Showing 1,141 - 1,160 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.22s Refine Results
  1. 1141
  2. 1142
  3. 1143

    Deep Learning for Medical Image Analysis Applications in Disease Detection and Diagnosis by Panchadhyayee Swagata, N Shirisha, S Sureshkumar, Priya S Harthy Ruby, Ramalingam Vanaja, M Mahima

    Published 2025-01-01
    “…Its potential applications are indeed great, but realising its potential has been slow owing to a host of challenges such as implementing it in a real-life scenario, data privacy challenges, ethical concerns, AI models being biased, operating system structures needing to be interoperable with existing systems, and their compliance with regulating standards. …”
    Get full text
    Article
  4. 1144

    Health Unchained Podcast on New Decentralized Industry Coalition by Ray Dogum

    Published 2025-04-01
    “…Concepts explored during the conversation include: • Financial systems interacting with health • AI agents interacting with AI agents, exchanging value and micro payments • Building frameworks that make it easy to consume for CIOs around globe • Blockchain transaction framework • AI analytical framework • Privacy preservation data complying with HIPAA and HL7 • Coming together to solve industry problems  • Real world implementations, use cases - including reporting, health data, and DeSci, clinical innovations and research, tokenization, ethical AI, and verifiable intelligence • Stable coins for cross border payments • Full access to data, and payments around globe • Supply chain ecosystem, pharmacy, pharma, insurance/payors, clinics, doctors, and patients • Who will new intermediaries be to move data, bill, and secure the data? …”
    Get full text
    Article
  5. 1145

    Real-Time Tracking of Diagnostic Discrepancies in Electronic Health Records for Improved Predictive Modeling by Elizabeth A. Trader, Varadraj P. Gurupur

    Published 2025-01-01
    “…By addressing the current lack of accessible diagnostic discrepancy data, the schema lays a foundation for more effective analysis, better patient outcomes, and improved use of machine learning in healthcare. …”
    Get full text
    Article
  6. 1146

    Data Confidentiality in Artificial Intelligence-Assisted Medicine: The Main Ethical Issue by Raluca DUMACHE, Camelia MURESAN, Marina Adriana MERCIONI, Alin IONESCU, Nina IVANOVIC, Alexandra ENACHE

    Published 2025-05-01
    “…Although there are many potential advantages of using AI to enhance medical care, they must be weighed against potential risks to patient privacy and data security. …”
    Get full text
    Article
  7. 1147
  8. 1148

    Securing gait recognition with homomorphic encryption by Marina Banov, Domagoj Pinčić, Diego Sušanj, Kristijan Lenac

    Published 2025-08-01
    “…At the same time, they raise significant privacy concerns because compromised biometric data cannot be revoked. …”
    Get full text
    Article
  9. 1149

    Balancing public safety and civil rights: Successes and challenges of AI-based video surveillance systems by S.S. Vaddiparti, F. Babaiev

    Published 2025-05-01
    “…AI-powered video analytics has had a profound impact on the right to privacy, particularly due to the mass collection of biometric data and automated profiling, sparking debate over compliance with international standards such as the General Data Protection Regulation and the Convention for the Protection of Human Rights. …”
    Get full text
    Article
  10. 1150

    Facebook as a Surveillance Tool: From the Perspective of the User by Ekaterina Petrovna Netchitailova

    Published 2012-09-01
    “…With the increasing use of online social networks such as Facebook in recent years, a lot of research has been focussing on the privacy issue of the network. …”
    Get full text
    Article
  11. 1151

    INVESTIGATE AND COMPARE GENDER-SPECIFIC DIFFERENCES IN COPING MECHANISMS AMONG PATIENTS DIAGNOSED WITH OBSESSIVE-COMPULSIVE DISORDER USING THE MEANING-CENTERED COPING SCALE SCORES. by AijazMohiud din Bhat, Nizamud din Dar, Abdul Majid Gania

    Published 2025-06-01
    “…Participants were recruited through consecutive sampling, and data were analyzed using descriptive and inferential statistics. …”
    Get full text
    Article
  12. 1152

    Challenges in accessing health care services for women and girls with disabilities using a humanitarian physical rehabilitation program in Lebanon: a mixed method study by Linda Abou-Abbas, Diana Sabbagh, Rodolfo Rossi, Lavanya Vijayasingham, Maria Rita Lteif, Haya Rawi, Rouba Mitri, Hala Al Sultan, Aicha Benyaich, Ahmad AL-MOSA, Claudia Truppa

    Published 2024-12-01
    “…Initially, a retrospective descriptive study analyzed data from the International Committee of the Red Cross (ICRC)-supported physical rehabilitation programme (PRP) database. …”
    Get full text
    Article
  13. 1153
  14. 1154

    Strengthening research preparedness for crises: lessons from Norwegian government agencies in using randomized trials and quasi-experimental methods to evaluate public policy inter... by Unni Gopinathan, Ingeborg Elgersma, Therese Dalsbø, Mona Bjørbæk, Atle Fretheim

    Published 2025-01-01
    “…The surveyed agencies stressed the importance of legislation providing clear guidelines on when differential treatment can be justified and when informed consent requirements can be waived, as well as faster and clearer processes for managing privacy concerns related to data access. Crucially, greater political acceptance for systematically and gradually implementing reforms, including using randomization, could strengthen evidence-informed public policy, enhancing the scaling-up of effective interventions and deprioritizing ineffective ones.…”
    Get full text
    Article
  15. 1155
  16. 1156

    A Digital Twin Comprehensive Monitoring System for Ship Equipment by Miao Zhe, Zhao Yong, Su Shaojuan, Song Nanzhe

    Published 2024-12-01
    “…In this study, a comprehensive digital twin monitoring system for ship equipment was designed and implemented, including the system architecture, key technologies, and applications. Through data-driven models and operational monitoring system analysis, our PSO-SVM-based time series prediction method demonstrated excellent predictive capabilities for catamaran equipment, achieving efficient fault warnings using a threshold method. …”
    Get full text
    Article
  17. 1157

    HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework by Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad

    Published 2025-06-01
    “…Abstract Protecting user privacy is essential in machine learning research, especially in the context of data collection. …”
    Get full text
    Article
  18. 1158

    Political Factors in Global Communication Platforms: Pavel Durov’s Case by Choi Keunwon, Zotova Tatyana Andreevna

    Published 2025-06-01
    “…The French authorities applied institutional pressure by using institutional advantages to achieve control over the private data of Telegram users. …”
    Get full text
    Article
  19. 1159

    Live research dialogue on the benefits, costs and utility of synthetic data for researchers by Emily Oliver, Fiona Lugg-Widger, Maureen Haaker, Cristina Magder, Emma Gordon

    Published 2024-11-01
    “… • To discuss governance frameworks essential for the routine creation, dissemination, and use of synthetic data. • Drawing on the experience of international participants, explore measures to mitigate risks to data privacy and public perception relating to synthetic data creation and use whilst maximising its utility. …”
    Get full text
    Article
  20. 1160

    Conditions for anonymity in some generic public-key encryption constructions by TIAN Yuan, DENG Lu-yao, ZHANG Hao

    Published 2009-01-01
    “…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
    Get full text
    Article