Showing 1,801 - 1,820 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.28s Refine Results
  1. 1801

    Covid-19 and Technological Disruption in Health Care Delivery in England by Louise Dalingwater

    Published 2023-11-01
    “…There is also an increased privacy risk when health data is digitalised. There are thus significant governance and infrastructure issues in the delivery of health care via digital devices, which this paper will explore. …”
    Get full text
    Article
  2. 1802
  3. 1803

    Secure deduplication and integrity audit system based on convergent encryption for cloud storage by Xiao-yong GUO, An-min FU, Bo-yu KUANG, Wei-jia DING

    Published 2017-11-01
    “…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
    Get full text
    Article
  4. 1804

    Cross-device federated unsupervised learning for the detection of anomalies in single-lead electrocardiogram signals. by Maximilian Kapsecker, Stephan M Jonas

    Published 2025-04-01
    “…<h4>Background</h4>Federated unsupervised learning offers a promising approach to leveraging decentralized data stored on consumer devices, addressing concerns about privacy and lack of annotation. …”
    Get full text
    Article
  5. 1805

    Mathematical Modeling of Multiattack Behavior Discrimination in the WSN Based on Incidence Matrix by Yu Shuai-Jing, Wang Peng-Fei

    Published 2022-01-01
    “…The WSN node model is used to collect relevant data and mark and map the disguised data, so as to determine the characteristics of multiattack behavior and establish the WSN multiattack behavior discrimination model based on the incidence matrix. …”
    Get full text
    Article
  6. 1806

    Studies on Artificial Intelligence’s Effect on the Employment Market in the Future by Chen Enqi

    Published 2024-01-01
    “…At the same time, the application of AI also raises concerns about privacy, data security, and ethical issues, all of which need to be considered in the development of the job market. …”
    Get full text
    Article
  7. 1807

    A Novel Raster Map Exchange Scheme Based on Visual Cryptography by Lijing Ren

    Published 2021-01-01
    “…Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task. …”
    Get full text
    Article
  8. 1808

    Interactive Applications with Artificial Intelligence: The Role of Trust among Digital Assistant Users by Pur Purwanto, Kuswandi Kuswandi, Fatmah Fatmah

    Published 2020-06-01
    “…The purpose of the present study was to analyze the effects of controllability, synchronicity, bidirectionality on perceived performance and user satisfaction with digital assistant applications as moderated by perceived trust. Amos 22.0 was used to analyze a sample of 150 digital assistant users of brands Samsung Bixby, Google Assistant, Apple Siri, and other brands.Results show that bidirectionality is the most worrying feature in terms of perceived performance of digital assistants related to trust and privacy protection issues of personal data, whereas the other two features contribute to perceived performance and digital assistant users’ satisfaction. …”
    Get full text
    Article
  9. 1809

    Evaluating Smart Home Usability and Accessibility in Early Detection and Intervention of Mental Health Challenges Among Older Adults: A Narrative Review and Framework by Mohammad Mahdi Fakhimi, Adriana Hughes, Alisson M. Gustavson

    Published 2025-01-01
    “…In total, 34 relevant studies met the inclusion criteria, and also, a standardized quality assessment tool was used to evaluate the methodological soundness of the included studies. …”
    Get full text
    Article
  10. 1810

    The Role of Artificial Intelligence in the Future of Language Teaching and Learning Practices in Higher Education by Job W. Mwakapina

    Published 2024-12-01
    “…However, challenges such as data privacy, lack of proficiency in AI, lack of suitable equipment, plagiarism issues, and high dependency on AI need to be addressed. …”
    Get full text
    Article
  11. 1811

    Why IoT Enablement of Agrifood Transportation Disappoints Its Stakeholders: Unravelling Barriers for Enhanced Logistics by Deepika Joshi, Sumit Gupta, Amit Vishwakarma, Sandeep Jagtap

    Published 2024-01-01
    “…As a result, a unique position of autonomous, dependent, linkage, and independent barriers was obtained which revealed that inadequate Internet connectivity, interoperability, and unclear roadmaps are precarious to the use of IoT in agrifood transportation. They are responsible for creating issues like data processing, vehicle tracking, and data privacy. …”
    Get full text
    Article
  12. 1812

    Electronic Records Management Practices and Academic Performance of Higher Institutions of Learning: A Case Study of Kabale University. by Tukahirwa, Elizabeth

    Published 2024
    “…A descriptive research design was used to collect both qualitative and quantitative data through purposive and simple random sampling techniques, with a sample size of 92 respondents. …”
    Get full text
    Thesis
  13. 1813

    A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks by Arslan Shafique, Syed Ali Atif Naqvi, Ali Raza, Masoud Ghalaii, Panagiotis Papanastasiou, Julie McCann, Qammer H. Abbasi, Muhammad Ali Imran

    Published 2024-12-01
    “…In this context, ensuring secure transmission and communication is necessary to protect medical data to maintain privacy. To address such privacy concerns and secure medical images against cyberattacks, this research presents a robust hybrid encryption framework that integrates quantum, and classical cryptographic methods. …”
    Get full text
    Article
  14. 1814

    Joint Class and Domain Continual Learning for Decentralized Federated Processes by Chiara Lanza, Tinne Tuytelaars, Marco Miozzo, Eduard Angelats, Paolo Dini

    Published 2025-01-01
    “…So far, learning in IoT scenarios has almost exclusively been studied in a centralized fashion, but CL can be used in decentralized settings involving a multitude of nodes to learn, adapt, and generalize from their streams of data, even with limited communication and computation capabilities. …”
    Get full text
    Article
  15. 1815

    How do strategic attributes of electronic commerce impel the perceived value and electronic loyalty of online food delivery applications (OFDAs) by Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Zoia Khan, Muhammad Ali Raza, Hira Hafeez

    Published 2024-08-01
    “…Design/methodology/approach – The study was quantitative and data were collected from 509 consumers of the district of Rawalpindi, Punjab Pakistan by using a convenience sampling technique who was the users of OFDAs to evaluate the proposed research model. …”
    Get full text
    Article
  16. 1816

    Examining Factors Impacting Online Survey Response Rates in Educational Research: Perceptions of Graduate Students by Amany Saleh, Krishna Bista

    Published 2017-09-01
    “…The authors used descriptive statistics (percentage, average mean) and inferential statistics (chi-square and correlations) to report the data analysis and findings. …”
    Get full text
    Article
  17. 1817

    Human rights, vulnerability and artificial intelligence: an analysis in constitutional perspective by Jorge Castellanos Claramunt

    Published 2024-12-01
    “…It also highlights the risk of algorithmic biases in the processing of personal data, highlighting the need to protect the privacy and data of individuals as fundamental elements to ensure an AI that respects human rights. …”
    Get full text
    Article
  18. 1818

    Challenges and opportunities with ChatGPT in oral oncology: The journey ahead by Ribwar Arsalan Mohammed, Sirwan Khalid Ahmed

    Published 2024-06-01
    “…The integration of artificial intelligence (AI) into oral oncology, particularly through tools like ChatGPT, has shown remarkable potential to advance diagnosis, therapy, and patient care. ChatGPT's use of natural language processing enables it to analyze complex medical data, aiding in early cancer detection and personalized treatment planning based on evidence-based guidelines. …”
    Get full text
    Article
  19. 1819

    MOVILIDAD Y TRANSPORTE INTELIGENTE: UNA REVISIÓN DE APLICACIONES Y TECNOLOGÍAS EMERGENTES EN EL CONTEXTO DE UNA CIUDAD INTELIGENTE by José Alejandro Franco Calderon, Enrique Estupiñan Escalante

    Published 2023-07-01
    “…Furthermore, the article highlights the importance of collectingand analyzing large volumes of data in real time to improve decision-making in intelligent transportation, addressingissues related to data privacy and security in this context, thus, the transformative role of applications and technologiesin transportation, and their proper implementation can contribute to the construction of smarter, more connected andsustainable cities in the future.…”
    Get full text
    Article
  20. 1820

    Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing by Shreya Girish Savadatti, Shruthi Krishnamoorthy, Radhakrishnan Delhibabu

    Published 2025-01-01
    “…It also delves into DLT&#x2019;s regulatory landscape, addressing compliance, data privacy and governance, while assessing the potential for regulatory clarity and international cooperation. …”
    Get full text
    Article