Showing 1,101 - 1,120 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.16s Refine Results
  1. 1101

    When Digital Economy Meets Web3.0: Applications and Challenges by Chuan Chen, Lei Zhang, Yihao Li, Tianchi Liao, Siran Zhao, Zibin Zheng, Huawei Huang, Jiajing Wu

    Published 2022-01-01
    “…In the digital economy scenario, the centralized nature of the Internet and other characteristics usually bring about security issues such as infringement and privacy leakage. Therefore, it is necessary to investigate how to use Web3.0 technologies to solve the pain points encountered in the development of the digital economy by fully exploring the critical technologies of digital economy and Web3.0. …”
    Get full text
    Article
  2. 1102

    Data analysis in the healthcare context: a smart cities perspective by Fabiane Florencio de Souza, Alana Corsi, Clayton Pereira de Sá, Regina Negri Pagani, João Luiz Kovaleski

    Published 2023-09-01
    “…For this, a bibliographic review was carried out, using the Methodi Ordinatio methodology, resulting in a portfolio of articles with scientific relevance, which was the source of data collection and analysis. …”
    Get full text
    Article
  3. 1103

    Determinants of behavioral intentions and their impact on student performance in the use of AI technology in higher education in Indonesia: A SEM-PLS analysis based on TPB, UTAUT,... by Muhammad Nurtanto, Septiari Nawanksari, Valiant Lukad Perdana Sutrisno, Husni Syahrudin, Nur Kholifah, Didik Rohmantoro, Iga Setia Utami, Farid Mutohhari, Mustofa Abi Hamid

    Published 2025-01-01
    “…The findings reveal that Attitude toward Behavior and Technology Anxiety significantly influence Student Performance through mediating variables such as Performance Expectancy, Facilitating Conditions, and Behavioral Intention to Use. Notably, perceived risk negatively affects behavioral intention and academic outcomes, suggesting high student awareness of data privacy, technological dependency, and accuracy uncertainty. …”
    Get full text
    Article
  4. 1104

    ARTIFICIAL INTELLIGENCE AND BIG DATA ANALYSIS IN CRIME PREVENTION AND COMBAT by George-Marius ȚICAL

    Published 2025-03-01
    “…In the era of accelerated digitalization, the use of artificial intelligence (AI) and big data analysis has become a necessity in crime prevention and combat. …”
    Get full text
    Article
  5. 1105
  6. 1106

    The Ethics of Data and Its Governance: A Discourse Theoretical Approach by Bernd Carsten Stahl

    Published 2025-06-01
    “…Drawing on Habermas’s Theory of Communicative Action and using the example of neuro data, this paper argues that data shapes and is shaped by discourses. …”
    Get full text
    Article
  7. 1107

    Addressing the gap in health data management skills: an online self-guided course for researchers and health professionals by Naomi Waithira, Brian Mutinda, Kehkashan Shah, Evelyne Kestelyn, Susan Bull, Liam Boggs, Trudie Lang, Phaik Yeong Cheah

    Published 2024-11-01
    “…This gap is pronounced in low- and middle-income countries (LMICs), where data privacy concerns and inadequate infrastructure hinder efforts to utilise and share health data. …”
    Get full text
    Article
  8. 1108
  9. 1109
  10. 1110

    Understanding user’s identifiability on social media: a supervised machine learning and self-reporting investigation by Xi Chen, Hao Ding, Jian Mou, Yuping Zhao

    Published 2025-09-01
    “…The relationship between machine-predicted and self-reported identifiability was tested using data from 91 participants. Based on the degree of deviation between the two, users can be divided into four categories—normal, conservative, active, and atypical—which reflect their sensitivity to privacy concerns and preferences regarding information disclosure. …”
    Get full text
    Article
  11. 1111

    Application of Spritz Encryption in Smart Meters to Protect Consumer Data by Lincoln Kamau Kiarie, Philip Kibet Langat, Christopher Maina Muriithi

    Published 2019-01-01
    “…However, enhanced communications make Smart Grid more susceptible to privacy leaks and cyber attacks. Small meters collect detailed consumer data, such as power consumption, which can then become a major source of privacy leakage. …”
    Get full text
    Article
  12. 1112

    SoK: The Impact of Educational Data Mining on Organisational Administration by Hamad Almaghrabi, Ben Soh, Alice Li, Idrees Alsolbi

    Published 2024-11-01
    “…It outlines key data mining techniques used in tasks like resource allocation, staff evaluation, and institutional planning. …”
    Get full text
    Article
  13. 1113

    A Study on Factors Affecting the Continuance Usage Intention of Social Robots with Episodic Memory: A Stimulus–Organism–Response Perspective by Yi Yang, Hye-Kyung Cho, Min-Yong Kim

    Published 2025-05-01
    “…A structural model incorporating key perceived features (intimacy, morality, dependency, and information privacy risk) was tested with survey data from 285 MOCCA users and analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  14. 1114

    Medical laboratory data-based models: opportunities, obstacles, and solutions by Jiaojiao Meng, Moxin Wu, Fangmin Shi, Ying Xie, Hui Wang, You Guo

    Published 2025-07-01
    “…Despite these benefits, challenges such as data quality, model optimization, computational requirements, and limited interpretability remain, along with concerns about data privacy, fairness, and security. …”
    Get full text
    Article
  15. 1115

    VF-CART: A communication-efficient vertical federated framework for the CART algorithm by Yang Xu, Xuexian Hu, Jianghong Wei, Hongjian Yang, Kejia Li

    Published 2023-01-01
    “…With growing concerns about privacy and the fact that data are distributed among multiple parties in realistic scenarios, vertical federated learning (VFL) is becoming increasingly important. …”
    Get full text
    Article
  16. 1116

    Particular qualities of evaluation of electronic card data in modern healthcare by I. R. Svechkareva, A. A. Kurylev, D. E. Shilova

    Published 2025-01-01
    “…The article discusses various aspects of the implementation and use of EHR, including technical difficulties, data privacy and security issues. …”
    Get full text
    Article
  17. 1117

    Synthetic data in medicine: Legal and ethical considerations for patient profiling by Maja Nisevic, Dusko Milojevic, Daniela Spajic

    Published 2025-01-01
    “…Synthetic data is increasingly used in healthcare to facilitate privacy-preserving research, algorithm training, and patient profiling. …”
    Get full text
    Article
  18. 1118

    Integrating Data Analytics into Traditional Media: Opportunities and Strategic Advantages by Веньхао Чжен, Вікторія Опанасенко

    Published 2025-05-01
    “…Moreover, the use of personal data raises concerns in terms of privacy and ethical standards, which necessitates a careful balancing act between leveraging data for analysing and maintaining the users’ trust. …”
    Get full text
    Article
  19. 1119

    Smart Grids Data Aggregation Method on Paillier Homomorphic Encryption by Shaodong Zhao

    Published 2024-12-01
    “…In this paper, the Paillier HE algorithm was used to study the power grid data, and the encrypted data was numerically calculated under different encryption states. …”
    Get full text
    Article
  20. 1120

    A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing by Abdullah Ayub Khan, Asif Ali Laghari, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Hamed Alsufyani, Sajid Ullah

    Published 2025-06-01
    “…This study presents a scalable, lightweight hybrid authentication system that integrates blockchain and edge computing within a Hyperledger Consortium network to address such real-time problems, particularly the use of Hyperledger Indy. For secure authentication, Hyperledger ensures a permissioned, decentralized, and impenetrable environment, while edge computing lowers latency by processing data closer to IoMT devices. …”
    Get full text
    Article