Showing 1,661 - 1,680 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.16s Refine Results
  1. 1661

    Cyber threats in mobile healthcare applications: systematic review of enabling technologies, threat models, detection approaches, and future directions by Anayo Chukwu Ikegwu, Uzoma Rita Alo, Henry Friday Nweke

    Published 2025-07-01
    “…The outlined open research prospects will improve the security and privacy of health-sensitive data against cyber threats. …”
    Get full text
    Article
  2. 1662

    Impact of occupancy behavior on building energy efficiency: What’s next in detection and monitoring technologies? by Wenjie Song, John Calautit

    Published 2025-07-01
    “…Despite their potential, numerous challenges remain. Privacy, data security, and user acceptance concerns must be addressed to ensure broad adoption; there is also a recognized need to improve the reliability of detection under varying environmental conditions. …”
    Get full text
    Article
  3. 1663

    Exploring internal challenges and coping strategies in online English learning via Google Meet: A study of 7th grade students in Yogyakarta by Bambang Widi Pratolo, Liza Beliarita, Naif Daifullah Alsulami

    Published 2024-10-01
    “…Data were collected through interviews and documentation, with pseudonyms used to protect students' privacy. …”
    Get full text
    Article
  4. 1664

    Clinician and patient perceptions around implementing remote blood pressure monitoring for hypertensive disorders of pregnancy: A survey-based study by Theepika Rajkumar, Sharon Hu, Annemarie Hennessy, Angela Makris

    Published 2025-07-01
    “…Conclusion Though socioeconomic status, ethnicity and language influenced perceptions towards RBPM; overall, Australian pregnant women and clinicians are broadly receptive to its use in antenatal care. Successful implementation of RPBM requires careful evaluation of design and workflow to accommodate for patient diversity, ease of use, compliance, privacy and clinical utility to optimise the user experience.…”
    Get full text
    Article
  5. 1665

    Exploring Youth Perspectives on Digital Mental Health Platforms: Qualitative Descriptive Study by Sarah Daniel, Lauren Volcko, Emilie Bassi, Julia Hews-Girard, Katherine Bright, Marianne Barker, Lia Norman, Karina Pintson, Geneca Henry, Sumaya Soufi, Chukwudumbiri Efrem Omorotionmwan, Melanie Fersovitch, Leanne Stamp, Karen Moskovic, David W Johnson, Gina Dimitropoulos

    Published 2025-05-01
    “…ResultsParticipants emphasized the importance of privacy, security, and personalization in building trust in the platform, with 72% (28/39) reporting that clear communication about data protection would increase their likelihood of use. …”
    Get full text
    Article
  6. 1666

    Implications of Public Disclosure of Personal Information in a Mobile Alert App for People Living With Dementia Who Go Missing: Qualitative Descriptive Study by Adebusola Adekoya, Christine Daum, Noelannah Neubauer, Antonio Miguel-Cruz, Lili Liu

    Published 2025-02-01
    “…NVivo (version 12) was used to manage data, and conventional content analysis was conducted to identify key themes of the implications of public disclosure of personal information in Community ASAP. …”
    Get full text
    Article
  7. 1667

    Who are MaaS avoiders, wanderers or enthusiasts and what drives their intentions to adopt MaaS? by Zuoxian Gan, Wentao Li

    Published 2025-12-01
    “…This study integrates the Unified Theory of Technology Acceptance and Use (UTAUT) and Status Quo Bias (SQB) theories and draws on survey data covering nine dimensions: performance expectancy, effort expectancy, social influence, individual innovation, transition costs, sunk costs, inertia and resistance to use. …”
    Get full text
    Article
  8. 1668

    Integrating an AI platform into clinical IT: BPMN processes for clinical AI model development by Kfeel Arshad, Saman Ardalan, Björn Schreiweis, Björn Bergh

    Published 2025-07-01
    “…To facilitate the architecture of the AI platform, BPMN diagrams of all the identified processes are created. Clinical use cases are used to evaluate the processes using the FEDS framework. …”
    Get full text
    Article
  9. 1669

    Hybrid quantum enhanced federated learning for cyber attack detection by G. Subramanian, M. Chinnadurai

    Published 2024-12-01
    “…The novel STAN used in the proposed work captures the spatio-temporal patterns in the network traffic data. …”
    Get full text
    Article
  10. 1670

    PENGAJARAN MISI BAGI JEMAAT KRISTEN DI ERA DIGITAL by Sandy Ariawan

    Published 2025-05-01
    “…The main challenges identified include the limitations of personal interactions that often lack depth in online contexts, as well as security and privacy issues relating to the protection of congregational data and the authenticity of information. …”
    Get full text
    Article
  11. 1671

    Comprehensive review of dimensionality reduction algorithms: challenges, limitations, and innovative solutions by Aasim Ayaz Wani

    Published 2025-07-01
    “…Yet widely used methods like principal component analysis, t-distributed stochastic neighbor embedding, uniform manifold approximation and projection, and autoencoders are often applied as “black boxes,” neglecting interpretability, fairness, stability, and privacy. …”
    Get full text
    Article
  12. 1672

    From Capturing a Moment to New Insights: A Methodological Reflection on Reflexive Photo-Elicitation Interviews to Understand Visitor Experiences in Cultural Institutions by Tesfaye Fentaw Nigatu, Alexander Trupp, Pek Yen Teh, Elangkovan Narayanan Alagas

    Published 2025-07-01
    “…Innovative qualitative methods like photo-elicitation interviews are gaining traction for their ability to produce data through negotiation and reflexivity. Reflective Photo-Elicitation Interviews (RPIs) are commonly used in nature and community-based tourism research, but their application in cultural institutions remains limited. …”
    Get full text
    Article
  13. 1673

    FedNDA: Enhancing Federated Learning with Noisy Client Detection and Robust Aggregation by Tuan Dung Kieu, Charles Fonbonne, Trung-Kien Tran, Thi-Lan Le, Hai Vu, Huu-Thanh Nguyen, Thanh-Hai Tran

    Published 2025-07-01
    “… Federated Learning is a novel decentralized methodology that enables multiple clients to collaboratively train a global model while preserving the privacy of their local data. Although federated learning enhances data privacy, it faces challenges related to data quality and client behavior. …”
    Get full text
    Article
  14. 1674

    Role of artificial intelligence in human resource management for optimizing employee productivity by Veshne Nupur, Jamnani Jyoti

    Published 2024-01-01
    “…Recruitments can be modernized by using catboats, predictive analysis helps in offering data-driven insights that can be used to find skill gaps and people management planning. …”
    Get full text
    Article
  15. 1675

    Impact of e-banking service quality on e-loyalty in pandemic times through interplay of e-satisfaction by Inzamam Ul Haq, Tahir Mumtaz Awan

    Published 2020-12-01
    “…Design/methodology/approach – The data was collected through an adapted questionnaire by using emails and messaging applications. …”
    Get full text
    Article
  16. 1676
  17. 1677

    What are the Thoughts of Women Whose Husbands’ Frozen Testicular Sperm Is Thawed for in vitro Fertilization on the Day of Oocyte Retrieval? A Qualitative Study by He Y, Wei Q, Chen X, Zhang C, Wang Z

    Published 2025-01-01
    “…Semi-structured, in-depth interviews were conducted to gather qualitative data. The Colaizzi 7-step analysis method was subsequently utilized to analyze the interview transcripts and identify emerging themes.Results: The analysis yielded 3 themes: (1) facing challenges and requiring assistance (a. demonstrate a strong desire to acquire professional knowledge; b. demonstrate a strong desire for recognition); (2) overwhelming psychological stress (a. concerns about potential privacy breaches; b. concerns about security issues; c. concerns about the therapeutic efficacy); (3) improving family atmosphere and marital relationships (a. communication between couples has increased.; b. shared expectations for children help couples establish a common goal).Conclusion: It is recommended that healthcare practitioners implement strategies to enhance patient education and awareness surrounding assisted reproductive technology. …”
    Get full text
    Article
  18. 1678

    Legal regulation of the application of information management technologies (on the example of the transport industry) by E. Yu. Serbinenko, O. A. Dmitrieva

    Published 2023-11-01
    “…This article discusses the importance of legal regulation in the use of management information technologies. It examines the current legal framework for the use of these technologies and highlights the need for further regulation to protect privacy and security. …”
    Get full text
    Article
  19. 1679

    Improving Vehicular Network Authentication with Teegraph: A Hashgraph-Based Efficiency Approach by Rubén Juárez Cádiz, Ruben Nicolas-Sans, José Fernández Tamámes

    Published 2025-08-01
    “…Our approach leverages the logical key hierarchy (LKH) and packet update keys to ensure data privacy and integrity in vehicular networks.…”
    Get full text
    Article
  20. 1680

    FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network by Jie Li, Yuanyuan Song, Ming-Gang Zheng, Shuo Zhang, Han Liang

    Published 2025-01-01
    “…We use the BatchCrypt algorithm to batch encrypt first- and second-order gradients to reduce the computational and communication overhead of Paillier homomorphic encryption. …”
    Get full text
    Article