Suggested Topics within your search.
Suggested Topics within your search.
-
1
INSURANCE DEVELOPMENTS IN THE LIGHT OF DATA USE
Published 2023-12-01“…It aims to assess the extent to which existing legal regulations can safeguard policyholders from potential mistreatment resulting from the use of such methodologies. The study concludes that despite the safeguards offered by data and consumer protection laws, the unregulated and unconstrained application of data analytics and algorithms in risk evaluation could potentially harm policyholders by infringing on their privacy and leading to discrimination, thereby impinging on their rights.…”
Get full text
Article -
2
Privacy-Conducive Data Ecosystem Architecture: By-Design Vulnerability Assessment Using Privacy Risk Expansion Factor and Privacy Exposure Index
Published 2025-06-01“…The increasing complexity of data ecosystems demands advanced methodologies for systematic privacy risk assessment. …”
Get full text
Article -
3
Solving Truthfulness-Privacy Trade-Off in Mixed Data Outsourcing by Using Data Balancing and Attribute Correlation-Aware Differential Privacy
Published 2025-01-01“…Anonymization methods are mostly used in data outsourcing to protect privacy; however, it is very hard to apply anonymity to datasets of poor quality while maintaining an equilibrium between privacy, utility, and truthfulness (i.e., ensuring the values in anonymized data are consistent with the real data). …”
Get full text
Article -
4
Crowdsourced data leaking user's privacy while using anonymization technique
Published 2025-04-01“…However, this may pose privacy risks to data owners, even though the data collectors usually anonymize the data before crowdsourcing. …”
Get full text
Article -
5
Addressing contemporary threats in anonymised healthcare data using privacy engineering
Published 2025-03-01Get full text
Article -
6
Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage
Published 2014-01-01“…Researchers are able to obtain valuable information that they would not otherwise be able to access; however, privacy concerns arise when sharing clinical data in these outsourced publicly available data storage services. …”
Get full text
Article -
7
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
Published 2023-12-01“…Linkage attack is a type of dominant attack in the privacy domain, which can leverage various data sources for private data mining. …”
Get full text
Article -
8
Design of Privacy Preservation Model for Data Stream Using Condensation Based Anonymization
Published 2025-08-01“…The condensation method minimizes lost information throughout the anonymization process in an effort to maintain the statistical features of the data. Using generalization and suppression approaches, k-Anonymity obscures identifying information in datasets, making it a useful tool for protecting individual privacy. …”
Get full text
Article -
9
Privacy-preserving recommender system using the data collaboration analysis for distributed datasets.
Published 2025-01-01“…To this end, we establish a framework for privacy-preserving recommender systems using the data collaboration analysis of distributed datasets. …”
Get full text
Article -
10
Exploring the association between cultural values and the intention to use digital data wallets
Published 2025-12-01“…We developed a model to examine the intention to use digital data wallets – new privacy-enhancing tools based on the privacy calculus theory and Hofstede's cultural values. …”
Get full text
Article -
11
Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering
Published 2020-02-01“…In this article, a novel scheme for data hiding in encrypted domain is proposed using fuzzy C-means clustering and compressive sensing technologies to protect privacy of the host image. …”
Get full text
Article -
12
Enhance differential privacy mechanisms for clinical data analysis using CNNs and reinforcement learning
Published 2025-07-01“…The primary emphasis is on predicting and optimizing ventilation and sedation strategies for patients in Intensive Care Units. We safeguard patient data in the MIMIC-III dataset while preserving analytical utility by integrating differential privacy techniques, such as Gaussian, Laplace, Exponential, Zero-Concentrated, and Rényi mechanisms. …”
Get full text
Article -
13
Privacy-Preserving Healthcare Data Interactions: A Multi-Agent Approach Using LLMs
Published 2025-03-01“…This study builds on prior research [1] by introducing a multi-agent system that uses Large Language Models (LLMs) for secure interactions with healthcare data. …”
Get full text
Article -
14
Doubly Structured Data Synthesis for Time-Series Energy-Use Data
Published 2024-12-01Subjects: Get full text
Article -
15
Protecting Privacy on Social Media: Mitigating Cyberbullying and Data Heist Through Regulated Use and Detox, with a Mediating Role of Privacy Safety Motivations
Published 2024-12-01“…Analyzing survey responses from 1,000 social media users in Pakistan, ranging in age from 18 years to over 50, and using the snowball sampling technique, our findings reveal that awareness of online information disclosure mediates the relationship between data theft and regulated social media use. …”
Get full text
Article -
16
Technology Policy Recommendations Using Artificial Intelligence
Published 2021-04-01Get full text
Article -
17
Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN
Published 2024-11-01“…This study proposes a privacy-preserving synthetic data generation method using a conditional tabular generative adversarial network (CTGAN) aimed at maintaining the utility of IoT sensor network data for IDS while safeguarding privacy. …”
Get full text
Article -
18
Disease prevention versus data privacy: using landcover maps to inform spatial epidemic models.
Published 2012-01-01Get full text
Article -
19
Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations
Published 2022-03-01“…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
Get full text
Article -
20
Perturbation based privacy preservation and classification using Jaya Algorithm and Dragonfly Inspired Algorithm
Published 2025-06-01“…That is why, privacy preservation of data for healthcare dataset is a significant consideration. …”
Get full text
Article