Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
1221
Security analysis of cyber physical system using digital forensic incident response
Published 2024-01-01Get full text
Article -
1222
The Possibilities of Legal Leveling of Political, Organizational and Managerial Risks of Using Artificial Intelligence
Published 2025-07-01“…The absence of human morality in artificial intelligence is emphasized, leading to ethical concerns regarding AI application, data privacy issues, the creation and spread of misinformation (for example, deepfakes), AI-driven discrimination, and unequal access to AI technologies. …”
Get full text
Article -
1223
USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT
Published 2023-12-01“…Moreover, federated learning systems present a promising solution for ensuring privacy and security when dealing with sensitive financial data. …”
Get full text
Article -
1224
Using Digital Phenotyping to Discriminate Unipolar Depression and Bipolar Disorder: Systematic Review
Published 2025-05-01“…Digital phenotyping, which involves using data from smartphones or other digital devices to assess mental health, has emerged as a promising tool for distinguishing between these two disorders. …”
Get full text
Article -
1225
Multi-Modal Comparative Analysis on Audio Dub Detection Using Artificial Intelligence
Published 2025-01-01“…The audio files are segmented using libROSA, the Python package for analysis of music and audio files. …”
Get full text
Article -
1226
Insights Gained from Using AI to Produce Cases for Problem-Based Learning
Published 2025-02-01“…ChatGPT respects patient data privacy and confidentiality by abstaining from providing scanned images, and while AI can generate discussion questions for tutorials, it may require modification to enhance specificity and provoke critical thought. …”
Get full text
Article -
1227
Generative AI on professional development: a narrative inquiry using TPACK framework
Published 2025-06-01“…However, challenges such as technical skill gaps, ethical concerns about data privacy, and the risk of over-reliance on AI, which may hinder critical thinking and teacher-student rapport, were identified. …”
Get full text
Article -
1228
The use of modern e-health services including telemedicine and telepharmacy for remote patient care in Saudi Arabia
Published 2025-01-01“…Participants reported perceived risks regarding privacy and data protection, and clinical risks associated with using e-health tools. …”
Get full text
Article -
1229
An Insight on the Timely Diagnosis of Diabetic Retinopathy Using Traditional and AI-Driven Approaches
Published 2025-01-01Get full text
Article -
1230
Artificial Intelligence in Education: Analysis and Assessment of Legal Knowledge Using AI Tools
Published 2025-08-01“…The study examined ethical concerns such as algorithmic bias, transparency, and student privacy, as well as legal dimensions related to consent, data protection, and institutional responsibility. …”
Get full text
Article -
1231
The algorithmic consumer: A conceptual investigation of AI’s influence on consumer preferences and decisions
Published 2025-08-01“…By a thorough literature review and commentary, I critically analyzed the impact of AI’s personalization algorithm and addressed ethical implications in terms of potential bias, data privacy, and transparency. This paper establishes a conceptual framework to illustrate how AI technologies, including machine learning, natural language processing, and predictive analytics, intersect with facets of consumer psychology, allowing for personalization of experiences, market segmentation, and influencing behaviour in real time. …”
Get full text
Article -
1232
OPPORTUNITIES AND RISKS OF USING AI-BASED APPLICATIONS IN RESEARCH: THE CASE OF UKRAINIAN UNIVERSITIES
Published 2025-02-01“…However, respondents did not express major concerns regarding ethical issues like data privacy, ghost authorship, or dishonesty and irresponsibility in the use of AI systems. …”
Get full text
Article -
1233
A qualitative study on ethical issues related to the use of AI-driven technologies in foreign language learning
Published 2025-07-01“…The results also highlight several grave ethical issues related to privacy in foreign language learning apps. This is the first research drawing attention to the topic of ethical issues when using AI-driven foreign language learning apps and it can be considered a pioneering work in this neglected area.…”
Get full text
Article -
1234
Development and implementation of an electronic health record system for use in humanitarian emergencies, disaster response, and conflict zones.
Published 2025-01-01“…Ongoing and future work in adapting electronic health records to international humanitarian response will emphasize data security, patient privacy, equity, and the rapid translation of electronic health data to improve population health. …”
Get full text
Article -
1235
-
1236
“When he is around, I’ll take the PrEP, but when he is not, I will not take PrEP”: key influences on PrEP use decisions among women attending family planning clinics in Kenya
Published 2025-07-01“…Participants expressed a preference for alternative PrEP formulations, such as injectable PrEP, due to perceived ease of use, privacy, and potential to support adherence.ConclusionPrEP discontinuation and restart cycles largely reflected changes in HIV risk. …”
Get full text
Article -
1237
FedDB: A Federated Learning Approach Using DBSCAN for DDoS Attack Detection
Published 2024-11-01Get full text
Article -
1238
-
1239
Leveraging dual‐blockchain collaboration for logistics supply chain supervision
Published 2024-12-01“…Current blockchain‐based LSC features distributed structure and data privacy requirements, hindering the supervision of logistics transactions. …”
Get full text
Article -
1240
Research on insider threat detection based on personalized federated learning and behavior log analysis
Published 2025-06-01“…Drawing on the DeepInsight concept, we convert different data types into image formats for use with Convolutional Neural Networks (CNNs) to train insider threat detection models. …”
Get full text
Article