Suggested Topics within your search.
Suggested Topics within your search.
-
1481
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
Published 2025-08-01“…Once these data are leaked, the privacy and security of users will be threatened. …”
Get full text
Article -
1482
Facebook as a Digital Public Sphere: Processes of Colonization and Emancipation
Published 2012-01-01“…The analysis focuses on Facebook’s communicative-structural contexts, in particular from the viewpoint of user terms, user manoeuvre, privacy/data use policy, and ownership and use of uploaded material. …”
Get full text
Article -
1483
Prevention and Detection Methods for Enhancing Security in an RFID System
Published 2012-08-01“…Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy threats due to computational constraint. This paper proposes the use of both prevention and detection techniques to solve the security and privacy issues. …”
Get full text
Article -
1484
Understanding the Semantic System by Tehrani Residents from a Private Spacial Perception
Published 2022-11-01“…The data of this study was collected through in-depth interviews and theoritical-purposeful sampling method with forty-two related residents and for analyzing data, five methods of open coding and recognition of concepts, development of concepts in terms of dimensions and characteristics, data analysis using grounded theory, inserting the process into the analysis, and integration of categories were used. …”
Get full text
Article -
1485
Problematic aspects of IoT cybersecurity standardisation
Published 2025-04-01“…There are also issues of user protection, security and privacy. The cybersecurity and privacy of IoT consumers can be negatively affected by the development of these technologies if vulnerable devices and their environments are used. …”
Get full text
Article -
1486
THE IMPACT OF DIGITAL INNOVATION ON E-COMMERCE YOUNG CUSTOMER SATISFACTION IN VIETNAM
Published 2025-01-01“…It investigates key factors influencing user satisfaction employing frameworks such as the Uses and Gratifications Theory (U&G), Technology Acceptance Model (TAM), and the Unified Theory of Acceptance and Use of Technology (UTAUT), including utilitarian, hedonic, technological, and social gratifications, privacy risk, and social influence. …”
Get full text
Article -
1487
Strengthening network DDOS attack detection in heterogeneous IoT environment with federated XAI learning approach
Published 2024-10-01“…Our approach is thus to use federated learning models that are to be trained on distributed and dissimilar sources of data without compromising on the privacy aspect. …”
Get full text
Article -
1488
Navigating Ethical Dilemmas Of Generative AI In Medical Writing
Published 2024-10-01“…Additionally, AI chatbots are trained using data that is available on the web, where misinformation itself is abundant. …”
Get full text
Article -
1489
Recommendations for reporting regression-based norms and the development of free-access tools to implement them in practice.
Published 2025-01-01“…Following our recommendations, any user can access the underlying models while data privacy is maintained. This approach ensures broad accessibility and practical application of norms, allowing other researchers to accurately interpret their individual data against such norms.…”
Get full text
Article -
1490
PENGARUH KEPERCAYAAN DAN KEPUASAN TERHADAP LOYALITAS PELANGGAN E- COMMERCE
Published 2018-03-01“…Samples used only 200. Structural Equation Model (SEM) was used to analyze the data. …”
Get full text
Article -
1491
Verso uno sviluppo tecnologicamente sostenibile. Strategie per un uso etico delle piattaforme digitali compatibile con gli SDGs
Published 2020-05-01“…Second digital platforms have played the role of big data tool: a key element of Agenda 2030 instrument is the opportunities of big data used to achieve the intended objectives. …”
Get full text
Article -
1492
A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs
Published 2024-09-01“…This transition applies a decentralized ledger mechanism to ensure correctness, reliability, accuracy, and security against various known attacks. The use of Layer 2 DLTs in our framework enhances key management, trust distribution, and data privacy, offering cost and speed advantages over Layer 1 DLTs, thereby enabling secure vehicle-to-everything (V2X) communication. …”
Get full text
Article -
1493
Legal Considerations in Machine-Assisted Decision-Making: Planning and Building as a Case Study
Published 2023-09-01“…It examines issues of transparency, algorithmic bias, privacy, data and intellectual property rights, as well as the implications of the use of generative Artificial Intelligence (AI). …”
Get full text
Article -
1494
Machine Learning in Ambient Assisted Living for Enhanced Elderly Healthcare: A Systematic Literature Review
Published 2025-01-01“…Issues around data privacy, security breaches, and the need for robust privacy-preserving mechanisms are recurrent themes. …”
Get full text
Article -
1495
Transforming health care with artificial intelligence: Regulations, challenges, and future directions
Published 2025-01-01“…Different regulations, such as the Food and Drug Administration (FDA), General Data Protection Regulation (GDPR), European Union AI Act, and Health Insurance Portability and Accountability Act (HIPAA), played a crucial role in balancing the benefits and risks of AI, ensuring the privacy of patients’ sensitive data, ethical use of AI, accountability, transparency, and optimized patient care. …”
Get full text
Article -
1496
Telemedicine for HIV care: a cross-sectional survey of people living with HIV receiving care at two federally qualified health centers in Los Angeles during a mature phase of the C...
Published 2024-12-01“…Most had consistent access to privacy (88%, n = 239), and those without privacy noted this as a barrier to the use of telemedicine. …”
Get full text
Article -
1497
Research on automatic processing system of financial information in colleges and universities based on NLP-KG fusion algorithm
Published 2025-12-01“…The existing mechanisms ensure security and privacy from multiple aspects: access control (using multi-factor identity authentication and role-based permission management), data encryption (SSL/TLS encryption protocol and AES algorithms are used for transmission and storage, respectively), data backup and recovery (regular backup, off-site storage, and recovery drills), audit and monitoring (detailed recording of operations and real-time monitoring of network traffic, etc.). …”
Get full text
Article -
1498
Assessing medical students’ attitudes, performance, and usage of ChatGPT in Jeddah, Saudi Arabia
Published 2025-07-01“…Associations were observed between ChatGPT usage and students’ academic standing and attitudes toward AI. While the ease of use was appreciated, concerns regarding privacy, ethical implications, and data security were also prominent, reflecting global trends. …”
Get full text
Article -
1499
Impact of Modern Technology on Social Research Methods in Educational Contexts
Published 2025-02-01“…The findings reveal that frequent use of technology significantly enhances research efficiency and data accuracy, providing educational researchers with expanded data collection capabilities and improved analytical precision. …”
Get full text
Article -
1500
Towards digital health: Integrating federated learning and crowdsensing through the Contigo app
Published 2024-12-01“…This digitization supposes a challenge from the point of view of privacy and the treatment of sensitive personal data while providing non-intrusive and easy-to-use digital mechanisms. …”
Get full text
Article