Suggested Topics within your search.
Suggested Topics within your search.
-
621
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
Get full text
Article -
622
MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM
Published 2025-01-01“…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
Get full text
Article -
623
Precision Oncology Program (POP), an observational study using real-world data and imaging mass cytometry to explore decision support for the Molecular Tumor Board: study protocol
Published 2025-03-01“…In this case, a signed general consent form must be available. Data privacy is ensured by unique patient numbers for pseudo-anonymised data. …”
Get full text
Article -
624
Determinants of Attitude and Intention to Use Virtual Credit Cards in Indonesia
Published 2025-03-01“…Data analysis was conducted using path analysis, revealing that all variables significantly influence trust and perceived risk, with t-statistics below 0.05 and 0.01. …”
Get full text
Article -
625
A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation
Published 2019-06-01“…The assessment results may be used to identify possible vulnerabilities in telehealth systems and practice or demonstrate to patients the sufficient security and privacy protection to patients’ data.…”
Get full text
Article -
626
A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards
Published 2025-08-01“…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
Get full text
Article -
627
Prompts, privacy, and personalized learning: integrating AI into nursing education—a qualitative study
Published 2025-04-01“…However, questions remain regarding the ethical use of AI-generated outputs, data privacy concerns, and limitations in recognizing emotional nuances. …”
Get full text
Article -
628
The Use of Artificial Intelligence in Medical Diagnostics: Opportunities, Prospects and Risks
Published 2024-07-01“…The AI integration in healthcare can revolutionise the industry by improving patient outcomes, optimising resource allocation, and reducing operational costs. However, the AI use in medicine carries certain risks related to ethics and data privacy, shortcomings in the quality of data for training algorithms, and importance of protecting against cyberthreats. …”
Get full text
Article -
629
Ethical aspects of the use of social networks during the employment process
Published 2022-01-01“…On the other hand, candidates applying for a vacant position have the opportunity to get to know an organization's employers and employees in more detail, and to gather more information that can often be decisive when making the final decision on whether or not to send in a job application. Most employers today use social media during the process of collecting data on job candidates. …”
Get full text
Article -
630
Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies
Published 2023-07-01“… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
Get full text
Article -
631
A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond
Published 2025-01-01“…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
Get full text
Article -
632
-
633
Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers
Published 2025-01-01“…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
Get full text
Article -
634
Artificial Intelligence–Enabled Facial Privacy Protection for Ocular Diagnosis: Development and Validation Study
Published 2025-07-01“… Abstract BackgroundFacial biometric data, while valuable for clinical applications, poses substantial privacy and security risks. …”
Get full text
Article -
635
Detecting Personally Identifiable Information Through Natural Language Processing: A Step Forward
Published 2025-04-01“…The protection of personally identifiable information (PII) is being increasingly demanded by customers and governments via data protection regulations. Private and public organizations store and exchange through the Internet a large amount of data that include the personal information of users, employees, and customers. …”
Get full text
Article -
636
Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security
Published 2024-12-01“…The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches. …”
Get full text
Article -
637
Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
Published 2024-08-01“…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
Get full text
Article -
638
LLM-MalDetect: A Large Language Model-Based Method for Android Malware Detection
Published 2025-01-01Get full text
Article -
639
A privacy budget adaptive optimization scheme for federated computing power Internet of things
Published 2024-12-01“…Furthermore, by assessing the similarity between the local model and the aggregated model, as well as their respective privacy budget proportions, the global contribution of each node was determined, which was used to fairly, also in real time, optimize and adjust the privacy budget settings in conjunction with the estimated privacy budget. …”
Get full text
Article -
640
Multifaceted Assessment of Responsible Use and Bias in Language Models for Education
Published 2025-03-01“…This study proposes a framework for the automatic detection of biases and violations of responsible use using a synthetic question-based dataset mimicking student–chatbot interactions. …”
Get full text
Article