Suggested Topics within your search.
Suggested Topics within your search.
-
1661
Cyber threats in mobile healthcare applications: systematic review of enabling technologies, threat models, detection approaches, and future directions
Published 2025-07-01“…The outlined open research prospects will improve the security and privacy of health-sensitive data against cyber threats. …”
Get full text
Article -
1662
Impact of occupancy behavior on building energy efficiency: What’s next in detection and monitoring technologies?
Published 2025-07-01“…Despite their potential, numerous challenges remain. Privacy, data security, and user acceptance concerns must be addressed to ensure broad adoption; there is also a recognized need to improve the reliability of detection under varying environmental conditions. …”
Get full text
Article -
1663
Exploring internal challenges and coping strategies in online English learning via Google Meet: A study of 7th grade students in Yogyakarta
Published 2024-10-01“…Data were collected through interviews and documentation, with pseudonyms used to protect students' privacy. …”
Get full text
Article -
1664
Clinician and patient perceptions around implementing remote blood pressure monitoring for hypertensive disorders of pregnancy: A survey-based study
Published 2025-07-01“…Conclusion Though socioeconomic status, ethnicity and language influenced perceptions towards RBPM; overall, Australian pregnant women and clinicians are broadly receptive to its use in antenatal care. Successful implementation of RPBM requires careful evaluation of design and workflow to accommodate for patient diversity, ease of use, compliance, privacy and clinical utility to optimise the user experience.…”
Get full text
Article -
1665
Exploring Youth Perspectives on Digital Mental Health Platforms: Qualitative Descriptive Study
Published 2025-05-01“…ResultsParticipants emphasized the importance of privacy, security, and personalization in building trust in the platform, with 72% (28/39) reporting that clear communication about data protection would increase their likelihood of use. …”
Get full text
Article -
1666
Implications of Public Disclosure of Personal Information in a Mobile Alert App for People Living With Dementia Who Go Missing: Qualitative Descriptive Study
Published 2025-02-01“…NVivo (version 12) was used to manage data, and conventional content analysis was conducted to identify key themes of the implications of public disclosure of personal information in Community ASAP. …”
Get full text
Article -
1667
Who are MaaS avoiders, wanderers or enthusiasts and what drives their intentions to adopt MaaS?
Published 2025-12-01“…This study integrates the Unified Theory of Technology Acceptance and Use (UTAUT) and Status Quo Bias (SQB) theories and draws on survey data covering nine dimensions: performance expectancy, effort expectancy, social influence, individual innovation, transition costs, sunk costs, inertia and resistance to use. …”
Get full text
Article -
1668
Integrating an AI platform into clinical IT: BPMN processes for clinical AI model development
Published 2025-07-01“…To facilitate the architecture of the AI platform, BPMN diagrams of all the identified processes are created. Clinical use cases are used to evaluate the processes using the FEDS framework. …”
Get full text
Article -
1669
Hybrid quantum enhanced federated learning for cyber attack detection
Published 2024-12-01“…The novel STAN used in the proposed work captures the spatio-temporal patterns in the network traffic data. …”
Get full text
Article -
1670
PENGAJARAN MISI BAGI JEMAAT KRISTEN DI ERA DIGITAL
Published 2025-05-01“…The main challenges identified include the limitations of personal interactions that often lack depth in online contexts, as well as security and privacy issues relating to the protection of congregational data and the authenticity of information. …”
Get full text
Article -
1671
Comprehensive review of dimensionality reduction algorithms: challenges, limitations, and innovative solutions
Published 2025-07-01“…Yet widely used methods like principal component analysis, t-distributed stochastic neighbor embedding, uniform manifold approximation and projection, and autoencoders are often applied as “black boxes,” neglecting interpretability, fairness, stability, and privacy. …”
Get full text
Article -
1672
From Capturing a Moment to New Insights: A Methodological Reflection on Reflexive Photo-Elicitation Interviews to Understand Visitor Experiences in Cultural Institutions
Published 2025-07-01“…Innovative qualitative methods like photo-elicitation interviews are gaining traction for their ability to produce data through negotiation and reflexivity. Reflective Photo-Elicitation Interviews (RPIs) are commonly used in nature and community-based tourism research, but their application in cultural institutions remains limited. …”
Get full text
Article -
1673
FedNDA: Enhancing Federated Learning with Noisy Client Detection and Robust Aggregation
Published 2025-07-01“… Federated Learning is a novel decentralized methodology that enables multiple clients to collaboratively train a global model while preserving the privacy of their local data. Although federated learning enhances data privacy, it faces challenges related to data quality and client behavior. …”
Get full text
Article -
1674
Role of artificial intelligence in human resource management for optimizing employee productivity
Published 2024-01-01“…Recruitments can be modernized by using catboats, predictive analysis helps in offering data-driven insights that can be used to find skill gaps and people management planning. …”
Get full text
Article -
1675
Impact of e-banking service quality on e-loyalty in pandemic times through interplay of e-satisfaction
Published 2020-12-01“…Design/methodology/approach – The data was collected through an adapted questionnaire by using emails and messaging applications. …”
Get full text
Article -
1676
Digital Phenotyping of Mental and Physical Conditions: Remote Monitoring of Patients Through RADAR-Base Platform
Published 2024-10-01“…Digital biomarkers developed through collected data are providing useful insights into different diseases. …”
Get full text
Article -
1677
What are the Thoughts of Women Whose Husbands’ Frozen Testicular Sperm Is Thawed for in vitro Fertilization on the Day of Oocyte Retrieval? A Qualitative Study
Published 2025-01-01“…Semi-structured, in-depth interviews were conducted to gather qualitative data. The Colaizzi 7-step analysis method was subsequently utilized to analyze the interview transcripts and identify emerging themes.Results: The analysis yielded 3 themes: (1) facing challenges and requiring assistance (a. demonstrate a strong desire to acquire professional knowledge; b. demonstrate a strong desire for recognition); (2) overwhelming psychological stress (a. concerns about potential privacy breaches; b. concerns about security issues; c. concerns about the therapeutic efficacy); (3) improving family atmosphere and marital relationships (a. communication between couples has increased.; b. shared expectations for children help couples establish a common goal).Conclusion: It is recommended that healthcare practitioners implement strategies to enhance patient education and awareness surrounding assisted reproductive technology. …”
Get full text
Article -
1678
Legal regulation of the application of information management technologies (on the example of the transport industry)
Published 2023-11-01“…This article discusses the importance of legal regulation in the use of management information technologies. It examines the current legal framework for the use of these technologies and highlights the need for further regulation to protect privacy and security. …”
Get full text
Article -
1679
Improving Vehicular Network Authentication with Teegraph: A Hashgraph-Based Efficiency Approach
Published 2025-08-01“…Our approach leverages the logical key hierarchy (LKH) and packet update keys to ensure data privacy and integrity in vehicular networks.…”
Get full text
Article -
1680
FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network
Published 2025-01-01“…We use the BatchCrypt algorithm to batch encrypt first- and second-order gradients to reduce the computational and communication overhead of Paillier homomorphic encryption. …”
Get full text
Article