Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
741
Data Protection in Employment: Implications of the Personal Data Protection Act in Tanzania
Published 2025-07-01“…Innovations in technology, their varied uses, and the widespread use of social media have all advanced more quickly than in the past, both globally and in the workplace, where employee and customer data is constantly being collected and digitally documented. …”
Get full text
Article -
742
Automatisk Nummerpladegenkendelse (ANPG)
Published 2022-04-01“…The wider scope of personal data used in investigations increasingly threatens the right to privacy. …”
Get full text
Article -
743
Architectural Design for Data Security in Cloud-based Big Data Systems
Published 2024-09-01“…The architectural style and structure chosen for a system should be based on the non-functional system requirements. Big Data technologies are used to store handles huge amounts of operational data in the public domain. …”
Get full text
Article -
744
Islands of data: cultivating an open data landscape for sustainable development in the Caribbean
Published 2024-12-01“…Efforts made towards data-sharing must consider privacy, security and the ethical use of information, and the tension between data as a social good and data for commercial gain can be a determinant of data-sharing decisions. …”
Get full text
Article -
745
Critical Factors in Young People’s Use and Non-Use of AI Technology for Emotion Regulation: A Pilot Study
Published 2025-07-01“…Data were collected through semi-structured face-to-face interviews and were analysed using NVivo 11 software. …”
Get full text
Article -
746
Hybrid-chain-based supervision scheme for privacypreserving trading system
Published 2023-12-01“…Due to its characteristics of decentralization, transparency, and security, blockchain technology is widely used in finance, the Internet of Things, and supply chain.However, along with the opportunities it brings, the application of blockchain technology also presents new challenges.On one hand, traditional centralized regulatory methods can undermine the decentralized and autonomous nature of blockchain, creating regulatory dilemmas.On the other hand, blockchain-based systems require privacy protection as transactions often contain sensitive information beyond currency amounts.Failure to protect privacy can result in information leakage and make it difficult for authorities to monitor transactions.To address these challenges and enable regulation in privacy-preserving blockchain-based trading systems, a hybrid chain framework was proposed.This framework incorporated a multiple committee-based approach for general cross-chain regulation.Separate committees were established for the supervision chain and service chain.The service chain committee handled service chain data, generating and sending proofs to the supervision chain to achieve private supervision.In addition to single-chain regulation, cross-chain communication committees and supervision committees collaborated to achieve cross-chain transaction supervision among different service chains.Through a security analysis, it is proven that the proposed scheme is secure when each module meets its security requirements.Experimental evaluations have been conducted to demonstrate the feasibility of the proposed scheme, showing that it achieves cross-chain supervision at a low cost and is scalable.…”
Get full text
Article -
747
Patients’ perspective about synchronous teleconsultation with a general practitioner: a mixed-method systematic literature review
Published 2025-08-01“…Patient characteristics, including age, socioeconomic status, and technology familiarity, impact acceptance. Privacy concerns, data security, and diagnostic accuracy remain significant barriers. …”
Get full text
Article -
748
Social media applications through the lens of DeLone and McLean’s information system success model: does perceived privacy matter?
Published 2025-07-01“…Therefore, this study explores the impact of perceived privacy on the relationship between tripartite quality constructs, user satisfaction, and continual usage using DeLone and McLean’s information system success (ISS) model. …”
Get full text
Article -
749
Generative AI-Based Judicial Ruling Disclosure System Innovation: A Legal and Technological Approach to Balancing Privacy Protection and the Right to Information
Published 2025-06-01“…Using actual court data, we compared the performance of fine-tuned sLLMs with that of few-shot Large Language Models (LLMs, e.g., GPT-4o). …”
Get full text
Article -
750
The effect of social grooming via live photo-sharing on well-being: the mediating role of social capital and moderating role of the need for privacy
Published 2025-07-01“…However, the spontaneous nature of live photos may unintentionally reveal audio or visual details, raising privacy concerns. Previous research has not fully explored why users share live photos despite these risks, nor how live photo sharing affects users’ well-being from a social grooming perspective.MethodsWe surveyed 266 users of WeChat Moments and analyzed the data using a moderated mediation model. …”
Get full text
Article -
751
Privacy Concerns Versus Personalized Health Content—Pregnant Individuals’ Willingness to Share Personal Health Information on Social Media: Survey Study
Published 2025-02-01“…MethodsWe designed and deployed an electronic survey to pregnant individuals worldwide electronically in 2023. We used the classical Internet Users’ Information Privacy Concerns (IUIPC) model to examine how privacy concerns modulate pregnant individuals’ behaviors and beliefs regarding risk and trust when using social media for health purposes. …”
Get full text
Article -
752
#BeSeen: understanding young people’s views of the motivation and impacts of sharing self-harm imagery online and use of their social media data for research—a UK participatory art...
Published 2024-07-01“…Participants from the RAS group were more inclined to agree to their data being used and had higher levels of trust in government.Conclusion Young people care about their privacy and use of their data even when it is publicly available. …”
Get full text
Article -
753
Secure and Reversible Face De-Identification With Format-Preserving Encryption
Published 2025-01-01“…In conclusion, the proposed method provides a robust privacy-preserving solution for facial data in digital environments, balancing security and utility while supporting lawful restoration.…”
Get full text
Article -
754
MANAJEMEN PRIVASI KOMUNIKASI MEDIA SOSIAL TWITTER OLEH MAHASISWA UNY COMMUNICATION PRIVACY MANAGEMENT OF SOCIAL MEDIA TWITTER BY UNY COLLEGE STUDENT
Published 2023-03-01“…The process of collecting data using the interview method. Test the validity of the data using source triangulation techniques, as well as four stages of data analysis: collection, reduction, presentation, and drawing conclusions. …”
Get full text
Article -
755
CPS-IIoT-P2Attention: Explainable Privacy-Preserving With Scaled Dot-Product Attention in Cyber-Physical System-Industrial IoT Network
Published 2025-01-01“…The findings revealed that the scaled dot product attention mechanism dramatically boosts model performance, while Pearson correlation and agglomerative clustering safeguard data privacy in CPS-IIoT, surpassing the performance of existing state-of-the-art (SOTA) models. …”
Get full text
Article -
756
-
757
Analysis of the Obstacles to Ethical Use of Artificial Intelligence
Published 2025-05-01“…Results: The results show that among the 6 identified barriers (lack of accountability, lack of transparency, lack of legal regulations, possibility of bias and discrimination, violation of data privacy, and violation of social justice and livelihood of individuals), the barrier of lack of transparency, followed by the lack of legal regulations, are considered to be the most important and influential barriers to the ethical use of AI. …”
Get full text
Article -
758
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems
Published 2024-09-01“…Access policies are uploaded to the cloud, stored, and downloaded in plain text, making them vulnerable to privacy breaches. When the access policy is completely hidden, users need to use their own attributes to try matching one by one, which is an inefficient process. …”
Get full text
Article -
759
The Use of Blockchain Technology in the Food Traceability System
Published 2025-07-01“…To enhance clarity, the paper examines a use case related to agricultural inputs, commodities, and products in the cereals sector to illustrate the application of data collection devices and the role of blockchain technology in data validation, storage, security, and transmission. …”
Get full text
Article -
760
Digital evidence and its use for criminal proceedings
Published 2025-07-01“…By examining these aspects, the paper contributes to a deeper understanding of how digital evidence is utilized in criminal investigations and legal proceedings, advocating for legislative updates to address the growing importance of digital data in modern criminal cases. Furthermore, it underscores the need for careful consideration of privacy rights and proportionality when dealing with personal information obtained from digital devices and online platforms. …”
Get full text
Article