Suggested Topics within your search.
Suggested Topics within your search.
-
1541
Authenticated Multi-Party Quantum Private Set Intersection with Single Particles
Published 2025-06-01“…With the increasing demand for privacy protection of user data, privacy set intersection has been widely used in privacy computing and other fields. …”
Get full text
Article -
1542
Evaluating the Quality of Psychotherapy Conversational Agents: Framework Development and Cross-Sectional Study
Published 2025-07-01“… Abstract BackgroundDespite potential risks, artificial intelligence–based chatbots that simulate psychotherapy are becoming more widely available and frequently used by the general public. A comprehensive way of evaluating the quality of these chatbots is needed. …”
Get full text
Article -
1543
The impact of information technology applications on the quality of life of disabled older adults in nursing homes in China: a qualitative study
Published 2025-04-01“…Semi-structured interviews were conducted with 14 disabled older adults, and the data were analyzed using Van Manen’s phenomenology of practice method.ResultsFour main themes and 16 sub-themes were identified: Physical Health and Functional Capacity: subjective health perception, physical functioning, chronic disease management, sleep quality, and nutritional status; Psychological Wellbeing and Emotional Support: attitudes toward aging, negative emotions, emotional companionship, and sense of meaning in life; Social Relationships and Social Engagement: interactions with family and friends, participation in social activities, social roles, and social support; and Environmental Adaptation and Digital Challenges: safety and comfort of the living environment, ease of independent mobility, the ‘digital divide’, and protection of personal privacy and data.ConclusionThe application of information technology in nursing homes in China has partially resolved longstanding issues in traditional older adults care, such as inaccurate health management, lack of personalized and diverse services, and inefficient resource allocation. …”
Get full text
Article -
1544
A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Published 2024-01-01“…The selection of an appropriate approach depends on the specific use case, and this work provides insights into which method is best suited for various network sizes, data availability, privacy, and security concerns, thus aiding practitioners in making informed decisions for their ID needs.…”
Get full text
Article -
1545
Exploring the Perceptions of Voice-Assisted Technology as a Tool for Speech and Voice Difficulties: Focus Group Study Among People With Parkinson Disease and Their Carers
Published 2025-07-01“…However, attention must be given to users’ privacy concerns and frustrations with devices before VAT can used as a tool in SLT. …”
Get full text
Article -
1546
Customer Continuance Usage of Digital Banking: A Systematic Review of Influencing Factors
Published 2025-06-01“…The Preferred Reporting Items for Systematic Review (PRISMA) Framework guided the review process, revealing 56 variables used in related models. Among these, satisfaction, privacy and security, user experience, ease of use, and customer service and support were the most frequently significant factors influencing continuance usage. …”
Get full text
Article -
1547
AI-Powered Object Detection in Radiology: Current Models, Challenges, and Future Direction
Published 2025-04-01“…Moreover, the need for strong applicable models across different populations and imaging modalities are addressed. The importance of privacy and ethics in general data use as well as safety and regulations for healthcare data are emphasized. …”
Get full text
Article -
1548
Efficient encrypted image retrieval in IoT-cloud with multi-user authentication
Published 2018-02-01“…Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. …”
Get full text
Article -
1549
Personalizing the Marketing with Artificial Intelligence (AI)
Published 2024-12-01“…One of the biggest risks is the issue of data privacy. For personalization and targeting, it is necessary to collect a large amount of information about consumers, which can raise concerns about violating their privacy. …”
Get full text
Article -
1550
Secure latent Dirichlet allocation
Published 2025-07-01“…We present a novel, decentralized approach to train an LDA model securely without having to share any information about the content of the documents. We preserve the privacy of the individual parties using a combination of privacy enhancing technologies. …”
Get full text
Article -
1551
Systematic Analysis of Federated Learning Approaches for Intrusion Detection in the Internet of Things Environment
Published 2025-01-01“…Data security and privacy research in FL is increasingly becoming popular. …”
Get full text
Article -
1552
Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components
Published 2009-01-01“…In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.…”
Get full text
Article -
1553
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى
Published 2018-07-01“…The studyalso comes up with the following results: positively, individuals of the academiccommunity succeeded at protecting their personal data automatically and at ahigh rate. Selection of fake names constitutes half of the academic community (53.2%), who use social networks and this is explored by their deny of personaldata or by writing fake personal data. …”
Get full text
Article -
1554
Predictors of fairness assessment for social media screening in employee selection
Published 2023-01-01“…Multiple linear regression with backward elimination was used to determine the predictors of perceived justice of Facebook and LinkedIn screening in the selection process. …”
Get full text
Article -
1555
The Effect of Guidance and Counseling Services on Students’ Academic Performance in Selected Secondary Schools in Kajara County, Ntungamo District.
Published 2020“…Questionnaires and Interview Guides were used in collecting data. From a total population of 1482, the sample size of 306 respondents was generated which included head teachers, parents, teachers and learners in Kajara County. …”
Get full text
Thesis -
1556
Generative pre-trained transformers: ‘Ctrl+alt+create’ or ‘ctrl+alt+delete’ for IT education?
Published 2025-06-01“…These characteristics are perceived customization, simulations, usefulness, ease of use, risks and complexity. Design/methodology/approach – Using a quantitative research design, this study analyzes data from a survey of IT undergraduate students interacting with GPT-based coding tools and simulations (Three filtration steps). …”
Get full text
Article -
1557
Online Purchasing Model for PwD (People with Disabilities) Consumers: Pre and Post Disability Behaviors
Published 2025-06-01“…In this regard, the effects of the variables perceived ease of use, perceived usefulness, peer communication, security concern, privacy concern and physical disabilities on consumers’ purchasing intention and subsequent purchasing behavior through subjective norms, attitude and behavioral control were investigated with pre- and post-disability data. …”
Get full text
Article -
1558
Bridging the Gap: An Algorithmic Framework for Vehicular Crowdsensing
Published 2024-11-01“…Vehicular crowdsensing leverages vehicles equipped with sensors to gather and transmit data to address several urban challenges. Despite its potential, VCS faces issues with user engagement due to inadequate incentives and privacy concerns. …”
Get full text
Article -
1559
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. EdgeGuard uses a privacy-preserving federated learning approach to keep sensitive medical data local and to promote collaborative model training, solving essential issues. …”
Get full text
Article -
1560
Balancing tech and humanity
Published 2025-06-01“…While technology can enhance efficiency, as shown in Lebanon's response to the Tripoli bomb attack, it must adhere to international legal standards, especially privacy protections in the ICCPR and UDHR. The use of AI in identification processes raises concerns about wrongful identification, privacy breaches, and discrimination, especially when sensitive data is processed without human oversight. …”
Get full text
Article