Showing 1,941 - 1,960 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.19s Refine Results
  1. 1941

    Features of Structured, One-to-One Videoconference Interventions That Actively Engage People in the Management of Their Chronic Conditions: Scoping Review by Yu-Ting Chen, Michelle Lehman, Toni Van Denend, Jacqueline Kish, Yue Wu, Katharine Preissner, Matthew Plow, Tanya L Packer

    Published 2025-02-01
    “…Studies reporting assessment or routine care were excluded. Extracted text data were analyzed using thematic analysis and published taxonomies. …”
    Get full text
    Article
  2. 1942

    Economic and social benefits of socially responsible actions towards employees in agribusiness enterprises by Matejun Marek, Ratajczak Marcin

    Published 2019-12-01
    “…Key socially responsible actions towards employees include employee satisfaction surveys as well as data protection and protection of employee privacy. …”
    Get full text
    Article
  3. 1943

    A novel blockchain-based surveillance and early-warning technology for infectious diseases by Liwei OUYANG, Yong YUAN, Xinhu ZHENG, Jun ZHANG, Fei-Yue WANG

    Published 2020-06-01
    “…The key of early prevention and control of infectious diseases is to use the early warning technology and system to monitor the abnormal occurrence and trend of infectious diseases.There are still some problems in the existing infectious diseases automated-alert and response systems,such as lack of intelligence,poor efficiency in exchange of key information,as well as difficulties in distributed decision-making.Based on the distributed blockchain architecture,a novel blockchain-based surveillance and early-warning technology for infectious diseases was proposed,leveraging emerging information technologies including artificial intelligence,big data and smart contract.The technology could aggregate monitoring forces from multiple parties efficiently,integrate various early warning technologies flexibly,and establish a distributed and collaborative monitoring environment for knowledge integration and intelligent interconnection with guaranteed security and privacy protection.In this framework,smart contract was served as a “software-defined agent” to fuse decisions,monitor the outbreak,and issue warnings in an automatic and real-time fashion,so as to meet the key requirements of accuracy and timeliness,and avoid the decision bias of single evidence.…”
    Get full text
    Article
  4. 1944

    The streetlights are watching you: A historical perspective on value change and public lighting by Taylor Stone

    Published 2022-02-01
    “…Smart city trends are spurring a new generation of streetlights, with lampposts being fitted with sensors, cameras and a host of other technologies aimed at monitoring and data collection. This has raised concerns about privacy, surveillance and power relations, arguably creating a changing value landscape for streetlights. …”
    Get full text
    Article
  5. 1945

    Federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain by Ming YANG, Xuexian HU, Qihui ZHANG, Jianghong WEI, Wenfen LIU

    Published 2021-12-01
    “…Federated learning is a new distributed machine learning technology, where training tasks are deployed on user side and training model parameters are sent to the server side.In the whole process, participants do not need to share their own data directly, which greatly avoids privacy issues.However, the trust relationship between mobile users in the learning model has not been established in advance, there is hidden safety when users perform cooperative train with each other.In view of the above problems, a federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain was proposed.The scheme allowed the server side to use subjective logic models to evaluate the reputation of participating mobile users and provided them with credible reputation opinions sharing environment and dynamic access strategy interface based on the technique of smart contract of blockchain.Theoretical and experimental analys is results show that the scheme can enable the server side to select reliable users for training.And it can achieve more fair and effective reputation calculations, which improves the accuracy of federated learning.…”
    Get full text
    Article
  6. 1946

    AI’s role in transforming learning environments: a review of collaborative approaches and innovations by Dwi Mariyono, Akmal Nur Alif Hd

    Published 2025-03-01
    “…By automating administrative tasks, AI allows educators to focus on fostering creativity and critical thinking. Ethical AI use: Institutions must establish ethical guidelines to prevent biases in algorithms and protect students’ data privacy, ensuring AI is a tool for equity rather than division. …”
    Get full text
    Article
  7. 1947

    Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme by Meng Wu, Xiufeng Zhao, Weitao Song

    Published 2025-03-01
    “…With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. …”
    Get full text
    Article
  8. 1948

    Incentivization and Aggregation Schemes for Federated Learning Applications by Vikas Hassija, Vaibhav Chawla, Vinay Chamola, Biplab Sikdar

    Published 2023-01-01
    “…This approach puts the privacy of the participants at risk. In this paper, federated learning (FL) is proposed for privacy-preserving collaborative model training on data distributed across IoT users. …”
    Get full text
    Article
  9. 1949

    Semantic Meta-Split Learning: A TinyML Scheme for Few-Shot Wireless Image Classification by Eslam Eldeeb, Mohammad Shehab, Hirley Alves, Mohamed-Slim Alouini

    Published 2025-01-01
    “…The proposed algorithm is tested using a data set of images of hand-written letters. …”
    Get full text
    Article
  10. 1950

    Feasibility and acceptability of a contextualized brief psychological intervention for people with bipolar disorder in rural Ethiopia by Mekdes Demissie, Charlotte Hanlon, Lauren C. Ng, Rosie Mayston, Abebaw Fekadu

    Published 2025-07-01
    “…We conducted a mixed-method evaluation, including in-depth qualitative interviews, fidelity ratings of a random selection of 25% of the audio recorded intervention sessions, and self-reported change in symptom severity. We used thematic analysis for qualitative data and descriptive analysis for quantitative data. …”
    Get full text
    Article
  11. 1951

    Artificial intelligence machine learning-driven outpatient appointment management: A qualitative study on acceptability by Kerry V. Wood, Daniel Frings, Chris Flood, Nicola Thomas

    Published 2025-06-01
    “…Interviews were analysed separately using Thematic Analysis, with one researcher coding and categorizing data, followed by discussions to refine themes and validate quotes. …”
    Get full text
    Article
  12. 1952

    Learning analytics in immersive virtual learning environments: a systematic literature review by Lei Tao, Mutlu Cukurova, Yanjie Song

    Published 2025-07-01
    “…However, these areas remain unevenly explored; (2) research has predominantly examined desktop-based immersive VLEs, while fewer studies have explored immersive virtual reality settings such as head-mounted displaysand cave automatic virtual environments; (3) higher education students have been the most frequently studied participants, with fewer studies involving K-12 students and adult learners; (4) most studies have employed data-driven approaches to identify behavioural patterns, but explicit theoretical frameworks have been used less frequently to guide analysis and interpretation; (5) behaviour data remains the most commonly used data type; (6) statistical methods such as regression and ANOVA dominate the analytical approaches, with machine learning and deep learning techniques remaining underutilised; and (7) challenges including technical complexity, data interpretability, privacy concerns, and adoption barriers impact the effectiveness and scalability of LA applications in immersive VLEs. …”
    Get full text
    Article
  13. 1953

    Web 3.0: The future of the decentralized Internet by Božić Tamara

    Published 2023-01-01
    “…Decentralization plays an important role in transferring power from providers to users, protecting privacy and regaining control over their information and data. …”
    Get full text
    Article
  14. 1954

    Federated learning for sustainable IoT appliance load monitoring at the edge devices by Gitanjali Wadhwa, Yuvaraj Natarajan, K. R. Sri Preethaa, M. P. Gopinath, M. Shyamala Devi

    Published 2025-07-01
    “…Using our federated learning-based load monitoring model, we can minimize energy consumption while maintaining high learning performance and preserving user privacy. …”
    Get full text
    Article
  15. 1955

    BSVA: blockchain-enabled secured vertical aggregation algorithm for transactions management in drug traceability framework by P. Bhuvaneshwari, Y. Harold Robinson, M. Bagya Lakshmi

    Published 2025-07-01
    “…The Certificate Authority is used to maintain a secure data-sharing process. The robust aggregation is used for the local models to process the chain code, ensuring the successful execution of the secured transaction. …”
    Get full text
    Article
  16. 1956

    Exploring mHealth app utilization for diabetes self-management: survey insights from a northern district in Malaysia by Premaa Supramaniam, Ying-Shan Beh, Suria Junus, Philip Rajan Devesahayam

    Published 2024-12-01
    “…Users perceived the mHealth app as useful (97.5%), yet faced challenges over the app initiation, charges and data security. …”
    Get full text
    Article
  17. 1957

    Enhancing medical image classification via federated learning and pre-trained model by Parvathaneni Naga Srinivasu, G. Jaya Lakshmi, Sujatha Canavoy Narahari, Jana Shafi, Jaeyoung Choi, Muhammad Fazal Ijaz

    Published 2024-09-01
    “…Federated learning (FL) offers a promising method for collaborative training on distributed data held by various entities, ensuring the privacy of patient information. …”
    Get full text
    Article
  18. 1958

    Addressing 6 challenges in generative AI for digital health: A scoping review. by Tara Templin, Monika W Perez, Sean Sylvia, Jeff Leek, Nasa Sinnott-Armstrong

    Published 2024-05-01
    “…Generative artificial intelligence (AI) can exhibit biases, compromise data privacy, misinterpret prompts that are adversarial attacks, and produce hallucinations. …”
    Get full text
    Article
  19. 1959

    Global Education Development Plan to Build Sustainable Education Based on Artificial Intelligence by Siti Marisa, Gunawan Gunawan, Evi Susilawati

    Published 2024-04-01
    “…Ethical aspects, student data privacy, and fairness in access and use of AI technology should be key concerns in designing sustainable global education development. …”
    Get full text
    Article
  20. 1960

    Collection and sharing of health information in mental health and related systems in Australia: perspectives of people who access mental health services by Anne Honey, Nicola Hancock, Helen Glover, Justin Newton Scanlan, Yidan Cao, Andrew Povolny, Mark Orr, Grenville Rose, Sumathi Govindasamy, Lorraine Smith, Naseem Ahmadapour

    Published 2024-12-01
    “…Focused group activities were conducted in which participants were asked to discuss and create a visual map to describe their collective experiences of sharing information relating to mental health and recovery. The data were analysed using qualitative content analysis and the coding techniques of constant comparative analysis. …”
    Get full text
    Article