Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
2101
A Review of Asynchronous Byzantine Consensus Protocols
Published 2024-12-01“…Blockchain technology can be used in the IoT to ensure the data privacy collected by sensors. …”
Get full text
Article -
2102
Consumption of boutique hotel experiences as revealed by electronic word-of-mouth
Published 2019-07-01“…The research considered prior studies on experiential consumption, as well as publications focused on understanding postmodern individuals. Netnography was used to collect data on – and analyse – post-consumption behaviours boutique hotels. …”
Get full text
Article -
2103
A Comparative Analysis of Artificial Intelligence Regulatory Law in Asia, Europe, and America
Published 2024-01-01“…The study employs normative research, which in this context focuses on analyzing legal frameworks, principles, and regulations governing AI. Data collection techniques include the study of legal documents such as laws and regulations, along with a qualitative analysis using comparative methods. …”
Get full text
Article -
2104
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Published 2025-01-01“…However, the lack of transparency in obfuscated code raises significant ethical concerns, including the potential for harmful or unethical uses such as hidden data collection, malicious features, back doors, and concealed vulnerabilities. …”
Get full text
Article -
2105
Integrating Machine Learning and IoT for Effective Plant Disease Management
Published 2025-01-01“…Further, the framework is structured for privacy of data and security using strong encryption and secure access protocols. …”
Get full text
Article -
2106
Updatable Multi-User Dynamic Searchable Encryption Scheme with Bidirectional Verification
Published 2025-06-01“…The scheme enables secure dynamic data sharing in multi-user scenarios by constructing an index structure using homomorphic message authentication codes and bitmaps. …”
Get full text
Article -
2107
Patients’ and Healthcare Personnel’s Experiences of Health Coaching with Online Self-Management in the Renewing Health Project
Published 2017-01-01“…To describe patients’ and healthcare personnel’s experiences of using health coaching with online self-management in primary health care. …”
Get full text
Article -
2108
Predictors of Women’s Satisfaction with Hospital-Based Intrapartum Care in Asmara Public Hospitals, Eritrea
Published 2017-01-01“…The key predictors of satisfaction with intrapartum care were provision of clean bed and beddings (AOR = 18.87, 2.33–15.75), privacy during examinations (AOR = 10.22, 4.86–21.48), using understandable language (AOR = 8.72, 3.57–21.27), showing how to summon for help (AOR = 8.16, 4.30–15.48), showing baby immediately after birth (AOR = 8.14, 2.87–23.07), control of the delivery room (AOR = 6.86, 2.65–17.75), receiving back massage (AOR = 6.43, 3.23–12.81), toilet access and cleanliness (AOR = 6.09, 3.25–11.42), availability of chairs for relatives (AOR = 5.96, 3.14–11.30), allowing parents to stay during labour (AOR = 3.52, 1.299–9.56), and request for permission before any procedure (AOR = 2.39, 1.28–4.46). …”
Get full text
Article -
2109
Digital insurance acceptance among older adults in the context of AI
Published 2025-06-01“…This exploratory study employed the insights of the Technology Acceptance Model (TAM), the Information System Continuance Model (ISCM), and the Customer Satisfaction (C-SAT) method. Data were collected by conducting interviews in September 2024 with 20 older adults using AI-powered insurance services. …”
Get full text
Article -
2110
Micro, Small and Medium-sized Enterprises in the Digital Economy: Barriers to Digitalisation
Published 2025-06-01“…Implications / Recommendations: There is a need for education and support of digital competences, as well as to increase awareness among the owners of small firms as to the benefits digitalisation promises. At the same time, data and privacy must be protected in order to encourage entrepreneurs to safely implement digital solutions. …”
Get full text
Article -
2111
The Dynamics of Regional Head Elections in the Digital Era in Indonesia: The Perspective of First-Time Voters
Published 2025-06-01“…However, on the other hand, the use of social media in political campaigns faces several challenges, including the spread of disinformation, manipulation of opinions by buzzers and influencers, and potential violations of user data privacy. …”
Get full text
Article -
2112
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“… The effective use of cloud technology eliminates the barriers and potential IT obstacles that companies face by using a traditional way of developing a platform for the information systems, as a backbone of modern business. …”
Get full text
Article -
2113
User and Provider Experiences With Health Education Chatbots: Qualitative Systematic Review
Published 2025-06-01“… Abstract BackgroundChatbots, as dialog-based platforms, have the potential to transform health education and behavior-change interventions. Despite the growing use of chatbots, qualitative insights into user and provider experiences remain underexplored, particularly with respect to experiences and perceptions, adoption factors, and the role of theoretical frameworks in design. …”
Get full text
Article -
2114
Collection and sharing of health information in mental health and related systems in Australia: perspectives of people who access mental health services
Published 2024-12-01“…Focused group activities were conducted in which participants were asked to discuss and create a visual map to describe their collective experiences of sharing information relating to mental health and recovery. The data were analysed using qualitative content analysis and the coding techniques of constant comparative analysis. …”
Get full text
Article -
2115
Exploring the application of ChatGPT in ESL/EFL education and related research issues: a systematic review of empirical studies
Published 2024-11-01“…The included studies collectively provide solid evidence regarding the affordances (e.g., increased learning opportunities, personalised learning, and teacher support) and potential drawbacks (e.g., incorrect information, privacy leakage, and academic dishonesty) of ChatGPT use in ESL/EFL education. …”
Get full text
Article -
2116
Cross-cultural attitudes toward generative AI in Art: Implications for sustainable creativity in the U.S., Japan, and China
Published 2025-12-01“…While Chinese participants focus on data privacy and intellectual property protection, U.S. participants are more concerned with misinformation and fake content. …”
Get full text
Article -
2117
Interaction of Customer Satisfaction and Digital Service Retention: Evidence of PLS from Indonesian Islamic Banking
Published 2023-01-01“…This study uncovered the effect of ease of use, efficiency, interoperability, privacy security, responsiveness, reliability, service cost, and service portfolio on ISBC customer satisfaction. …”
Get full text
Article -
2118
Algerian Efl Students’ Perspectives And Practices On Ai-enabled Learning At The University Of Medea
Published 2025-05-01“…However, students identified several drawbacks, namely excessive reliance on AI, negative impact on their critical thinking, and the problem of unreliable AI-generated data. They also faced some challenges, such as limited access to advanced AI tools, privacy and security issues, and a lack of guidance on how to use AI thoughtfully and responsibly. …”
Get full text
Article -
2119
Who owns Internet of Thing devices?
Published 2018-11-01“…We propose to automatically extract owner annotation by utilizing a set of techniques (network scanning, machine learning, and natural language processing). We use the probing and classifier to determine whether the response data come from an IoT device. …”
Get full text
Article -
2120
Digital game addiction in elementary students: The impact of digital literacy, parental styles, and background variables
Published 2025-02-01“…The sample comprised 530 fourth-grade students from four primary schools in Turkey. Data were collected using the “Scale of Digital Game Addiction for Children”, “Digital Literacy Scale for Primary School Students”, and “Parental Style Scale”. …”
Get full text
Article