Showing 1,861 - 1,880 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.19s Refine Results
  1. 1861

    Impact of telemedicine on antenatal care at a teaching institution in Eastern India: An insight into the future of better India by Ipsita Mohapatra, Vikash K. Rai, Subha Ranjan Samantaray

    Published 2023-11-01
    “…Materials and Methods: Primary data were collected by means of a telephonic survey of all the antenatal patients who used telemedicine services of AIIMS, Kalyani, based on a preformed questionnaire. …”
    Get full text
    Article
  2. 1862

    Exploring the Limitations of Federated Learning: A Novel Wasserstein Metric-Based Poisoning Attack on Traffic Sign Classification by Suzan Almutairi, Ahmed Barnawi

    Published 2025-01-01
    “…This reference model is then used to generate an adversarial local model characterized by low accuracy but minimal perturbation. …”
    Get full text
    Article
  3. 1863

    Exploring the Challenges of Mobile Phone Utilization for Library Service Delivery: The Librarians’ Perspectives by Qudus Bankole

    Published 2025-04-01
    “…A self-developed questionnaire was used to collect data, which was analyzed using descriptive statistics. …”
    Get full text
    Article
  4. 1864

    Current AI technologies in cancer diagnostics and treatment by Ashutosh Tiwari, Soumya Mishra, Tsung-Rong Kuo

    Published 2025-06-01
    “…Finally, we discuss important challenges such as data privacy, interpretability, and regulatory issues, and recommend future directions that involve the use of federated learning, synthetic biology, and quantum-boosted AI. …”
    Get full text
    Article
  5. 1865

    Unsupervised intrusion detection model based on temporal convolutional network by LIAO Jinju, DING Jiawei, FENG Guanghui

    Published 2025-01-01
    “…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. In addition, UDMT can adopt different privacy layer modes, and the configuration was flexible to meet the requirements of different detection rates and detection delays. …”
    Get full text
    Article
  6. 1866

    The nature of online civil dispute resolution in modern India by Irina A. Gronic

    Published 2024-12-01
    “…Some believe that the introduction of information technology in the activities of the courts creates high risks for the security and privacy of data and the lack of digital literacy will contribute to this, while others believe that the future belongs to virtual courts and online dispute resolution.…”
    Get full text
    Article
  7. 1867

    Arduino – Based Electronic Voting Machine by Marwa Adeeb Al-jawaherry

    Published 2019-01-01
    “…During the construction of any electronic voting system, several aspects must consider, the most important is the privacy of voters and the accuracy of the voting process in addition to maintaining the security of data, this research provides a safe and reliable voting system. …”
    Get full text
    Article
  8. 1868

    A mixed-method study to inform the design of a video observed therapy app to monitor individuals with TB in the Dominican Republic by Julio Arturo Canario-Guzmán, Ricardo Elias-Melgen, Eddys Rafael Mendoza, Luis Felipe Arias, Roberto Espinal, Jeannette Báez, Sarah Iribarren

    Published 2025-06-01
    “…Data integration was achieved by comparing convergent and divergent results.ResultsParticipants expressed a positive attitude towards using DAT to facilitate communication with health personnel to support treatment adherence. …”
    Get full text
    Article
  9. 1869

    GOVERNANCE TOKENS IN THE CONCEPT OF ELECTRONIC GOVERNMENT by Oleksii Dotsenko, Marko Zelenskyi

    Published 2023-12-01
    “…We emphasized that the use of blockchain technology raises significant privacy concerns, as many e-government services involve personal data that must be properly protected to avoid situations where the blockchain could become the target of attacks by attackers trying to obtain unauthorized access to the personal information of citizens. …”
    Get full text
    Article
  10. 1870

    From Surveillance to Sentencing: Evaluating AI's Role in Indian Criminal Justice by Kumar Navin

    Published 2025-06-01
    “…However, the integration of AI into criminal investigations raises critical concerns regarding privacy, surveillance, data protection, and algorithmic bias. …”
    Get full text
    Article
  11. 1871

    Artificial intelligence in academic research: Benefits, challenges, and ethical dimensions in doctoral studies by Zaki EL HANI, Jaouad KARROUM, Abdelmajid ELOUADI, Aniss MOUMEN

    Published 2025-04-01
    “…However, this transformation is accompanied by challenges, including ethical concerns such as algorithmic bias, risks to data privacy, and over-reliance on automation, which may erode critical thinking and human judgment. …”
    Get full text
    Article
  12. 1872

    Energy Intelligence: A Systematic Review of Artificial Intelligence for Energy Management by Ashkan Safari, Mohammadreza Daneshvar, Amjad Anvari-Moghaddam

    Published 2024-11-01
    “…Despite these advances, there are still additional challenges that remain, such as concerns regarding the privacy of data, challenges with integrating different systems, and issues related to scalability. …”
    Get full text
    Article
  13. 1873

    Machine Learning in E-Commerce: Trends, Applications, and Future Challenges by Elias Dritsas, Maria Trigka

    Published 2025-01-01
    “…Key challenges related to scalability, interpretability, cold-start problems, data sparsity, and privacy are critically analyzed. …”
    Get full text
    Article
  14. 1874

    The Process for the Formulation of the International Telehealth Position Statement for Occupational Therapy by Karen Jacobs, Jana Cason, Ann McCullough

    Published 2015-07-01
    “…In 2014, WFOT published the WFOT Telehealth Position Statement on the use of telehealth in occupational therapy. The process for the formulation of the official document involved reviewing WFOT member organizations’ telehealth position statements and data collected from a survey sent to member organizations’ delegates in April 2014.  …”
    Get full text
    Article
  15. 1875

    COVID-19 Antibody Test/Vaccination Certification: There's an App for That by Marc Eisenstadt, Manoharan Ramachandran, Niaz Chowdhury, Allan Third, John Domingue

    Published 2020-01-01
    “…<italic>Result</italic>s: Our mobile phone app and decentralized server architecture enable the mixture of verifiability and privacy in a manner derived from public/private key pairs and digital signatures, generalized to avoid restrictive ownership of sensitive digital keys and/or data. …”
    Get full text
    Article
  16. 1876

    ENGLISH:FROM MANUSCRIPTS TO MONITORS: THE DIGITAL EVOLUTION OF ISLAMIC KNOWLEDGE AND THE ROLE OF COMPUTERIZING IN SAFEGUARDING TRADITION FOR FUTURE GENERATIONS by Tariq Hussain Jalbani, Muhammad Irfan Baloch, Syed Abrar Ali Shah

    Published 2024-06-01
    “…The paper explores the danger of breaching privacy and the abuse of personal data pointing to the necessity and effectiveness of a policy against such issues. …”
    Get full text
    Article
  17. 1877

    Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care by Kou-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Chieh Wang

    Published 2013-12-01
    “…Although RFID-based procedure is more efficient than traditional process, patient's information may be attacked (or stolen) during the data transmission period. This will cause inappropriate medication use and medical errors. …”
    Get full text
    Article
  18. 1878

    Social media integration in marketing education: A way forward to improve engagement and learning outcomes by Hesham Fazel, Amer Sayaf

    Published 2025-03-01
    “…The findings indicate that social media significantly increased student engagement and knowledge retention. Perceived ease of use, institutional support, and effectiveness in meeting instructional objectives were most significant to adoption. …”
    Get full text
    Article
  19. 1879

    Application of blockchain in urban rail traffic edge computing network by Gaochang XIE, Hua LU, Qinqin TANG, Han ZHU, Chenghao LIANG, Wen WEN, Renchao XIE

    Published 2021-10-01
    “…Multi-access edge computing (MEC) can provide high-quality service capabilities for computing-intensive services and delay-sensitive services in urban rail traffic.However, many edge facilities in rail traffic edge computing network are exposed to an open environment, and their privacy protection and transmission security are facing great challenges.Blockchain has functional characteristics such as distributed ledger, consensus mechanism, smart contract, and decentralized application.Therefore, the use of blockchain can build a systematic security protection mechanism for the distributed rail traffic edge computing network to ensure network security and data security and realize high-quality urban rail traffic services.Firstly, the basic concept of the blockchain and the urban rail traffic edge computing network architecture were introduced.Then, the structure and application content of the rail traffic edge computing network security protection mechanism integrated with the blockchain was discussed in detail.Finally, the open research issues and challenges of the security protection mechanism were analyzed.…”
    Get full text
    Article
  20. 1880

    Comprehensive synthesis of mHealth interventions in psychiatry: insights from systematic, scoping, narrative reviews and content analysis by Zaakira Shahul Hameed Mahreen, Noor Azziah Zainuldin, Melvyn Weibin Zhang

    Published 2024-10-01
    “…Conclusion: Despite positive outcomes, challenges such as data privacy, user engagement and healthcare integration persist. …”
    Get full text
    Article