Search alternatives:
useds » uses (Expand Search)
Showing 2,061 - 2,080 results of 2,784 for search '((((( useds OR usedds) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.28s Refine Results
  1. 2061

    Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors by Priyanka Shrivastava

    Published 2025-04-01
    “…This study explores the factors influencing college students’ acceptance and resistance toward generative AI technologies by integrating three theoretical frameworks: the Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Social Exchange Theory (SET). Using data from 407 respondents collected through a structured survey, the study employed Structural Equation Modeling (SEM) to examine how functional factors (perceived usefulness, ease of use, and reliability), risk factors (privacy concerns, data security, and ethical issues), and sociolegal factors (trust in governance and regulatory frameworks) impact user attitudes. …”
    Get full text
    Article
  2. 2062

    Auxiliary Teaching and Student Evaluation Methods Based on Facial Expression Recognition in Medical Education by Xueling Zhu, Roben A Juanatas

    Published 2025-05-01
    “…This method consists of 4 key steps. In data collection, multiangle high-definition cameras record students’ facial expressions to ensure data comprehensiveness and accuracy. …”
    Get full text
    Article
  3. 2063

    Automotive Cybersecurity: A Survey on Frameworks, Standards, and Testing and Monitoring Technologies by Claudiu Vasile Kifor, Aurelian Popescu

    Published 2024-09-01
    “…To sustain and enhance the performance, quality, and reliability of vehicle systems, software engineers face significant challenges, including in diverse communication channels, software integration, complex testing, compatibility, core reusability, safety and reliability assurance, data privacy, and software security. Addressing cybersecurity risks presents a substantial challenge in finding practical solutions to these issues. …”
    Get full text
    Article
  4. 2064

    Decentralized Distributed Sequential Neural Networks Inference on Low-Power Microcontrollers in Wireless Sensor Networks: A Predictive Maintenance Case Study by Yernazar Bolat, Iain Murray, Yifei Ren, Nasim Ferdosian

    Published 2025-07-01
    “…The growing adoption of IoT applications has led to increased use of low-power microcontroller units (MCUs) for energy-efficient, local data processing. …”
    Get full text
    Article
  5. 2065

    Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences by Mohamed H. Shahin, Srijib Goswami, Sebastian Lobentanzer, Brian W. Corrigan

    Published 2025-03-01
    “…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
    Get full text
    Article
  6. 2066

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى by د. مها أحمد ابراهیم

    Published 2019-10-01
    “…The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. …”
    Get full text
    Article
  7. 2067

    Bridging the Gap between Neuroarchitecture, Artificial Intelligence, and Sustainability: A Systematic Review of Mental Health in the Built Environment by Esraa Elazab, Ahmed ELtawil

    Published 2025-09-01
    “…Ethical considerations related to data privacy and consent are also discussed, providing a comprehensive understanding of the potential and challenges in designing AI-driven neuroarchitecture-sustainable adaptive designs.…”
    Get full text
    Article
  8. 2068

    Encrypted traffic identification scheme based on sliding window and randomness features by LIU Jiachi, KUANG Boyu, SU Mang, XU Yaqian, FU Anmin

    Published 2024-08-01
    “…Specifically, the scheme involved sampling the payloads of data packets in sessions using a sliding window mechanism to obtain data block sequences that reflect the information patterns of the original traffic. …”
    Get full text
    Article
  9. 2069

    The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers by Mehrunnisa Saleem jan, Salman Ahmed, Safdar Nawaz Khan Marwat

    Published 2022-06-01
    “… Dynamic navigation devices like Global Positioning Systems (GPSs) are deployed for various purposes in different areas and these devices are usually the central point of interest of various groups like hackers to exploit the data sent and received by GPS systems. The GPS data is usually manipulated using spoofing attacks. …”
    Get full text
    Article
  10. 2070

    Decision-making model in digital commerce: electronic trust-based purchasing intention through online food delivery applications (OFDAs) by Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Laszlo Barna Iantovics, Maryam Manzoor, Muhammad Ali Raza, Zoia Khan

    Published 2024-09-01
    “…Design/methodology/approach – Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. …”
    Get full text
    Article
  11. 2071

    Toward Secure and Transparent Global Authentication: A Blockchain-Based System Integrating Biometrics and Subscriber Identification Module by Navid Khalili, Dimitrios Makrakis, Yaser Baseri, Abdelhakim Senhaji Hafid

    Published 2025-01-01
    “…This approach safeguards user privacy and data security. By employing blockchain technology, B2-GAS eliminates SPOFs, ensures tamper-proof transaction storage, and guarantees transparency. …”
    Get full text
    Article
  12. 2072

    Revolutionizing Imaging Design Content With AIGC: User-Centered Challenges, Opportunities, and Workflow Evolution by Zijian Zhu, Tao Yu, Yijing Wang, Junping Xu

    Published 2025-01-01
    “…Technological maturity and public acceptance serve as key adoption drivers, while social construction and innovation underscore AI’s capacity to foster creativity and design diversity. Ethics and privacy reflect user concerns over data security, whereas learning costs negatively affect adoption due to perceived complexity. …”
    Get full text
    Article
  13. 2073

    Fine-Tuned YOLO Model for Monitoring Children Across Medical Scenes Based on a Large-Scale Real-World Dataset for Children Detection by Samuel Diop, Francois Jouen, Jean Bergounioux, Imen Trabelsi

    Published 2025-01-01
    “…Accurate detection and monitoring of children in medical settings using computer vision systems present unique challenges due to anatomical differences, environmental complexity, and stringent privacy constraints. …”
    Get full text
    Article
  14. 2074
  15. 2075

    The IoT and AI in Agriculture: The Time Is Now—A Systematic Review of Smart Sensing Technologies by Tymoteusz Miller, Grzegorz Mikiciuk, Irmina Durlik, Małgorzata Mikiciuk, Adrianna Łobodzińska, Marek Śnieg

    Published 2025-06-01
    “…However, this review also identifies critical challenges, including high infrastructure costs, limited interoperability, connectivity constraints in rural areas, and ethical concerns regarding transparency and data privacy. To address these barriers, recent innovations have emphasized the potential of Edge AI for local inference, blockchain systems for decentralized data governance, and autonomous platforms for field-level automation. …”
    Get full text
    Article
  16. 2076

    Blockchain in maritime: applications, effects and challenges by Zhao Li, Zhao Li, Yongqiang Sun

    Published 2025-07-01
    “…To prevent issues such as information concealment and privacy breaches, these stakeholders often establish complex and multi-layered data exchange processes, which significantly reduce the operational efficiency of the shipping market. …”
    Get full text
    Article
  17. 2077

    Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies by Abraham Romero, Roberto Hernandez

    Published 2024-09-01
    “…The architecture, implemented on a private Ethereum network using Hyperledger Besu and Tessera, ensures secure and transparent transactions, robust dispute resolution, and fraud prevention mechanisms. …”
    Get full text
    Article
  18. 2078

    Criminal Law Challenged by Crossing into Virtual Reality by Mahdi Karimi

    Published 2025-03-01
    “…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
    Get full text
    Article
  19. 2079

    Teledentistry-Dental students' preparedness and patients' experiences. by Swarna Math, Janice Diong Li Nga, Huey Fen Lim, Maryam Amin, Camila Pacheco-Pereira

    Published 2025-01-01
    “…Descriptive statistics were used to summarise the data.<h4>Results</h4>Out of 125 students, 88% (N = 110) were contacted by 318 patients. …”
    Get full text
    Article
  20. 2080

    Providers' perceptions of implementing standardized postpartum family planning: a qualitative study of midwives and nurses in GhanaAJOG Global Reports at a Glance by Sarita Sonalkar, Ernest Maya, Chris Guure, Arden McAllister, Dzifa Adimle Puplampu, Roseline Dansowaa Doe, Mary Eluned Gaffield, James Kiarie

    Published 2025-05-01
    “…We interpreted data using thematic analysis. Results: Providers indicated that use of one-on-one counseling and the mobile application in hospital-based postpartum care delivery was acceptable, feasible, and appropriate. …”
    Get full text
    Article