Showing 1,401 - 1,420 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.21s Refine Results
  1. 1401

    A scoping review by I Gusti Ayu Tirtayani, I Made Wardana, Putu Yudi Setiawan, I Gst. Ngr. Jaya Agung Widagda K

    Published 2024-11-01
    “…However, challenges such as data privacy concerns, algorithmic biases, and the need for greater transparency are also noted. …”
    Get full text
    Article
  2. 1402

    Challenges in Adopting Artificial Intelligence Technologies in Supply Chain Management in Romanian Companies by Radu RUGIUBEI, Valentin STOICA

    Published 2025-03-01
    “…Key challenges identified include high implementation costs, data quality issues, and ethical concerns related to data privacy and algorithmic transparency. …”
    Get full text
    Article
  3. 1403

    The impact of artificial intelligence on research efficiency by Mitra Madanchian, Hamed Taherdoost

    Published 2025-06-01
    “…From literature search to data analysis, to design experiments and manuscript writing, AI-powered tools using robotics, machine learning (ML), and natural language processing (NLP) go a long way in facilitating easy research. …”
    Get full text
    Article
  4. 1404

    Artificial Intelligence in Thoracic Surgery: Transforming Diagnostics, Treatment, and Patient Outcomes by Sara Lopes, Miguel Mascarenhas, João Fonseca, Maria Gabriela O. Fernandes, Adelino F. Leite-Moreira

    Published 2025-07-01
    “…AI-based tools can be employed in medicine, and by extracting useful information from big data, they allow for the early diagnosis of diseases like lung cancer. …”
    Get full text
    Article
  5. 1405

    Edge-Assisted Label-Flipping Attack Detection in Federated Learning by Nourah S. AlOtaibi, Muhamad Felemban, Sajjad Mahmood

    Published 2024-01-01
    “…Federated Learning (FL) has transformed machine learning by facilitating decentralized, privacy-focused data processing. Despite its advantages, FL remains vulnerable to data poisoning attacks, particularly Label-Flipping Attacks (LFA). …”
    Get full text
    Article
  6. 1406

    How do we measure the costs, benefits, and harms of sharing data from biomedical studies? A protocol for a scoping review [version 2; peer review: 2 approved] by Lauren Maxwell, Ankur Krishnan, Priya Shreedhar

    Published 2025-01-01
    “…In this scoping review, we will identify and summarize existing evidence on the positive and negative impacts and costs of data sharing and how they are measured. Methods and analysis Eligible studies will report on qualitative or quantitative approaches for measuring the cost of data sharing or its impact on participant privacy, individual or public health, researcher’s careers, clinical or public health practice, or research or development. …”
    Get full text
    Article
  7. 1407

    Revolutionizing Education: Harnessing Machine Learning and Deep Learning for Digital Examination Transformation by Shilpi Gautam, Asadi Srinivasulu

    Published 2023-12-01
    “…Furthermore, substantial concerns revolve around data security and privacy. The digital examination process entails the collection and secure storage of sensitive student data, raising worries about potential data security breaches and violations of privacy. …”
    Get full text
    Article
  8. 1408

    Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence by Jia LIU

    Published 2024-07-01
    “…Technical risks include data security vulnerabilities and model bias, while ethical risks focus on the issues surrounding user privacy, misinformation, and intellectual property rights. …”
    Get full text
    Article
  9. 1409

    CogTrack: A Proof of Concept for Cognition Tracker by Yesoda Bhargava, Kanthi Kumar Kattupalli, Veeky Baths

    Published 2024-01-01
    “…Additionally, we discuss how CogTrack may be advanced in the future and reflect on critical issues related to data privacy, confidentiality, ethics, scalability, and socio-medical factors which influence CogTrack adoption and acceptability. …”
    Get full text
    Article
  10. 1410
  11. 1411

    Enhancing retinal disease diagnosis through AI: Evaluating performance, ethical considerations, and clinical implementation by Maryam Fatima, Praveen Pachauri, Wasim Akram, Mohd Parvez, Shadab Ahmad, Zeinebou Yahya

    Published 2024-09-01
    “…However, several studies highlighted concerns about algorithmic bias, data privacy, and the need for diverse and representative datasets to ensure generalizability across different populations. …”
    Get full text
    Article
  12. 1412

    Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks by Salah T. Alshammari, Muna Al-Razgan, Taha Alfakih, Khalid A. AlGhamdi

    Published 2024-01-01
    “…A significant concern in the field of cloud computing is the security and confidentiality of data. A cryptographic access control technique can be used to guarantee data privacy, which prevents unauthorized access and allows only authorized users to access the data. …”
    Get full text
    Article
  13. 1413

    Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ by Stefanus Eko Prasetyo, Haeruddin, Tiara

    Published 2024-12-01
    “… This study aims to analyze and evaluate the vulnerability of Insecure Direct Object Reference (IDOR) in the thesis registration web application at XYZ University, as well as to provide improvement recommendations to enhance the security of students' personal data. The IDOR vulnerability allows unauthorized access to students' personal documents, which can jeopardize privacy and information security. …”
    Get full text
    Article
  14. 1414

    Tree-to-Me: Standards-Driven Traceability for Farm-Level Visibility by Ya Cho, Arbind Agrahari Baniya, Kieran Murphy

    Published 2025-04-01
    “…These systems also fail to standardise and integrate diverse data sources, ensure data privacy, and scale effectively to meet the demands of modern agriculture. …”
    Get full text
    Article
  15. 1415

    SimProx: A Similarity-Based Aggregation in Federated Learning With Client Weight Optimization by Ayoub El-Niss, Ahmad Alzu'Bi, Abdelrahman Abuarqoub, Mohammad Hammoudeh, Ammar Muthanna

    Published 2024-01-01
    “…Federated Learning (FL) enables decentralized training of machine learning models across multiple clients, preserving data privacy by aggregating locally trained models without sharing raw data. …”
    Get full text
    Article
  16. 1416
  17. 1417

    The relevance of implementing the employee digital profile as an element of the employer’s HR policy by O. V. Shcherbakova

    Published 2025-06-01
    “…The most important risk today is the increasing release of labor force and mass cuts of jobs requiring average qualifications, as well as dismissal of employees due to failure to pass tests because of the lack of skills in digital tools.The purpose of the study was to substantiate the urgent character of the implementation of digital profile programs as a part of the employer's personnel policy to achieve the objectives set in the National Security Strategy of the Russian Federation dated 2021.The methodology of comprehensive research, including methods of document analysis, comparative analysis, secondary use of sociological and economic data were used.Main results. …”
    Get full text
    Article
  18. 1418

    Tabular transformer generative adversarial network for heterogeneous distribution in healthcare by Ha Ye Jin Kang, Minsam Ko, Kwang Sun Ryu

    Published 2025-03-01
    “…However, privacy concerns have hindered their widespread use. …”
    Get full text
    Article
  19. 1419

    Crypto management: a novel organizational management model based on blockchain by Juanjuan LI, Ge WANG, Xiao WANG, Junqing LI, Yong YUAN, Fei-Yue WANG

    Published 2022-06-01
    “…Aim to deal with the problem of data, trust and timeliness asymmetry faced by modern organizational management from the root, a novel organizational management model towards Web 3.0 namely crypto management was proposed.It was enabled by blockchain technology and smart contracts based on it, supported by the federated data, organized in the form of DAO (decentralized autonomous organization), and driven by the incentive mechanism with NFT (non-fungible token) as the core.The primary goal of crypto management was to realize trustable, reliable and usable real-time management decision-making under the premise of data security and privacy protection.The framework of crypto management was formulated, its core components and implementation mode were discussed, and its operation process using the example of personnel performance management was also introduced.Towards the end, the potential future works in this emerging new area were discussed.…”
    Get full text
    Article
  20. 1420

    The Impact of Artificial Intelligence on Personalized Learning in Higher Education: A Systematic Review by Carlos Merino-Campos

    Published 2025-03-01
    “…The risk of bias was assessed using a standardized ranking system. This systematic review follows the PRISMA guidelines to ensure transparency in study selection, data extraction, and synthesis. …”
    Get full text
    Article