Showing 1,981 - 2,000 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"used) privacy data\\"))~\""', query time: 0.15s Refine Results
  1. 1981

    Any Bluetooth device can be hacked. Know how? by Prathibha Muraleedhara, Mary Subaja Christo, Jaya J, Yuvasini  D

    Published 2024-01-01
    “…Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain.…”
    Get full text
    Article
  2. 1982

    Work process of community health workers in the context of digital health: a non-participant observation study by Romário Correia dos Santos, Lenira Ferreira Ribeiro, Cláudia Fell Amado, Lívia Milena Barbosa de Deus e Méllo, Liliana Santos

    Published 2025-08-01
    “…The results point to advantages for the work of the CHW, such as expanding access to health and communication between the team and users, agility in data collection and qualification of care; Disadvantages also emerged in the scenario of using digital technologies, such as delays in replacing damaged instruments, loss of workers’ privacy and precarious working conditions. …”
    Get full text
    Article
  3. 1983

    Barriers and sources of information in prostate cancer screening at a South African hospital by Boitumelo M. Komane, Annah Mosalo

    Published 2025-04-01
    “…Methods: A qualitative, exploratory study was conducted with 19 conveniently selected men attending the specific clinic. Data were analysed using thematic analysis. Results: Three themes emerged which were (1) barriers to screening, (2) sources of information regarding prostate cancer and (3) symptoms experienced during screening. …”
    Get full text
    Article
  4. 1984

    Spiking Residual ShuffleNet-Based Intrusion Detection in IoT Environment by Sneha Leela Jacob, H. Parveen Sultana

    Published 2025-01-01
    “…The input data is normalized using Z-score normalization (ZN). …”
    Get full text
    Article
  5. 1985

    Micro, Small and Medium-sized Enterprises in the Digital Economy: Barriers to Digitalisation by Grażyna Węgrzyn

    Published 2025-06-01
    “…Implications / Recommendations: There is a need for education and support of digital competences, as well as to increase awareness among the owners of small firms as to the benefits digitalisation promises. At the same time, data and privacy must be protected in order to encourage entrepreneurs to safely implement digital solutions. …”
    Get full text
    Article
  6. 1986

    GenAI and effective reading among university students: Prospects, challenges, and future directions by George Matto, Jaffar Msafiri Ponera, Valeria Kyumana

    Published 2025-04-01
    “…The system can also lead to breach of data privacy and it is resources intensive.  Most of the limitations are, however, manageable. …”
    Get full text
    Article
  7. 1987

    User and Provider Experiences With Health Education Chatbots: Qualitative Systematic Review by Кyung-Eun (Anna) Choi, Sebastian Fitzek

    Published 2025-06-01
    “… Abstract BackgroundChatbots, as dialog-based platforms, have the potential to transform health education and behavior-change interventions. Despite the growing use of chatbots, qualitative insights into user and provider experiences remain underexplored, particularly with respect to experiences and perceptions, adoption factors, and the role of theoretical frameworks in design. …”
    Get full text
    Article
  8. 1988

    It's not just about pads! Adolescent reproductive health views in Kenya: A qualitative secondary analysis. by Sylvia Ayieko, Angela Nguku, Nancy Kidula

    Published 2023-01-01
    “…We used pre-existing codes and current literature to design the coding framework and thematic analysis to describe emerging themes. …”
    Get full text
    Article
  9. 1989

    There’s (not) an App for that: situating smartphones, Excel and the techno-political interfaces and infrastructures of digital solutions for COVID-19 by Luke Heemsbergen, Catherine Bennett, Monique Mann

    Published 2025-02-01
    “…Significant literature exists on user adoption of the platformisation of public health during the pandemic, but there has been limited consideration of how those responsible for implementing CTA design, deployment, and use of public health infrastructures did so. We redress this imbalance by exploring some of the politics and practicalities of offering CTA as technical ‘solutions’ to pandemic problems. …”
    Get full text
    Article
  10. 1990

    AI Robotics in Healthcare Between the EU Medical Device Regulation and the Artificial Intelligence Act<subtitle>Gaps and Inconsistencies in the Protection of Patients and Care Reci... by Martin Ebers

    Published 2024-10-01
    “…The growing inclusion of social robots in therapeutic situations raises a variety of unresolved legal and ethical issues, including risks to patient autonomy, human dignity and trust, the potentially life-threatening effects of inaccurate or malfunctioning technology, diminished privacy due to the reliance on enormous amounts of personal (sensitive health) data, new challenges to data security due to the cyber-physical nature of robots, and the problem of how to obtain informed consent to medical treatments based on opaque AI decision making. …”
    Get full text
    Article
  11. 1991

    Federated learning-based user access strategy and energy consumption optimization in cell-free massive MIMO network by Yuanyuan YAO, Yiqiu LIU, Sai HUANG, Chunyu PAN, Xuehua LI, Xin YUAN

    Published 2023-10-01
    “…To solve the problem that how users choose access points in cell-free massive multiple-input multiple-output (CF-mMIMO) network, a prioritized access strategy for poorer users based on channel coefficient ranking was proposed.First, users were evaluated and ranked for their channel quality and stability after channel sensing, and suitable access points were selected in sequence according to the order of the channel state information.Second, considering issues such as users' energy consumption and data security, a federal learning framework was used to enhance user's data privacy and security.Meanwhile, an alternating optimization variables algorithm based on energy consumption optimization was proposed to optimize the multi-dimensional variables, for the purpose of minimizing the total energy consumption of the system.Simulation results show that compared with the traditional user-centric in massive MIMO, the proposed access strategy can improve the average uplink reachable rate of users by 20%, and the uplink rate of users with poor channels can be double improved; in terms of energy consumption optimization, the total energy consumption can be reduced by much more than 50% after optimization.…”
    Get full text
    Article
  12. 1992

    Digital Health Interventions for Depression and Anxiety in Low- and Middle-Income Countries: Rapid Scoping Review by Leena W Chau, Raymond W Lam, Harry Minas, Kanna Hayashi, Vu Cong Nguyen, John O'Neil

    Published 2025-08-01
    “…Challenges pertained to the technological system, engagement issues, structural barriers, and concerns regarding privacy and confidentiality. Facilitators included widespread mobile phone use, built-in supervision and training features, and convenience. …”
    Get full text
    Article
  13. 1993

    Wireless Body Area Network (WBAN) based Health Care Monitoring: A Comprehensive Review by Qaisar Ayyub

    Published 2023-12-01
    “…Using multiple WBAN techniques, we aim to identify which techniques are giving better results in data transmission, storing, and maintaining patient data privacy and also identify the best performance using multiple techniques based on the two most important parameters such as ‘throughput’, and ‘delay’. …”
    Get full text
    Article
  14. 1994

    Developing an Ontology to Enhance Semantic Interoperability in IoT Environment by Maria Cornejo-Lupa, Ana Aguilera, Irvin Dongo

    Published 2025-05-01
    “…This study proposes the development of an enhanced ontology that integrates different ontologies in the IoT domain, including key aspects such as interoperability, security, privacy, energy efficiency, and ethics. A formal methodology for ontology design and construction was used in four phases: ontology requirements, design, construction, and evaluation. …”
    Get full text
    Article
  15. 1995

    Learning analytics in immersive virtual learning environments: a systematic literature review by Lei Tao, Mutlu Cukurova, Yanjie Song

    Published 2025-07-01
    “…However, these areas remain unevenly explored; (2) research has predominantly examined desktop-based immersive VLEs, while fewer studies have explored immersive virtual reality settings such as head-mounted displaysand cave automatic virtual environments; (3) higher education students have been the most frequently studied participants, with fewer studies involving K-12 students and adult learners; (4) most studies have employed data-driven approaches to identify behavioural patterns, but explicit theoretical frameworks have been used less frequently to guide analysis and interpretation; (5) behaviour data remains the most commonly used data type; (6) statistical methods such as regression and ANOVA dominate the analytical approaches, with machine learning and deep learning techniques remaining underutilised; and (7) challenges including technical complexity, data interpretability, privacy concerns, and adoption barriers impact the effectiveness and scalability of LA applications in immersive VLEs. …”
    Get full text
    Article
  16. 1996

    Assessment of Patient Satisfaction Attaining Primary Health Care Services at Health Centers in Mogadishu, Somalia by Abdi HA, Warsame MO, Adan MA, Hassan MA

    Published 2024-12-01
    “…Quantitative data was analyzed using appropriate statistical methods, such as descriptive statistics and chi-square tests, to examine the relationships between patient satisfaction and various factors the statistical significance was declared at p-value < 0.05. …”
    Get full text
    Article
  17. 1997

    Artificial Intelligence in Geography Teaching: Potentialities, Applications, And Challenges by Cennet Şanlı

    Published 2025-06-01
    “…Therefore, the study recommends developing in-service teacher training programs, implementing AI-supported instructional scenarios, creating culturally responsive and localized content, and promoting ethical data use awareness. It also emphasizes the need for experimental research using quantitative and qualitative methods to evaluate AI's pedagogical value in enhancing students' mapping skills, spatial thinking, and conceptual understanding. …”
    Get full text
    Article
  18. 1998

    Evaluation of comprehensive abortion care service in University of Gondar Comprehensive Specialized Hospital in Northwest Ethiopia: mixed case study design by Birtukan Demis Getaneh, Nigusu Worku, Kaleb Assegid Demissie, Tesfahun Zemene Tafere, Melak Jejaw

    Published 2025-03-01
    “…Availability, patient-centered care, timeliness, and compliance dimensions with 35 indicators were used. A total of 379 exit interviews, five key informant interviews, six in-depth interviews, 411 medical charts reviewed, and 17 observations were done. …”
    Get full text
    Article
  19. 1999

    Deep multi-biometric fuzzy commitment scheme: fusion methods and performance by Valentina Fohr, Christian Rathgeb

    Published 2025-07-01
    “…Abstract Biometric cryptosystems enable privacy-preserving authentication using biometric data, such as fingerprints or iris scans. …”
    Get full text
    Article
  20. 2000

    Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD by Mustafa Khairallah

    Published 2025-03-01
    “… Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a committing AEAD scheme into a succinctly committing AEAD scheme. …”
    Get full text
    Article