Showing 441 - 460 results of 2,784 for search '((((( usedds OR useddds) OR useddddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.30s Refine Results
  1. 441

    Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age by Ahmad Mansour, Khaled Alshaketheep, Hind Al-Ahmed, Ahmad Shajrawi, Arafat Deeb

    Published 2025-06-01
    “…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
    Get full text
    Article
  2. 442

    Social Media Suicide Watch by Katherine Prothro

    Published 2025-07-01
    “…There was an immediate backlash due to concerns over privacy and the potential for stalkers and bullies to misuse this data and encourage suicide or self-harm, like Roy’s girlfriend did. …”
    Get full text
    Article
  3. 443

    An Exact Top- Query Algorithm with Privacy Protection in Wireless Sensor Networks by Huang Haiping, Feng Juan, Wang Ruchuan, Qin XiaoLin

    Published 2014-02-01
    “…Aimed at the Top- k query problems in the wireless sensor networks (WSN) where enquirers try to seek the k highest or shortest reported values of the source nodes, using privacy protection technology, we present an exact Top- k query algorithm based on filter and data distribution table (shorted for ETQFD). …”
    Get full text
    Article
  4. 444

    Redefining customer connections in the UAE’s digital era: A study on emerging technological synergies by Hussam Ali, Ehab Haikal

    Published 2025-06-01
    “…This study investigates the socio-technical implications of IoT integration, particularly its effects on operational efficiency, customer engagement, digital inclusivity, ethical data practices, and sustainability. The research used a quantitative cross-sectional survey conducted from February to April 2024 across the UAE. …”
    Get full text
    Article
  5. 445
  6. 446

    Optimization of machine learning methods for de-anonymization in social networks by Nurzhigit Smailov, Fatima Uralova, Rashida Kadyrova, Raiymbek Magazov, Akezhan Sabibolda

    Published 2025-03-01
    “…Anonymity features are widely used to help individuals maintain their privacy, but they can also be exploited for malicious purposes. …”
    Get full text
    Article
  7. 447

    Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity Considerations by Peter Kováč, Peter Jackuliak, Alexandra Bražinová, Ivan Varga, Michal Aláč, Martin Smatana, Dušan Lovich, Andrej Thurzo

    Published 2024-06-01
    “…Current and future developments must focus on securing AI models against attacks, ensuring data integrity, and safeguarding the privacy of individuals within this technological landscape.…”
    Get full text
    Article
  8. 448
  9. 449

    ZK-STARK: Mathematical Foundations and Applications in Blockchain Supply Chain Privacy by Arade Madhuri S., Pise Nitin N.

    Published 2025-03-01
    “…Privacy is one of the major security concerns. The zero-knowledge proof enables the transmission of data from the sender to the receiver without disclosing the actual content of the data. …”
    Get full text
    Article
  10. 450

    A multimodal differential privacy framework based on fusion representation learning by Chaoxin Cai, Yingpeng Sang, Hui Tian

    Published 2022-12-01
    “…Then based on this representation, we use the Local Differential Privacy (LDP) mechanism to protect data. …”
    Get full text
    Article
  11. 451

    A deep decentralized privacy-preservation framework for online social networks by Samuel Akwasi Frimpong, Mu Han, Emmanuel Kwame Effah, Joseph Kwame Adjei, Isaac Hanson, Percy Brown

    Published 2024-12-01
    “…This paper addresses the critical challenge of privacy in Online Social Networks (OSNs), where centralized designs compromise user privacy. …”
    Get full text
    Article
  12. 452

    Children's digital privacy on fast-food and dine-in restaurant mobile applications. by Christine Mulligan, Grace Gillis, Lauren Remedios, Christopher Parsons, Laura Vergeer, Monique Potvin Kent

    Published 2025-02-01
    “…Restaurant mobile applications are powerful platforms for collecting users' data and are popular among children. This study aimed to provide insight into the privacy policies of top dine-in and fast-food mobile apps in Canada and data collected on child users. …”
    Get full text
    Article
  13. 453

    A Verifiable, Privacy-Preserving, and Poisoning Attack-Resilient Federated Learning Framework by Washington Enyinna Mbonu, Carsten Maple, Gregory Epiphaniou, Christo Panchev

    Published 2025-03-01
    “…Federated learning is the on-device, collaborative training of a global model that can be utilized to support the privacy preservation of participants’ local data. …”
    Get full text
    Article
  14. 454

    Jointly Achieving Smart Homes Security and Privacy through Bidirectional Trust by Osman Abul, Melike Burakgazi Bilgen

    Published 2025-04-01
    “…Once approved, users are primarily concerned about privacy protection (i.e., user-to-system trust) when utilizing system services that require sensitive data for their functionality. …”
    Get full text
    Article
  15. 455

    Challenges in IoMT Adoption in Healthcare: Focus on Ethics, Security, and Privacy by Alton Mabina, Neo Rafifing, Boago Seropola, Thapelo Monageng, Pulafela Majoo

    Published 2024-12-01
    “…This study highlights ethical, security, and privacy barriers to IoMT adoption in developing countries and proposes strategies like regulatory frameworks, data encryption, AI transparency, and professional training to address these challenges. …”
    Get full text
    Article
  16. 456

    PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels by Anastasios N. Bikos

    Published 2025-05-01
    “…Our pre-prototyped framework can provide such privacy preservation (namely <i>virtual proof of privacy (VPP)</i>) and visually secure data transfer promptly (<1000 ms), as well as the physical distance of the smart glasses (∼50 cm).…”
    Get full text
    Article
  17. 457

    Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks by Hongning Li, Qingqi Pei, Wenjing Zhang

    Published 2016-07-01
    “…In this paper, to make full use of idle spectrum with low probability of location leakage, we propose a Location Privacy-Preserving Channel Allocation (LP-p CA) scheme. …”
    Get full text
    Article
  18. 458

    GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks by Nges Brian Njungle, Eric Jahns, Zhenqi Wu, Luigi Mastromauro, Milan Stojkov, Michel A. Kinsy

    Published 2025-01-01
    “…Machine learning has become integral to our lives, finding applications in nearly every aspect of our daily routines. However, using personal information in machine learning applications has raised concerns about user data privacy and security. …”
    Get full text
    Article
  19. 459

    A Privacy-Preserving Querying Mechanism with High Utility for Electric Vehicles by Ugur Ilker Atmaca, Sayan Biswas, Carsten Maple, Catuscia Palamidessi

    Published 2024-01-01
    “…Simultaneously, personal data use for analytics is growing at an unprecedented rate, raising concerns for privacy. …”
    Get full text
    Article
  20. 460

    PPSC: High-Precision and Scalable Encrypted Privacy-Preserving Speech Classification by WANG Leilei, SONG Kao, ZHANG Yuanyuan, BI Renwan, XIONG Jinbo

    Published 2025-02-01
    “…Secondly, the PPSC scheme securely implements the fundamental modules such as the convolutional layer, ReLU layer, average pooling layer, fully connected layer, and Softmax layer. This ensures the privacy of speech data, speech classification models, and intermediate computing results. …”
    Get full text
    Article