Showing 1,021 - 1,040 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.22s Refine Results
  1. 1021
  2. 1022

    Factors influencing the perceived usability of line pay: An extended technology acceptance model approach by Yogi Tri Prasetyo, Krisna Chandra Susanto, Ko-Hui Chuang, Ruo-Ting Yin, Jia-Wei Chen, Yu-Xuan Zhang, Omar Paolo Benito, Zachariah John A. Belmonte, Maela Madel L. Cahigas, Reny Nadlifatin, Ma. Janice J. Gumasing

    Published 2025-05-01
    “…Utilizing an extended Technology Acceptance Model (TAM), the research integrated additional variables such as social influence, trust, security, and environmental concerns, offering a comprehensive framework to understand user adoption dynamics. 120 Taiwanese participants were surveyed by employing the Purposive Sampling Method and data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  3. 1023

    New cross-layer reputation mechanism for mobile cloud computing by Mengyang YU, Hui LIN, Youliang TIAN

    Published 2018-03-01
    “…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
    Get full text
    Article
  4. 1024

    A data management system for precision medicine. by John J L Jacobs, Inés Beekers, Inge Verkouter, Levi B Richards, Alexandra Vegelien, Lizan D Bloemsma, Vera A M C Bongaerts, Jacqueline Cloos, Frederik Erkens, Patrycja Gradowska, Simon Hort, Michael Hudecek, Manel Juan, Anke H Maitland-van der Zee, Sergio Navarro-Velázquez, Lok Lam Ngai, Qasim A Rafiq, Carmen Sanges, Jesse Tettero, Hendrikus J A van Os, Rimke C Vos, Yolanda de Wit, Steven van Dijk

    Published 2025-01-01
    “…This paper evaluates a MedDMS in five types of use cases for precision medicine, ranging from data collection to algorithm development and from implementation to integration with real-world data. …”
    Get full text
    Article
  5. 1025

    WiFi-Based Location Tracking: A Still Open Door on Laptops by Mariana Cunha, Ricardo Mendes, Yves-Alexandre de Montjoye, Joao P. Vilela

    Published 2025-01-01
    “…Location privacy is a major concern in the current digital society, due to the sensitive information that can be inferred from location data. …”
    Get full text
    Article
  6. 1026

    FERTILITY CARE IN LOW- AND MIDDLE- INCOME COUNTRIES: The future use of AI to improve accessibility of assisted reproductive technology in low- and middle-income countries by Gerardo Mendizabal-Ruiz, Omar Paredes, Ernesto Borrayo, Alejandro Chavez-Badiola

    Published 2025-08-01
    “…Finally, this paper addresses the ethical and practical challenges associated with using these technologies, including potential biases in AI, equitable access, quality control, data privacy, job implications, and cultural sensitivities.…”
    Get full text
    Article
  7. 1027

    Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning by Muhammad Dilshad, Madiha Haider Syed, Semeen Rehman

    Published 2025-01-01
    “…Detection methods currently face challenges due to the complex and enormous amounts of data inherent in IoV systems. This paper presents a new approach toward improving DDoS attack detection by using the Gini index in feature selection and Federated Learning during model training. …”
    Get full text
    Article
  8. 1028
  9. 1029

    ReACT_OCRS: An AI-Driven Anonymous Online Reporting System Using Synergized Reasoning and Acting in Language Models by Amir Aboubakr Shaker Mahmoud, Wesam Shishah, Nilay R. Mistry

    Published 2025-01-01
    “…Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibility barriers and delaying response times. …”
    Get full text
    Article
  10. 1030

    Based on model randomization and adaptive defense for federated learning schemes by Gaofeng Yue, Xiaowei Han

    Published 2025-02-01
    “…Abstract Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data. …”
    Get full text
    Article
  11. 1031
  12. 1032

    Enhancing unmanned aerial vehicle and smart grid communication security using a ConvLSTM model for intrusion detection by Raed Alharthi

    Published 2024-12-01
    “…The emergence of small-drone technology has revolutionized the way we use drones. Small drones leverage the Internet of Things (IoT) to deliver location-based navigation services, making them versatile tools for various applications. …”
    Get full text
    Article
  13. 1033
  14. 1034

    Using malware for software-defined networking–based smart home security management through a taint checking approach by Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Wen-Hui Lin, Hsiao-Chung Lin, Wun-Jie Chao

    Published 2016-08-01
    “…Accordingly, this article proposes a taint propagation analysis model incorporating a weighted spanning tree analysis scheme for tracking data with taint marking using several taint checking tools with an open software-defined networking architecture for solving the dynamic taint propagation analysis problem. …”
    Get full text
    Article
  15. 1035

    Hypothetical Preferences and Concerns for Long-Acting Injectable HIV PrEP Use Among Female Barmaids in Ubungo, Dar Es Salaam, Tanzania by Akyoo WO, Mosha IH, Mpembeni RM, Jahn A

    Published 2025-08-01
    “…Interviews were conducted using a guide with semi-structured questions. We adopted an inductive approach for analyzing data.Findings: The majority of PrEP non-users expressed no preference for any form of PrEP, while oral PrEP-users preferred LAI PrEP. …”
    Get full text
    Article
  16. 1036

    Using AI chatbots (e.g., CHATGPT) in seeking health-related information online: The case of a common ailment by Pouyan Esmaeilzadeh, Mahed Maddah, Tala Mirzaei

    Published 2025-03-01
    “…Using structural equation modeling on survey data collected from 231 respondents in the US, our study examines the hypotheses linking hedonic and utilitarian values, user satisfaction, willingness to reuse conversational AI, and intentions to take recommended actions. …”
    Get full text
    Article
  17. 1037
  18. 1038

    Grouping Digital Health Apps Based on Their Quality and User Ratings Using K-Medoids Clustering: Cross-Sectional Study by Maciej Marek Zych, Raymond Bond, Maurice Mulvenna, Lu Bai, Jorge Martinez-Carracedo, Simon Leigh

    Published 2025-07-01
    “…With over 350,000 digital health apps available on the app stores today, those apps need to be of sufficient quality to be safe to use. Discovering the typology of digital health apps regarding professional and clinical assurance (PCA), user experience (UX), data privacy (DP), and user ratings may help in determining the areas where digital health apps can improve. …”
    Get full text
    Article
  19. 1039

    Barriers and facilitators to seeking psychological support among healthcare professionals: a qualitative study using the Theoretical Domains Framework by Sha Liu, Yinhuan Hu, Holger Pfaff, Xiaoyun Lei, Zhen Qi, Xiandong Feng

    Published 2025-03-01
    “…Data were analyzed using framework analysis and relevant domains were identified according to the frequency of participants’ belief statements. …”
    Get full text
    Article
  20. 1040

    Medical data sharing and synthetic clinical data generation – maximizing biomedical resource utilization and minimizing participant re-identification risks by Simeone Marino, Ruth Cassidy, Joseph Nanni, Yuxuan Wang, Yipeng Liu, Mingyi Tang, Yuan Yuan, Toby Chen, Anik Sinha, Balaji Pandian, Ivo D. Dinov, Michael L. Burns

    Published 2025-08-01
    “…This article introduces an end-to-end, titratable pipeline that generates privacy-preserving “digital twin” datasets from complex EHR and wearable-device records (Apple Watch data from 3029 participants) using DataSifter and Synthetic Data Vault (SDV) methods. …”
    Get full text
    Article