption by Easton N. Wollney, Shireen Madani Sims, Luisel J. Ricks-Santi, Elizabeth Eddy, Daniel Wiesman, Carla L. Fisher

    Published 2025-07-01
    “…Findings illustrate how each factor functioned as a facilitator and/or barrier in women’s uptake (e.g., technology being trusted for accuracy versus concerns for data privacy and security). Conclusions While chatbots can extend women’s cancer risk screening access, particularly in rural regions and with college-educated women, systems-level (cost) and individual-level factors (perceived risk, misconceptions about repeating genetic testing) should be addressed to promote adoption. …”
    Get full text
    Article
  10. 2570

    Large language models aided patient progression documentation according to the ICD standard by Nuria Lebeña, Arantza Casillas, Alicia Pérez

    Published 2025-01-01
    “…In previous works, this task has been carried out using structured data, such as, ICD-coded diagnoses, overlooking unstructured textual information in EHRs. …”
    Get full text
    Article
  11. 2571

    Sustainable financial infrastructure and governance: A fuzzy multi-criteria decision-making analysis of open service innovation in unstable economies by Homa Molavi, Lihong Zhang, Mohammad Khanbabaei

    Published 2025-06-01
    “…Regulatory sandboxes and innovation clusters can foster collaboration between banks, fintech companies, and regulators, enhancing trust and compliance. Strict data governance frameworks aligned with global standards are essential to balancing innovation with privacy.…”
    Get full text
    Article
  12. 2572

    Factors Influencing the Implementation and Adoption of Digital Nursing Technologies: Systematic Umbrella Review by Stefan Walzer, Christoph Armbruster, Sonja Mahler, Erik Farin-Glattacker, Christophe Kunze

    Published 2025-07-01
    “…MethodsWe used an umbrella review methodology to synthesize the evidence on DNTs and the complexities of their implementation. …”
    Get full text
    Article
  13. 2573

    A hybrid explainable federated-based vision transformer framework for breast cancer prediction via risk factors by Aymen M. Al-Hejri, Archana Harsing Sable, Riyadh M. Al-Tam, Mugahed A. Al-antari, Sultan S. Alshamrani, Kaled M. Alshmrany, Wedad Alatebi

    Published 2025-05-01
    “…These models are assessed on binary, multi-class, and Breast Imaging Reporting and Data System (BI-RADS) classification tasks using a unique dataset encompassing real-world risk factors. …”
    Get full text
    Article
  14. 2574

    The Human Voice as a Digital Health Solution Leveraging Artificial Intelligence by Pratyusha Muddaloor, Bhavana Baraskar, Hriday Shah, Keerthy Gopalakrishnan, Divyanshi Sood, Prem C. Pasupuleti, Akshay Singh, Dipankar Mitra, Sumedh S. Hoskote, Vivek N. Iyer, Scott A. Helgeson, Shivaram P. Arunachalam

    Published 2025-05-01
    “…The primary ethical challenge when incorporating voice as a diagnostic tool is that of privacy and security. To eliminate this, encryption methods exist to convert patient-identifiable vocal data into a more secure, private nature. …”
    Get full text
    Article
  15. 2575

    What is the Role of Medical Informatics in Digital Healthcare? by Mihai TĂRÂŢĂ

    Published 2025-05-01
    “…. • Cybersecurity & Privacy in Healthcare – Implementing robust security solutions (e.g., encryption, blockchain) to safeguard sensitive patient data and ensure compliance with regulations like HIPAA (USA), GDPR (EU), and local healthcare laws…”
    Get full text
    Article
  16. 2576

    Low Saturation Confidence Distribution-based Test-Time Adaptation for cross-domain remote sensing image classification by Yu Liang, Shilei Cao, Juepeng Zheng, Xiucheng Zhang, Jianxi Huang, Haohuan Fu

    Published 2025-05-01
    “…However, most UDA approaches require access to source data, which may be infeasible due to data privacy or transmission constraints. …”
    Get full text
    Article
  17. 2577

    BESPOKE study protocol: a multicentre, prospective observational study to evaluate the impact of circulating tumour DNA guided therapy on patients with colorectal cancer by Scott Kopetz, Axel Grothey, Shifra Krinshpun, Meenakshi Malhotra, Paul Billings, Angel Rodriguez, Alexey Aleshin, Sarah Sawyer, Michelle Munro, Pashtoon Murtaza Kasi, Jessica Guilford, Sascha Ellers, Jacob Wulff, Nicole Hook, Allyson Koyen Malashevich, Solomon Moshkevich

    Published 2021-09-01
    “…The secondary endpoints are MRD clearance rate (MRD+ to MRD−) during or after adjuvant chemotherapy, percentage of patients that undergo surgery for oligometastatic recurrence, survival of MRD-negative patients treated with adjuvant chemotherapy versus no adjuvant chemotherapy (active surveillance), overall survival, examine the number of stage I CRC that have recurrent disease detected postsurgery, and patient-reported outcomes.Ethics and dissemination This study has received ethical approval from the Advarra Institutional Review Board (IRB) protocol: Natera—20-041-NCP/3766.01, BESPOKE Study of ctDNA Guided Therapy in Colorectal Cancer (BESPOKE CRC) (Pro00041473) on 10 June 2021. Data protection and privacy regulations will be strictly observed in the capturing, forwarding, processing and storing of patients’ data. …”
    Get full text
    Article
  18. 2578

    HealthPass: a contactless check-in and adaptive access control system for lowering cluster infection risk in public health crisis by Guofeng Luo, Yufei Wang, Linghong Hong, Xin He, Jiaru Wang, Qu Shen, Cheng Wang, Longbiao Chen

    Published 2024-12-01
    “…IntroductionEnsuring effective measures against the spread of the virus is paramount for educational institutions and workplaces as they resume operations amidst the ongoing public health crisis. A touchless and privacy-conscious check-in procedure for visitor assessment is critical to safeguarding venues against potential virus transmission.MethodsIn our study, we developed an interaction-free entry system featuring anonymous visitors who voluntarily provide data. …”
    Get full text
    Article
  19. 2579

    Exploring the role of digital technology for feedback exchange in clinical training: a scoping review by Veena S. Singaram, Rayishnee Pillay, Esther L. Mbobnda Kapche

    Published 2024-12-01
    “…The incorporation of virtual reality and artificial intelligence presents promising opportunities for personalized, real-time feedback, but requires vigilant governance to ensure data integrity and privacy. Scoping review protocol https://doi.org/10.1186/s13643-022-02151-8…”
    Get full text
    Article
  20. 2580

    Smart cities and electrical and electronic waste management: a review of challenges and opportunities by Deividson Sá Fernandes de Souza, Simone Sehnem, Patricia Guarnieri, Thyago Celso Cavalcante Nepomuceno, Fernando Henrique Taques, Lucio Camara e Silva

    Published 2025-05-01
    “…Design/methodology/approach – A systematic literature review was conducted using the Methodi Ordinatio. Articles published between 2012 and 2022 were analyzed, totaling 149 references, of which 30 were included in the final review. …”
    Get full text
    Article