Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
1001
The impact of algorithm awareness training on competent interaction with intelligent voice assistants
Published 2025-05-01Get full text
Article -
1002
SHARED DECISION MAKING AND AI ROLE IN NON-FINANCIAL PERFORMANCE: EXPLORING MODERATING ROLE OF TOP MANAGEMENT SUPPORT AND SECURITY
Published 2025-03-01“… This research investigates the effect of shared decision-making on non-financial performance, with specific attention to the mediating effect of using AI and the moderation effects of security and privacy concerns and top management support. …”
Get full text
Article -
1003
SHARED DECISION MAKING AND AI ROLE IN NON-FINANCIAL PERFORMANCE: EXPLORING MODERATING ROLE OF TOP MANAGEMENT SUPPORT AND SECURITY
Published 2025-03-01“… This research investigates the effect of shared decision-making on non-financial performance, with specific attention to the mediating effect of using AI and the moderation effects of security and privacy concerns and top management support. …”
Get full text
Article -
1004
Data stewardship and curation practices in AI-based genomics and automated microscopy image analysis for high-throughput screening studies: promoting robust and ethical AI applicat...
Published 2025-02-01“…However, these advancements generate vast datasets requiring effective data stewardship and curation practices to maintain data integrity, privacy, and accessibility. …”
Get full text
Article -
1005
A practical guide to apply AI in childhood cancer: Data collection and AI model implementation
Published 2024-12-01“…This review also outlines the rules and criteria for collecting, processing, and sharing these data. Informed consent and re-consent are required for data collection and re-use, and data quality, privacy, and security as well as data standardisation, harmonisation and interoperability are important for data processing. …”
Get full text
Article -
1006
Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs
Published 2025-04-01“…Using blockchain ensures secure and trustworthy communication, transparency in data sharing, maintenance of trust among nodes, and protection of user privacy. …”
Get full text
Article -
1007
Secure Blockchain Integration Approach for Knowledge Discovery in Industrial Internet of Things
Published 2025-01-01Get full text
Article -
1008
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm.
Published 2025-01-01“…However, when dealing with high-dimensional medical data, the inherent transparency of blockchain conflicts with the necessity of protecting patient privacy. …”
Get full text
Article -
1009
Securing LLM Workloads With NIST AI RMF in the Internet of Robotic Things
Published 2025-01-01Get full text
Article -
1010
An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
Published 2020-05-01“…With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. …”
Get full text
Article -
1011
Patients’ perspective about synchronous teleconsultation with a general practitioner: a mixed-method systematic literature review
Published 2025-08-01“…Patient characteristics, including age, socioeconomic status, and technology familiarity, impact acceptance. Privacy concerns, data security, and diagnostic accuracy remain significant barriers. …”
Get full text
Article -
1012
Digital twins, synthetic patient data, and in-silico trials: can they empower paediatric clinical trials?
Published 2025-05-01“…However, such digital innovations have been rarely used in paediatric trials. In this Viewpoint, we propose using virtual patient data to empower paediatric trials. …”
Get full text
Article -
1013
HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes
Published 2024-01-01“…Furthermore, the scheme supports attribute revocation and forward secrecy to enhance user privacy. The security of HA-Med is rigorously verified through theoretical analysis, and its feasibility is demonstrated through experiments conducted using the Java-based JPBC library.…”
Get full text
Article -
1014
Harnessing multi-source data for AI-driven oncology insights: Productivity, trend, and sentiment analysis
Published 2025-03-01“…The most prominent article emphasized the Explainability of AI methods (XAI) with a profound discussion of their potential implications and privacy in data fusion contexts. Current trends involve the utilization of supervised learning methods such as CNN, Bayesian networks, and extreme learning machines for various cancers, particularly breast, lung, brain, and skin cancer. …”
Get full text
Article -
1015
Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
Published 2025-01-01“…Data breaches in the government sector are severe threats to cybersecurity and illegal acts that flagrantly violate security and privacy laws. …”
Get full text
Article -
1016
GABs: A Game-Based Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks
Published 2015-03-01“…The content herein models homogeneous WSN environment of highly linked nodes, in a theoretical game with synchronized actions, where, in order to transmit their readings securely across the network in some level of hierarchy, using the technique of data aggregation, sensor nodes with communication and computational resources constraint should establish trusted and direct links between their neighbors for the privacy and integrity of their data against faulty nodes, while ensuring energy saving. …”
Get full text
Article -
1017
Security access permission authentication simulation of multi-source network big data based on blockchain
Published 2024-02-01“…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
Get full text
Article -
1018
F-DATA: A Fugaku Workload Dataset for Job-centric Predictive Modelling in HPC Systems
Published 2025-07-01“…The encoding is based on a Natural Language Processing model and retains sensitive but useful job information for prediction purposes without violating privacy concerns.…”
Get full text
Article -
1019
CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data Generation
Published 2025-02-01“…It employs a data generator that integrates artificially generated data with the existing data from local clients by employing label correction and data generation techniques. …”
Get full text
Article -
1020
Next Arrival and Destination Prediction via Spatiotemporal Embedding with Urban Geography and Human Mobility Data
Published 2025-02-01“…However, trajectory data are often mutilated because of personal privacy and hardware limitations, i.e., we usually can only obtain partial trajectory information. …”
Get full text
Article