Showing 661 - 680 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.23s Refine Results
  1. 661
  2. 662

    Using electronic health record data to establish a chronic kidney disease surveillance system in China: protocol for the China Kidney Disease Network (CK-NET)-Yinzhou Study by Yu Yang, Peng Shen, Hongbo Lin, Luxia Zhang, Minghui Zhao, Jinwei Wang, Beiyan Bao, Guilan Kong, Xiaoyu Sun, Guohui Ding, Bixia Gao, Chao Yang

    Published 2019-08-01
    “…The China Kidney Disease Network (CK-NET) was established as a comprehensive surveillance system for CKD using various data sources. As part of this, the proposed CK-NET-Yinzhou study aims to build a regional surveillance system in a developed coastal area in China to obtain detailed dynamic information about kidney disease and to improve the ability to manage the disease effectively.Methods and analysis Yinzhou is a district of Ningbo city, Zhejiang province. …”
    Get full text
    Article
  3. 663
  4. 664

    Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub by Yu (Andrew) Liu, Gurpreet Kaur, Natasha Kholgade Banerjee, Sean Banerjee

    Published 2025-08-01
    “…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
    Get full text
    Article
  5. 665

    Considerations for using Artificial Intelligence in Medical Education by Ali Hamidi Madani

    Published 2025-05-01
    “…Dear Editor Today, the traditional context and method of education have changed, marking the beginning of the digital era in education. The use of new technologies, such as virtual reality (VR), augmented reality (AR), simulators, and artificial intelligence (AI), is a key factor in improving the quality of education and learning outcomes. …”
    Get full text
    Article
  6. 666

    #BeSeen: understanding young people’s views of the motivation and impacts of sharing self-harm imagery online and use of their social media data for research—a UK participatory art... by Ann John, Ashrafunnesa Khanom, Todd Smith, Amanda Marchant, Dana Dekel, Harley Morgan, Sarah Tombs, Karen Ingham

    Published 2024-07-01
    “…Participants from the RAS group were more inclined to agree to their data being used and had higher levels of trust in government.Conclusion Young people care about their privacy and use of their data even when it is publicly available. …”
    Get full text
    Article
  7. 667

    The ICE–Lexis nexus: An argument against use of commercial databases in immigration enforcement by Jessica P. Needle, Alan Rubel

    Published 2025-09-01
    “…The plaintiffs allege that use of Accurint (the product Lexis sells to U.S. …”
    Get full text
    Article
  8. 668

    Barriers to contraceptive access and use among youths (15–24 Years) living in informal urban settlements of Kigali, Rwanda: a qualitative study by Emmanuel Okiror Okello, Alexandre Edgard Murinzi, Colyse Nduwimana, Rashidah Nambaziira

    Published 2025-08-01
    “…Abstract Background Contraceptive use among youths below 19 years in Rwanda is still very low, as low as 3.7%, yet their level of sexual activity is high. …”
    Get full text
    Article
  9. 669

    STF-LPPVA: Local Privacy-Preserving Method for Vehicle Assignment Based on Spatial–Temporal Fusion by Lei Tang, Zhengxin Cao, Xin Zhou, Junzhe Zhang, Junchi Ma

    Published 2025-01-01
    “…There are user privacy risks in cloud-based vehicle dispatch platforms due to the unauthorized collection, use, and dissemination of data. …”
    Get full text
    Article
  10. 670

    Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks by Liang Liu, Zhenhai Hu, Lisong Wang

    Published 2019-07-01
    “…The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. To protect node data privacy, Shamir’s secret sharing technology is used to prevent internal attackers from stealing the sensitive data of the surrounding nodes. …”
    Get full text
    Article
  11. 671

    Recent Advances in Federated Learning for Connected Autonomous Vehicles: Addressing Privacy, Performance, and Scalability Challenges by Asad Ali, Huang Jianjun, Ayesha Jabbar

    Published 2025-01-01
    “…FL presents a decentralized infrastructure that allows collaborative learning, while also ensuring data privacy, as CAVs increasingly rely on machine learning to process large amounts of sensor data. …”
    Get full text
    Article
  12. 672

    Improved Denclue Outlier Detection Algorithm With Differential Privacy and Attribute Fuzzy Priority Relation Ordering by Huangzhi Xia, Limin Chen, Dongyan Wang, Xiaotong Lu

    Published 2023-01-01
    “…Firstly, the differential privacy technology is used to add the Laplacian noise to the density to realize the sensitive information hiding among the data objects. …”
    Get full text
    Article
  13. 673
  14. 674

    Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT) by zahra eskandari

    Published 2023-01-01
    “…Federated learning is a distributed data analysis approach used in many IoT applications, including IoMT, due to its ability to provide acceptable accuracy and privacy. …”
    Get full text
    Article
  15. 675

    Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means by Suxia ZHU, Shulun LIU, Guanglu SUN

    Published 2021-02-01
    “…To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means was proposed.Firstly, according to the topological relationship of geographic space, relative entropy was used to calculate the sensitivity of real location to privacy budget, a real-time calculation method of location sensitive privacy level was designed, and a new privacy model was built in combination with differential privacy budget.Secondly, K-means algorithm was used to cluster the release position to obtain the release position set that was most similar to the real position direction, and Fréchet distance was introduced to measure the similarity between the release track and the real track, so as to improve the availability of the release track.Experiments on real data sets show that the proposed trajectory protection mechanism has obvious advantages in trajectory availability compared with others.…”
    Get full text
    Article
  16. 676

    How Service Quality and Perceived Privacy Can Affect the Customer Satisfaction in Generations Y and Z? by M Iqbal Nurfaizi, Endy Gunanto Marsasi

    Published 2025-01-01
    “…Data were collected by distributing questionnaires using the purposive sampling method to 190 generation Y and Z participants who used online food delivery. …”
    Get full text
    Article
  17. 677

    PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge by Bora Bugra Sezer, Sedat Akleylek, Urfat Nuriyev

    Published 2025-01-01
    “…To the best of our knowledge, there is no comprehensive review or taxonomy that provides a complete picture of post-quantum secure structures with privacy-preserving techniques that have the potential to be used in blockchain. …”
    Get full text
    Article
  18. 678

    A Reliable Application of MPC for Securing the Tri-Training Algorithm by Hendra Kurniawan, Masahiro Mambo

    Published 2023-01-01
    “…Due to the widespread use of distributed data mining techniques in a variety of areas, the issue of protecting the privacy of sensitive data has received increasing attention in recent years. …”
    Get full text
    Article
  19. 679

    Can human rights law bend mass surveillance? by Rikke Frank Joergensen

    Published 2014-02-01
    “…This paper provides a brief introduction to PRISM, continues with an outline of the right to privacy as stipulated in the International Covenant on Civil and Political Rights (ICCPR), the European Convention on Human Rights and the EU Directive on Data Protection, and moves on to discuss whether international human rights law may be used to bend mass surveillance.…”
    Get full text
    Article
  20. 680

    Sharenting in Asunción, Paraguay: Parental Behavior, Risk Perception, and Child Privacy Awareness on Social Media by María Nieto-Sobrino, Nidia Beatriz Pérez Maciel, María Sánchez-Jiménez

    Published 2025-05-01
    “…A survey of 73 parents analysed posting habits, knowledge of risks, and possible influencing factors on parental digital behaviour. Data analysis techniques such as descriptive statistics and correlation analysis were used to examine the associations between the key variables. …”
    Get full text
    Article