Showing 1,041 - 1,060 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.16s Refine Results
  1. 1041

    Cybersecurity and Liability in a Big Data World by Maria Lillà Montagnani, Mirta Antonella Cavallo

    Published 2018-10-01
    “…We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use “contractual shields” and escape liability. …”
    Get full text
    Article
  2. 1042

    Data Protection in Pre-Tertiary Schools In Ghana by Ephrem Kwaa-Aidoo, Elizabeth Serwaa Baah

    Published 2025-05-01
    “…The study also identifies a lack of coordination, formal guidance, inadequate consent procedures, and fragmented implementation strategies in data protection practices. Furthermore, the use of varied data protection mechanisms by different schools suggests a lack of standardised security protocols, which is likely to result in security gaps. …”
    Get full text
    Article
  3. 1043

    Heterogeneous bioinformatic data encryption on portable devices by Hao Chen, Xiayun Hong, Yao Cheng, Xiaotong Wang, Liyan Chen, Xuan Cheng, Juncong Lin

    Published 2025-04-01
    “…Abstract With the popularity of mobile health monitoring and genome sequencing techniques, the scale of biomedical and genomic data grow rapidly, with their privacy receiving more and more concerns. …”
    Get full text
    Article
  4. 1044

    Blockchain Technology for Secure Patient Data Sharing by Robert-Stefan CIZMAŞ

    Published 2025-05-01
    “… This paper presents a decentralized healthcare data management system that utilizes blockchain technology to address critical challenges in data security, patient privacy, and interoperability of electronic medical records (EMR). …”
    Get full text
    Article
  5. 1045
  6. 1046

    Telehealth service use and quality of care among US adults with diabetes: A cross-sectional study of the 2022 health information national trends survey by Zhigang Xie, Kea Turner, Ashby F Walker, Young-Rock Hong, Oliver T Nguyen

    Published 2024-10-01
    “…Objective To characterise telehealth use, reasons for using or not using telehealth and the factors associated with telehealth use among US adults with diabetes.Design A cross-sectional study.Setting Data were sourced from the 2022 Health Information National Trends Survey.Participants US adults aged 18 years or older with self-reported diagnosis of diabetes (both type 1 and type 2).Primary and secondary outcomes Past 12-month utilisation of telehealth services, modality (eg, video, voice only), overall perception of quality of care, perceived trust in healthcare system and patient-centred communication score.Results In an analysis of 1116 US adults with diabetes, representing 33.6 million individuals, 48.1% reported telehealth use in the past year. …”
    Get full text
    Article
  7. 1047

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services by charu awasthi, Satya Prakash, Prashant Kumar Mishra

    Published 2024-12-01
    “…Here the fog nodes gather the information from the medical sensor devices and the data is validated using smart contracts in the blockchain network. …”
    Get full text
    Article
  8. 1048

    Non-Contact Fall Detection System Using 4D Imaging Radar for Elderly Safety Based on a CNN Model by Sejong Ahn, Museong Choi, Jongjin Lee, Jinseok Kim, Sungtaek Chung

    Published 2025-05-01
    “…A CNN model classifies postures into standing, sitting, and lying, while changes in the speed and position distinguish falling actions from lying-down actions. The Point Cloud data were normalized and organized using zero padding and k-means clustering to improve the learning efficiency. …”
    Get full text
    Article
  9. 1049

    Akrivia Health Database—deep patient characterisation using a secondary mental healthcare dataset in England and Wales: cohort profile by Ana Todorovic, Philip Craig, Simon Pillinger, Panagiota Kontari, Sophie Gibbons, Luke Bryden, Tarso Franarin, Ceyda Uysal, Gloria Roque, Benjamin Fell

    Published 2024-10-01
    “…The data are anonymised, structured and harmonised from the source electronic health records across a range of information technology systems, enabling for unified, privacy-preserving access for research purposes.Participants The cohort contains data from electronic health records for over 4.6 million patients in England and Wales, as of January 2024. …”
    Get full text
    Article
  10. 1050

    AI-based model for Prediction of Power consumption in smart grid-smart way towards smart city using blockchain technology by Emran Aljarrah

    Published 2024-12-01
    “…Ensuring data integrity, privacy, and trust among grid applicants, transmit the data securely and reliably to a centralized or distributed cloud platform utilizing blockchain technology—a secure transmission and storage using Distributed Authentication and Authorization (DAA) protocol. …”
    Get full text
    Article
  11. 1051

    Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM) by R. Priya, N. Sivakumar

    Published 2022-12-01
    “…Abbreviations: VANETs: vehicular ad hoc networks; IVC: inter-vehicular communication; NC-WTM: node-centric weight-based trust management algorithm; WTM: weight-based trust management algorithm; RPRep: robust and privacy-preserving reputation management scheme; ART: attack-resistant trust management scheme; MANET: mobile ad hoc network; DSRC: dedicated short-range communication; WAVE: wireless access in vehicular environment; IVC: inter-vehicular communication; I2V: infrastructure-to-vehicle; V2I: vehicle-to-infrastructure; V2V: vehicle-to-vehicle; TA: trust authority; RSU: road side unit; OBU: on-board unit; GPS: global positioning system; WSN: wireless sensor network; VASNETs: vehicular sensor networks; CCW: cooperative collision warning; BMA: bad mouth attack; TDMA: time division multiple access; GDVAN: greedy detection for VANETs; SMTS: spider monkey time synchronization; SVM: support vector machine; DST: Dempster-Shafer theory of evidence; TA: trust authority; PCA: puzzle-based co-authentication; VLC: visible light communication; NE: Nash equilibrium; RTB: request-to-broadcast; CTB: clear-to-broadcast; RREQ: route request message; RREP: route reply; DDR: data disseminate ratio; Dir: direct trust; IDir: indirect trust; TCE: trust computation error; PDR: packet delivery ratio…”
    Get full text
    Article
  12. 1052

    Using information technology to communicate about health and wellbeing, assessment and review: audio computer assisted self-interviewing (A-CASI) by Murray Davies

    Published 2009-10-01
    “…In addition, its use is thought to decrease respondent error or fatigue and allows the relatively easy use of more complicated questionnaires, providing richer data than other self-completion approaches (Tourangeau and Smith, 1996).…”
    Article
  13. 1053

    A True Random Number Generator Based on Race Hazard and Jitter of Braided and Cross-Coupled Logic Gates Using FPGA by Hossam O. Ahmed, Donghoon Kim, William J. Buchanan

    Published 2024-01-01
    “…Cryptographic algorithms, which are critical for protecting user data privacy, rely on cryptographic keys to ensure data security. …”
    Get full text
    Article
  14. 1054

    Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework by Manal Abdullah Alohali, Hatim Dafaalla, Mohammed Baihan, Sultan Alahmari, Achraf Ben Miled, Othman Alrusaini, Ali Alqazzaz, Hanadi Alkhudhayr

    Published 2025-07-01
    “…The main objective of the SAMFL-SCDCOA methodology is to provide an effective method for preventing cyberattacks in real time using FL and advanced optimization algorithms. Initially, the Z-score normalization is utilized to scale and standardize data to improve analysis consistency and accuracy. …”
    Get full text
    Article
  15. 1055

    Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation by S. Subathra, V. Thanikaiselvan

    Published 2025-07-01
    “…Abstract Medical image encryption is important for maintaining the confidentiality of sensitive medical data and protecting patient privacy. Contemporary healthcare systems store significant patient data in text and graphic form. …”
    Get full text
    Article
  16. 1056

    GraphXplore: Visual exploration and accessible preprocessing of medical data by Louis Bellmann, Karl Gottfried, Philipp Breitfeld, Frank Ückert

    Published 2025-02-01
    “…It enables explainable, easy-to-use exploratory data analysis paired with dataset preparation and metadata annotation accessible for physicians. …”
    Get full text
    Article
  17. 1057

    Mannaging medical records with blockchain by Paulo Caetano da Silva, Reginalda Santos Silva, Daniel José Diaz

    Published 2025-07-01
    “…Therefore, the goal of this work is to evaluate, through a systematic literature review (SLR), the use of blockchain to guarantee data privacy and security in e-Health systems. …”
    Get full text
    Article
  18. 1058

    Experiences and views of patients, carers and healthcare professionals on using modems in domiciliary non-invasive ventilation (NIV): a qualitative study by Stephanie K Mansell, Martin J Wood, Cherry Kilbride, Swapna Mandal, Francesca Gowing

    Published 2020-09-01
    “…Data suggests a need for increased clarity to patients/carers regarding clinical practice relating to responsiveness to modem data. …”
    Get full text
    Article
  19. 1059

    A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol by Baidaa Abdulrahman Jalil, Taha Mohammed Hasan, Ghassan Sabeeh Mahmood, Hazim Noman Abed

    Published 2022-07-01
    “…Hence, public cloud storage auditing is critical, so users can use a Third-party auditor (TPA) to verify data integrity. …”
    Get full text
    Article
  20. 1060

    Patient Confidentiality of Electronic Health Records: A Recent Review of the Saudi Literature by Nada Saddig Almaghrabi, Bussma Ahmed Bugis

    Published 2022-07-01
    “…Background Health systems harbor lucrative data that can be targeted for illegal access, thus posing a serious privacy breach. …”
    Get full text
    Article