Showing 1,241 - 1,260 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.19s Refine Results
  1. 1241

    Secure Delivery Method for Preserving Data Integrity of a Video Frame with Sensitive Objects by You-Rak Choi, Yunhee Kang

    Published 2025-03-01
    “…The logger operates a cryptography hash function of a feature vector of a video data frame and an XOR encoding scheme used for hiding the privacy information of sensitive objects in the video data frame. …”
    Get full text
    Article
  2. 1242

    Substation Inspection Safety Risk Identification Based on Synthetic Data and Spatiotemporal Action Detection by Chengcheng Liu, Weihua Zhang, Weijin Xu, Bo Lu, Weijie Li, Xuefeng Zhao

    Published 2025-04-01
    “…Model training is conducted using three datasets: a real dataset, a synthetic dataset generated via a VWP, and a mixed dataset comprising both real and synthetic data. …”
    Get full text
    Article
  3. 1243

    Knowledge abstraction and filtering based federated learning over heterogeneous data views in healthcare by Anshul Thakur, Soheila Molaei, Pafue Christy Nganjimi, Fenglin Liu, Andrew Soltan, Patrick Schwab, Kim Branson, David A. Clifton

    Published 2024-10-01
    “…Abstract Robust data privacy regulations hinder the exchange of healthcare data among institutions, crucial for global insights and developing generalised clinical models. …”
    Get full text
    Article
  4. 1244

    Sense (and) the city: From Internet of Things sensors and open data platforms to urban observatories by Vijay Kumar, Sam Gunner, Maria Pregnolato, Patrick Tully, Nektarios Georgalas, George Oikonomou, Stylianos Karatzas, Theo Tryfonas

    Published 2024-12-01
    “…Anyone can monitor from their fitness to the air quality of their immediate environment using everyday technologies. With caveats around privacy and accuracy, such data could even complement those collected by authorities at city‐scale, for validating or improving policies. …”
    Get full text
    Article
  5. 1245

    Investigating the role of serious games on raising students’ awareness on safety and data protection on the Internet by Georgia Zempila, Stelios Xinogalos

    Published 2025-08-01
    “…In this article, we present the results of an empirical study that utilized serious games for raising students’ awareness on safety and data protection on the Internet. Two questionnaires, that collected information regarding students’ knowledge and practices while using the Internet, were used for data collection. …”
    Get full text
    Article
  6. 1246

    Multimodal Face Data Sets—A Survey of Technologies, Applications, and Contents by Kamela Al-Mannai, Khaled Al-Thelaya, Jens Schneider, Spiridon Bakiras

    Published 2024-01-01
    “…Biometric verification for controlling access to digital devices has become ubiquitous for its ease-of-use but often relies on notoriously data-hungry supervised machine learning. …”
    Get full text
    Article
  7. 1247

    FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review by Abdulmajeed Adil Yazdeen, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, Rizgar R. Zebari

    Published 2021-03-01
    “… In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. …”
    Get full text
    Article
  8. 1248

    Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks by Zhitao Guan, Tingting Yang, Xiaojiang Du

    Published 2015-08-01
    “…An authorization certificate composed of the signature and related privilege items is constructed which is used to grant privileges to data receivers. To ensure security, a unique value is chosen to mask the certificate for each data receiver. …”
    Get full text
    Article
  9. 1249

    Perlindungan Data Pribadi Konsumen Oleh Penyelenggara Sistem Elektronik Dalam Transaksi Digital by Rista Maharani, Andria Luhur Prakoso

    Published 2024-03-01
    “…In the field of digital economic transactions, the significance of personal data is increasing, driven by the widespread use of big data. …”
    Get full text
    Article
  10. 1250

    The impact of big data analytics on digital marketing decision-making: A comprehensive analysis by Roberta Bajrami, Adelina Gashi, Kaltrina Bajraktari, Etleva Namligjiu

    Published 2025-08-01
    “…An online questionnaire, delivered through SurveyMonkey, achieved a 92% response rate (n = 230), capturing data on tool usage, benefits, and problems. Data pre-processing includes duplicate removal and mean imputation, followed by K-means clustering and logistic regression analysis using Python (scikit-learn, pandas). …”
    Get full text
    Article
  11. 1251

    Health equity innovation in precision medicine: data stewardship and agency to expand representation in clinicogenomics by Patrick J. Silva, Vasiliki Rahimzadeh, Reid Powell, Junaid Husain, Scott Grossman, Adam Hansen, Jennifer Hinkel, Rafael Rosengarten, Marcia G. Ory, Kenneth S. Ramos

    Published 2024-12-01
    “…Digital tools that preserve privacy, document provenance, and enable the management of data as intellectual property have great promise. …”
    Get full text
    Article
  12. 1252

    Risk of AI Algorithmic Discrimination Embedded in Government Data Governance and Its Prevention and Control by PENG Lihui, ZHANG Qiong, LI Tianyi

    Published 2024-05-01
    “…To address this issue, this study proposed a series of targeted prevention and control measures, including clarifying the principle of algorithmic fairness, formulating industry norms and standards, improving the accountability mechanism and regulatory system, and optimizing the data collection and processing environment, so as to effectively curb the phenomenon of algorithmic discrimination while making full use of the advantages of AI technology, so that AI technology in government data governance can truly benefit the people, and promote social fairness and justice.…”
    Get full text
    Article
  13. 1253

    Legal Implications of Consumer Personal Data Misuse by OJK Licensed Fintech Lending Operators by Rahmadi Indra Tektona

    Published 2024-04-01
    “…This normative legal research uses statutory, conceptual, and comparative approaches with a deductive-analytical method to explain the importance of regulating of personal data consumer protection on fintech lending operators. …”
    Get full text
    Article
  14. 1254

    SQUiD: ultra-secure storage and analysis of genetic data for the advancement of precision medicine by Jacob Blindenbach, Jiayi Kang, Seungwan Hong, Caline Karam, Thomas Lehner, Gamze Gürsoy

    Published 2024-12-01
    “…Due to the sensitive nature of this data and varied laws and regulations, additional security measures are needed to ensure data privacy. …”
    Get full text
    Article
  15. 1255

    Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions by Dandu Varalakshmi, N Shirisha, K Suresh, Saidhbi Shaik, V Venkatesh, C F Theresa Cenate

    Published 2025-01-01
    “…We note that while existing security frameworks such as security standards may be useful: they fail to deal with limitations in areas such as privacy, authentication, and secure transactions across multiple cloud platforms. …”
    Get full text
    Article
  16. 1256

    Data Sovereignty and Open Sharing: Reconceiving Benefit-Sharing and Governance of Digital Sequence Information by Masanori Arita

    Published 2025-02-01
    “…Using the example of the COVID-19 pandemic, the tension between open science principles and data control rights is explained. …”
    Get full text
    Article
  17. 1257

    Big Data–Driven Health Portraits for Personalized Management in Noncommunicable Diseases: Scoping Review by Haoyang Du, Jianing Yu, Dandan Chen, Jingjie Wu, Erxu Xue, Yufeng Zhou, Xiaohua Pan, Jing Shao, Zhihong Ye

    Published 2025-06-01
    “…In terms of volume, structured data were widely used (64.29%-100% depending on portrait type), while unstructured data usage varied significantly (19.05%-93.33%). …”
    Get full text
    Article
  18. 1258

    Enhancing tourism management through big data: Design and implementation of an integrated information system by Lulu Wang

    Published 2024-10-01
    “…The system combines data from several sources, including booking systems, social media platforms, and tracking devices, and addresses issues related to data privacy, quality, and integration. …”
    Get full text
    Article
  19. 1259
  20. 1260

    Verifiable Blockchain-Empowered Federated Learning for Secure Data Sharing in the Internet of Medical Things by Ping Guo, Shuilong Xu, Wenfeng Liang

    Published 2025-01-01
    “…This paper proposes a verifiable blockchain-empowered federated learning framework to address privacy and aggregation verification challenges in data sharing. …”
    Get full text
    Article