Showing 1,581 - 1,600 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.25s Refine Results
  1. 1581

    Nurses’ perceptions of artificial intelligence (AI) integration into practice: An integrative review by Lester Lora, Paula Fo

    Published 2024-09-01
    “…However, nurses show concerns about ethical implications for data privacy, and the potential deskilling of human expertise. …”
    Get full text
    Article
  2. 1582

    Stable federated learning method for low-altitude IoT networks based on election strategy by SHEN Lingfeng, WANG Guanghui, BAI Tianshui, ZHU Zhengyu, ZHANG Qiankun

    Published 2024-09-01
    “…The deep integration of UAV and Internet of things (IoT) transmits a large amount of sensitive data in the air-to-ground intelligent network, posing a serious risk of privacy leakage. …”
    Get full text
    Article
  3. 1583

    A Predictive Models for Advertisement Campaign Budget Allocation by Iqra kousar

    Published 2025-03-01
    “…Research should focus on real-time data integration and ethical concerns around data privacy to ensure responsible use. …”
    Get full text
    Article
  4. 1584

    Exploring real estate blockchain adoption: An empirical study based on an integrated task-technology fit and technology acceptance model. by Hailan Yang, Zixian Zhang, Chen Jian, Nisar Ahmad

    Published 2025-01-01
    “…Partial least square structural equation modeling (PLS-SEM) was used for data analysis. The study's findings indicate that attitude, perceived usefulness (PU) and data privacy and security (DPS) exerts highest influence in the proposed theoretical model. …”
    Get full text
    Article
  5. 1585

    Barriers to cleaning of shared latrines in slums of Addis Ababa, Ethiopia. by Kidist Hailu, Zewdie Aderaw Alemu, Metadel Adane

    Published 2022-01-01
    “…Cases were those who had not cleaned their shared latrines and controls were those who had cleaned their shared latrines at least once during the week prior to data collection. Data were collected using a structured questionnaire and an on-the-spot-observational checklist and analyzed using bivariate (crude odds ratio [COD]) and multivariable (adjusted odds ratio [AOR]) unconditional logistic regression model. …”
    Get full text
    Article
  6. 1586

    Research on health information avoidance behavior and influencing factors of cancer patients—an empirical analysis based on structural equation modeling by Rui Zhu, Hui Zhao, Yun Yun, Yue Zhao, Weixian Wang, Lingmeng Wang, Wenjie Hou, Fuzhi Wang

    Published 2024-12-01
    “…Methods A face-to-face electronic questionnaire was used to collect data. Applying a chi-square test and multivariate logistic regression model to analyze the role of different socio-demographic factors in influencing health information avoidance behavior of cancer patients; applying structural equation modeling to analyze the role mechanism of health information avoidance behavior of cancer patients. …”
    Get full text
    Article
  7. 1587

    Appropriately Matching Transport Care Units to Patients in Interhospital Transport Care: Implementation Study by Shirin Hasavari, Pouyan Esmaeilzadeh

    Published 2024-12-01
    “…We introduce a distributed digital health platform, Interfacility Transport Care (ITC)–InfoChain, designed to solve this problem without compromising EHR security or data privacy. ObjectiveThis study aimed to detail the implementation of ITC-InfoChain, a secure, blockchain-based platform designed to enhance real-time data sharing without compromising data privacy or EHR security. …”
    Get full text
    Article
  8. 1588

    Generative AI in higher education: Seeing ChatGPT through universities' policies, resources, and guidelines by Hui Wang, Anh Dang, Zihao Wu, Son Mac

    Published 2024-12-01
    “…Primary concerns lie in ethical usage, accuracy, and data privacy. Most universities actively respond and provide diverse types of resources, such as syllabus templates, workshops, shared articles, and one-on-one consultations; focusing on a range of topics, namely general technical introduction, ethical concerns, pedagogical applications, preventive strategies, data privacy, limitations, and detective tools. …”
    Get full text
    Article
  9. 1589

    An Efficient Edge-Based System for Nucleated Oval-Shaped Red Blood Cell Counting by Carlo Centofanti, Daniele Lozzi, Ciro Cococcetta, Andrea Marotta

    Published 2024-01-01
    “…Leveraging Multi-access Edge Computing (MEC) technology, the system ensures efficient data processing, privacy preservation, and ease of use through a user-friendly web interface. …”
    Get full text
    Article
  10. 1590

    Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing by Leyou Zhang, Xiaoxu Gao, Fuchun Guo, Gongcheng Hu

    Published 2020-01-01
    “…A Leakage-Resilient Ciphertext-Policy Attribute-based Encryption (LR-CP-ABE) not only supports the fine-grained access control to encrypted data but also guarantees the security of the data under the side-channel attacks. …”
    Get full text
    Article
  11. 1591

    Key digital health literacy competencies for citizens – A Delphi study by Mika Uitto, Merja Hoffrèn-Mikkola, Leena Paakkari

    Published 2025-07-01
    “…Qualitative and quantitative methods were used to analyse the data. Results A broad list of competencies was produced, and the 17 most important were identified. …”
    Get full text
    Article
  12. 1592

    Developing an Institutional AI Digital Assistant in an Age of Industry 5.0 by Bart Rienties, Thomas Ullmann, Felipe Tessarolo, Joseph Kwarteng, John Domingue, Tim Coughlan, Emily Coughlan, Duygu Bektik

    Published 2025-06-01
    “…However, there are concerns around the use of such p-AIDA tools, particularly in terms of academic integrity, data privacy, intellectual property, and the impact on the quality of education. …”
    Get full text
    Article
  13. 1593

    Clinicians’ perspectives on the adoption and implementation of EMR-integrated clinical decision support tools in primary care by Debora Goetz Goldberg, Tulay G Soylu, Carolyn Faith Hoffman, Rachel E Kishton, Peter F Cronholm

    Published 2025-04-01
    “…There are many concerns with the use of EMR-integrated CDS tools in primary care that should be considered including evidence of the tool's effectiveness, data security and privacy protocols, workflow integration, and clinician burden.…”
    Get full text
    Article
  14. 1594

    Sociodemographic predictors of digital health adoption in patients with asthma and COPD by Daniela Téllez, Elroy Boers, Leanne Kaye, Vy Vuong, Meredith A. Barrett

    Published 2025-07-01
    “…The objective of this study was to evaluate how sociodemographic characteristics may relate to the adoption of digital health among patients with asthma and chronic obstructive pulmonary disease (COPD).MethodsAdults residing in the US and using a digital platform for asthma or COPD management were surveyed to understand (1) level of comfort sharing health data with their healthcare providers and (2) the presence of remote care concerns, specifically clinical, technological, privacy and financial concerns. …”
    Get full text
    Article
  15. 1595

    Greening the justice system: assessing the legality, feasibility, and potential of artificial intelligence in advancing environmental sustainability within the Indian judiciary by Anbarasi G, Sankar D

    Published 2025-05-01
    “…While AI integration shows significant promise in reducing environmental impact and improving judicial efficiency, the study identifies key challenges including the need for comprehensive legislation governing AI use in judiciary, substantial infrastructure requirements, and data privacy concerns. …”
    Get full text
    Article
  16. 1596

    A Cloud User Anomaly Detection Method Based on Mouse Behavior by XU Hong-jun, ZHANG Hong, HE Wei

    Published 2019-08-01
    “… Aiming at the problem of cloud security threat caused by illegal operation of cloud users, this paper proposes a method to detect the abnormal behavior of cloud users by analyzing the mouse operation behavior in user’s work by using deep learning technology under the premise of ensuring the privacy of cloud users. …”
    Get full text
    Article
  17. 1597

    An Examination of Records Retention and Disposition Policy at Kabale University. by Nayakiira, Promise

    Published 2024
    “…The study sampled a total of 15 which was collected and used in the analysis. Data was collected through questionnaires and interviews. …”
    Get full text
    Thesis
  18. 1598

    Qualitative Investigation of Digital Technologies, Social Media, and AI on Human Behaviour, Identity, Communication, and Social Relations in Australia by Isla Davis

    Published 2024-01-01
    “…Additionally, the research identifies societal concerns about AI, including privacy, data exploitation, and the blending of human and machine interactions, which impact decision-making and personal boundaries. …”
    Get full text
    Article
  19. 1599

    Federated learning system on autonomous vehicles for lane segmentation by Mohab M. Eid Kishawy, Mohamed T. Abd El-Hafez, Retaj Yousri, M. Saeed Darweesh

    Published 2024-10-01
    “…However, one of the bottlenecks of this evolution is providing data that contains different scenarios and scenes to improve the models without exposing the privacy and security of the edge vehicles. …”
    Get full text
    Article
  20. 1600

    Graph Split Federated Learning for Distributed Large-Scale AIoT in Smart Cities by Hanyue Xu, Kah Phooi Seng, Li-Minn Ang, Wei Wang, Jeremy Smith

    Published 2025-01-01
    “…However, the centralization of sensitive IoT data for ML raises privacy and efficiency concerns. …”
    Get full text
    Article