Suggested Topics within your search.
Suggested Topics within your search.
-
1041
Cybersecurity and Liability in a Big Data World
Published 2018-10-01“…We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use “contractual shields” and escape liability. …”
Get full text
Article -
1042
Data Protection in Pre-Tertiary Schools In Ghana
Published 2025-05-01“…The study also identifies a lack of coordination, formal guidance, inadequate consent procedures, and fragmented implementation strategies in data protection practices. Furthermore, the use of varied data protection mechanisms by different schools suggests a lack of standardised security protocols, which is likely to result in security gaps. …”
Get full text
Article -
1043
Heterogeneous bioinformatic data encryption on portable devices
Published 2025-04-01“…Abstract With the popularity of mobile health monitoring and genome sequencing techniques, the scale of biomedical and genomic data grow rapidly, with their privacy receiving more and more concerns. …”
Get full text
Article -
1044
Blockchain Technology for Secure Patient Data Sharing
Published 2025-05-01“… This paper presents a decentralized healthcare data management system that utilizes blockchain technology to address critical challenges in data security, patient privacy, and interoperability of electronic medical records (EMR). …”
Get full text
Article -
1045
The Venus score for the assessment of the quality and trustworthiness of biomedical datasets
Published 2025-01-01Get full text
Article -
1046
Telehealth service use and quality of care among US adults with diabetes: A cross-sectional study of the 2022 health information national trends survey
Published 2024-10-01“…Objective To characterise telehealth use, reasons for using or not using telehealth and the factors associated with telehealth use among US adults with diabetes.Design A cross-sectional study.Setting Data were sourced from the 2022 Health Information National Trends Survey.Participants US adults aged 18 years or older with self-reported diagnosis of diabetes (both type 1 and type 2).Primary and secondary outcomes Past 12-month utilisation of telehealth services, modality (eg, video, voice only), overall perception of quality of care, perceived trust in healthcare system and patient-centred communication score.Results In an analysis of 1116 US adults with diabetes, representing 33.6 million individuals, 48.1% reported telehealth use in the past year. …”
Get full text
Article -
1047
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…Here the fog nodes gather the information from the medical sensor devices and the data is validated using smart contracts in the blockchain network. …”
Get full text
Article -
1048
Non-Contact Fall Detection System Using 4D Imaging Radar for Elderly Safety Based on a CNN Model
Published 2025-05-01“…A CNN model classifies postures into standing, sitting, and lying, while changes in the speed and position distinguish falling actions from lying-down actions. The Point Cloud data were normalized and organized using zero padding and k-means clustering to improve the learning efficiency. …”
Get full text
Article -
1049
Akrivia Health Database—deep patient characterisation using a secondary mental healthcare dataset in England and Wales: cohort profile
Published 2024-10-01“…The data are anonymised, structured and harmonised from the source electronic health records across a range of information technology systems, enabling for unified, privacy-preserving access for research purposes.Participants The cohort contains data from electronic health records for over 4.6 million patients in England and Wales, as of January 2024. …”
Get full text
Article -
1050
AI-based model for Prediction of Power consumption in smart grid-smart way towards smart city using blockchain technology
Published 2024-12-01“…Ensuring data integrity, privacy, and trust among grid applicants, transmit the data securely and reliably to a centralized or distributed cloud platform utilizing blockchain technology—a secure transmission and storage using Distributed Authentication and Authorization (DAA) protocol. …”
Get full text
Article -
1051
Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)
Published 2022-12-01“…Abbreviations: VANETs: vehicular ad hoc networks; IVC: inter-vehicular communication; NC-WTM: node-centric weight-based trust management algorithm; WTM: weight-based trust management algorithm; RPRep: robust and privacy-preserving reputation management scheme; ART: attack-resistant trust management scheme; MANET: mobile ad hoc network; DSRC: dedicated short-range communication; WAVE: wireless access in vehicular environment; IVC: inter-vehicular communication; I2V: infrastructure-to-vehicle; V2I: vehicle-to-infrastructure; V2V: vehicle-to-vehicle; TA: trust authority; RSU: road side unit; OBU: on-board unit; GPS: global positioning system; WSN: wireless sensor network; VASNETs: vehicular sensor networks; CCW: cooperative collision warning; BMA: bad mouth attack; TDMA: time division multiple access; GDVAN: greedy detection for VANETs; SMTS: spider monkey time synchronization; SVM: support vector machine; DST: Dempster-Shafer theory of evidence; TA: trust authority; PCA: puzzle-based co-authentication; VLC: visible light communication; NE: Nash equilibrium; RTB: request-to-broadcast; CTB: clear-to-broadcast; RREQ: route request message; RREP: route reply; DDR: data disseminate ratio; Dir: direct trust; IDir: indirect trust; TCE: trust computation error; PDR: packet delivery ratio…”
Get full text
Article -
1052
Using information technology to communicate about health and wellbeing, assessment and review: audio computer assisted self-interviewing (A-CASI)
Published 2009-10-01“…In addition, its use is thought to decrease respondent error or fatigue and allows the relatively easy use of more complicated questionnaires, providing richer data than other self-completion approaches (Tourangeau and Smith, 1996).…”
Article -
1053
A True Random Number Generator Based on Race Hazard and Jitter of Braided and Cross-Coupled Logic Gates Using FPGA
Published 2024-01-01“…Cryptographic algorithms, which are critical for protecting user data privacy, rely on cryptographic keys to ensure data security. …”
Get full text
Article -
1054
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework
Published 2025-07-01“…The main objective of the SAMFL-SCDCOA methodology is to provide an effective method for preventing cyberattacks in real time using FL and advanced optimization algorithms. Initially, the Z-score normalization is utilized to scale and standardize data to improve analysis consistency and accuracy. …”
Get full text
Article -
1055
Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation
Published 2025-07-01“…Abstract Medical image encryption is important for maintaining the confidentiality of sensitive medical data and protecting patient privacy. Contemporary healthcare systems store significant patient data in text and graphic form. …”
Get full text
Article -
1056
GraphXplore: Visual exploration and accessible preprocessing of medical data
Published 2025-02-01“…It enables explainable, easy-to-use exploratory data analysis paired with dataset preparation and metadata annotation accessible for physicians. …”
Get full text
Article -
1057
Mannaging medical records with blockchain
Published 2025-07-01“…Therefore, the goal of this work is to evaluate, through a systematic literature review (SLR), the use of blockchain to guarantee data privacy and security in e-Health systems. …”
Get full text
Article -
1058
Experiences and views of patients, carers and healthcare professionals on using modems in domiciliary non-invasive ventilation (NIV): a qualitative study
Published 2020-09-01“…Data suggests a need for increased clarity to patients/carers regarding clinical practice relating to responsiveness to modem data. …”
Get full text
Article -
1059
A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol
Published 2022-07-01“…Hence, public cloud storage auditing is critical, so users can use a Third-party auditor (TPA) to verify data integrity. …”
Get full text
Article -
1060
Patient Confidentiality of Electronic Health Records: A Recent Review of the Saudi Literature
Published 2022-07-01“…Background Health systems harbor lucrative data that can be targeted for illegal access, thus posing a serious privacy breach. …”
Get full text
Article