Showing 861 - 880 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.28s Refine Results
  1. 861

    A qualitative study on ethical issues related to the use of AI-driven technologies in foreign language learning by Marcel Pikhart, Blanka Klimova

    Published 2025-07-01
    “…The results also highlight several grave ethical issues related to privacy in foreign language learning apps. This is the first research drawing attention to the topic of ethical issues when using AI-driven foreign language learning apps and it can be considered a pioneering work in this neglected area.…”
    Get full text
    Article
  2. 862

    Development and implementation of an electronic health record system for use in humanitarian emergencies, disaster response, and conflict zones. by Sarah D Draugelis, Erik C Brown, Donald A Donahue, Justin Hickman, Sean G Smith, Philip Sutherland, George A Yendewa, Amir M Mohareb

    Published 2025-01-01
    “…Ongoing and future work in adapting electronic health records to international humanitarian response will emphasize data security, patient privacy, equity, and the rapid translation of electronic health data to improve population health. …”
    Get full text
    Article
  3. 863

    Islands of data: cultivating an open data landscape for sustainable development in the Caribbean by Ian R. Hambleton, Selvi Jeyaseelan

    Published 2024-12-01
    “…Efforts made towards data-sharing must consider privacy, security and the ethical use of information, and the tension between data as a social good and data for commercial gain can be a determinant of data-sharing decisions. …”
    Get full text
    Article
  4. 864

    Hybrid-chain-based supervision scheme for privacypreserving trading system by Xuedan JIA, Longxia HUANG, Pujie JING, Liangmin WANG, Xiangmei SONG

    Published 2023-12-01
    “…Due to its characteristics of decentralization, transparency, and security, blockchain technology is widely used in finance, the Internet of Things, and supply chain.However, along with the opportunities it brings, the application of blockchain technology also presents new challenges.On one hand, traditional centralized regulatory methods can undermine the decentralized and autonomous nature of blockchain, creating regulatory dilemmas.On the other hand, blockchain-based systems require privacy protection as transactions often contain sensitive information beyond currency amounts.Failure to protect privacy can result in information leakage and make it difficult for authorities to monitor transactions.To address these challenges and enable regulation in privacy-preserving blockchain-based trading systems, a hybrid chain framework was proposed.This framework incorporated a multiple committee-based approach for general cross-chain regulation.Separate committees were established for the supervision chain and service chain.The service chain committee handled service chain data, generating and sending proofs to the supervision chain to achieve private supervision.In addition to single-chain regulation, cross-chain communication committees and supervision committees collaborated to achieve cross-chain transaction supervision among different service chains.Through a security analysis, it is proven that the proposed scheme is secure when each module meets its security requirements.Experimental evaluations have been conducted to demonstrate the feasibility of the proposed scheme, showing that it achieves cross-chain supervision at a low cost and is scalable.…”
    Get full text
    Article
  5. 865

    Social media applications through the lens of DeLone and McLean’s information system success model: does perceived privacy matter? by Isyaku Salisu, Mazlan Mohd Sappri, Mohd Faizal Omar, Aemin Nasir, Sarmad Ejaz, Md Billal Hossain

    Published 2025-07-01
    “…Therefore, this study explores the impact of perceived privacy on the relationship between tripartite quality constructs, user satisfaction, and continual usage using DeLone and McLean’s information system success (ISS) model. …”
    Get full text
    Article
  6. 866
  7. 867
  8. 868

    Diabetes: Non-Invasive Blood Glucose Monitoring Using Federated Learning with Biosensor Signals by Narmatha Chellamani, Saleh Ali Albelwi, Manimurugan Shanmuganathan, Palanisamy Amirthalingam, Anand Paul

    Published 2025-04-01
    “…To address these challenges, this study proposes a federated learning (FL)-based solution that enables multiple healthcare organizations to collaboratively train a global model without sharing raw patient data, thereby enhancing model performance while ensuring data privacy and security. …”
    Get full text
    Article
  9. 869

    Privacy Concerns Versus Personalized Health Content—Pregnant Individuals’ Willingness to Share Personal Health Information on Social Media: Survey Study by Haijing Hao, Yang W Lee, Marianne Sharko, Qilu Li, Yiye Zhang

    Published 2025-02-01
    “…MethodsWe designed and deployed an electronic survey to pregnant individuals worldwide electronically in 2023. We used the classical Internet Users’ Information Privacy Concerns (IUIPC) model to examine how privacy concerns modulate pregnant individuals’ behaviors and beliefs regarding risk and trust when using social media for health purposes. …”
    Get full text
    Article
  10. 870
  11. 871

    Generative AI-Based Judicial Ruling Disclosure System Innovation: A Legal and Technological Approach to Balancing Privacy Protection and the Right to Information by Eul Young Lim, MinSung Hyun

    Published 2025-06-01
    “…Using actual court data, we compared the performance of fine-tuned sLLMs with that of few-shot Large Language Models (LLMs, e.g., GPT-4o). …”
    Get full text
    Article
  12. 872

    Lithium-Ion Battery State of Health Degradation Prediction Using Deep Learning Approaches by Talal Alharbi, Muhammad Umair, Abdulelah Alharbi

    Published 2025-01-01
    “…Traditional centralized deep learning models have shown promising results, but they raise concerns related to data privacy, as data needed to be collected and trained on a single node. …”
    Get full text
    Article
  13. 873

    Semiotic Analysis of the Advertisement “iPhone 15 Face ID” Using Peirce’s Theory by Fairuz Khalisha, R. Myrna Nur Sakinah, Andang Saehu

    Published 2025-01-01
    “…This research aimed at analyzing how Apple’s Face ID technology is represented in the advertisement “iPhone 15 Face ID” using Charles Sanders Peirce’s semiotic theory. This study highlights how Peirce’s semiotic elements—icon, index, and symbol—are employed to emphasize privacy, personalization, and innovation in the iPhone 15 advertisement. …”
    Get full text
    Article
  14. 874
  15. 875

    The effect of social grooming via live photo-sharing on well-being: the mediating role of social capital and moderating role of the need for privacy by Fei Wang, Xin Wang

    Published 2025-07-01
    “…However, the spontaneous nature of live photos may unintentionally reveal audio or visual details, raising privacy concerns. Previous research has not fully explored why users share live photos despite these risks, nor how live photo sharing affects users’ well-being from a social grooming perspective.MethodsWe surveyed 266 users of WeChat Moments and analyzed the data using a moderated mediation model. …”
    Get full text
    Article
  16. 876

    Secure gray image sharing framework with adaptive key generation using image digest by C. Nithya, C. Lakshmi, K. Thenmozhi, M. V. Harshavardhan, R. Kumaran, Padmapriya Velupillai Meikandan, Hemalatha Mahalingam, Rengarajan Amirtharajan

    Published 2025-03-01
    “…Abstract In the constantly changing digital age where instant information sharing is shared globally, the content’s safe delivery and privacy management have become necessary. Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. …”
    Get full text
    Article
  17. 877

    Generation of Vessel Track Characteristics Using a Conditional Generative Adversarial Network (CGAN) by Jessica N.A Campbell, Martha Dais Ferreira, Anthony W. Isenor

    Published 2024-12-01
    “…Machine learning (ML) models often require large volumes of data to learn a given task. However, access and existence of training data can be difficult to acquire due to privacy laws and availability. …”
    Get full text
    Article
  18. 878

    Securing the IoT System of Smart City against Cyber Threats Using Deep Learning by Tanzila Saba, Amjad Rehman Khan, Tariq Sadad, Seng-phil Hong

    Published 2022-01-01
    “…IoT enhances productivity and efficacy intelligently using remote management, but the risk of security and privacy increases. …”
    Get full text
    Article
  19. 879
  20. 880

    A Novel Deep Learning Model for Human Skeleton Estimation Using FMCW Radar by Parma Hadi Rantelinggi, Xintong Shi, Mondher Bouazizi, Tomoaki Ohtsuki

    Published 2025-06-01
    “…Human skeleton estimation using Frequency-Modulated Continuous Wave (FMCW) radar is a promising approach for privacy-preserving motion analysis. …”
    Get full text
    Article