Showing 1 - 20 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.23s Refine Results
  1. 1

    INSURANCE DEVELOPMENTS IN THE LIGHT OF DATA USE by NADJIA, Madaoui

    Published 2023-12-01
    “…It aims to assess the extent to which existing legal regulations can safeguard policyholders from potential mistreatment resulting from the use of such methodologies. The study concludes that despite the safeguards offered by data and consumer protection laws, the unregulated and unconstrained application of data analytics and algorithms in risk evaluation could potentially harm policyholders by infringing on their privacy and leading to discrimination, thereby impinging on their rights.…”
    Get full text
    Article
  2. 2

    Privacy-Conducive Data Ecosystem Architecture: By-Design Vulnerability Assessment Using Privacy Risk Expansion Factor and Privacy Exposure Index by Ionela Chereja, Rudolf Erdei, Daniela Delinschi, Emil Pasca, Anca Avram, Oliviu Matei

    Published 2025-06-01
    “…The increasing complexity of data ecosystems demands advanced methodologies for systematic privacy risk assessment. …”
    Get full text
    Article
  3. 3

    Solving Truthfulness-Privacy Trade-Off in Mixed Data Outsourcing by Using Data Balancing and Attribute Correlation-Aware Differential Privacy by Abdul Majeed, Seong Oun Hwang

    Published 2025-01-01
    “…Anonymization methods are mostly used in data outsourcing to protect privacy; however, it is very hard to apply anonymity to datasets of poor quality while maintaining an equilibrium between privacy, utility, and truthfulness (i.e., ensuring the values in anonymized data are consistent with the real data). …”
    Get full text
    Article
  4. 4

    Crowdsourced data leaking user's privacy while using anonymization technique by Naadiya Mirbahar Mirbahar, Kamlesh Kumar, Asif Ali Laghari, Mansoor Ahmed Khuhro

    Published 2025-04-01
    “…However, this may pose privacy risks to data owners, even though the data collectors usually anonymize the data before crowdsourcing. …”
    Get full text
    Article
  5. 5
  6. 6

    Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage by Geontae Noh, Ji Young Chun, Ik Rae Jeong

    Published 2014-01-01
    “…Researchers are able to obtain valuable information that they would not otherwise be able to access; however, privacy concerns arise when sharing clinical data in these outsourced publicly available data storage services. …”
    Get full text
    Article
  7. 7

    Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence by Youyang Qu, Lichuan Ma, Wenjie Ye, Xuemeng Zhai, Shui Yu, Yunfeng Li, David Smith

    Published 2023-12-01
    “…Linkage attack is a type of dominant attack in the privacy domain, which can leverage various data sources for private data mining. …”
    Get full text
    Article
  8. 8

    Design of Privacy Preservation Model for Data Stream Using Condensation Based Anonymization by Latha P, Thangaraj M

    Published 2025-08-01
    “…The condensation method minimizes lost information throughout the anonymization process in an effort to maintain the statistical features of the data. Using generalization and suppression approaches, k-Anonymity obscures identifying information in datasets, making it a useful tool for protecting individual privacy. …”
    Get full text
    Article
  9. 9

    Privacy-preserving recommender system using the data collaboration analysis for distributed datasets. by Tomoya Yanagi, Shunnosuke Ikeda, Noriyoshi Sukegawa, Yuichi Takano

    Published 2025-01-01
    “…To this end, we establish a framework for privacy-preserving recommender systems using the data collaboration analysis of distributed datasets. …”
    Get full text
    Article
  10. 10

    Exploring the association between cultural values and the intention to use digital data wallets by Varvara Keba, Tiago Oliveira, Melanie Trabandt

    Published 2025-12-01
    “…We developed a model to examine the intention to use digital data wallets – new privacy-enhancing tools based on the privacy calculus theory and Hofstede's cultural values. …”
    Get full text
    Article
  11. 11

    Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering by Ming Li, Lanlan Wang, Haiju Fan

    Published 2020-02-01
    “…In this article, a novel scheme for data hiding in encrypted domain is proposed using fuzzy C-means clustering and compressive sensing technologies to protect privacy of the host image. …”
    Get full text
    Article
  12. 12

    Enhance differential privacy mechanisms for clinical data analysis using CNNs and reinforcement learning by Rakesh Batchala, Priyank Jain, Manasi Gyanchandani, Sanyam Shukla, Rajesh Wadhvani

    Published 2025-07-01
    “…The primary emphasis is on predicting and optimizing ventilation and sedation strategies for patients in Intensive Care Units. We safeguard patient data in the MIMIC-III dataset while preserving analytical utility by integrating differential privacy techniques, such as Gaussian, Laplace, Exponential, Zero-Concentrated, and Rényi mechanisms. …”
    Get full text
    Article
  13. 13

    Privacy-Preserving Healthcare Data Interactions: A Multi-Agent Approach Using LLMs by Carmen De Maio, Giuseppe Fenza, Domenico Furno, Teodoro Grauso, Vincenzo Loia

    Published 2025-03-01
    “…This study builds on prior research [1] by introducing a multi-agent system that uses Large Language Models (LLMs) for secure interactions with healthcare data. …”
    Get full text
    Article
  14. 14
  15. 15

    Protecting Privacy on Social Media: Mitigating Cyberbullying and Data Heist Through Regulated Use and Detox, with a Mediating Role of Privacy Safety Motivations by Jing Niu, Bilal Mazhar, Inam Ul Haq, Fatima Maqsood

    Published 2024-12-01
    “…Analyzing survey responses from 1,000 social media users in Pakistan, ranging in age from 18 years to over 50, and using the snowball sampling technique, our findings reveal that awareness of online information disclosure mediates the relationship between data theft and regulated social media use. …”
    Get full text
    Article
  16. 16
  17. 17

    Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN by Saleh Alabdulwahab, Young-Tak Kim, Yunsik Son

    Published 2024-11-01
    “…This study proposes a privacy-preserving synthetic data generation method using a conditional tabular generative adversarial network (CTGAN) aimed at maintaining the utility of IoT sensor network data for IDS while safeguarding privacy. …”
    Get full text
    Article
  18. 18
  19. 19

    Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations by Marzieh Faridi Masouleh, Ali Harounabadi, Asal Sayyad

    Published 2022-03-01
    “…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
    Get full text
    Article
  20. 20

    Perturbation based privacy preservation and classification using Jaya Algorithm and Dragonfly Inspired Algorithm by Dipanwita Sen, Bhupati Bhusan Mishra, Prasant Kumar Pattnaik

    Published 2025-06-01
    “…That is why, privacy preservation of data for healthcare dataset is a significant consideration. …”
    Get full text
    Article