Showing 1,081 - 1,100 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.26s Refine Results
  1. 1081

    Prospective acceptability of using mHealth interventions for oral health promotion in a sample of Egyptian women: A cross-sectional study by Mariam Sharaf, Reham Khaled Abou El Fadl

    Published 2024-12-01
    “…Health awareness (36.8%) and effort & time saving (29%) were the most commonly cited motivators for using mHealth while lack of time (33%) and privacy issues (14.2%) were the main barriers. …”
    Get full text
    Article
  2. 1082

    Comparison of Personal Data Protection Laws Indonesia and Thailand by wardah yuspin, Miranti Kusretno Tampawestri, Ridho Bawana Jati

    Published 2025-06-01
    “…The emergence the leakage of personal data realizes the protection of personal data is very important because it involves the concept of one’s privacy. …”
    Get full text
    Article
  3. 1083

    Promoting Awareness of Data Confidentiality and Security During the COVID-19 Pandemic in a Low-Income Country—Sierra Leone by Joseph Sam Kanu, Mohamed A. Vandi, Brima Bangura, Katherine Draper, Yelena Gorina, Monique A. Foster, Jadnah D. Harding, Eric N. Ikoona, Amara Jambai, Mohamed A. M. Kamara, Daniel Kaitibi, Daphne B. Moffett, Tushar Singh, John T. Redd

    Published 2024-11-01
    “…ObjectivesWorld Health Organization issued Joint Statement on Data Protection and Privacy in the COVID-19 Response stating that collection of vast amounts of personal data may potentially lead to the infringement of fundamental human rights and freedoms. …”
    Get full text
    Article
  4. 1084

    Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm by Jawhara Aljabri

    Published 2025-04-01
    “…The main intention of the MHAID-IWSOA methodology relies on enhancing the cybersecurity detection and migration model using advanced optimization algorithms. Initially, the data pre-processing applies min–max scaling to transform input data into a beneficial format. …”
    Get full text
    Article
  5. 1085

    FedDSL: A Novel Client Selection Method to Handle Statistical Heterogeneity in Cross-Silo Federated Learning Using Flower Framework by Vineetha Pais, Santhosha Rao, Balachandra Muniyal

    Published 2024-01-01
    “…Once this environment is created, a client selection strategy is applied that uses a weighted approach to select clients. A statistical analysis checks the data distributed among hospitals using skewness and normality tests. …”
    Get full text
    Article
  6. 1086

    Using citizen science Raspberry Shake seismometers to enhance earthquake location and characterization: a case study from Wellington, New Zealand by Bethany Hughes, Finnigan Illsley-Kemp, Eleanor Mestel, John Townend, Chantujan Chandrakumar, Raj Prasanna

    Published 2025-02-01
    “…Notably, we find that precise station locations are less critical for precise earthquake location, a significant factor given that the publicly available Raspberry Shake locations are obfuscated to protect user privacy. These results suggest that, dependent on network geometry, citizen seismometer data can be a valuable tool in seismic monitoring and improve earthquake location capability, whilst remaining cost-effective. …”
    Get full text
    Article
  7. 1087

    Private Data Leakage in Federated Contrastive Learning Networks by Kongyang Chen, Wenfeng Wang, Zixin Wang, Yao Huang, Yatie Xiao, Wangjun Zhang, Zhipeng Li, Zhefei Guo, Zhucheng Luo, Lin Yin, Haiyan Mai, Xiaoying Wang, Qintai Yang

    Published 2025-01-01
    “…Generally, Federated Contrastive Learning (FCL) represents an emerging approach for learning from decentralized unlabeled data while upholding data privacy. In FCL, participant clients collaborate in learning a global encoder using unlabeled data, which can serve as a versatile feature extractor for diverse downstream tasks. …”
    Get full text
    Article
  8. 1088

    Experience of older adults using smart devices and mHealth apps in nursing homes in Chinese megacities: A descriptive qualitative study by Jie Ding, Yifei Ren, Jiajia Xu, Qingqing Hu, Ting Chu

    Published 2025-06-01
    “…Data were collected through semi-structured interviews and analyzed using directed content analysis. …”
    Get full text
    Article
  9. 1089

    Using artificial intelligence based language interpretation in non-urgent paediatric emergency consultations: a clinical performance test and legal evaluation by Julia Brandenberger, Ian Stedman, Noah Stancati, Karen Sappleton, Sarathy Kanathasan, Jabeen Fayyaz, Devin Singh

    Published 2025-01-01
    “…Legal evaluation indicated inconsistent access to language interpretation services across healthcare jurisdictions and potential risks involving data privacy, consent, and malpractice when using AI-based translation tools. …”
    Get full text
    Article
  10. 1090
  11. 1091

    The role of field studying practices in improving understanding and skills for using electronic medical records among medical records and health information students by Musparlin Halid, Beny Binarto Budi Susilo

    Published 2025-04-01
    “…Specifically, the students showed increased understanding of the concepts and basic functions of EMR (p = 0.001), as well as technical skills for using EMR (p = 0.001). They also demonstrated enhanced knowledge of data security and privacy (p = 0.002), and a better understanding of workflows and procedures for using EMR (p = 0.041). …”
    Get full text
    Article
  12. 1092
  13. 1093

    Best practices for clinical trials data harmonization and sharing on NHLBI bioData catalyst (BDC) learned from CONNECTS network COVID-19 studies by Jeran K. Stratford, Huaqin Helen Pan, Alex Mainor, Edvin Music, Joshua Froess, Alex C. Cheng, Alexandra Weissman, David T. Huang, Elizabeth C. Oelsner, Sonia M. Thomas

    Published 2025-01-01
    “…Responsible data-sharing requires addressing challenges associated with data privacy and confidentiality, data linkage, data quality, variable harmonization, data formats, and comprehensive metadata documentation to produce a high-quality, contextually rich, findable, accessible, interoperable, and reusable (FAIR) dataset. …”
    Get full text
    Article
  14. 1094

    Lightweight Block and Stream Cipher Algorithm: A Review by Suaad Ali Abead, Nada Hussein M. Ali

    Published 2024-06-01
    “…Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. …”
    Get full text
    Article
  15. 1095
  16. 1096

    Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination by ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao

    Published 2024-04-01
    “…At present, the sparse matrix multiplication encryption method is used to protect the privacy of data in the matrix multiplication verifiable calculation scheme. …”
    Get full text
    Article
  17. 1097

    Balancing Innovation and Ethics by Anisa Patel

    Published 2025-03-01
    “…Opponents also point out privacy concerns and insufficient consumer data protection.  …”
    Get full text
    Article
  18. 1098

    Balancing Innovation and Ethics by Anisa Patel

    Published 2025-03-01
    “…Opponents also point out privacy concerns and insufficient consumer data protection.  …”
    Get full text
    Article
  19. 1099

    Multi-dimensional secure query scheme for fog-enhanced IIoT by Yousheng ZHOU, Chang TAN, Fei TANG

    Published 2020-08-01
    “…In view of the fact that most of the existing range query schemes for fog-enhanced IoT cannot achieve both multi-dimensional query and privacy protection,a privacy-preserving multi-dimensional secure query scheme for fog-enhanced IIoT was proposed.Firstly,the multiple ranges to be queried were mapped into a certain query matrix.Then,auxiliary vectors were constructed to decompose the query matrix,and then the auxiliary vector was processed by BGN homomorphic encryption to form a query trapdoor.Finally,with the homomorphic computation utilized by an IoT device terminal,the query trapdoor could be matched to its sensor data.Spatial complexity could be effectively reduced with the used specific auxiliary vectors.The confidentiality of sensor data could be ensured and the privacy of user’s query mode could be protected by the homomorphic encryption property.Experiments results show that the computational and communication costs are relatively low.…”
    Get full text
    Article
  20. 1100

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article