Showing 1,481 - 1,500 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.18s Refine Results
  1. 1481

    An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography by Zeyu Sun, Yan Wang

    Published 2025-08-01
    “…Once these data are leaked, the privacy and security of users will be threatened. …”
    Get full text
    Article
  2. 1482

    Facebook as a Digital Public Sphere: Processes of Colonization and Emancipation by Bjarki Valtysson

    Published 2012-01-01
    “…The analysis focuses on Facebook’s communicative-structural contexts, in particular from the viewpoint of user terms, user manoeuvre, privacy/data use policy, and ownership and use of uploaded material. …”
    Get full text
    Article
  3. 1483

    Prevention and Detection Methods for Enhancing Security in an RFID System by Jing Huey Khor, Widad Ismail, Mohammad Ghulam Rahman

    Published 2012-08-01
    “…Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy threats due to computational constraint. This paper proposes the use of both prevention and detection techniques to solve the security and privacy issues. …”
    Get full text
    Article
  4. 1484

    Understanding the Semantic System by Tehrani Residents from a Private Spacial Perception by Seyed Hasan Hosseini, shahla teymournejad

    Published 2022-11-01
    “…The data of this study was collected through in-depth interviews and theoritical-purposeful sampling method with forty-two related residents and for analyzing data, five methods of open coding and recognition of concepts, development of concepts in terms of dimensions and characteristics, data analysis using grounded theory, inserting the process into the analysis, and integration of categories were used. …”
    Get full text
    Article
  5. 1485

    Problematic aspects of IoT cybersecurity standardisation by P. S. Klimushyn

    Published 2025-04-01
    “…There are also issues of user protection, security and privacy. The cybersecurity and privacy of IoT consumers can be negatively affected by the development of these technologies if vulnerable devices and their environments are used. …”
    Get full text
    Article
  6. 1486

    THE IMPACT OF DIGITAL INNOVATION ON E-COMMERCE YOUNG CUSTOMER SATISFACTION IN VIETNAM by Minh-Hoa Le, Que-Nhu Duong, Hieu-Nghia Nguyen, Quynh-Nhu Au, Nhat-Nam Pham

    Published 2025-01-01
    “…It investigates key factors influencing user satisfaction employing frameworks such as the Uses and Gratifications Theory (U&G), Technology Acceptance Model (TAM), and the Unified Theory of Acceptance and Use of Technology (UTAUT), including utilitarian, hedonic, technological, and social gratifications, privacy risk, and social influence. …”
    Get full text
    Article
  7. 1487

    Strengthening network DDOS attack detection in heterogeneous IoT environment with federated XAI learning approach by Ahmad Almadhor, Ali Altalbe, Imen Bouazzi, Abdullah Al Hejaili, Natalia Kryvinska

    Published 2024-10-01
    “…Our approach is thus to use federated learning models that are to be trained on distributed and dissimilar sources of data without compromising on the privacy aspect. …”
    Get full text
    Article
  8. 1488

    Navigating Ethical Dilemmas Of Generative AI In Medical Writing by Qurrat Ulain Hamdan, Waleed Umar, Mahnoor Hasan

    Published 2024-10-01
    “…Additionally, AI chatbots are trained using data that is available on the web, where misinformation itself is abundant. …”
    Get full text
    Article
  9. 1489

    Recommendations for reporting regression-based norms and the development of free-access tools to implement them in practice. by Rok Blagus, Bojan Leskošek, Francisco B Ortega, Grant Tomkinson, Gregor Jurak

    Published 2025-01-01
    “…Following our recommendations, any user can access the underlying models while data privacy is maintained. This approach ensures broad accessibility and practical application of norms, allowing other researchers to accurately interpret their individual data against such norms.…”
    Get full text
    Article
  10. 1490

    PENGARUH KEPERCAYAAN DAN KEPUASAN TERHADAP LOYALITAS PELANGGAN E- COMMERCE by Eka Satryawati

    Published 2018-03-01
    “…Samples used only 200. Structural Equation Model (SEM) was used to analyze the data. …”
    Get full text
    Article
  11. 1491

    Verso uno sviluppo tecnologicamente sostenibile. Strategie per un uso etico delle piattaforme digitali compatibile con gli SDGs by Davide Bennato

    Published 2020-05-01
    “…Second digital platforms have played the role of big data tool: a key element of Agenda 2030 instrument is the opportunities of big data used to achieve the intended objectives. …”
    Get full text
    Article
  12. 1492

    A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs by Haitham Y. Adarbah, Mehmet Sabir Kiraz, Suleyman Kardas, Ali H. Al-Bayatti, Hilal M. Y. Al-Bayatti

    Published 2024-09-01
    “…This transition applies a decentralized ledger mechanism to ensure correctness, reliability, accuracy, and security against various known attacks. The use of Layer 2 DLTs in our framework enhances key management, trust distribution, and data privacy, offering cost and speed advantages over Layer 1 DLTs, thereby enabling secure vehicle-to-everything (V2X) communication. …”
    Get full text
    Article
  13. 1493

    Legal Considerations in Machine-Assisted Decision-Making: Planning and Building as a Case Study by Yee-Fui Ng, Eric Windholz, James Moutsias

    Published 2023-09-01
    “…It examines issues of transparency, algorithmic bias, privacy, data and intellectual property rights, as well as the implications of the use of generative Artificial Intelligence (AI). …”
    Get full text
    Article
  14. 1494

    Machine Learning in Ambient Assisted Living for Enhanced Elderly Healthcare: A Systematic Literature Review by Aabid A. Mir, Ahmad S. Khalid, Shahrulniza Musa, Mohammad Faizal Ahmad Fauzi, Normy Norfiza Abdul Razak, Tong Boon Tang

    Published 2025-01-01
    “…Issues around data privacy, security breaches, and the need for robust privacy-preserving mechanisms are recurrent themes. …”
    Get full text
    Article
  15. 1495

    Transforming health care with artificial intelligence: Regulations, challenges, and future directions by Jalees Razavi, Hamza O. Dhafar, Ahmed S. BaHammam

    Published 2025-01-01
    “…Different regulations, such as the Food and Drug Administration (FDA), General Data Protection Regulation (GDPR), European Union AI Act, and Health Insurance Portability and Accountability Act (HIPAA), played a crucial role in balancing the benefits and risks of AI, ensuring the privacy of patients’ sensitive data, ethical use of AI, accountability, transparency, and optimized patient care. …”
    Get full text
    Article
  16. 1496
  17. 1497

    Research on automatic processing system of financial information in colleges and universities based on NLP-KG fusion algorithm by Jin Lei, Mengke Wei, Yiwen She, Weixia Wang

    Published 2025-12-01
    “…The existing mechanisms ensure security and privacy from multiple aspects: access control (using multi-factor identity authentication and role-based permission management), data encryption (SSL/TLS encryption protocol and AES algorithms are used for transmission and storage, respectively), data backup and recovery (regular backup, off-site storage, and recovery drills), audit and monitoring (detailed recording of operations and real-time monitoring of network traffic, etc.). …”
    Get full text
    Article
  18. 1498

    Assessing medical students’ attitudes, performance, and usage of ChatGPT in Jeddah, Saudi Arabia by Dalia Alammari, Dalia Alammari, Elaf Alamari, Rawan Alamri, Raneem Alharbi, Jumana Felimban, Jana Aljohani

    Published 2025-07-01
    “…Associations were observed between ChatGPT usage and students’ academic standing and attitudes toward AI. While the ease of use was appreciated, concerns regarding privacy, ethical implications, and data security were also prominent, reflecting global trends. …”
    Get full text
    Article
  19. 1499

    Impact of Modern Technology on Social Research Methods in Educational Contexts by Horia Aljounid

    Published 2025-02-01
    “…The findings reveal that frequent use of technology significantly enhances research efficiency and data accuracy, providing educational researchers with expanded data collection capabilities and improved analytical precision. …”
    Get full text
    Article
  20. 1500

    Towards digital health: Integrating federated learning and crowdsensing through the Contigo app by Daniel Flores-Martin, Sergio Laso, Javier Berrocal, Juan M. Murillo

    Published 2024-12-01
    “…This digitization supposes a challenge from the point of view of privacy and the treatment of sensitive personal data while providing non-intrusive and easy-to-use digital mechanisms. …”
    Get full text
    Article