Showing 2,121 - 2,140 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"used) privacy data\\"))~\""', query time: 0.14s Refine Results
  1. 2121

    Investigating the impact of publicly announced information security breaches on corporate risk factor disclosure tendencies by Sandra J. Cereola, Joanna Dynowska

    Published 2019-01-01
    “…We pay particular attention to organizations that have suffered a data breach, as determined by the Privacy Rights Clearinghouse (PRC). …”
    Get full text
    Article
  2. 2122

    Criminal Law Challenged by Crossing into Virtual Reality by Mahdi Karimi

    Published 2025-03-01
    “…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
    Get full text
    Article
  3. 2123

    Teledentistry-Dental students' preparedness and patients' experiences. by Swarna Math, Janice Diong Li Nga, Huey Fen Lim, Maryam Amin, Camila Pacheco-Pereira

    Published 2025-01-01
    “…Descriptive statistics were used to summarise the data.<h4>Results</h4>Out of 125 students, 88% (N = 110) were contacted by 318 patients. …”
    Get full text
    Article
  4. 2124

    Providers' perceptions of implementing standardized postpartum family planning: a qualitative study of midwives and nurses in GhanaAJOG Global Reports at a Glance by Sarita Sonalkar, Ernest Maya, Chris Guure, Arden McAllister, Dzifa Adimle Puplampu, Roseline Dansowaa Doe, Mary Eluned Gaffield, James Kiarie

    Published 2025-05-01
    “…We interpreted data using thematic analysis. Results: Providers indicated that use of one-on-one counseling and the mobile application in hospital-based postpartum care delivery was acceptable, feasible, and appropriate. …”
    Get full text
    Article
  5. 2125

    New secure distributed secret sharing scheme of n product by Zhen-hua CHEN, Shun-dong LI, Bao-cang WANG, Ji-liang LI, Xin LIU

    Published 2014-11-01
    “…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
    Get full text
    Article
  6. 2126

    Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting by Bernhard Axmann, Sanket Pujar

    Published 2025-01-01
    “…Artificial Intelligence tools, using natural language processing and machine learning, streamline data extraction. - Despite their benefits, organizations face challenges in selecting the right Artificial Intelligence-driven Knowledge Management software due to a lack of standardized evaluation frameworks. …”
    Get full text
    Article
  7. 2127

    BSLISE directory: innovating global mapping and organization of LIS schools by Tiago Emmanuel Nunes Braga, Josir Cardoso Gomes, Nathaly Cristine Leite Rocha, Fatih Oguz, Chris Cunningham

    Published 2025-03-01
    “…Evolving from the MAP project, the BSLISE directory consolidates and adapts data into a new framework using open-source software. …”
    Get full text
    Article
  8. 2128

    Mapping the landscape of machine learning in chronic disease management: A comprehensive bibliometric study by Shiying Shen, Wenhao Qi, Sixie Li, Jianwen Zeng, Xin Liu, Xiaohong Zhu, Chaoqun Dong, Bin Wang, Qian Xu, Shihua Cao

    Published 2025-07-01
    “…Conclusion ML is rapidly integrating into personalized medicine, real-time monitoring, and multimodal data fusion. However, challenges such as limited collaboration, weak model generalization, and data privacy persist. …”
    Get full text
    Article
  9. 2129

    Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China by Yifu Li, Nilo Jayoma Castulo, Xiaoyuan Xu, Xiaoyuan Xu

    Published 2025-02-01
    “…The findings revealed that students demonstrated moderate familiarity with AI tools, particularly ChatGPT and willingness to use them in coursework. Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
    Get full text
    Article
  10. 2130

    Encouraging gender-inclusive acceptance of multipurpose national-identity smart cards. by Yuen Yee Yen, P H P Yeow, Loo Wee Hong

    Published 2022-01-01
    “…The data was collected through five hundred questionnaires from Malaysia (the MNIS pioneer) and analyzed using structural equation modeling.…”
    Get full text
    Article
  11. 2131

    A systematic review of consumers’ and healthcare professionals’ trust in digital healthcare by Soraia de Camargo Catapan, Hannah Sazon, Sophie Zheng, Victor Gallegos-Rejas, Roshni Mendis, Pedro H. R. Santiago, Jaimon T. Kelly

    Published 2025-02-01
    “…Trust in digital healthcare is complex and, from a consumers’ perspective, can influence digital healthcare use, adoption, acceptance, and usefulness. Consumers’ trust can be affected by the degree of human interaction in automated interventions, perceived risks, privacy concerns, data accuracy, digital literacy, quality of the digital healthcare intervention, satisfaction, education, and income. …”
    Get full text
    Article
  12. 2132

    تحليل العلاقة بين مؤشر الحرية الاقتصادية والنمو الاقتصادي (دراسة في بلدان عربية مختارة) by حسن كريم حمزة

    Published 2018-03-01
    “…Abstract     The Index of Economic Freedom, one of the most important economic indicators, which affect the size and quality of economic growth,     So the many institutions and organizations in the drafting of a set of standards, that will provide a lot of information and data for workers on economic policies to take advantage of them Including the Index of Economic Freedom, which consists of ten a fundamental elements of the branches off of which (42) is variable, and was to study the relationship between economic freedom and chosen variable and economic growth of the three Arab countries (Egypt - United Arab Emirates - Iraq) After identify the theoretical Framework variables and the index data analysis and identification, has been used statistical program (Evievs) to analyze and assess the impact of economic freedom variables on the dependent variable rate of economic growth, then use the built-in data analysis (Pooling data) in those countries giving dummy variables a role in determining the international privacy in the analysis, Was chosen stability of variables and  cointegration to make sure a significant parameters of the model, and it turned out after the analysis to correspond estimate for the study the UAE with the economic theory that explains there a direct correlation between economic freedom cursor and the rate of GDP growth model equation while non-existent relationship in Egypt and Iraq. …”
    Get full text
    Article
  13. 2133

    A Qualitative Study of HIV Testing Experiences and HIV Self-Testing Perspectives among Men in Northern Nigeria by Zubairu Iliyasu, Zikrillahi A. Haladu, Bilkisu Z. Iliyasu, Aminatu A. Kwaku, Nafisa S. Nass, Taiwo G. Amole, Hadiza M. Abdullahi, Amina U. Abdullahi, Fatimah I. Tsiga-Ahmed, Auwal Abdullahi, Humayra A. Bashir, Hamisu M. Salihu, Muktar H. Aliyu

    Published 2024-01-01
    “…Thematic analysis was employed to analyze the data, yielding key themes related to prior test experiences, knowledge of self-testing, and perceived ease of use, in addition to motivation for self-testing and concerns about reliability and counseling support. …”
    Get full text
    Article
  14. 2134

    Sybil Attack Detection Based on Signal Clustering in Vehicular Networks by Halit Bugra Tulay, Can Emre Koksal

    Published 2024-01-01
    “…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
    Get full text
    Article
  15. 2135

    Identifying latent mobility as a service preference segments among college students by Willy Kriswardhana, Domokos Esztergár-Kiss

    Published 2025-04-01
    “…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
    Get full text
    Article
  16. 2136

    Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks by Dheyaa Marjan Hussein Almuntifeky, Basim K. J. Al-shammari

    Published 2024-08-01
    “…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
    Get full text
    Article
  17. 2137

    Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors by Emel Ay, Menekşe Nazlı Aker

    Published 2025-03-01
    “…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
    Get full text
    Article
  18. 2138

    Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications by Juan E. Tapia, Maximilian Russo, Christoph Busch

    Published 2025-01-01
    “…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
    Get full text
    Article
  19. 2139

    The Impact of Digital Technologies on the Development of Payment Services by A. Y. Chentsov

    Published 2020-10-01
    “…The problems and ways of protecting user identification, data privacy and money safety when using electronic payment services are investigated. …”
    Get full text
    Article
  20. 2140

    Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review by Y Greeshma Vani, Suma B. Chalapathy, Pallavi Pandey, Shailendra K. Sahu, A Ramesh, Jayashree Sajjanar

    Published 2024-12-01
    “…However, issues such as data privacy, dental professional job displacement, and the necessity for thorough validation and regulation to ensure safety and efficacy remain significant concerns.…”
    Get full text
    Article