Showing 2,221 - 2,240 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"used) privacy data\\"))~\""', query time: 0.16s Refine Results
  1. 2221

    Motivated by Design: A Codesign Study to Promote Challenging Misinformation on Social Media by Selin Gurgun, Emily Arden-Close, Keith Phalp, Raian Ali

    Published 2024-01-01
    “…We applied the unified theory of acceptance and use of technology (UTAUT) as a theoretical framework and analysed our data based on the core constructs of this framework: performance expectancy, effort expectancy, social influence, and facilitating conditions. …”
    Get full text
    Article
  2. 2222

    The Interdependence of Competition Policy, Consumer Policy and Regulation in Introducing and Safeguarding Effective Competition in the EU Telecommunications Market by Andreas Bartels, Doru Alexandru Pleșea, Michael Studeny, Vanessa Just

    Published 2017-05-01
    “…In the case of telecommunications, several initiatives of the European Commission and of national regulatory authorities to falls in prices and forced operators to implement customer friendly rules and to protect customer data and privacy. The authors consider that the European Commission has tried to establish and harmonise rules across all member states in order to protect the interests and rights of consumers on the telecommunication market. …”
    Get full text
    Article
  3. 2223

    BACP-LRS: Blockchain and IPFS-based Land Record System by Insaf Boumezbeur, Abdelhalim Benoughidene, Imane Harkat, Farah Boutouatou, Dounia Keddari, Karim Zarour

    Published 2025-01-01
    “…Objective: The purpose of the present work is to propose an architecture for blockchain-based access control for distribution, ensuring information privacy. We take advantage of the benefits of blockchain technology in improving land record management while granting access to electronic data through user permissions. …”
    Get full text
    Article
  4. 2224

    Ethical considerations in artificial intelligence-driven environments for higher education by Phumzile D. Mogoale, Agnieta Pretorius, Refilwe C. Mogase, Mmatshuene A. Segooa

    Published 2025-07-01
    “…The IEEE Xplore Digital Library database was used, with keywords such as ‘artificial intelligence OR AI’ AND ‘education’ AND/OR ‘ethics’. …”
    Get full text
    Article
  5. 2225

    Views on the incorporation of Geolocation Devices in Field Trips by Marta Magallón, Cristina Mercader

    Published 2022-01-01
    “…Geolocation in field trips has great potential, but it is an understudied field that needs more research and discussion to ensure data privacy.…”
    Get full text
    Article
  6. 2226

    On-Device System for Device Directed Speech Detection for Improving Human Computer Interaction by Abhishek Singh, Rituraj Kabra, Rahul Kumar, Manjunath Belgod Lokanath, Reetika Gupta, Sumit Kumar Shekhar

    Published 2021-01-01
    “…To solve this, we propose an On-Device solution that listens to the user continuously for <bold>only</bold> predefined period and classifies the utterance into device-directed or non-device-directed using a deep learning-based model. Since our solution is On-Device, the privacy of the user is maintained. …”
    Get full text
    Article
  7. 2227

    Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem by Saša Malešević, Michael Lustenberger, Florian Spychiger

    Published 2020-12-01
    “…Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. …”
    Get full text
    Article
  8. 2228

    An intelligent conversational agent for querying satellite manoeuvre detections: a case study by Wathsala Karunarathne, David P Shorten, Matthew Roughan

    Published 2025-06-01
    “…Moreover, our system can handle sensitive and confidential data without breaching privacy. This paper presents the results of deploying SatChat in conjunction with a particle filter based manoeuvre detection system.…”
    Get full text
    Article
  9. 2229

    IoT-driven smart grid monitoring with enhanced energy routing and advanced encryption techniques by K. Perachi, S. Balaji

    Published 2025-11-01
    “…The proposed work incorporates Improved Paillier Homomorphic (IPH) based encryption scheme, which assures integrity and confidentiality of data transmitted. The outcomes of proposed smart grid system using MATLAB and FPGA controller demonstrate significant improvements by providing enhanced security and optimal routing. …”
    Get full text
    Article
  10. 2230

    Revolutionizing Midwifery Education : A Scoping Review of Artificial Intelligence Methods by Harridhil Silmi, Ari Indra Susanti

    Published 2025-04-01
    “…Despite these advancements, challenges such as ethical concerns (algorithmic bias, privacy issues), poor data quality, limited AI expertise among educators, and resistance to change in traditional learning environments were noted. …”
    Get full text
    Article
  11. 2231

    DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems by Yucong Duan, Zhendong Guo

    Published 2025-07-01
    “…The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. …”
    Get full text
    Article
  12. 2232

    THE IMPACT OF AI ON FUNDAMENTAL HUMAN RIGHTS IN EU COUNTRIES. EXAMINATION OF ACADEMIC STUDIES AND THE POSITIONS OF NON-GOVERNMENTAL ORGANIZATIONS REGARDING THE ETHICAL AND AI LEGAL... by Doina Ljungholm POPESCU, Carmina-Elena TOLBARU

    Published 2025-05-01
    “…In the European Union, the development and use of AI pose significant challenges regarding the protection of fundamental human rights, such as the right to privacy, equality, and access to justice. …”
    Get full text
    Article
  13. 2233

    Lived experiences of women with spontaneous abortion at a district hospital, South Africa by Marshall Lockett, Robert J. Mash

    Published 2024-04-01
    “…Atlas-ti (version 22) software assisted with data analysis using the framework method. Results: A total of nine participants were interviewed. …”
    Get full text
    Article
  14. 2234

    Messenger-based assessment of empathic accuracy in couples’ smartphone communication by Philipp Steinebach, Miriam Stein, Knut Schnell

    Published 2025-02-01
    “…Methods Data from N = 102 participants (51 couples) was used to investigate how accurate judgments of partners’ affect map their partners’ actual affect. …”
    Get full text
    Article
  15. 2235

    Optimising resources allocation in implementing school counselling programme at schools in the Ohangwena region by Anna Niitembu Hako, Olaniyi Bojuwoye

    Published 2024-09-01
    “…In-depth semi-structured interviews and focus group discussions were used to gather data. Thematic results revealed that teacher-counsellors had no counselling rooms to conduct individual counselling, no separate budget for school counselling programme, and that file cabinets and display boards were only available in very few schools and were inadequate school-counsellor in schools. …”
    Get full text
    Article
  16. 2236

    Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing by Yun-Yi Fan, Chit-Jie Chew, Jung-San Lee

    Published 2025-05-01
    “…Furthermore, the lack of transparency and credibility in intelligence sources has negatively impacted the quality and trustworthiness of shared data. To address these issues, authors aim to leverage blockchain technology, utilizing its decentralized and tamper-proof properties to ensure corporate privacy and the reliability of intelligence sources. …”
    Get full text
    Article
  17. 2237

    Lightweight Authentication for Devices in Internet of Thing Environment: A Survey by Sameera Abbas Fadhel, Ahmed Sami Nori

    Published 2023-12-01
    “…The extremely large number of associated devices together through different protocols make it vulnerable to be threatened by several types of attacks, such as; Unauthorized Access and Authentication Attacks, Network Attacks, Data Privacy and Integrity Attacks, and Supply Chain Attacks. …”
    Get full text
    Article
  18. 2238

    Customer’s Satisfaction via Online Shopping Environment: The Case of China by GholamReza Zandi, Rezvan Torabi, Mohammad Amin Mohammad, Xu Yi Dan

    Published 2021-07-01
    “…The philosophy of positivism was used to evaluate the online shopping behaviour in a Chinese context. …”
    Get full text
    Article
  19. 2239

    Availability and utilization of sexual and reproductive health services among adolescents of Godawari Municipality, Nepal: A cross-sectional study. by Laxmi Gautam, Aastha Maharjan, Harikrishna Bhattarai, Sujan Gautam

    Published 2025-01-01
    “…Only 13.22% of them had ever used ASRH services, and the reasons for not using services were the lack of realization of the need for services (60.39%), while 14.55% of them felt that privacy was not maintained at all. …”
    Get full text
    Article
  20. 2240

    Blockchain enhanced smart healthcare management for chronic diseases by Shruti Saxena, Shivani Saxena, Nikunj Tahilramani, Panem Charanarur

    Published 2025-06-01
    “…Abstract Chronic diseases affect millions of people worldwide, making it a significant issue for the efficient and secure management of patient data. Most traditional chronic disease management systems fail to manage data in real time and struggle with interoperability and security issues. …”
    Get full text
    Article