Suggested Topics within your search.
Suggested Topics within your search.
-
981
Deconstructing Bentham’s Panopticon: The New Metaphors of Surveillance in the Web 2.0 Environment
Published 2011-02-01“…This article reflects on the meaning of the words “control” and “privacy” in light of the intensive diffusion of user generated content on the web. …”
Get full text
Article -
982
Big data transfer service architecture for cloud data centers: problems, methods, applications, and future trends
Published 2025-08-01“…After thoroughly screening selected peer-reviewed articles, the primary open issues are: incorporating a data placement module in the data transfer service, providing end-to-end safeguards for packet delivery, improving data transfer time and speed, minimizing costs and implementation overhead, ensuring secure data transfer between servers in the cloud, demonstrating effective big data transfer architectures, considering topology-specific extensions to reduce the busty nature of data centers, and enhancing data transfer services using machine learning algorithms during upload and download operations. …”
Get full text
Article -
983
Student nurses’ views regarding disclosure of patients’ confidential information
Published 2011-10-01Get full text
Article -
984
Calibrated optional randomized response techniques for efficient and robust estimation of quantitative sensitive variables
Published 2025-05-01“…Numerical applications using both real and simulated data supported the theoretical findings, demonstrating that the C-ORRT models exhibited lower biases, reduced variances, higher relative efficiency, enhanced privacy levels, and a better combined metric of variance and privacy. …”
Get full text
Article -
985
Ethical and regulatory challenges in machine learning-based healthcare systems: A review of implementation barriers and future directions
Published 2025-03-01“…Key issues concern patient data privacy, algorithmic bias, absence of transparency, and ambiguous legal liability. …”
Get full text
Article -
986
-
987
Design of an Improved Model for Smart Grid Pricing Using ST-GNN-PNet and MAD-RL-StackelNet
Published 2025-01-01“…However, current pricing models fail to capture spatio-temporal load behavior, consumer heterogeneity, and externalities like emissions. Privacy constraints also hinder granular data collection, causing revenue loss. …”
Get full text
Article -
988
Distance caregiving using smart home technologies: balancing ethical priorities in family decision-making by only children
Published 2025-07-01“…We used the applied thematic analysis methodology to analyze the data. …”
Get full text
Article -
989
Artificial Intelligence Use in Daily and Professional Life among Pediatric Surgeons in India: A Roadmap for Adoption Based on Online Survey Results
Published 2025-05-01“…Addressing barriers such as ethical concerns, data privacy, and cost could catalyze AI’s potential to revolutionize pediatric surgical care. …”
Get full text
Article -
990
Automated Digital Safety Planning Interventions for Young Adults: Qualitative Study Using Online Co-design Methods
Published 2025-02-01“…Young adult participants also shared 3 key technological needs of an automated intervention: (1) transparency about how the intervention functions, the kinds of actions it does and does not take, the limits of confidentiality, and the role of human oversight within the program; (2) strong privacy practices—data security around how content within the intervention and how private data created by the intervention would be maintained and used was extremely important to young adult participants given the sensitive nature of suicide-related data; and (3) usability, convenience, and accessibility were particularly important to participants—this includes having an approachable and engaging message tone, customizable message delivery options (eg, length, number, content focus), and straightforward menu navigation. …”
Get full text
Article -
991
-
992
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
Published 2023-12-01“…On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. …”
Get full text
Article -
993
Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT
Published 2025-01-01Get full text
Article -
994
Secure and intelligent 5G-enabled remote patient monitoring using ANN and Choquet integral fuzzy VIKOR
Published 2025-03-01Get full text
Article -
995
A Denoising Diffusion Probabilistic Model-Based Human Respiration Monitoring Method Using a UWB Radar
Published 2025-01-01“…This paper proposes a denoising diffusion probabilistic model (DDPM)-based human respiration monitoring method using an ultra-wideband (UWB) radar, where the localization calculation of the target based on the respiration-motion energy ratio, maximum ratio combining (MRC), and principal component analysis (PCA) are included for data enhancement. …”
Get full text
Article -
996
Using telemedicine to support care for people with type 2 diabetes mellitus: a qualitative analysis of patients’ perspectives
Published 2019-10-01“…Four themes emerged from the analysis: (1) generational difference; (2) independence and convenience, (3) sharing of health data and privacy and (4) concerns and challenges. …”
Get full text
Article -
997
-
998
Establishing and evaluating trustworthy AI: overview and research challenges
Published 2024-11-01Get full text
Article -
999
Synthetic data production for biomedical research
Published 2025-04-01“…Synthetic data, generated using advanced artificial intelligence (AI) techniques, replicates the statistical properties of real-world datasets while excluding identifiable information. …”
Get full text
Article -
1000
Women’s hospital birth experiences in Harar, eastern Ethiopia: a qualitative study using Roy’s Adaptation Model
Published 2022-07-01“…Interviews were audio-recorded and transcribed on the spot and the interviews were analysed using a deductive content analysis approach. Data were analysed using the four components of Roy’s Adaptation Model (RAM) as a guiding framework of women’s experiences: physiological, self-concept, role and function, and interdependence.Results Various behaviours were identified: under physiological mode, common behaviours identified included labour pain, fatigue, surgical site pain and anaesthesia-related complication. …”
Get full text
Article