Showing 621 - 640 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.20s Refine Results
  1. 621

    Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing by Dengzhi Liu, Zhimin Li, Dongbao Jia

    Published 2023-12-01
    “…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
    Get full text
    Article
  2. 622

    MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM by Virendra P. Vishwakarma, Abhay Kumar Yadav

    Published 2025-01-01
    “…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
    Get full text
    Article
  3. 623
  4. 624

    Determinants of Attitude and Intention to Use Virtual Credit Cards in Indonesia by Budi Hartono, Suci Nasehati Sunaningsih, Mumpuni Wahyudiarti Sitoresmi

    Published 2025-03-01
    “…Data analysis was conducted using path analysis, revealing that all variables significantly influence trust and perceived risk, with t-statistics below 0.05 and 0.01. …”
    Get full text
    Article
  5. 625

    A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation by Leming Zhou, Robert Thieret, Valerie Watzlaf, Dilhari DeAlmeida, Bambang Parmanto

    Published 2019-06-01
    “…The assessment results may be used to identify possible vulnerabilities in telehealth systems and practice or demonstrate to patients the sufficient security and privacy protection to patients’ data.…”
    Get full text
    Article
  6. 626

    A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards by Eva Heinrich

    Published 2025-08-01
    “…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
    Get full text
    Article
  7. 627

    Prompts, privacy, and personalized learning: integrating AI into nursing education—a qualitative study by Mingyan Shen, Yanping Shen, Fangchi Liu, Jiawen Jin

    Published 2025-04-01
    “…However, questions remain regarding the ethical use of AI-generated outputs, data privacy concerns, and limitations in recognizing emotional nuances. …”
    Get full text
    Article
  8. 628

    The Use of Artificial Intelligence in Medical Diagnostics: Opportunities, Prospects and Risks by Nataliia Sheliemina

    Published 2024-07-01
    “…The AI integration in healthcare can revolutionise the industry by improving patient outcomes, optimising resource allocation, and reducing operational costs. However, the AI use in medicine carries certain risks related to ethics and data privacy, shortcomings in the quality of data for training algorithms, and importance of protecting against cyberthreats. …”
    Get full text
    Article
  9. 629

    Ethical aspects of the use of social networks during the employment process by Branislav Sančanin

    Published 2022-01-01
    “…On the other hand, candidates applying for a vacant position have the opportunity to get to know an organization's employers and employees in more detail, and to gather more information that can often be decisive when making the final decision on whether or not to send in a job application. Most employers today use social media during the process of collecting data on job candidates. …”
    Get full text
    Article
  10. 630

    Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies by Lisbeth Sinan Lendik

    Published 2023-07-01
    “… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
    Get full text
    Article
  11. 631

    A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond by Ahmad Rahdari, Elham Keshavarz, Ehsan Nowroozi, Rahim Taheri, Mehrdad Hajizadeh, Mohammadreza Mohammadi, Sima Sinaei, Thomas Bauschert

    Published 2025-01-01
    “…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
    Get full text
    Article
  12. 632
  13. 633

    Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers by HUANG Yichuan, SONG Yuhui, JING Zhaoxia

    Published 2025-01-01
    “…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
    Get full text
    Article
  14. 634

    Artificial Intelligence–Enabled Facial Privacy Protection for Ocular Diagnosis: Development and Validation Study by Haizhu Tan, Hongyu Chen, Zhenmao Wang, Mingguang He, Chiyu Wei, Lei Sun, Xueqin Wang, Danli Shi, Chengcheng Huang, Anping Guo

    Published 2025-07-01
    “… Abstract BackgroundFacial biometric data, while valuable for clinical applications, poses substantial privacy and security risks. …”
    Get full text
    Article
  15. 635

    Detecting Personally Identifiable Information Through Natural Language Processing: A Step Forward by Luca Mainetti, Andrea Elia

    Published 2025-04-01
    “…The protection of personally identifiable information (PII) is being increasingly demanded by customers and governments via data protection regulations. Private and public organizations store and exchange through the Internet a large amount of data that include the personal information of users, employees, and customers. …”
    Get full text
    Article
  16. 636

    Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security by Akshita Maradapu Vera Venkata Sai, Chenyu Wang, Zhipeng Cai, Yingshu Li

    Published 2024-12-01
    “…The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches. …”
    Get full text
    Article
  17. 637

    Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram by TIAN Yuechi, LI Fenghua, ZHOU Zejun, SUN Zhe, GUO Shoukun, NIU Ben

    Published 2024-08-01
    “…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
    Get full text
    Article
  18. 638
  19. 639

    A privacy budget adaptive optimization scheme for federated computing power Internet of things by MA Wenyu, CHEN Qian, HU Yuxiang, YAN Haonan, HU Tao, YI Peng

    Published 2024-12-01
    “…Furthermore, by assessing the similarity between the local model and the aggregated model, as well as their respective privacy budget proportions, the global contribution of each node was determined, which was used to fairly, also in real time, optimize and adjust the privacy budget settings in conjunction with the estimated privacy budget. …”
    Get full text
    Article
  20. 640

    Multifaceted Assessment of Responsible Use and Bias in Language Models for Education by Ishrat Ahmed, Wenxing Liu, Rod D. Roscoe, Elizabeth Reilley, Danielle S. McNamara

    Published 2025-03-01
    “…This study proposes a framework for the automatic detection of biases and violations of responsible use using a synthetic question-based dataset mimicking student–chatbot interactions. …”
    Get full text
    Article