Showing 1,541 - 1,560 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.20s Refine Results
  1. 1541

    Authenticated Multi-Party Quantum Private Set Intersection with Single Particles by Gong-De Guo, Li-Qin Zheng, Kai Yu, Song Lin

    Published 2025-06-01
    “…With the increasing demand for privacy protection of user data, privacy set intersection has been widely used in privacy computing and other fields. …”
    Get full text
    Article
  2. 1542

    Evaluating the Quality of Psychotherapy Conversational Agents: Framework Development and Cross-Sectional Study by Kunmi Sobowale, Daniel Kevin Humphrey

    Published 2025-07-01
    “… Abstract BackgroundDespite potential risks, artificial intelligence–based chatbots that simulate psychotherapy are becoming more widely available and frequently used by the general public. A comprehensive way of evaluating the quality of these chatbots is needed. …”
    Get full text
    Article
  3. 1543

    The impact of information technology applications on the quality of life of disabled older adults in nursing homes in China: a qualitative study by Hong Zhang, Xiaoyan Liao, Shuang Liang, Lifang Tong, Jun Shen, Bin Peng, Lin Wu, Lu Gao, Qianying Jia, Liu Ren, Lanyue Luo, Yixin Wang, Xiaoli Zhang

    Published 2025-04-01
    “…Semi-structured interviews were conducted with 14 disabled older adults, and the data were analyzed using Van Manen’s phenomenology of practice method.ResultsFour main themes and 16 sub-themes were identified: Physical Health and Functional Capacity: subjective health perception, physical functioning, chronic disease management, sleep quality, and nutritional status; Psychological Wellbeing and Emotional Support: attitudes toward aging, negative emotions, emotional companionship, and sense of meaning in life; Social Relationships and Social Engagement: interactions with family and friends, participation in social activities, social roles, and social support; and Environmental Adaptation and Digital Challenges: safety and comfort of the living environment, ease of independent mobility, the ‘digital divide’, and protection of personal privacy and data.ConclusionThe application of information technology in nursing homes in China has partially resolved longstanding issues in traditional older adults care, such as inaccurate health management, lack of personalized and diverse services, and inefficient resource allocation. …”
    Get full text
    Article
  4. 1544

    A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis by Salman Muneer, Umer Farooq, Atifa Athar, Muhammad Ahsan Raza, Taher M. Ghazal, Shadman Sakib

    Published 2024-01-01
    “…The selection of an appropriate approach depends on the specific use case, and this work provides insights into which method is best suited for various network sizes, data availability, privacy, and security concerns, thus aiding practitioners in making informed decisions for their ID needs.…”
    Get full text
    Article
  5. 1545

    Exploring the Perceptions of Voice-Assisted Technology as a Tool for Speech and Voice Difficulties: Focus Group Study Among People With Parkinson Disease and Their Carers by Jodie Mills, Orla Duffy, Katy Pedlow, George Kernohan

    Published 2025-07-01
    “…However, attention must be given to users’ privacy concerns and frustrations with devices before VAT can used as a tool in SLT. …”
    Get full text
    Article
  6. 1546

    Customer Continuance Usage of Digital Banking: A Systematic Review of Influencing Factors by Cathrine Abigael Christy, Lisana Lisana

    Published 2025-06-01
    “…The Preferred Reporting Items for Systematic Review (PRISMA) Framework guided the review process, revealing 56 variables used in related models. Among these, satisfaction, privacy and security, user experience, ease of use, and customer service and support were the most frequently significant factors influencing continuance usage. …”
    Get full text
    Article
  7. 1547

    AI-Powered Object Detection in Radiology: Current Models, Challenges, and Future Direction by Abdussalam Elhanashi, Sergio Saponara, Qinghe Zheng, Nawal Almutairi, Yashbir Singh, Shiba Kuanar, Farzana Ali, Orhan Unal, Shahriar Faghani

    Published 2025-04-01
    “…Moreover, the need for strong applicable models across different populations and imaging modalities are addressed. The importance of privacy and ethics in general data use as well as safety and regulations for healthcare data are emphasized. …”
    Get full text
    Article
  8. 1548

    Efficient encrypted image retrieval in IoT-cloud with multi-user authentication by Mustafa A Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Ayad Ibrahim, Zaid Alaa Hussien, Keyan Abdul-Aziz Mutlaq, Mohammed Abdulridha Hussain

    Published 2018-02-01
    “…Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. …”
    Get full text
    Article
  9. 1549

    Personalizing the Marketing with Artificial Intelligence (AI) by Rozhko Viktor I., Pletnova Yelyzaveta S.

    Published 2024-12-01
    “…One of the biggest risks is the issue of data privacy. For personalization and targeting, it is necessary to collect a large amount of information about consumers, which can raise concerns about violating their privacy. …”
    Get full text
    Article
  10. 1550

    Secure latent Dirichlet allocation by Thijs Veugen, Thijs Veugen, Vincent Dunning, Michiel Marcus, Bart Kamphorst

    Published 2025-07-01
    “…We present a novel, decentralized approach to train an LDA model securely without having to share any information about the content of the documents. We preserve the privacy of the individual parties using a combination of privacy enhancing technologies. …”
    Get full text
    Article
  11. 1551
  12. 1552

    Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components by Anastasios Fragopoulos, John Gialelis, Dimitrios Serpanos

    Published 2009-01-01
    “…In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.…”
    Get full text
    Article
  13. 1553

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى by د. مها أحمد ابراهیم محمد

    Published 2018-07-01
    “…The studyalso comes up with the following results: positively, individuals of the academiccommunity succeeded at protecting their personal data automatically and at ahigh rate. Selection of fake names constitutes half of the academic community (53.2%), who use social networks and this is explored by their deny of personaldata or by writing fake personal data. …”
    Get full text
    Article
  14. 1554

    Predictors of fairness assessment for social media screening in employee selection by Alicja Balcerak, Jacek Woźniak, Alexandra Zbuchea

    Published 2023-01-01
    “…Multiple linear regression with backward elimination was used to determine the predictors of perceived justice of Facebook and LinkedIn screening in the selection process. …”
    Get full text
    Article
  15. 1555

    The Effect of Guidance and Counseling Services on Students’ Academic Performance in Selected Secondary Schools in Kajara County, Ntungamo District. by Nuncy, Twikirize

    Published 2020
    “…Questionnaires and Interview Guides were used in collecting data. From a total population of 1482, the sample size of 306 respondents was generated which included head teachers, parents, teachers and learners in Kajara County. …”
    Get full text
    Thesis
  16. 1556

    Generative pre-trained transformers: ‘Ctrl+alt+create’ or ‘ctrl+alt+delete’ for IT education? by Samer Abaddi

    Published 2025-06-01
    “…These characteristics are perceived customization, simulations, usefulness, ease of use, risks and complexity. Design/methodology/approach – Using a quantitative research design, this study analyzes data from a survey of IT undergraduate students interacting with GPT-based coding tools and simulations (Three filtration steps). …”
    Get full text
    Article
  17. 1557

    Online Purchasing Model for PwD (People with Disabilities) Consumers: Pre and Post Disability Behaviors by Sefa Emre Yilmazel

    Published 2025-06-01
    “…In this regard, the effects of the variables perceived ease of use, perceived usefulness, peer communication, security concern, privacy concern and physical disabilities on consumers’ purchasing intention and subsequent purchasing behavior through subjective norms, attitude and behavioral control were investigated with pre- and post-disability data. …”
    Get full text
    Article
  18. 1558

    Bridging the Gap: An Algorithmic Framework for Vehicular Crowdsensing by Luis G. Jaimes, Craig White, Paniz Abedin

    Published 2024-11-01
    “…Vehicular crowdsensing leverages vehicles equipped with sensors to gather and transmit data to address several urban challenges. Despite its potential, VCS faces issues with user engagement due to inadequate incentives and privacy concerns. …”
    Get full text
    Article
  19. 1559

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. EdgeGuard uses a privacy-preserving federated learning approach to keep sensitive medical data local and to promote collaborative model training, solving essential issues. …”
    Get full text
    Article
  20. 1560

    Balancing tech and humanity by Linda Cottone

    Published 2025-06-01
    “…While technology can enhance efficiency, as shown in Lebanon's response to the Tripoli bomb attack, it must adhere to international legal standards, especially privacy protections in the ICCPR and UDHR. The use of AI in identification processes raises concerns about wrongful identification, privacy breaches, and discrimination, especially when sensitive data is processed without human oversight. …”
    Get full text
    Article