Showing 1,461 - 1,480 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.22s Refine Results
  1. 1461

    Advancement in public health through machine learning: a narrative review of opportunities and ethical considerations by Sumit Singh Dhanda, Deepak Panwar, Chia-Chen Lin, Tarun Kumar Sharma, Deependra Rastogi, Shantanu Bindewari, Anand Singh, Yung-Hui Li, Neha Agarwal, Saurabh Agarwal

    Published 2025-07-01
    “…Ethically, this review surfaces critical issues, including algorithmic bias, data privacy concerns in mental health analytics, and the interpretability of black-box models used in outbreak surveillance. …”
    Get full text
    Article
  2. 1462

    Confidential Intelligent Traffic Light Control System: Prevention of Unauthorized Traceability by Ahmad Audat, Maram Bani Younes, Marah Yahia, Said Ghoul

    Published 2025-06-01
    “…The technology of vehicular networks has been widely used to gather the traffic characteristics of competing traffic flows at signalized road intersections. …”
    Get full text
    Article
  3. 1463

    Hierarchical Service Composition via Blockchain-enabled Federated Learning by Li Huang, Lu Zhao, Yansong Liu, Yao Zhao

    Published 2024-08-01
    “…The first selection layer enables each CSP to efficiently select services using a pre-trained model, while the second selection layer employs a blockchain-based QoS-aware mechanism for the final composition result, addressing privacy concerns. …”
    Get full text
    Article
  4. 1464

    Integrating blockchain technology for secure access control in smart home environments: A comprehensive review by Tariq Bishtawi, Mohammad Shehab, Reem Alzubi, Ayman Ghaben, Suaad M. Alenzi

    Published 2025-01-01
    “…The decentralized and tamper-resistant nature of blockchain technology effectively solves important problems, including device authentication, data integrity, and access management, through the use of cryptography and distributed ledgers. …”
    Get full text
    Article
  5. 1465

    Digital Technologies and Trade Facilitation in Ethiopia: A Mixed-Methods Analysis of Blockchain, AI, and IoT Adoption by Chekole Sete Demeke

    Published 2025-06-01
    “…Specifically, survey data revealed that only 10% of firms currently use AI, despite 67% recognizing its value for fraud detection. …”
    Get full text
    Article
  6. 1466

    SAFERIDES: Application of decentralized control edge-computing to ridesharing monitoring services by Samaa Elnagar, Kweku Muata Osei Bryson, Manoj Thomas

    Published 2024-11-01
    “…The model also limits data transfer to the edge to avoid security and privacy risks. …”
    Get full text
    Article
  7. 1467
  8. 1468
  9. 1469
  10. 1470
  11. 1471

    The Impact of Operating System on Bandwidth in Open VPN Technology by Baghdad Science Journal

    Published 2016-03-01
    “…The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. …”
    Get full text
    Article
  12. 1472

    An empirical study on the usage behavior of mobile health management service systems for flight attendants in the digital Age by Yuting Liu, Yuting Liu, Haiyan Li

    Published 2025-04-01
    “…This study deeply explores the use behavior and influencing factors of mobile health management service systems for flight attendants in the context of the "Digital age".MethodsThe study mainly adopted the questionnaire survey method, used SPSS24.0 and AMOS24.0 software for data analysis, and used statistical methods such as factor analysis, regression analysis, and path analysis to verify the effectiveness of the model and explore the relationship between key variables.Results(1) The usage rate of the health management service system among flight attendants is not as high as expected, but the use rate of sports health monitoring applications reached 66.5%, and the daily frequency of use was as high as 25.52%, (2) Perceived ease of use and perceived usefulness have a positive and significant impact on intention to use, (3) Privacy concerns have a positive impact on intention to use Significant negative impact.ConclusionThe study points out that ease of use and usefulness are key factors in attracting flight attendants to use mobile health management service systems. …”
    Get full text
    Article
  13. 1473

    Patient and wearable device authentication utilizing attribute-based credentials and permissioned blockchains in smart homes by Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo, Brighton Mukorera

    Published 2023-06-01
    “…The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. …”
    Get full text
    Article
  14. 1474

    تطبیقات الهواتف الذکیة والخصوصیة المعلوماتیة : دراسة تحلیلیة مقارنة by د. حسام الدین محمد رفعت

    Published 2020-09-01
    “…In recent years there has been alegislative response at different levels for the sake of this protection, and thejudiciary has followed it with a remarkable response in favour of the jurisprudenceof the private life of individuals that is of paramount importance to both theindividual and the community.This coincided with the increasing vulnerability of the right to privacy tothe digital environment through e-mail and chat sites Networks or communicationsites, which have become a hoot of the modern era and a wide electronic space,in which we put all the references about us and our lives, as well as our privacy.The purpose of this study is to diagnose the reality of the work of Google Playapplications that work on the smart phone environment, especially with regard togathering information or allowing access to personal data and users’ information,by identifying the nature of data and information collected or allowed access to,monitoring the nature of the risks of using these applications.To do so, the researcher studied and analyzed licensing agreements forthe use of 80 applications of smart phones in areas commonly used in the digitalenvironment, such as social networking applications, Online banks Applications,antivirus applications, web search applications, news and press applications,educational applications, web applications, travel and tourism applications. …”
    Get full text
    Article
  15. 1475

    Exploring Smart Health Wearable Adoption Among Singaporean Older Adults Based on Self-Determination Theory: Web-Based Survey Study by Hyunjin Kang, Tingting Yang, Nazira Banu, Sheryl Wei Ting Ng, Jeong Kyu Lee

    Published 2025-03-01
    “… Abstract BackgroundSmart health wearables offer significant benefits for older adults, enabling seamless health monitoring and personalized suggestions based on real-time data. Promoting adoption and sustained use among older adults is essential to empower autonomous health management, leading to better health outcomes, improved quality of life, and reduced strain on health care systems. …”
    Get full text
    Article
  16. 1476

    Federated Learning of Jamming Classifiers: From Global to Personalized Models by Peng Wu, Helena Calatrava, Tales Imbiriba, Pau Closas

    Published 2025-03-01
    “…Given the ubiquity of these signals, jamming mitigation and localization techniques are of crucial importance, and these techniques can be enhanced with accurate jammer classification methods. Although data-driven models have proven useful for detecting jamming signals, training these models using crowdsourced data requires sharing private data and may therefore compromise user privacy. …”
    Get full text
    Article
  17. 1477

    UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities by Syed M. Aqleem Abbas, Muazzam A. Khan Khattak, Wadii Boulila, Anis Kouba, M. Shahbaz Khan, Jawad Ahmad

    Published 2024-01-01
    “…Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. …”
    Get full text
    Article
  18. 1478

    An investigation of factors impacting the acceptance of telehealth in rural India by Rashmy Moray

    Published 2025-07-01
    “…The purposive sampling technique is used to collect the primary data through a structured questionnaire from rural participants and the data was analysed by employing structural equation method (SEM). …”
    Get full text
    Article
  19. 1479

    Design Hybrid Algorithm for Video Encoding by Ghada Tahir Qasim, Toqa Zuhair, Sahar Saleh, Amena Emad

    Published 2013-12-01
    “…Due to the fact that all the studies and researches that have been found were focused on the use of some  of the ways of encrypting the texts like data encryption standard (DES) in encrypting video files ,and the fact that all the weakness points were related to the calculations, so in this research, many of these methods were connected with modification required to reduce the calculations and to obtain the speed of encrypting video files and give them a high privacy. …”
    Get full text
    Article
  20. 1480

    Implementasi Teknologi Blockchain dalam Digital Marketing by Achmad Solechan, Rohmad Abidin

    Published 2024-12-01
    “…Some respondents were concerned about their privacy on the use of digital marketing, especially the abuse of their privacy related to user data. …”
    Get full text
    Article