Suggested Topics within your search.
Suggested Topics within your search.
-
861
A qualitative study on ethical issues related to the use of AI-driven technologies in foreign language learning
Published 2025-07-01“…The results also highlight several grave ethical issues related to privacy in foreign language learning apps. This is the first research drawing attention to the topic of ethical issues when using AI-driven foreign language learning apps and it can be considered a pioneering work in this neglected area.…”
Get full text
Article -
862
Development and implementation of an electronic health record system for use in humanitarian emergencies, disaster response, and conflict zones.
Published 2025-01-01“…Ongoing and future work in adapting electronic health records to international humanitarian response will emphasize data security, patient privacy, equity, and the rapid translation of electronic health data to improve population health. …”
Get full text
Article -
863
Islands of data: cultivating an open data landscape for sustainable development in the Caribbean
Published 2024-12-01“…Efforts made towards data-sharing must consider privacy, security and the ethical use of information, and the tension between data as a social good and data for commercial gain can be a determinant of data-sharing decisions. …”
Get full text
Article -
864
Hybrid-chain-based supervision scheme for privacypreserving trading system
Published 2023-12-01“…Due to its characteristics of decentralization, transparency, and security, blockchain technology is widely used in finance, the Internet of Things, and supply chain.However, along with the opportunities it brings, the application of blockchain technology also presents new challenges.On one hand, traditional centralized regulatory methods can undermine the decentralized and autonomous nature of blockchain, creating regulatory dilemmas.On the other hand, blockchain-based systems require privacy protection as transactions often contain sensitive information beyond currency amounts.Failure to protect privacy can result in information leakage and make it difficult for authorities to monitor transactions.To address these challenges and enable regulation in privacy-preserving blockchain-based trading systems, a hybrid chain framework was proposed.This framework incorporated a multiple committee-based approach for general cross-chain regulation.Separate committees were established for the supervision chain and service chain.The service chain committee handled service chain data, generating and sending proofs to the supervision chain to achieve private supervision.In addition to single-chain regulation, cross-chain communication committees and supervision committees collaborated to achieve cross-chain transaction supervision among different service chains.Through a security analysis, it is proven that the proposed scheme is secure when each module meets its security requirements.Experimental evaluations have been conducted to demonstrate the feasibility of the proposed scheme, showing that it achieves cross-chain supervision at a low cost and is scalable.…”
Get full text
Article -
865
Social media applications through the lens of DeLone and McLean’s information system success model: does perceived privacy matter?
Published 2025-07-01“…Therefore, this study explores the impact of perceived privacy on the relationship between tripartite quality constructs, user satisfaction, and continual usage using DeLone and McLean’s information system success (ISS) model. …”
Get full text
Article -
866
FedDB: A Federated Learning Approach Using DBSCAN for DDoS Attack Detection
Published 2024-11-01Get full text
Article -
867
-
868
Diabetes: Non-Invasive Blood Glucose Monitoring Using Federated Learning with Biosensor Signals
Published 2025-04-01“…To address these challenges, this study proposes a federated learning (FL)-based solution that enables multiple healthcare organizations to collaboratively train a global model without sharing raw patient data, thereby enhancing model performance while ensuring data privacy and security. …”
Get full text
Article -
869
Privacy Concerns Versus Personalized Health Content—Pregnant Individuals’ Willingness to Share Personal Health Information on Social Media: Survey Study
Published 2025-02-01“…MethodsWe designed and deployed an electronic survey to pregnant individuals worldwide electronically in 2023. We used the classical Internet Users’ Information Privacy Concerns (IUIPC) model to examine how privacy concerns modulate pregnant individuals’ behaviors and beliefs regarding risk and trust when using social media for health purposes. …”
Get full text
Article -
870
Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm
Published 2025-02-01Get full text
Article -
871
Generative AI-Based Judicial Ruling Disclosure System Innovation: A Legal and Technological Approach to Balancing Privacy Protection and the Right to Information
Published 2025-06-01“…Using actual court data, we compared the performance of fine-tuned sLLMs with that of few-shot Large Language Models (LLMs, e.g., GPT-4o). …”
Get full text
Article -
872
Lithium-Ion Battery State of Health Degradation Prediction Using Deep Learning Approaches
Published 2025-01-01“…Traditional centralized deep learning models have shown promising results, but they raise concerns related to data privacy, as data needed to be collected and trained on a single node. …”
Get full text
Article -
873
Semiotic Analysis of the Advertisement “iPhone 15 Face ID” Using Peirce’s Theory
Published 2025-01-01“…This research aimed at analyzing how Apple’s Face ID technology is represented in the advertisement “iPhone 15 Face ID” using Charles Sanders Peirce’s semiotic theory. This study highlights how Peirce’s semiotic elements—icon, index, and symbol—are employed to emphasize privacy, personalization, and innovation in the iPhone 15 advertisement. …”
Get full text
Article -
874
-
875
The effect of social grooming via live photo-sharing on well-being: the mediating role of social capital and moderating role of the need for privacy
Published 2025-07-01“…However, the spontaneous nature of live photos may unintentionally reveal audio or visual details, raising privacy concerns. Previous research has not fully explored why users share live photos despite these risks, nor how live photo sharing affects users’ well-being from a social grooming perspective.MethodsWe surveyed 266 users of WeChat Moments and analyzed the data using a moderated mediation model. …”
Get full text
Article -
876
Secure gray image sharing framework with adaptive key generation using image digest
Published 2025-03-01“…Abstract In the constantly changing digital age where instant information sharing is shared globally, the content’s safe delivery and privacy management have become necessary. Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. …”
Get full text
Article -
877
Generation of Vessel Track Characteristics Using a Conditional Generative Adversarial Network (CGAN)
Published 2024-12-01“…Machine learning (ML) models often require large volumes of data to learn a given task. However, access and existence of training data can be difficult to acquire due to privacy laws and availability. …”
Get full text
Article -
878
Securing the IoT System of Smart City against Cyber Threats Using Deep Learning
Published 2022-01-01“…IoT enhances productivity and efficacy intelligently using remote management, but the risk of security and privacy increases. …”
Get full text
Article -
879
Trust-Based Consensus and ABAC for Blockchain Using Deep Learning to Secure Internet of Things
Published 2025-12-01Get full text
Article -
880
A Novel Deep Learning Model for Human Skeleton Estimation Using FMCW Radar
Published 2025-06-01“…Human skeleton estimation using Frequency-Modulated Continuous Wave (FMCW) radar is a promising approach for privacy-preserving motion analysis. …”
Get full text
Article