Showing 921 - 940 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.18s Refine Results
  1. 921

    Nuclei segmentation and classification from histopathology images using federated learning for end-edge platform. by Anjir Ahmed Chowdhury, S M Hasan Mahmud, Md Palash Uddin, Seifedine Kadry, Jung-Yeon Kim, Yunyoung Nam

    Published 2025-01-01
    “…To protect data privacy, the framework employs a FedAvg-based federated learning scheme, enabling decentralized training without exposing sensitive data. …”
    Get full text
    Article
  2. 922
  3. 923

    Photography in the Age of Surveillance: Ethics and the Photographer’s Responsibility by Çeyiz MAKAL FAIRCLOUGH

    Published 2025-04-01
    “…This paper explores how certain photographers, including Hasan Elahi and Trevor Paglen, have responded to the dominance of surveillance culture by using their work to critique and resist its normalisation. …”
    Get full text
    Article
  4. 924

    A framework for systematically applying humanistic ethics when using AI as a design material by Kyle Dent, Richelle Dumond, Mike Kuniavsky

    Published 2019-07-01
    “…Because AI-supported and autonomous decision making has the potential for widespread negative personal, social, and environmental effects, we aim to take a proactive stance to uphold human rights, respect individuals’ privacy, protect personal data, and enable freedom of expression and equality. …”
    Get full text
    Article
  5. 925

    Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm by Zainab Abdullah Jasim, Ameer Kadhim Hadi

    Published 2025-01-01
    “…Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. …”
    Get full text
    Article
  6. 926

    Analysis of MAXIM Application Service Quality on User Satisfaction using the E-Service Quality Method by Putri Wulandari, Nur Rachman Dzakiyullah, Asti Ratnasari, Dadang Heksaputra

    Published 2024-11-01
    “…Efficiency, fulfillment, system availability, privacy, responsiveness, compensation, and interaction are the seven factors used, while user satisfaction is the dependent variable. …”
    Get full text
    Article
  7. 927

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…However, the vulnerabilities in the underlying smart city technologies, interconnection of heterogeneous devices, and transfer of data over the open public channels expose these networks to a myriad of security and privacy threats. …”
    Get full text
    Article
  8. 928

    FedSW-TSAD: SWGAN-Based Federated Time Series Anomaly Detection by Xiuxian Zhang, Hongwei Zhao, Weishan Zhang, Shaohua Cao, Haoyun Sun, Baoyu Zhang

    Published 2025-06-01
    “…As distributed sensing technologies evolve, the collection of time series data is becoming increasingly decentralized, which introduces serious challenges for both model training and data privacy protection. …”
    Get full text
    Article
  9. 929

    Passive Sensing for Mental Health Monitoring Using Machine Learning With Wearables and Smartphones: Scoping Review by ShiYing Shen, Wenhao Qi, Jianwen Zeng, Sixie Li, Xin Liu, Xiaohong Zhu, Chaoqun Dong, Bin Wang, Yankai Shi, Jiani Yao, Bingsheng Wang, Xiajing Lou, Simin Gu, Pan Li, Jinghua Wang, Guowei Jiang, Shihua Cao

    Published 2025-08-01
    “…However, clinical translation requires standardized protocols, larger longitudinal studies (≥3 months), and ethical frameworks for data privacy. Future work should prioritize multimodal sensor fusion and explainable artificial intelligence to bridge the gap between technical performance and clinical deployability.…”
    Get full text
    Article
  10. 930

    Perceptions of Executive Decision Makers on Using Social Media in Effective Health Communication: Qualitative Study by Norah Abdullah Alanazi, Alia Mohammed Almoajel, Shabana Tharkar, Khalid Almutairi, Farha Nazir Ahmad Mohamad, Bader Saud Talak Almatairi

    Published 2025-05-01
    “…We included 13 participants from government and private health care sectors in the Al-Qassim region of Saudi Arabia, who were key players and decision makers in health care programs and reforms. Data were recorded, transcribed verbatim, and analyzed using thematic analysis to identify key themes and patterns. …”
    Get full text
    Article
  11. 931

    Synthetic Financial Data: A Case Study Regarding Polish Limited Liability Companies Data by Aleksandra Szymura

    Published 2024-07-01
    “…Due to the statistical similarity with real data, they can be used instead of them. This action allows data to be shared externally while guaranteeing their privacy. …”
    Get full text
    Article
  12. 932
  13. 933

    Bioethical implications of the use of digital technologies for mental health research during the social distancing period of the COVID-19 pandemic by Liliana Mondragón-Barrios, Gabriela Martínez-Levy, Adriana Díaz-Anzaldúa, Miguel Ángel Caballero-Gutiérrez, Luis Moncayo-Samperio

    Published 2025-06-01
    “…The need to apply ethical principles to protocols for mental health research using digital technologies was a central concern of ethics committees during the COVID-19 pandemic, which sought to ensure a fair selection of participants, appropriate adaptation of the informed consent process, protection of participants’ privacy, secure management of research data, and assessment of risks and benefits. …”
    Get full text
    Article
  14. 934

    User Intent to Use DeepSeek for Health Care Purposes and Their Trust in the Large Language Model: Multinational Survey Study by Avishek Choudhury, Yeganeh Shahsavar, Hamid Shamszare

    Published 2025-05-01
    “…It was then distributed on the web to users in India, the United Kingdom, and the United States who had used DeepSeek within the past 2 weeks. Data analysis involved descriptive frequency assessments and Partial Least Squares Structural Equation Modeling. …”
    Get full text
    Article
  15. 935

    It’s Fine If Others Do It Too: Privacy Concerns, Social Influence, and Political Expression on Facebook in Canada, France, Germany, the United Kingdom, and the United States by Christian Pieter Hoffmann, Shelley Boulianne

    Published 2024-10-01
    “…We use survey data gathered in 2023 from Canada, France, Germany, the United Kingdom, and the United States ( n  = 5,936). …”
    Get full text
    Article
  16. 936

    Predicting digital contact tracing tool adoption during COVID-19 from the perspective of TAM: The role of trust, fear, privacy, anxiety, and social media by Adi Alsyouf, Ala’a M Al-Momani, Nizar Alsubahi, Abdalwali Lutfi, Khalid Anwer Al-Mugheed, Mohammed Amin Almaiah, Rami J Anshasi, Main Naser Alolayyan, Abdallah Alsaad, Mahmaod Alrawad

    Published 2025-05-01
    “…This study investigates the key determinants of DCT adoption and acceptance by integrating the Technology Acceptance Model (TAM) with psychological, social, and regulatory factors related to the context of the study. Methods Using a quantitative, cross-sectional design, data were collected from Saudi participants through an online survey and analysed using Structural Equation Modeling (SEM) with SmartPLS4. …”
    Get full text
    Article
  17. 937

    A data flow process for confidential data and its application in a health research project. by Samantha S R Crossfield, Kieran Zucker, Paul Baxter, Penny Wright, Jon Fistein, Alex F Markham, Mark Birkin, Adam W Glaser, Geoff Hall

    Published 2022-01-01
    “…However, using healthcare data for secondary purposes raises legal and ethical concerns relating to confidentiality, privacy and data protection rights. …”
    Get full text
    Article
  18. 938

    Big data, big responsibilities by Primavera De Filippi

    Published 2014-01-01
    “…With the advent of cloud computing, specialised data centres with powerful computational hardware and software resources can be used for processing and analysing a humongous amount of aggregated data coming from a variety of different sources. …”
    Get full text
    Article
  19. 939

    Strong Association of Perceived Chronic Stress with Leadership Quality, Work–Privacy Conflict and Quantitative Work Demands: Results of the IMPROVE<i>job</i> Study by Julian Göbel, Lukas Degen, Karen Minder, Monika A. Rieger, Birgitta M. Weltermann

    Published 2025-05-01
    “…The factors associated with lower perceived chronic stress were identified using a multilevel regression model approach. The model showed a significant association with less work–privacy conflict (<i>p</i> < 0.001, <i>β</i> = 0.31), lower quantitative work demands (<i>p</i> < 0.001, <i>β</i> = 0.28), and good leadership quality (<i>p</i> < 0.001, <i>β</i> = −0.22). …”
    Get full text
    Article
  20. 940