Showing 2,041 - 2,060 results of 2,784 for search '((((( useds OR usedds) OR usedddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.27s Refine Results
  1. 2041

    Leveraging AI-Generated Virtual Speakers to Enhance Multilingual E-Learning Experiences by Sergio Miranda, Rosa Vegliante

    Published 2025-02-01
    “…Future research should focus on addressing ethical considerations, such as data privacy and algorithmic bias, and expanding the user base to include more languages and proficiency levels.…”
    Get full text
    Article
  2. 2042

    Encouraging gender-inclusive acceptance of multipurpose national-identity smart cards. by Yuen Yee Yen, P H P Yeow, Loo Wee Hong

    Published 2022-01-01
    “…The data was collected through five hundred questionnaires from Malaysia (the MNIS pioneer) and analyzed using structural equation modeling.…”
    Get full text
    Article
  3. 2043

    A systematic review of consumers’ and healthcare professionals’ trust in digital healthcare by Soraia de Camargo Catapan, Hannah Sazon, Sophie Zheng, Victor Gallegos-Rejas, Roshni Mendis, Pedro H. R. Santiago, Jaimon T. Kelly

    Published 2025-02-01
    “…Trust in digital healthcare is complex and, from a consumers’ perspective, can influence digital healthcare use, adoption, acceptance, and usefulness. Consumers’ trust can be affected by the degree of human interaction in automated interventions, perceived risks, privacy concerns, data accuracy, digital literacy, quality of the digital healthcare intervention, satisfaction, education, and income. …”
    Get full text
    Article
  4. 2044

    A Qualitative Study of HIV Testing Experiences and HIV Self-Testing Perspectives among Men in Northern Nigeria by Zubairu Iliyasu, Zikrillahi A. Haladu, Bilkisu Z. Iliyasu, Aminatu A. Kwaku, Nafisa S. Nass, Taiwo G. Amole, Hadiza M. Abdullahi, Amina U. Abdullahi, Fatimah I. Tsiga-Ahmed, Auwal Abdullahi, Humayra A. Bashir, Hamisu M. Salihu, Muktar H. Aliyu

    Published 2024-01-01
    “…Thematic analysis was employed to analyze the data, yielding key themes related to prior test experiences, knowledge of self-testing, and perceived ease of use, in addition to motivation for self-testing and concerns about reliability and counseling support. …”
    Get full text
    Article
  5. 2045

    Sybil Attack Detection Based on Signal Clustering in Vehicular Networks by Halit Bugra Tulay, Can Emre Koksal

    Published 2024-01-01
    “…We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. …”
    Get full text
    Article
  6. 2046

    Identifying latent mobility as a service preference segments among college students by Willy Kriswardhana, Domokos Esztergár-Kiss

    Published 2025-04-01
    “…The negative precautions regarding MaaS should be decreased by respecting data privacy and providing easy-to-use MaaS applications, while the perceived safety risks should be eliminated by providing emergency features. …”
    Get full text
    Article
  7. 2047

    Blockchain-Enabled Secure and Decentralized Resource Management for Open Radio Access Network Cellular Networks by Dheyaa Marjan Hussein Almuntifeky, Basim K. J. Al-shammari

    Published 2024-08-01
    “…This study proposes the use of blockchain technology for enhancing the security, privacy, and decentralized decision-making in Open RAN cellular networks. …”
    Get full text
    Article
  8. 2048

    Frequency of Episiotomy and Perineal Injury in Home Births and Influencing Factors by Emel Ay, Menekşe Nazlı Aker

    Published 2025-03-01
    “…The sample consisted of 159 women. The data were collected by using the Personal Information Form and Satisfaction Scale (Visual Analog Scale-Satisfaction).Results: Participants preferred home birth for reasons such as preserving privacy, avoiding IV oxytocin use, having their spouse present during labor, and preventing episiotomy. …”
    Get full text
    Article
  9. 2049

    Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications by Juan E. Tapia, Maximilian Russo, Christoph Busch

    Published 2025-01-01
    “…The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. …”
    Get full text
    Article
  10. 2050

    Description and utilization of the United States department of defense serum repository: a review of published studies, 1985-2012. by Christopher L Perdue, Angelia A Eick Cost, Mark V Rubertone, Luther E Lindler, Sharon L Ludwig

    Published 2015-01-01
    “…The Armed Forces Health Surveillance Center (AFHSC) information systems and open (online) sites were used as data sources. Through 2012, the repository contained 54,542,658 serum specimens, of which 228,610 (0.42%) have been accessed for any purpose. …”
    Get full text
    Article
  11. 2051

    The Impact of Digital Technologies on the Development of Payment Services by A. Y. Chentsov

    Published 2020-10-01
    “…The problems and ways of protecting user identification, data privacy and money safety when using electronic payment services are investigated. …”
    Get full text
    Article
  12. 2052

    Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review by Y Greeshma Vani, Suma B. Chalapathy, Pallavi Pandey, Shailendra K. Sahu, A Ramesh, Jayashree Sajjanar

    Published 2024-12-01
    “…However, issues such as data privacy, dental professional job displacement, and the necessity for thorough validation and regulation to ensure safety and efficacy remain significant concerns.…”
    Get full text
    Article
  13. 2053

    Generative adversarial networks (GANS) for generating face images by Dolly Indra, Muh Wahyu Hidayat, Fitriyani Umar

    Published 2025-07-01
    “…However, the use of public facial datasets such as CelebA and FFHQ faces limitations in representing global demographic diversity and raises privacy concerns. …”
    Get full text
    Article
  14. 2054

    Digital health tools in juvenile idiopathic arthritis: a systematic literature review by Jordi Anton, María Montoro, Estíbaliz Loza, Teresa Otón, Susan Ramirez, Diego Benavent

    Published 2025-05-01
    “…Tool development and validation processes were poorly or not at all described, and data regarding regulatory compliance, security, or privacy were scarce. …”
    Get full text
    Article
  15. 2055

    Self-Regulation of Internet Behaviors on Social Media Platforms by Clara B. Rebello, Kiana L. C. Reddock, Sonia Ghir, Angelie Ignacio, Gerald C. Cupchik

    Published 2024-10-01
    “…The current research sought a comprehensive understanding about the consequences of information-sharing behavior on social media, given public concerns about privacy violations. We used a mixed-methods approach to investigate the influence of the self on “revealing” and emotional “healing” experiences online. …”
    Get full text
    Article
  16. 2056

    Unveiling practical insights of eHealth implementation in Europe: a grey literature review on legal, ethical, financial, and technological (LEFT) considerations by B. E. Bente, N. Beerlage-de Jong, R. M. Verdaasdonk, J. E. W. C. van Gemert-Pijnen

    Published 2025-08-01
    “…Legal barriers include navigating complex regulatory frameworks, interpreting regulations, and concerns about data privacy. Facilitators focus on centralized governance and Europe's role in the global data market. …”
    Get full text
    Article
  17. 2057

    Prospective Applications of Artificial Intelligence In Fetal Medicine: A Scoping Review of Recent Updates by Miskeen E, Alfaifi J, Alhuian DM, Alghamdi M, Alharthi MH, Alshahrani NA, Alosaimi G, Alshomrani RA, Hajlaa AM, Khair NM, Almuawi AM, Al-Jaber KH, Elrasheed FE, Elhassan K, Abbas M

    Published 2025-01-01
    “…Despite these advancements, challenges related to the ethical use of AI, data privacy, and the need for extensive validation of AI tools in diverse populations were noted.Conclusion: The potential benefits of AI in fetal medicine are immense, offering a brighter future for our field. …”
    Get full text
    Article
  18. 2058

    Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption by Min Hou, Yue Wu

    Published 2025-01-01
    “…The participants’ private data are encoded as single photons, which are encrypted using a rotational encryption method. …”
    Get full text
    Article
  19. 2059

    Potential benefits and challenges of artificial intelligence in human resource management in public institutions by Kelvin M. Mwita, Felician Andrew Kitole

    Published 2025-05-01
    “…The findings on the perceived benefits of AI in HRM show that increased efficiency, better decision-making, and cost reduction are the top advantages, while ease of use ranks the lowest. However, challenges such as lack of expertise, data privacy concerns, high costs, and resistance to change remain significant barriers. …”
    Get full text
    Article
  20. 2060

    Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things by P. S. Klimushyn

    Published 2025-06-01
    “…It is noted that the analysis of the security of IoT communication technologies using specialised communication protocols across networks with different topologies, communication ranges and bandwidths is a pressing issue, as the number of security and privacy breaches in the IoT ecosystem is growing, which is constantly expanding in various sectors of the economy and human life with the introduction of billions of heterogeneous smart devices. …”
    Get full text
    Article