Suggested Topics within your search.
Suggested Topics within your search.
-
381
Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing
Published 2023-03-01“…Secondly, the user's privacy may be adequately protected with a secure authentication paradigm that employs ABS to safeguard the user's private data. …”
Get full text
Article -
382
-
383
Protection of personal data under martial law in Ukraine
Published 2023-09-01“…Particular attention has been paid to the need to develop and implement specialised legal acts that would regulate the protection of personal data in such emergency situations. The possibilities of using modern technologies, in particular data encryption and multi-level authentication, to enhance the security and confidentiality of personal data have also been considered. …”
Get full text
Article -
384
Traversable Ledger for Responsible Data Sharing and Access Control in Health Research
Published 2024-12-01“…Healthcare institutions and health registries often store patients’ health data. In order to ensure privacy, sensitive medical information is stored separately from the identifying information of the patient. …”
Get full text
Article -
385
Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study
Published 2025-04-01“…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
Get full text
Article -
386
TAPS Responsibility matrix: a tool for responsible data science by design
Published 2024-12-01“…We map TAPS-RM to well-known initiatives for open-data (FACT/FAIR and Datasheets for datasets). We conclude that TAPS-RM is a tool to reflect on responsibilities at a data science project level and can be used to advance responsible data science by design.…”
Get full text
Article -
387
Application of novel security technique in cloud environment using attribute dependent authentication for health care
Published 2025-07-01“…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
Get full text
Article -
388
Las tecnologías de la información; derecho a la privacidad, tratamiento de datos y tercera edad
Published 2011-09-01Get full text
Article -
389
Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property
Published 2024-12-01“…However, a comprehensive and multidimensional examination of the research landscape is still required to better understand its structure and evolution. Using CiteSpace software, this study conducts a bibliometric analysis, revealing key trends and patterns in collaboration, co-citation, and keyword co-occurrence in the field of data-based intellectual property. …”
Get full text
Article -
390
Ethical Considerations in Emotion Recognition Research
Published 2025-05-01“…The development of real-time feedback loops for user awareness should be combined with clear disclosures about data use and participatory design practices. The successful oversight of these systems requires interdisciplinary work between researchers, policymakers, designers, and ethicists. …”
Get full text
Article -
391
NFTs enabled federated digital identity data representation and management
Published 2025-05-01“…The idea of using NFTs to represent digital identities and their associated data is promising, but it also raises significant concerns regarding data privacy and compliance. …”
Get full text
Article -
392
Challenges and Ethical Considerations in Implementing Assistive Technologies in Healthcare
Published 2025-01-01“…As AI-powered solutions become more widely used, we discovered that stronger legal frameworks and robust data security standards are required. …”
Get full text
Article -
393
High-Order Vehicular Pattern Learning and Privacy-Preserving and Unsupervised GAN for Privacy Protection Toward Vehicular Parts Detection
Published 2025-01-01“…To preserve data privacy, we use the PPUP-GAN to create massive-scale vehicular data that well mimics real data. …”
Get full text
Article -
394
-
395
-
396
Applying usability recommendations when developing mobile instant messaging applications
Published 2022-02-01Get full text
Article -
397
Protection of Public Services Personal Data in The Delivery of Public Services: Comparative Study in Indonesia and Malaysia
Published 2025-03-01“…However, the exposure of personal data in public service is worrying, as data breaches have affected the public's privacy. …”
Get full text
Article -
398
A Performance Analysis of VPN Technologies Used in an IoT Environment
Published 2025-06-01Get full text
Article -
399
“By browsing this site, you accept cookies”: Research on the cookie usage permissions of news sites in Türkiye
Published 2023-06-01“…Particularly in recent years, increasing awareness levels about personal data, digital privacy studies, and legal regulations have raised concerns about the use of cookies. …”
Get full text
Article -
400
Prexion: Probabilistic Matching-Based Compression to Mitigate Compression Side Channel Attacks Against HTTPS
Published 2025-01-01“…Web servers typically use data compression and encryption to optimize data transmission and protect user privacy. …”
Get full text
Article