Showing 1,121 - 1,140 results of 2,784 for search '((((( usedds OR usedddds) OR usedddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.26s Refine Results
  1. 1121
  2. 1122

    Ethical Design of Data-Driven Decision Support Tools for Improving Cancer Care: Embedded Ethics Review of the 4D PICTURE Project by Marieke Bak, Laura Hartman, Charlotte Graafland, Ida J Korfage, Alena Buyx, Maartje Schermer

    Published 2025-04-01
    “…The 4D PICTURE (Producing Improved Cancer Outcomes Through User-Centered Research) project aims to support patients, their families, and clinicians with these complex decisions by developing data-driven decision support tools (DSTs) for patients with breast cancer, prostate cancer, and melanoma as part of care path redesign using a methodology called MetroMapping. …”
    Get full text
    Article
  3. 1123

    A systematic review of digital twins’ potential for citizen participation and influence in land use agenda-setting by David Adade, Walter Timo de Vries

    Published 2025-04-01
    “…The findings also reveal two ways of citizen participation: (1) providing data for developing digital twins and (2) utilising digital twins to analyse and identify key land use challenges and to push forward land use claims and proposals within a policy system.…”
    Get full text
    Article
  4. 1124
  5. 1125

    Applications of blockchain technology in long-term care: use cases, potentials, and barriers by Beate Steurer, Birgit Trukeschitz, Ulrike Schneider

    Published 2024-10-01
    “…Abstract Background Digitalization in long-term care (LTC) is being discussed as a means of easing pressures on care service delivery, optimizing care coordination and planning processes, and improving service quality. With its advanced data protection and process automation features, blockchain technology could help solve data security and privacy issues, especially for the implementation of assistive technologies. …”
    Get full text
    Article
  6. 1126

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  7. 1127

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  8. 1128

    FedCVG: a two-stage robust federated learning optimization algorithm by Runze Zhang, Yang Zhang, Yating Zhao, Bin Jia, Wenjuan Lian

    Published 2025-05-01
    “…Abstract Federated learning provides an effective solution to the data privacy issue in distributed machine learning. …”
    Get full text
    Article
  9. 1129

    Teachers’ digital literacy competencies according to their age status and their level of use in classes by Gökbulut Burak, Yeniasır Mustafa, Gökbulut Özlem Dağlı

    Published 2024-01-01
    “…Digital literacy means that individuals know how to properly use digital platforms/tools both for their personal development and for solving everyday problems, mastering information technologies and being aware of issues such as legal responsibility, data protection, security and ethics. …”
    Get full text
    Article
  10. 1130
  11. 1131

    The Use of ChatGPT in English Language Learning: A Systematic Literature Review by Nur Hidayati, Erna Andriyanti, Novasa Adiyani

    Published 2025-03-01
    “…Following PRISMA guidelines, this review analyzes data from Scopus, ERIC, and Google Scholar using thematic analysis to identify key themes. …”
    Get full text
    Article
  12. 1132

    Big Data Analytics for Mental Health Education: A New Framework for University-Level Evaluation under Linguistic Confidence Interval Neutrosophic Numbers by Hong Zhu

    Published 2025-05-01
    “…Ten criteria—including accessibility, awareness, analytics integration, and data ethics—are used to evaluate a diverse set of intervention alternatives ranging from AI-based detection systems to immersive VR training. …”
    Get full text
    Article
  13. 1133
  14. 1134

    The use of micromobility riding simulators in road safety research: a systematic review by Charitha Dias, Qinaat Hussain, Muhammad Abdullah

    Published 2025-09-01
    “…Collecting real-world and field data involves numerous challenges due to ethical, privacy, and safety concerns. …”
    Get full text
    Article
  15. 1135
  16. 1136

    A review of the use of technology in sport coaching: current trends and future directions by Fadli Ihsan, Ahmad Nasrulloh, Sigit Nugroho, Rina Yuniana

    Published 2025-03-01
    “…Various technological tools and applications have been developed to help coaches analyze athlete performance, monitor physical condition, provide feedback, and make decisions based on objective, real-time data. Conclusion The use of technology in sports training offers promising benefits but also presents challenges. …”
    Get full text
    Article
  17. 1137

    Use of ChatGPT in Education: Future Strategic Road Map with SWOT Analysis by Mustafa Taktak , Mehmet Şükrü Bellibaş , Mustafa Özgenel

    Published 2024-10-01
    “…However, concerns have been raised regarding ethical issues such as data privacy, security, plagiarism, bias, and the potential for commercial exploitation, as well as negative psychological impacts on users. …”
    Get full text
    Article
  18. 1138

    Federated knee injury diagnosis using few shot learning by Chirag Goel, Anita X, Jani Anbarasi L

    Published 2025-07-01
    “…While deep learning approaches have shown promise in identifying knee injuries from MRI scans, they often require large amounts of labeled data, which can be both scarce and privacy-sensitive.MethodsThis paper analyses a hybrid methodology that integrates few-shot learning with federated learning for the diagnosis of knee injuries using MRI scans. …”
    Get full text
    Article
  19. 1139

    Ethical Challenges of Using the Internet of Behavior in the Medical and Healthcare Practice by Zahra Sadeqi-Arani, Esmaeil Mazroui Nasrabadi

    Published 2024-11-01
    “…These include concerns about privacy, data security, transparency, behavioral manipulation, equity in access, and the psychological and social consequences of continuous monitoring. …”
    Get full text
    Article
  20. 1140

    Use of AI in Mental Health Care: Community and Mental Health Professionals Survey by Shane Cross, Imogen Bell, Jennifer Nicholas, Lee Valentine, Shaminka Mangelsdorf, Simon Baker, Nick Titov, Mario Alvarez-Jimenez

    Published 2024-10-01
    “…The surveys collected data on demographics, technology comfort, attitudes toward AI, specific AI use cases, and experiences of benefits and harms from AI use. …”
    Get full text
    Article