Showing 381 - 400 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"useds OR \"used)) privacy data\\"))~\""', query time: 0.17s Refine Results
  1. 381

    Protection of personal data under martial law in Ukraine by V. A. Svitlychnyi

    Published 2023-09-01
    “…Particular attention has been paid to the need to develop and implement specialised legal acts that would regulate the protection of personal data in such emergency situations. The possibilities of using modern technologies, in particular data encryption and multi-level authentication, to enhance the security and confidentiality of personal data have also been considered. …”
    Get full text
    Article
  2. 382

    Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study by Denise Lee, Akhil Vaid, Kartikeya M Menon, Robert Freeman, David S Matteson, Michael L Marin, Girish N Nadkarni

    Published 2025-04-01
    “…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
    Get full text
    Article
  3. 383

    Malaysian Public’s Perception Toward Event Data Recorder (EDR) in Vehicles by Fadhlan Hafizhelmi Kamaru Kamaru Zaman, Ismail Danish Rozaimi, Syahrul Afzal Che Abdullah, Lucyantie Mazalan, Husna Zainol Abidin, Amir Radzi Ab. Ghani, Yahaya Ahmad

    Published 2024-12-01
    “…Besides, 40.3% expressed concern about potential privacy breaches and misuse of EDR data. Despite that, nearly 80% of respondents were in favor of installing EDR in their vehicles and allowing the data to be used in court. …”
    Get full text
    Article
  4. 384

    Traversable Ledger for Responsible Data Sharing and Access Control in Health Research by Sunanda Bose, Dusica Marijan

    Published 2024-12-01
    “…Healthcare institutions and health registries often store patients’ health data. In order to ensure privacy, sensitive medical information is stored separately from the identifying information of the patient. …”
    Get full text
    Article
  5. 385

    Application of novel security technique in cloud environment using attribute dependent authentication for health care by D. Deena Rose, C. Agees Kumar

    Published 2025-07-01
    “…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
    Get full text
    Article
  6. 386

    Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property by Hanyue Sun, Jiajia Liu, Bingyuan Chen, Le Yang

    Published 2024-12-01
    “…However, a comprehensive and multidimensional examination of the research landscape is still required to better understand its structure and evolution. Using CiteSpace software, this study conducts a bibliometric analysis, revealing key trends and patterns in collaboration, co-citation, and keyword co-occurrence in the field of data-based intellectual property. …”
    Get full text
    Article
  7. 387

    TAPS Responsibility matrix: a tool for responsible data science by design by Visara Urovi, Remzi Celebi, Chang Sun, Parveen Kumar, Linda Rieswijk, Michael Erard, Arif Yilmaz, Kody Moodley, Michel Dumontier

    Published 2024-12-01
    “…We map TAPS-RM to well-known initiatives for open-data (FACT/FAIR and Datasheets for datasets). We conclude that TAPS-RM is a tool to reflect on responsibilities at a data science project level and can be used to advance responsible data science by design.…”
    Get full text
    Article
  8. 388

    NFTs enabled federated digital identity data representation and management by Memoona Javeria Anwar, Asif Qumer Gill

    Published 2025-05-01
    “…The idea of using NFTs to represent digital identities and their associated data is promising, but it also raises significant concerns regarding data privacy and compliance. …”
    Get full text
    Article
  9. 389
  10. 390

    High-Order Vehicular Pattern Learning and Privacy-Preserving and Unsupervised GAN for Privacy Protection Toward Vehicular Parts Detection by Yanqin Zhang, Zhanling Zhang

    Published 2025-01-01
    “…To preserve data privacy, we use the PPUP-GAN to create massive-scale vehicular data that well mimics real data. …”
    Get full text
    Article
  11. 391

    Challenges and Ethical Considerations in Implementing Assistive Technologies in Healthcare by Eleni Gkiolnta, Debopriyo Roy, George F. Fragulis

    Published 2025-01-01
    “…As AI-powered solutions become more widely used, we discovered that stronger legal frameworks and robust data security standards are required. …”
    Get full text
    Article
  12. 392
  13. 393
  14. 394

    Protection of Public Services Personal Data in The Delivery of Public Services: Comparative Study in Indonesia and Malaysia by Winsherly Tan, Rizky Pratama Putra Karo Karo, Ampuan Situmeang, Shelvi Rusdiana, Siti Suraya Abd Razak

    Published 2025-03-01
    “…However, the exposure of personal data in public service is worrying, as data breaches have affected the public's privacy. …”
    Get full text
    Article
  15. 395

    “By browsing this site, you accept cookies”: Research on the cookie usage permissions of news sites in Türkiye by Murat Uluk

    Published 2023-06-01
    “…Particularly in recent years, increasing awareness levels about personal data, digital privacy studies, and legal regulations have raised concerns about the use of cookies. …”
    Get full text
    Article
  16. 396

    Prexion: Probabilistic Matching-Based Compression to Mitigate Compression Side Channel Attacks Against HTTPS by Hyoungshick Kim, Sangwon Hyun

    Published 2025-01-01
    “…Web servers typically use data compression and encryption to optimize data transmission and protect user privacy. …”
    Get full text
    Article
  17. 397

    On the edge of glory (…or catastrophe): regulation, transparency and party democracy in data-driven campaigning in Québec by Eric Montigny, Philippe Dubois, Thierry Giasson

    Published 2019-12-01
    “…They have all massively integrated data-driven campaigning practices. This article identifies factors that could explain the increasing pressure to regulate Québec’s political parties’ uses of large sets of digital voter information. …”
    Get full text
    Article
  18. 398

    Patient and clinician experiences with the implementation of telemedicine and related adaptations in office-based buprenorphine treatment during the COVID-19 pandemic: a qualitativ... by Melissa Davoust, Angela R. Bazzi, Samantha Blakemore, Juliana Blodgett, Anna Cheng, Sarah Fielman, Kara M. Magane, Jacqueline Theisen, Richard Saitz, Alicia S. Ventura, Zoe M. Weinstein

    Published 2025-03-01
    “…We coded all interview data and used a thematic analysis approach to understand how telemedicine impacted treatment quality and engagement in care, as well as preferences for using telemedicine moving forward. …”
    Get full text
    Article
  19. 399

    Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem by Zhengqi Zhang, Zixin Xiong, Jun Ye

    Published 2025-06-01
    “…The protocol uses the additive homomorphism property of the Paillier cryptosystem to perform K-means clustering on the encrypted data, which ensures the confidentiality of the data during the whole calculation process. …”
    Get full text
    Article
  20. 400

    PERSONAL DATA PROTECTION ISSUE REFLECTED IN THE CASE-LAW OF THE CONSTITUTIONAL COURT OF ROMANIA by Valentina BĂRBĂȚEANU

    Published 2019-05-01
    “…Over the past few years, data privacy became more and more an issue that stirred on European level lots of debates and determined the adoption of a new set of rules, imposed with the compulsory force of a European regulation. …”
    Get full text
    Article